⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 选择题题库07.txt

📁 卡耐基SSD8选择题答案TXT版 相信对大家有好处
💻 TXT
📖 第 1 页 / 共 5 页
字号:
 (c) I only
 (d) I and III only  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 9. 
 When you connect your computer to the Internet, the protocol(s) your computer uses is (are) selected according to 
 

  (a) the application client and server you use at each moment
 (b) which HTTP (Web) server you connect to
 (c) which operating system is running on your computer
 (d) what vendor your Internet service provider purchased equipment from  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 10. 
 Which of the following activities use an inter-network? 
A phone call from Pittsburgh in the United States to Chennai in India 
A phone call from a wired phone to a mobile ("cell") phone 
A chat session between two computers connected to an office Ethernet 
 
 

  (a) I, II, and III
 (b) I only
 (c) I and II only
 (d) III only  

 Correct answer is  (c)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.6 of the course notes.  
 
1. 
 An advantage of defining network protocols through agreement among many companies and individuals is that 
 

  (a) only one implementation need then be created
 (b) a protocol designed by committee always has better performance than that designed by a single company or research project
 (c) otherwise source code would need to be shipped with all networking applications
 (d) different implementations can then communicate with each other  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 



--------------------------------------------------------------------------------

 2. 
 Packet collisions occur in an Ethernet network because 
 

  (a) the Ethernet switching mechanism may occasionally send two packets through the same route
 (b) two different Ethernet networks may be spliced together
 (c) two Ethernet nodes can send packets at the same time
 (d) the Ethernet uses a ring topology  

 Correct answer is  (c)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.2 of the course notes.  
 

--------------------------------------------------------------------------------

 3. 
 The Maximum Transfer Unit (MTU) is a parameter of 
 

  (a) the technology of the physical network
 (b) the application protocol
 (c) the size of data sent by the application
 (d) the operating system  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 4. 
 Two packets A and B are sent in that order through a connectionless communication network. They will arrive at the destination 
 

  (a) in the order A-B, after possibly having traversed different routes
 (b) in the order A-B, after having traversed the same route
 (c) in any order, after having traversed the same route
 (d) in any order, after possibly having traversed different routes  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.2 of the course notes.  
 

--------------------------------------------------------------------------------

 5. 
 Ethernet (IEEE 802.3) is an example of 
 

  (a) a successful example of the Internet's strategy of developing standards through "rough consensus and running code"
 (b) an a priori standard
 (c) a de facto standard later developed into a de jure standard
 (d) a standard developed by the International Telecommunications Union  

 Correct answer is  (c)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.6 of the course notes.  
 

--------------------------------------------------------------------------------

 6. 
 In a broadcast network 
 

  (a) only the destination computer sees a packet
 (b) only the computers that are tuned to a channel see and process the packets in that channel
 (c) all computers see and process the application data within all packets
 (d) all computers see all packets, but the application data in each packet is only processed by the destination computer  

 Correct answer is  (d)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.1 of the course notes.
   (b) A network with channels would be, in effect, multiple broadcast networks.  
 

--------------------------------------------------------------------------------

 7. 
 The transmission of high-quality, interactive voice and video over the current Internet is difficult because today's Internet 
 

  (a) gives higher priority to bulk data transfers
 (b) is unable to guarantee minimum throughput or maximum latency for a given connection
 (c) does not really have sufficient throughput
 (d) uses connectionless protocols  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.4 of the course notes.  
 

--------------------------------------------------------------------------------

 8. 
 What can be said concerning the protocol that is used by the implementation of the network layer of an Internet host? 
It guarantees delivery. 
It is the Internet Protocol (IP). 
It uses services provided by the session layer. 
 
 

  (a) none
 (b) I and II only
 (c) I only
 (d) II only  

 Correct answer is  (d)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.5 of the course notes.  
 

--------------------------------------------------------------------------------

 9. 
 A computer sends 100 Kbytes of aggregate data to another computer through the network. If this transmission time takes 10 seconds and setup time is negligible, the throughput of this network is 
 

  (a) exactly 10 Kbps
 (b) in the range from 60 to 120 Kbps (kilobits per second)
 (c) not able to be determined with the information given
 (d) in the range from 6 to 12 Kbps (kilobits per second)  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.4 of the course notes.  
 

--------------------------------------------------------------------------------

 10. 
 Why do network applications send "messages," but the network transmits information in "packets?" 
Buffer allocation and error handling is easier when done for smaller chunks of data. 
Multiple messages can be sent in a single large packet to decrease overhead. 
Network engineers and application programmers just use different terminology for the same unit of application data. 
A message needs to be packaged with the instructions to process it at the destination. 
 
 

  (a) II and IV only
 (b) II and III only
 (c) I and II only
 (d) I, II, III, and IV  

 Correct answer is  (c)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 
1. 
 An advantage of defining network protocols through agreement among many companies and individuals is that 
 

  (a) different implementations can then communicate with each other
 (b) only one implementation need then be created
 (c) otherwise source code would need to be shipped with all networking applications
 (d) a protocol designed by committee always has better performance than that designed by a single company or research project  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 



--------------------------------------------------------------------------------

 2. 
 The Protocol Data Unit (PDU) that is sent by a protocol layer to its peer on the destination system typically includes 
A payload 
A protocol header 
A router vendor ID 
 
 

  (a) II only
 (b) I and III only
 (c) I, II, and III
 (d) I and II only  

 Correct answer is  (d)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.5 of the course notes.  
 

--------------------------------------------------------------------------------

 3. 
 How does an operating system identify the application to which data coming in from the network should be relayed? 
 

  (a) By the file extension of the data
 (b) Only one application at a time is given access to the network.
 (c) By the protocol with which the data was sent
 (d) By the port number carried by the transport protocol  

 Correct answer is  (d)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 4. 
 Which of the following distinguish stream sockets (e.g., TCP) from datagram sockets (e.g., UDP)? 
Stream sockets guarantee delivery of the data sent through them. 
Stream sockets can be used to send application data to a remote host, whereas datagram sockets can only send control commands. 
Stream sockets have greater overhead. 
 
 

  (a) I only
 (b) I and III only
 (c) I and II only
 (d) II and III only  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 5. 
 Why do network applications send "messages," but the network transmits information in "packets?" 
Buffer allocation and error handling is easier when done for smaller chunks of data. 
Multiple messages can be sent in a single large packet to decrease overhead. 
Network engineers and application programmers just use different terminology for the same unit of application data. 
A message needs to be packaged with the instructions to process it at the destination. 
 
 

  (a) I and II only
 (b) II and IV only
 (c) I, II, III, and IV
 (d) II and III only  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 6. 
 A computer sends 100 Kbytes of aggregate data to another computer through the network. If this transmission time takes 10 seconds and setup time is negligible, the throughput of this network is 
 

  (a) exactly 10 Kbps
 (b) in the range from 6 to 12 Kbps (kilobits per second)
 (c) in the range from 60 to 120 Kbps (kilobits per second)
 (d) not able to be determined with the information given  

 Correct answer is  (c)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.4 of the course notes.  
 

--------------------------------------------------------------------------------

 7. 
 The Maximum Transfer Unit (MTU) is a parameter of 
 

  (a) the operating system
 (b) the technology of the physical network
 (c) the size of data sent by the application
 (d) the application protocol  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 8. 
 Packet collisions occur in an Ethernet network because 
 

  (a) the Ethernet switching mechanism may occasionally send two packets through the same route
 (b) the Ethernet uses a ring topology
 (c) two Ethernet nodes can send packets at the same time
 (d) two different Ethernet networks may be spliced together  

 Correct answer is  (c)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.2 of the course notes.  
 

--------------------------------------------------------------------------------

 9. 
 What can be said about the protocol used by the implementation of the transport layer of an Internet host? 
It guarantees delivery. 
It is the Transmission Control Protocol (TCP). 
It uses services provided by the session layer. 
 
 

  (a) none
 (b) I only
 (c) I and III only
 (d) I and II only  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.5 of the course notes.  
 

--------------------------------------------------------------------------------

 10. 
 Which of the following methods are invoked by a server implemented with sockets? 
connect( ) 
listen( ) 
accept( ) 
 
 

  (a) I, II, and III
 (b) II and III only
 (c) II only
 (d) III only  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 
1. 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -