⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 选择题题库07.txt

📁 卡耐基SSD8选择题答案TXT版 相信对大家有好处
💻 TXT
📖 第 1 页 / 共 5 页
字号:

 Correct answer is  (d)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.6 of the course notes.  
 

--------------------------------------------------------------------------------

 8. 
 Which of the following are specified by the HTTP protocol? 
The syntax of the request header 
The syntax of the response header 
The specific legal names of the request header fields 
 
 

  (a) I only
 (b) I, II, and III
 (c) I and II only
 (d) I and III only  

 Correct answer is  (c)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.
   (c) All header field names are valid; it is up to the client and the server to understand each other's field names, or to ignore them.  
 

--------------------------------------------------------------------------------

 9. 
 Why do network applications send "messages," but the network transmits information in "packets?" 
Buffer allocation and error handling is easier when done for smaller chunks of data. 
Multiple messages can be sent in a single large packet to decrease overhead. 
Network engineers and application programmers just use different terminology for the same unit of application data. 
A message needs to be packaged with the instructions to process it at the destination. 
 
 

  (a) II and III only
 (b) I and II only
 (c) I, II, III, and IV
 (d) II and IV only  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 10. 
 In a broadcast network 
 

  (a) all computers see and process the application data within all packets
 (b) all computers see all packets, but the application data in each packet is only processed by the destination computer
 (c) only the computers that are tuned to a channel see and process the packets in that channel
 (d) only the destination computer sees a packet  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  




View Assessment Result: Multiple-Choice Quiz 1



 

 Your performance was as follows:  

 1. 
 Which of the following methods are invoked by a server implemented with sockets? 
connect( ) 
listen( ) 
accept( ) 
 
 

  (a) II only
 (b) II and III only
 (c) I, II, and III
 (d) III only  

 Correct answer is  (b)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 2. 
 Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination 
 

  (a) only in the order A-B, after having traversed the same route
 (b) in any order, after possibly having traversed different routes
 (c) in any order, after having traversed the same route
 (d) only in the order A-B, after possibly having traversed different routes  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.2 of the course notes.  
 

--------------------------------------------------------------------------------

 3. 
 Which of the following activities use an inter-network? 
A phone call from Pittsburgh in the United States to Chennai in India 
A phone call from a wired phone to a mobile ("cell") phone 
A chat session between two computers connected to an office Ethernet 
 
 

  (a) I, II, and III
 (b) I and II only
 (c) III only
 (d) I only  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.6 of the course notes.  
 

--------------------------------------------------------------------------------

 4. 
 Which of the following parameters can be specified in the header of a request in the Hypertext Transfer Protocol (HTTP)? 
The types of image formats that a browser understands 
The type of browser (e.g., Netscape, Internet Explorer) making the request 
The method by which the request is to be satisfied—for example, whether the request is a GET of a form submission 
 
 

  (a) II and III only
 (b) III only
 (c) I and II only
 (d) I, II, and III  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 5. 
 You have recently become the first network engineer of a large corporation with offices worldwide. The company is considering the installation of a data network, but the Board of Directors is rather old-fashioned and does not see the need to change the company's time-honored business practices. Your first task at the job is to justify your salary and the cost of a new network, and for this purpose you are about to give a presentation to the Board of Directors. Which of the following would you include in your presentation? Assume the directors are extremely intelligent, though perhaps not knowledgeable in your field. 
Lower expenditures on computer hardware 
Higher availability of customer services 
Better protection of the company's proprietary information 
 
 

  (a) I and II only
 (b) II only
 (c) II and III
 (d) I and III only  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 6. 
 An application on a computer sends data through a socket to another computer. Which of the following are specified by the communication protocol? 
The contents of the message body 
The speed of transmission 
The header format, which specifies the header field sizes and meanings 
 
 

  (a) I only
 (b) III only
 (c) I and III only
 (d) II and III only  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 7. 
 Packet collisions occur in an Ethernet network because 
 

  (a) the Ethernet uses a ring topology
 (b) two different Ethernet networks may be spliced together
 (c) two Ethernet nodes can send packets at the same time
 (d) the Ethernet switching mechanism may occasionally send two packets through the same route  

 Correct answer is  (c)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.2 of the course notes.  
 

--------------------------------------------------------------------------------

 8. 
 Which of the following methods are invoked by a client implemented with sockets? 
connect( ) 
listen( ) 
read( ) 
 
 

  (a) I only
 (b) I and III only
 (c) III only
 (d) I, II, and III  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 9. 
 An advantage of defining network protocols through agreement among many companies and individuals is that 
 

  (a) otherwise source code would need to be shipped with all networking applications
 (b) different implementations can then communicate with each other
 (c) a protocol designed by committee always has better performance than that designed by a single company or research project
 (d) only one implementation need then be created  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 10. 
 Ethernet (IEEE 802.3) is an example of 
 

  (a) a standard developed by the International Telecommunications Union
 (b) an a priori standard
 (c) a successful example of the Internet's strategy of developing standards through "rough consensus and running code"
 (d) a de facto standard later developed into a de jure standard  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.6 of the course notes.  
 

 

1. 
 Which of the following parameters can be specified in the header of a request in the Hypertext Transfer Protocol (HTTP)? 
The types of image formats that a browser understands 
The type of browser (e.g., Netscape, Internet Explorer) making the request 
The method by which the request is to be satisfied—for example, whether the request is a GET of a form submission 
 
 

  (a) III only
 (b) I, II, and III
 (c) II and III only
 (d) I and II only  

 Correct answer is  (b)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 



--------------------------------------------------------------------------------

 2. 
 Which of the following distinguish stream sockets (e.g., TCP) from datagram sockets (e.g., UDP)? 
Stream sockets guarantee delivery of the data sent through them. 
Stream sockets can be used to send application data to a remote host, whereas datagram sockets can only send control commands. 
Stream sockets have greater overhead. 
 
 

  (a) I and III only
 (b) I and II only
 (c) II and III only
 (d) I only  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 3. 
 A computer sends 100 Kbytes of aggregate data to another computer through the network. If this transmission time takes 10 seconds and setup time is negligible, the throughput of this network is 
 

  (a) not able to be determined with the information given
 (b) exactly 10 Kbps
 (c) in the range from 60 to 120 Kbps (kilobits per second)
 (d) in the range from 6 to 12 Kbps (kilobits per second)  

 Correct answer is  (c)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.4 of the course notes.  
 

--------------------------------------------------------------------------------

 4. 
 An application on a computer sends data through a socket to another computer. Which of the following are specified by the communication protocol? 
The contents of the message body 
The speed of transmission 
The header format, which specifies the header field sizes and meanings 
 
 

  (a) II and III only
 (b) III only
 (c) I only
 (d) I and III only  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 5. 
 An advantage of defining network protocols through agreement among many companies and individuals is that 
 

  (a) different implementations can then communicate with each other
 (b) otherwise source code would need to be shipped with all networking applications
 (c) only one implementation need then be created
 (d) a protocol designed by committee always has better performance than that designed by a single company or research project  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 6. 
 We send a packet from host A to host B, which immediately acknowledges it. We measure the interval between the time the packet is sent by A and its acknowledgement is received. This interval is found to be 180 milliseconds. What can be said about the latency of the link from A to B? 
 

  (a) It is smaller than 180 ms.
 (b) It is greater than 180 ms.
 (c) It is exactly 180 ms.
 (d) It is exactly 90 ms.  

 Correct answer is  (a)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.4 of the course notes.
   (d) This would be so only if the latency in the direction A->B was identical to the latency in the direction B->A  
 

--------------------------------------------------------------------------------

 7. 
 What can be said about the protocol used by the implementation of the transport layer of an Internet host? 
It guarantees delivery. 
It is the Transmission Control Protocol (TCP). 
It uses services provided by the session layer. 
 
 

  (a) none
 (b) I only
 (c) I and II only
 (d) I and III only  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.5 of the course notes.  
 

--------------------------------------------------------------------------------

 8. 
 Which of the following methods are invoked by a client implemented with sockets? 
connect( ) 
listen( ) 
read( ) 
 
 

  (a) I, II, and III
 (b) III only

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -