--%>

MIME content type

State the MIME content type &explain?

E

Expert

Verified

It is used in order to declare the general type of the data. Subtype describes the particular format for that type of data. It consists of 7 content type and 15 subtypes. They are:

1) Text type

a) Plain text.
b) Enriched.

2) Multipart type

a) Multipart/parallel.
b) Multipart/mixed.
c) Multipart/alternative.
d) Multipart/digest.

3) Message type

a) Message/RFC822.
b) Message/partial.
c) Message/external.

4. Image type

a) JPEG.
d) CIF.

5. Audio type.

6. Video type.

7. Application type

a) Post script.
b) Octet stream.

   Related Questions in Computer Network Security

  • Q : What is ReefEdge Connect System

    ReefEdge Connect System: The ReefEdge connect system works on three layers of security: privacy, access control and authentication. The system then recognizes the technologies needed to address the security requirement for each of the above mentioned

  • Q : Competition matrix-Michael Porters

    The competition matrix is a term used while talking about strategy development, first used by Michael E. Porter 1983. They tell about product politics in marketing for individual business fields of an enterprise to gain competition advantage. In this,

  • Q : Cryptographic Systems What are

    What are Cryptographic Systems?

  • Q : Analysis on Wireless Technology 1.

    1. Summarize what is being accomplished in this section in a few sentences. What is being accomplished here is that we have created a sequence generator that outputs two short random messages. The multiple sequence source generates

  • Q : Wireless Information Security System

    Wireless Information Security System: In any wireless network only secure authorized usage should be given and the company should make sure o putting the best practices into use. The access points should not be given access without putting it through

  • Q : Application and benefits of IP security

    List out the various application and benefits of IP security?

  • Q : Cloud computingb security syntheses +20

    syntheses +20 paper +5 figures starting from introduction until conclusion

  • Q : Network layers What are the methods

    What are the methods used by a station to sense whether a station is idle or busy? Explain with a neat diagram.

  • Q : Critics of online communities The

    The Critics of online communities discuss that there is very big potential for deceit in online relationships in comparison to face-to face ones. Explain the advantages or disadvantages of having the capability to represent yourself differently in an

  • Q : Number of keys required to communicate

    Specify the number of keys required for the two people to communicate through a cipher?