📄 选择题题库07.txt
字号:
Correct answer is (d)
Your score on this question is: 0.00
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
8.
Which of the following are specified by the HTTP protocol?
The syntax of the request header
The syntax of the response header
The specific legal names of the request header fields
(a) I only
(b) I, II, and III
(c) I and II only
(d) I and III only
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
(c) All header field names are valid; it is up to the client and the server to understand each other's field names, or to ignore them.
--------------------------------------------------------------------------------
9.
Why do network applications send "messages," but the network transmits information in "packets?"
Buffer allocation and error handling is easier when done for smaller chunks of data.
Multiple messages can be sent in a single large packet to decrease overhead.
Network engineers and application programmers just use different terminology for the same unit of application data.
A message needs to be packaged with the instructions to process it at the destination.
(a) II and III only
(b) I and II only
(c) I, II, III, and IV
(d) II and IV only
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
10.
In a broadcast network
(a) all computers see and process the application data within all packets
(b) all computers see all packets, but the application data in each packet is only processed by the destination computer
(c) only the computers that are tuned to a channel see and process the packets in that channel
(d) only the destination computer sees a packet
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
View Assessment Result: Multiple-Choice Quiz 1
Your performance was as follows:
1.
Which of the following methods are invoked by a server implemented with sockets?
connect( )
listen( )
accept( )
(a) II only
(b) II and III only
(c) I, II, and III
(d) III only
Correct answer is (b)
Your score on this question is: 0.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
2.
Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination
(a) only in the order A-B, after having traversed the same route
(b) in any order, after possibly having traversed different routes
(c) in any order, after having traversed the same route
(d) only in the order A-B, after possibly having traversed different routes
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.2 of the course notes.
--------------------------------------------------------------------------------
3.
Which of the following activities use an inter-network?
A phone call from Pittsburgh in the United States to Chennai in India
A phone call from a wired phone to a mobile ("cell") phone
A chat session between two computers connected to an office Ethernet
(a) I, II, and III
(b) I and II only
(c) III only
(d) I only
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
4.
Which of the following parameters can be specified in the header of a request in the Hypertext Transfer Protocol (HTTP)?
The types of image formats that a browser understands
The type of browser (e.g., Netscape, Internet Explorer) making the request
The method by which the request is to be satisfied—for example, whether the request is a GET of a form submission
(a) II and III only
(b) III only
(c) I and II only
(d) I, II, and III
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
5.
You have recently become the first network engineer of a large corporation with offices worldwide. The company is considering the installation of a data network, but the Board of Directors is rather old-fashioned and does not see the need to change the company's time-honored business practices. Your first task at the job is to justify your salary and the cost of a new network, and for this purpose you are about to give a presentation to the Board of Directors. Which of the following would you include in your presentation? Assume the directors are extremely intelligent, though perhaps not knowledgeable in your field.
Lower expenditures on computer hardware
Higher availability of customer services
Better protection of the company's proprietary information
(a) I and II only
(b) II only
(c) II and III
(d) I and III only
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1 of the course notes.
--------------------------------------------------------------------------------
6.
An application on a computer sends data through a socket to another computer. Which of the following are specified by the communication protocol?
The contents of the message body
The speed of transmission
The header format, which specifies the header field sizes and meanings
(a) I only
(b) III only
(c) I and III only
(d) II and III only
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
7.
Packet collisions occur in an Ethernet network because
(a) the Ethernet uses a ring topology
(b) two different Ethernet networks may be spliced together
(c) two Ethernet nodes can send packets at the same time
(d) the Ethernet switching mechanism may occasionally send two packets through the same route
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1.2 of the course notes.
--------------------------------------------------------------------------------
8.
Which of the following methods are invoked by a client implemented with sockets?
connect( )
listen( )
read( )
(a) I only
(b) I and III only
(c) III only
(d) I, II, and III
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
9.
An advantage of defining network protocols through agreement among many companies and individuals is that
(a) otherwise source code would need to be shipped with all networking applications
(b) different implementations can then communicate with each other
(c) a protocol designed by committee always has better performance than that designed by a single company or research project
(d) only one implementation need then be created
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
10.
Ethernet (IEEE 802.3) is an example of
(a) a standard developed by the International Telecommunications Union
(b) an a priori standard
(c) a successful example of the Internet's strategy of developing standards through "rough consensus and running code"
(d) a de facto standard later developed into a de jure standard
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.6 of the course notes.
1.
Which of the following parameters can be specified in the header of a request in the Hypertext Transfer Protocol (HTTP)?
The types of image formats that a browser understands
The type of browser (e.g., Netscape, Internet Explorer) making the request
The method by which the request is to be satisfied—for example, whether the request is a GET of a form submission
(a) III only
(b) I, II, and III
(c) II and III only
(d) I and II only
Correct answer is (b)
Your score on this question is: 0.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
2.
Which of the following distinguish stream sockets (e.g., TCP) from datagram sockets (e.g., UDP)?
Stream sockets guarantee delivery of the data sent through them.
Stream sockets can be used to send application data to a remote host, whereas datagram sockets can only send control commands.
Stream sockets have greater overhead.
(a) I and III only
(b) I and II only
(c) II and III only
(d) I only
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
3.
A computer sends 100 Kbytes of aggregate data to another computer through the network. If this transmission time takes 10 seconds and setup time is negligible, the throughput of this network is
(a) not able to be determined with the information given
(b) exactly 10 Kbps
(c) in the range from 60 to 120 Kbps (kilobits per second)
(d) in the range from 6 to 12 Kbps (kilobits per second)
Correct answer is (c)
Your score on this question is: 0.00
Feedback:
See section 1.1.4 of the course notes.
--------------------------------------------------------------------------------
4.
An application on a computer sends data through a socket to another computer. Which of the following are specified by the communication protocol?
The contents of the message body
The speed of transmission
The header format, which specifies the header field sizes and meanings
(a) II and III only
(b) III only
(c) I only
(d) I and III only
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
5.
An advantage of defining network protocols through agreement among many companies and individuals is that
(a) different implementations can then communicate with each other
(b) otherwise source code would need to be shipped with all networking applications
(c) only one implementation need then be created
(d) a protocol designed by committee always has better performance than that designed by a single company or research project
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
6.
We send a packet from host A to host B, which immediately acknowledges it. We measure the interval between the time the packet is sent by A and its acknowledgement is received. This interval is found to be 180 milliseconds. What can be said about the latency of the link from A to B?
(a) It is smaller than 180 ms.
(b) It is greater than 180 ms.
(c) It is exactly 180 ms.
(d) It is exactly 90 ms.
Correct answer is (a)
Your score on this question is: 0.00
Feedback:
See section 1.1.4 of the course notes.
(d) This would be so only if the latency in the direction A->B was identical to the latency in the direction B->A
--------------------------------------------------------------------------------
7.
What can be said about the protocol used by the implementation of the transport layer of an Internet host?
It guarantees delivery.
It is the Transmission Control Protocol (TCP).
It uses services provided by the session layer.
(a) none
(b) I only
(c) I and II only
(d) I and III only
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.5 of the course notes.
--------------------------------------------------------------------------------
8.
Which of the following methods are invoked by a client implemented with sockets?
connect( )
listen( )
read( )
(a) I, II, and III
(b) III only
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -