📄 quiz 1.txt
字号:
Your score on this question is: 0.00
Feedback:
See section 1.1.1 of the course notes.
3.
The Maximum Transfer Unit (MTU) is a parameter of
(a) the application protocol
(b) the operating system
(c) the technology of the physical network
(d) the size of data sent by the application
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
4.
The Protocol Data Unit (PDU) that is sent by a protocol layer to its peer on the destination system typically includes
1. A payload
2. A protocol header
3. A router vendor ID
(a) I and III only
(b) I and II only
(c) II only
(d) I, II, and III
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.5 of the course notes.
5.
_____ can be used to measure latency in the communication network.
(a) Bit Error Rate
(b) Roundtrip time
(c) Percentage of packets retransmitted
(d) Throughput
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.4 of the course notes.
6.
Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination
(a) only in the order A-B, after possibly having traversed different routes
(b) only in the order A-B, after having traversed the same route
(c) in any order, after possibly having traversed different routes
(d) in any order, after having traversed the same route
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.2 of the course notes.
7.
An application on a computer sends data through a socket to another computer. Which of the following are specified by the communication protocol?
1. The contents of the message body
2. The speed of transmission
3. The header format, which specifies the header field sizes and meanings
(a) III only
(b) II and III only
(c) I and III only
(d) I only
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
8.
An advantage of defining network protocols through agreement among many companies and individuals is that
(a) otherwise source code would need to be shipped with all networking applications
(b) only one implementation need then be created
(c) different implementations can then communicate with each other
(d) a protocol designed by committee always has better performance than that designed by a single company or research project
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
9.
You have recently become the first network engineer of a large corporation with offices worldwide. The company is considering the installation of a data network, but the Board of Directors is rather old-fashioned and does not see the need to change the company's time-honored business practices. Your first task at the job is to justify your salary and the cost of a new network, and for this purpose you are about to give a presentation to the Board of Directors. Which of the following would you include in your presentation? Assume the directors are extremely intelligent, though perhaps not knowledgeable in your field.
1. Lower expenditures on computer hardware
2. Higher availability of customer services
3. Better protection of the company's proprietary information
(a) I and III only
(b) II and III
(c) I and II only
(d) II only
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1 of the course notes.
10.
The transmission of high-quality, interactive voice and video over the current Internet is difficult because today's Internet
(a) uses connectionless protocols
(b) is unable to guarantee minimum throughput or maximum latency for a given connection
(c) does not really have sufficient throughput
(d) gives higher priority to bulk data transfers
Correct answer is (b)
Your score on this question is: 10.00
An advantage of defining network protocols through agreement among many companies and individuals is that
(a) only one implementation need then be created
(b) different implementations can then communicate with each other
(c) otherwise source code would need to be shipped with all networking applications
(d) a protocol designed by committee always has better performance than that designed by a single company or research project
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
2.
_____ can be used to measure latency in the communication network.
(a) Bit Error Rate
(b) Roundtrip time
(c) Percentage of packets retransmitted
(d) Throughput
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.4 of the course notes.
3.
All store-and-forward networks are
(a) connectionless networks
(b) broadcast networks
(c) connection-based networks
(d) packet or message switched networks
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
4.
Two packets A and B are sent in that order through a connectionless communication network. They will arrive at the destination
(a) in the order A-B, after possibly having traversed different routes
(b) in the order A-B, after having traversed the same route
(c) in any order, after possibly having traversed different routes
(d) in any order, after having traversed the same route
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1.2 of the course notes.
5.
Which of the following distinguish stream sockets (e.g., TCP) from datagram sockets (e.g., UDP)?
1. Stream sockets guarantee delivery of the data sent through them.
2. Stream sockets can be used to send application data to a remote host, whereas datagram sockets can only send control commands.
3. Stream sockets have greater overhead.
(a) I and II only
(b) I only
(c) I and III only
(d) II and III only
Correct answer is (c)
Your score on this question is: 0.00
Feedback:
See section 1.1.1 of the course notes.
6.
Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination
(a) only in the order A-B, after possibly having traversed different routes
(b) only in the order A-B, after having traversed the same route
(c) in any order, after having traversed the same route
(d) in any order, after possibly having traversed different routes
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.2 of the course notes.
7.
Which of the following activities use an inter-network?
1. A phone call from Pittsburgh in the United States to Chennai in India
2. A phone call from a wired phone to a mobile ("cell") phone
3. A chat session between two computers connected to an office Ethernet
(a) III only
(b) I and II only
(c) I, II, and III
(d) I only
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.6 of the course notes.
8.
John is using his bank's Web server to pay his telephone bill electronically. Which kind(s) of network interaction take(s) place in this Scenario, from the moment John logs into his bank's Web site until the telephone company receives the money?
1. People-people
2. People-computer
3. Computer-computer
(a) II only
(b) III only
(c) II and III only
(d) I, II, and III
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1 of the course notes.
9.
The Protocol Data Unit (PDU) that is sent by a protocol layer to its peer on the destination system typically includes
1. A payload
2. A protocol header
3. A router vendor ID
(a) II only
(b) I and II only
(c) I, II, and III
(d) I and III only
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.5 of the course notes.
10.
An application on a computer sends data through a socket to another computer. Which of the following are specified by the communication protocol?
1. The contents of the message body
2. The speed of transmission
3. The header format, which specifies the header field sizes and meanings
(a) II and III only
(b) I and III only
(c) I only
(d) III only
Correct answer is (d)
Your score on this question is: 10.00View Assessment Result: Multiple-Choice Quiz 1
Your performance was as follows:
1.
What can be said concerning the protocol that is used by the implementation of the network layer of an Internet host?
It guarantees delivery.
It is the Internet Protocol (IP).
It uses services provided by the session layer.
(a) I and II only
(b) none
(c) II only
(d) I only
Correct answer is (c)
Your score on this question is: 0.00
Feedback:
See section 1.1.5 of the course notes.
--------------------------------------------------------------------------------
2.
Why do network applications send "messages," but the network transmits information in "packets?"
Buffer allocation and error handling is easier when done for smaller chunks of data.
Multiple messages can be sent in a single large packet to decrease overhead.
Network engineers and application programmers just use different terminology for the same unit of application data.
A message needs to be packaged with the instructions to process it at the destination.
(a) II and III only
(b) I and II only
(c) II and IV only
(d) I, II, III, and IV
Correct answer is (b)
Your score on this question is: 0.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
3.
The Internet received its name in the 1980s because
(a) it consisted of many interconnected networks
(b) it was meant to be a network internal to the United States Department of Defense
(c) it was an interim (temporary) design of what it later became, but the name stuck
(d) it achieved international scope with the addition of the City University of London
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
4.
Ethernet (IEEE 802.3) is an example of
(a) a successful example of the Internet's strategy of developing standards through "rough consensus and running code"
(b) an a priori standard
(c) a standard developed by the International Telecommunications Union
(d) a de facto standard later developed into a de jure standard
Correct answer is (d)
Your score on this question is: 0.00
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
5.
A computer sends 100 Kbytes of aggregate data to another computer through the network. If this transmission time takes 10 seconds and setup time is negligible, the throughput of this network is
(a) not able to be determined with the information given
(b) exactly 10 Kbps
(c) in the range from 60 to 120 Kbps (kilobits per second)
(d) in the range from 6 to 12 Kbps (kilobits per second)
Correct answer is (c)
Your score on this question is: 0.00
Feedback:
See section 1.1.4 of the course notes.
--------------------------------------------------------------------------------
6.
Which of the following methods are invoked by a server implemented with sockets?
connect( )
listen( )
accept( )
(a) II and III only
(b) III only
(c) I, II, and III
(d) II only
Correct answer is (a)
Your score on this question is: 0.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
7.
Which of the following parameters can be specified in the header of a request in the Hypertext Transfer Protocol (HTTP)?
The types of image formats that a browser understands
The type of browser (e.g., Netscape, Internet Explorer) making the request
The method by which the request is to be satisfied—for example, whether the request is a GET of a form submission
(a) II and III only
(b) I, II, and III
(c) I and II only
(d) III only
Correct answer is (b)
Your score on this question is: 0.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -