📄 quiz 1.txt
字号:
See section 1.1.1 of the course notes.
(c) The protocol specifies how to transmit the contents, but not what the contents are.
7.
John is using his bank's Web server to pay his telephone bill electronically. Which kind(s) of network interaction take(s) place in this Scenario, from the moment John logs into his bank's Web site until the telephone company receives the money?
1. People-people
2. People-computer
3. Computer-computer
(a) III only
(b) I, II, and III
(c) II only
(d) II and III only
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1 of the course notes.
8.
When you connect your computer to the Internet, the protocol(s) your computer uses is (are) selected according to
(a) which operating system is running on your computer
(b) the application client and server you use at each moment
(c) which HTTP (Web) server you connect to
(d) what vendor your Internet service provider purchased equipment from
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
9.
Which of the following activities use an inter-network?
1. A phone call from Pittsburgh in the United States to Chennai in India
2. A phone call from a wired phone to a mobile ("cell") phone
3. A chat session between two computers connected to an office Ethernet
(a) III only
(b) I and II only
(c) I, II, and III
(d) I only
Correct answer is (b)
Your score on this question is: 0.00
Feedback:
See section 1.1.6 of the course notes.
10.
Ethernet (IEEE 802.3) is an example of
(a) a successful example of the Internet's strategy of developing standards through "rough consensus and running code"
(b) a standard developed by the International Telecommunications Union
(c) a de facto standard later developed into a de jure standard
(d) an a priori standard
Correct answer is (c)
1.
Which of the following pairs of entities name a client and one of its servers?
1. Google search engine/www.example.com
2. Web browser/Google search engine
3. Email client/Web browser
(a) II and III only
(b) I and II only
(c) I, II, and III
(d) II only
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
2.
John is using his bank's Web server to pay his telephone bill electronically. Which kind(s) of network interaction take(s) place in this Scenario, from the moment John logs into his bank's Web site until the telephone company receives the money?
1. People-people
2. People-computer
3. Computer-computer
(a) II and III only
(b) III only
(c) I, II, and III
(d) II only
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1 of the course notes.
3.
When you connect your computer to the Internet, the protocol(s) your computer uses is (are) selected according to
(a) which HTTP (Web) server you connect to
(b) the application client and server you use at each moment
(c) which operating system is running on your computer
(d) what vendor your Internet service provider purchased equipment from
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
4.
The transmission of high-quality, interactive voice and video over the current Internet is difficult because today's Internet
(a) is unable to guarantee minimum throughput or maximum latency for a given connection
(b) gives higher priority to bulk data transfers
(c) uses connectionless protocols
(d) does not really have sufficient throughput
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.4 of the course notes.
5.
All store-and-forward networks are
(a) packet or message switched networks
(b) broadcast networks
(c) connectionless networks
(d) connection-based networks
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
6.
An advantage of defining network protocols through agreement among many companies and individuals is that
(a) otherwise source code would need to be shipped with all networking applications
(b) only one implementation need then be created
(c) different implementations can then communicate with each other
(d) a protocol designed by committee always has better performance than that designed by a single company or research project
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
7.
You have recently become the first network engineer of a large corporation with offices worldwide. The company is considering the installation of a data network, but the Board of Directors is rather old-fashioned and does not see the need to change the company's time-honored business practices. Your first task at the job is to justify your salary and the cost of a new network, and for this purpose you are about to give a presentation to the Board of Directors. Which of the following would you include in your presentation? Assume the directors are extremely intelligent, though perhaps not knowledgeable in your field.
1. Lower expenditures on computer hardware
2. Higher availability of customer services
3. Better protection of the company's proprietary information
(a) II and III
(b) II only
(c) I and II only
(d) I and III only
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1 of the course notes.
8.
A packet with no data is sent from host A to host B on an otherwise idle network. The packet is found to have taken 35 milliseconds to reach B. The incremental overhead to send an additional byte (usually called the "throughput") is estimated to be five microseconds by repeatedly measuring the transmission times of long packets. Approximately, how long will an eight Kbytes (8192 bytes) packet take to reach B when sent from A?
(a) cannot be determined from the information given
(b) 76 milliseconds
(c) 55 milliseconds
(d) 40 milliseconds
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.4 of the course notes.
9.
Why do network applications send "messages," but the network transmits information in "packets?"
1. Buffer allocation and error handling is easier when done for smaller chunks of data.
2. Multiple messages can be sent in a single large packet to decrease overhead.
3. Network engineers and application programmers just use different terminology for the same unit of application data.
4. A message needs to be packaged with the instructions to process it at the destination.
(a) I and II only
(b) I, II, III, and IV
(c) II and IV only
(d) II and III only
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
10.
Which of the following methods are invoked by a client implemented with sockets?
1. connect( )
2. listen( )
3. read( )
(a) III only
(b) I, II, and III
(c) I only
(d) I and III only
Correct answer is (d)
Your score on this question is: 10.00
1.
Which of the following methods are invoked by a client implemented with sockets?
1. connect( )
2. listen( )
3. read( )
(a) III only
(b) I only
(c) I, II, and III
(d) I and III only
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
2.
Which of the following methods are invoked by a server implemented with sockets?
1. connect( )
2. listen( )
3. accept( )
(a) III only
(b) II only
(c) II and III only
(d) I, II, and III
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
3.
You have recently become the first network engineer of a large corporation with offices worldwide. The company is considering the installation of a data network, but the Board of Directors is rather old-fashioned and does not see the need to change the company's time-honored business practices. Your first task at the job is to justify your salary and the cost of a new network, and for this purpose you are about to give a presentation to the Board of Directors. Which of the following would you include in your presentation? Assume the directors are extremely intelligent, though perhaps not knowledgeable in your field.
1. Lower expenditures on computer hardware
2. Higher availability of customer services
3. Better protection of the company's proprietary information
(a) II only
(b) I and III only
(c) II and III
(d) I and II only
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1 of the course notes.
4.
Which of the following parameters can be specified in the header of a request in the Hypertext Transfer Protocol (HTTP)?
1. The types of image formats that a browser understands
2. The type of browser (e.g., Netscape, Internet Explorer) making the request
3. The method by which the request is to be satisfied—for example, whether the request is a GET of a form submission
(a) III only
(b) II and III only
(c) I and II only
(d) I, II, and III
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
5.
What can be said about the protocol used by the implementation of the transport layer of an Internet host?
1. It guarantees delivery.
2. It is the Transmission Control Protocol (TCP).
3. It uses services provided by the session layer.
(a) I and III only
(b) I only
(c) I and II only
(d) none
Correct answer is (d)
Your score on this question is: 0.00
Feedback:
See section 1.1.5 of the course notes.
6.
Two packets A and B are sent in that order through a connectionless communication network. They will arrive at the destination
(a) in the order A-B, after possibly having traversed different routes
(b) in any order, after having traversed the same route
(c) in the order A-B, after having traversed the same route
(d) in any order, after possibly having traversed different routes
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.2 of the course notes.
7.
Every Protocol Data Unit (PDU) that is sent by a protocol layer to its remote peer on the destination system always includes:
1. The headers for all the protocols of the layers above it
2. The headers for the protocol of the layer below it
3. Application Data
(a) III only
(b) None
(c) I and III only
(d) I, II, and III
Correct answer is (b)
Your score on this question is: 0.00
Feedback:
See section 1.1.5 of the course notes.
8.
What can be said concerning the protocol that is used by the implementation of the network layer of an Internet host?
1. It guarantees delivery.
2. It is the Internet Protocol (IP).
3. It uses services provided by the session layer.
(a) I only
(b) none
(c) II only
(d) I and II only
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1.5 of the course notes.
9.
The transmission of high-quality, interactive voice and video over the current Internet is difficult because today's Internet
(a) uses connectionless protocols
(b) gives higher priority to bulk data transfers
(c) does not really have sufficient throughput
(d) is unable to guarantee minimum throughput or maximum latency for a given connection
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.4 of the course notes.
10.
All store-and-forward networks are
(a) connectionless networks
(b) broadcast networks
(c) packet or message switched networks
(d) connection-based networks
Correct answer is (c)
Your score on this question is: 10.00
.
How does an operating system identify the application to which data coming in from the network should be relayed?
(a) Only one application at a time is given access to the network.
(b) By the protocol with which the data was sent
(c) By the file extension of the data
(d) By the port number carried by the transport protocol
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
2.
Which of the following methods are invoked by a client implemented with sockets?
1. connect( )
2. listen( )
3. read( )
(a) I only
(b) I, II, and III
(c) I and III only
(d) III only
Correct answer is (c)
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -