⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 选择题题库07.txt

📁 卡耐基SSD8选择题答案TXT版 相信对大家有好处
💻 TXT
📖 第 1 页 / 共 5 页
字号:
 In contrast to standards developed by traditional standards organizations like the International Telecommunications Union (ITU) or the International Standards Organization (ISO), standards developed by the Internet Engineering Task Force (IETF) can be 
 

  (a) modified arbitrarily by the Advance Research projects Agency (ARPA) of the United States Department of Defense, which originally developed the Internet
 (b) applied before they have been embodied in working implementations, in order not to delay progress
 (c) developed in secret by the members of the IETF until the standards mature sufficiently to withstand public criticism
 (d) extensively critiqued and modified by individuals, without requiring them to have special membership status  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.6 of the course notes.  
 



--------------------------------------------------------------------------------

 2. 
 John is using his bank's Web server to pay his telephone bill electronically. Which kind(s) of network interaction take(s) place in this Scenario, from the moment John logs into his bank's Web site until the telephone company receives the money? 
People-people 
People-computer 
Computer-computer 
 
 

  (a) III only
 (b) I, II, and III
 (c) II only
 (d) II and III only  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 3. 
 Which of the following activities use an inter-network? 
A phone call from Pittsburgh in the United States to Chennai in India 
A phone call from a wired phone to a mobile ("cell") phone 
A chat session between two computers connected to an office Ethernet 
 
 

  (a) III only
 (b) I only
 (c) I and II only
 (d) I, II, and III  

 Correct answer is  (c)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.6 of the course notes.  
 

--------------------------------------------------------------------------------

 4. 
 A packet with no data is sent from host A to host B on an otherwise idle network. The packet is found to have taken 35 milliseconds to reach B. The incremental overhead to send an additional byte (usually called the "throughput") is estimated to be five microseconds by repeatedly measuring the transmission times of long packets. Approximately, how long will an eight Kbytes (8192 bytes) packet take to reach B when sent from A? 
 

  (a) 76 milliseconds
 (b) 40 milliseconds
 (c) 55 milliseconds
 (d) cannot be determined from the information given  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.4 of the course notes.  
 

--------------------------------------------------------------------------------

 5. 
 Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination 
 

  (a) only in the order A-B, after having traversed the same route
 (b) only in the order A-B, after possibly having traversed different routes
 (c) in any order, after having traversed the same route
 (d) in any order, after possibly having traversed different routes  

 Correct answer is  (a)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.2 of the course notes.  
 

--------------------------------------------------------------------------------

 6. 
 The throughput of a network link for an HTTP session is measured in two ways. Measurement A is the total amount of data received by the browser, divided by the duration of the session. Measurement B is the total amount of data received by the operating system on behalf of the browser, divided by the duration of the session. Which of the following statements about A and B is true? 
 

  (a) A is smaller than B
 (b) B is equal to A
 (c) B and A are not related
 (d) B is smaller than A  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.4 of the course notes.  
 

--------------------------------------------------------------------------------

 7. 
 What can be said concerning the protocol that is used by the implementation of the network layer of an Internet host? 
It guarantees delivery. 
It is the Internet Protocol (IP). 
It uses services provided by the session layer. 
 
 

  (a) none
 (b) I only
 (c) I and II only
 (d) II only  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.5 of the course notes.  
 

--------------------------------------------------------------------------------

 8. 
 The Internet received its name in the 1980s because 
 

  (a) it consisted of many interconnected networks
 (b) it was meant to be a network internal to the United States Department of Defense
 (c) it achieved international scope with the addition of the City University of London
 (d) it was an interim (temporary) design of what it later became, but the name stuck  

 Correct answer is  (a)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.6 of the course notes.  
 

--------------------------------------------------------------------------------

 9. 
 Which of the following methods are invoked by a server implemented with sockets? 
connect( ) 
listen( ) 
accept( ) 
 
 

  (a) I, II, and III
 (b) III only
 (c) II and III only
 (d) II only  

 Correct answer is  (c)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 10. 
 In a broadcast network 
 

  (a) only the destination computer sees a packet
 (b) all computers see all packets, but the application data in each packet is only processed by the destination computer
 (c) only the computers that are tuned to a channel see and process the packets in that channel
 (d) all computers see and process the application data within all packets  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 
1. 
 Every Protocol Data Unit (PDU) that is sent by a protocol layer to its remote peer on the destination system always includes: 
The headers for all the protocols of the layers above it 
The headers for the protocol of the layer below it 
Application Data 
 
 

  (a) I, II, and III
 (b) I and III only
 (c) III only
 (d) None  

 Correct answer is  (d)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.5 of the course notes.  
 



--------------------------------------------------------------------------------

 2. 
 Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination 
 

  (a) only in the order A-B, after possibly having traversed different routes
 (b) in any order, after having traversed the same route
 (c) in any order, after possibly having traversed different routes
 (d) only in the order A-B, after having traversed the same route  

 Correct answer is  (d)  

 Your score on this question is: 0.00  

 Feedback: 
   See section 1.1.2 of the course notes.  
 

--------------------------------------------------------------------------------

 3. 
 When you connect your computer to the Internet, the protocol(s) your computer uses is (are) selected according to 
 

  (a) what vendor your Internet service provider purchased equipment from
 (b) which operating system is running on your computer
 (c) which HTTP (Web) server you connect to
 (d) the application client and server you use at each moment  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 4. 
 How does an operating system identify the application to which data coming in from the network should be relayed? 
 

  (a) By the file extension of the data
 (b) By the port number carried by the transport protocol
 (c) By the protocol with which the data was sent
 (d) Only one application at a time is given access to the network.  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 5. 
 You have recently become the first network engineer of a large corporation with offices worldwide. The company is considering the installation of a data network, but the Board of Directors is rather old-fashioned and does not see the need to change the company's time-honored business practices. Your first task at the job is to justify your salary and the cost of a new network, and for this purpose you are about to give a presentation to the Board of Directors. Which of the following would you include in your presentation? Assume the directors are extremely intelligent, though perhaps not knowledgeable in your field. 
Lower expenditures on computer hardware 
Higher availability of customer services 
Better protection of the company's proprietary information 
 
 

  (a) I and II only
 (b) I and III only
 (c) II and III
 (d) II only  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 6. 
 Which of the following methods are invoked by a server implemented with sockets? 
connect( ) 
listen( ) 
accept( ) 
 
 

  (a) II and III only
 (b) II only
 (c) I, II, and III
 (d) III only  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 

--------------------------------------------------------------------------------

 7. 
 Which of the following activities use an inter-network? 
A phone call from Pittsburgh in the United States to Chennai in India 
A phone call from a wired phone to a mobile ("cell") phone 
A chat session between two computers connected to an office Ethernet 
 
 

  (a) III only
 (b) I and II only
 (c) I only
 (d) I, II, and III  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.6 of the course notes.  
 

--------------------------------------------------------------------------------

 8. 
 Ethernet (IEEE 802.3) is an example of 
 

  (a) an a priori standard
 (b) a de facto standard later developed into a de jure standard
 (c) a successful example of the Internet's strategy of developing standards through "rough consensus and running code"
 (d) a standard developed by the International Telecommunications Union  

 Correct answer is  (b)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.6 of the course notes.  
 

--------------------------------------------------------------------------------

 9. 
 Packet collisions occur in an Ethernet network because 
 

  (a) the Ethernet switching mechanism may occasionally send two packets through the same route
 (b) the Ethernet uses a ring topology
 (c) two different Ethernet networks may be spliced together
 (d) two Ethernet nodes can send packets at the same time  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.2 of the course notes.  
 

--------------------------------------------------------------------------------

 10. 
 A packet with no data is sent from host A to host B on an otherwise idle network. The packet is found to have taken 35 milliseconds to reach B. The incremental overhead to send an additional byte (usually called the "throughput") is estimated to be five microseconds by repeatedly measuring the transmission times of long packets. Approximately, how long will an eight Kbytes (8192 bytes) packet take to reach B when sent from A? 
 

  (a) 76 milliseconds
 (b) cannot be determined from the information given
 (c) 40 milliseconds
 (d) 55 milliseconds  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.4 of the course notes.  
 
1. 
 Which of the following distinguish stream sockets (e.g., TCP) from datagram sockets (e.g., UDP)? 
Stream sockets guarantee delivery of the data sent through them. 
Stream sockets can be used to send application data to a remote host, whereas datagram sockets can only send control commands. 
Stream sockets have greater overhead. 
 
 

  (a) I and III only
 (b) I only
 (c) II and III only
 (d) I and II only  

 Correct answer is  (a)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.1 of the course notes.  
 



--------------------------------------------------------------------------------

 2. 
 Ethernet (IEEE 802.3) is an example of 
 

  (a) a standard developed by the International Telecommunications Union
 (b) a successful example of the Internet's strategy of developing standards through "rough consensus and running code"
 (c) an a priori standard
 (d) a de facto standard later developed into a de jure standard  

 Correct answer is  (d)  

 Your score on this question is: 10.00  

 Feedback: 
   See section 1.1.6 of the course notes.  
 

--------------------------------------------------------------------------------

 3. 
 The Internet received its name in the 1980s because 
 

  (a) it consisted of many interconnected networks
 (b) it was an interim (temporary) design of what it later became, but the name stuck
 (c) it achieved internati

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -