⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 选择题题库07.txt

📁 卡耐基SSD8选择题答案TXT版 相信对大家有好处
💻 TXT
📖 第 1 页 / 共 5 页
字号:
View Assessment Result: Multiple-Choice Quiz 9



 

 Your performance was as follows:  

 1. 
 Which of the following are true of CORBA's dynamic discovery of interfaces? 
Parameter values are matched by the number and type of the parameters. 
Parameter values can be provided by a human user at run time. 
 
 

  (a) II only
 (b) I and II
 (c) I only
 (d) None  

 Correct answer is  (a)  

 Your score on this question is: 20.00  

 Feedback: 
   See section 3.3.2 of the course notes.  
 

--------------------------------------------------------------------------------

 2. 
 In ORB environments, services are implemented as _____, and they are invoked through a(n) _____. 
 

  (a) stateless functions, interpreter
 (b) objects, RMI
 (c) URLs, Web browser
 (d) procedures, RPC  

 Correct answer is  (b)  

 Your score on this question is: 20.00  

 Feedback: 
   See section 3.3.1 of the course notes.  
 

--------------------------------------------------------------------------------

 3. 
 Which of the following are supported by Jini? 
Entire object passing 
Discovery service that looks up services based on a set of attributes 
 
 

  (a) I and II
 (b) I only
 (c) None
 (d) II only  

 Correct answer is  (a)  

 Your score on this question is: 20.00  

 Feedback: 
   See section 3.3.3 of the course notes.  
 

--------------------------------------------------------------------------------

 4. 
 In a traditional distributed computing environment, _____ decides what services are needed and configures a set of servers to provide those services. 
 

  (a) the system manager
 (b) the user
 (c) a process load table
 (d) a central server  

 Correct answer is  (a)  

 Your score on this question is: 20.00  

 Feedback: 
   See section 3.3.1 of the course notes.  
 

--------------------------------------------------------------------------------

 5. 
 To convert a CORBA object reference to a string, one could use 
 

  (a) the ORB Interface
 (b) the Object Adapter
 (c) the DSI
 (d) the Implementation Repository  

 Correct answer is  (a)  

 Your score on this question is: 20.00  

 Feedback: 
   See section 3.3.2 of the course notes.  
 

--------------------------------------------------------------------------------

 Go to top of assessment.  

 Total score: 100.00 

 
? Copyright 2003 iCarnegie, Inc. All rights reserved. 

 2. 
 _____ prevents mobile code from accessing the memory of other users or of the system 
 

  (a) Sandboxing
 (b) Multithreading
 (c) Executing binary executables
 (d) Real-time scheduling  

 Correct answer is  (a)  

2. 
 A Caesar cipher is a kind of 
 

  (a) transposition cipher
 (b) substitution cipher
 (c) unbreakable cipher
 (d) product cipher  

 Correct answer is  (b)  

 Your performance was as follows:  

 1. 
 An advantage of defining network protocols through agreement among many companies and individuals is that 
 

  (a) otherwise source code would need to be shipped with all networking applications
 (b) a protocol designed by committee always has better performance than that designed by a single company or research project
 (c) only one implementation need then be created
 (d) different implementations can then communicate with each other  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 2. 
 Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination 
 

  (a) in any order, after possibly having traversed different routes
 (b) only in the order A-B, after having traversed the same route
 (c) in any order, after having traversed the same route
 (d) only in the order A-B, after possibly having traversed different routes  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.2 of the course notes.  
 

--------------------------------------------------------------------------------

 3. 
 Packet collisions occur in an Ethernet network because 
 

  (a) the Ethernet uses a ring topology
 (b) the Ethernet switching mechanism may occasionally send two packets through the same route
 (c) two Ethernet nodes can send packets at the same time
 (d) two different Ethernet networks may be spliced together  

 Correct answer is  (c)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.2 of the course notes.  
 

--------------------------------------------------------------------------------

 4. 
 You have recently become the first network engineer of a large corporation with offices worldwide. The company is considering the installation of a data network, but the Board of Directors is rather old-fashioned and does not see the need to change the company's time-honored business practices. Your first task at the job is to justify your salary and the cost of a new network, and for this purpose you are about to give a presentation to the Board of Directors. Which of the following would you include in your presentation? Assume the directors are extremely intelligent, though perhaps not knowledgeable in your field. 
Lower expenditures on computer hardware 
Higher availability of customer services 
Better protection of the company's proprietary information 
 
 

  (a) I and II only
 (b) II only
 (c) I and III only
 (d) II and III  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 5. 
 Two packets A and B are sent in that order through a connectionless communication network. They will arrive at the destination 
 

  (a) in the order A-B, after having traversed the same route
 (b) in the order A-B, after possibly having traversed different routes
 (c) in any order, after having traversed the same route
 (d) in any order, after possibly having traversed different routes  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.2 of the course notes.  
 

--------------------------------------------------------------------------------

 6. 
 John is using his bank's Web server to pay his telephone bill electronically. Which kind(s) of network interaction take(s) place in this Scenario, from the moment John logs into his bank's Web site until the telephone company receives the money? 
People-people 
People-computer 
Computer-computer 
 
 

  (a) I, II, and III
 (b) II and III only
 (c) III only
 (d) II only  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 7. 
 The Protocol Data Unit (PDU) that is sent by a protocol layer to its peer on the destination system typically includes 
A payload 
A protocol header 
A router vendor ID 
 
 

  (a) I, II, and III
 (b) I and II only
 (c) II only
 (d) I and III only  

 Correct answer is  (b)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.5 of the course notes.  
 

--------------------------------------------------------------------------------

 8. 
 Which of the following methods are invoked by a client implemented with sockets? 
connect( ) 
listen( ) 
read( ) 
 
 

  (a) III only
 (b) I, II, and III
 (c) I only
 (d) I and III only  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 9. 
 When you connect your computer to the Internet, the protocol(s) your computer uses is (are) selected according to 
 

  (a) which operating system is running on your computer
 (b) which HTTP (Web) server you connect to
 (c) the application client and server you use at each moment
 (d) what vendor your Internet service provider purchased equipment from  

 Correct answer is  (c)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 10. 
 Which of the following are specified by the HTTP protocol? 
The syntax of the request header 
The syntax of the response header 
The specific legal names of the request header fields 
 
 

  (a) I, II, and III
 (b) I and III only
 (c) I only
 (d) I and II only  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.
   (d) All header field names are valid; it is up to the client and the server to understand each other's field names, or to ignore them.  


 1. 
 All store-and-forward networks are 
 

  (a) connectionless networks
 (b) connection-based networks
 (c) packet or message switched networks
 (d) broadcast networks  

 Correct answer is  (c)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 



--------------------------------------------------------------------------------

 2. 
 Which of the following are specified by the HTTP protocol? 
The syntax of the request header 
The syntax of the response header 
The specific legal names of the request header fields 
 
 

  (a) I and III only
 (b) I only
 (c) I and II only
 (d) I, II, and III  

 Correct answer is  (c)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 3. 
 The transmission of high-quality, interactive voice and video over the current Internet is difficult because today's Internet 
 

  (a) gives higher priority to bulk data transfers
 (b) uses connectionless protocols
 (c) does not really have sufficient throughput
 (d) is unable to guarantee minimum throughput or maximum latency for a given connection  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.4 of the course notes.  
 

--------------------------------------------------------------------------------

 4. 
 Which of the following methods are invoked by a client implemented with sockets? 
connect( ) 
listen( ) 
read( ) 
 
 

  (a) I only
 (b) III only
 (c) I, II, and III
 (d) I and III only  

 Correct answer is  (d)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 5. 
 What can be said concerning the protocol that is used by the implementation of the network layer of an Internet host? 
It guarantees delivery. 
It is the Internet Protocol (IP). 
It uses services provided by the session layer. 
 
 

  (a) none
 (b) II only
 (c) I only
 (d) I and II only  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.5 of the course notes.  
 

--------------------------------------------------------------------------------

 6. 
 _____ can be used to measure latency in the communication network. 
 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -