📄 选择题题库07.txt
字号:
In contrast to standards developed by traditional standards organizations like the International Telecommunications Union (ITU) or the International Standards Organization (ISO), standards developed by the Internet Engineering Task Force (IETF) can be
(a) modified arbitrarily by the Advance Research projects Agency (ARPA) of the United States Department of Defense, which originally developed the Internet
(b) applied before they have been embodied in working implementations, in order not to delay progress
(c) developed in secret by the members of the IETF until the standards mature sufficiently to withstand public criticism
(d) extensively critiqued and modified by individuals, without requiring them to have special membership status
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
2.
John is using his bank's Web server to pay his telephone bill electronically. Which kind(s) of network interaction take(s) place in this Scenario, from the moment John logs into his bank's Web site until the telephone company receives the money?
People-people
People-computer
Computer-computer
(a) III only
(b) I, II, and III
(c) II only
(d) II and III only
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1 of the course notes.
--------------------------------------------------------------------------------
3.
Which of the following activities use an inter-network?
A phone call from Pittsburgh in the United States to Chennai in India
A phone call from a wired phone to a mobile ("cell") phone
A chat session between two computers connected to an office Ethernet
(a) III only
(b) I only
(c) I and II only
(d) I, II, and III
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
4.
A packet with no data is sent from host A to host B on an otherwise idle network. The packet is found to have taken 35 milliseconds to reach B. The incremental overhead to send an additional byte (usually called the "throughput") is estimated to be five microseconds by repeatedly measuring the transmission times of long packets. Approximately, how long will an eight Kbytes (8192 bytes) packet take to reach B when sent from A?
(a) 76 milliseconds
(b) 40 milliseconds
(c) 55 milliseconds
(d) cannot be determined from the information given
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.4 of the course notes.
--------------------------------------------------------------------------------
5.
Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination
(a) only in the order A-B, after having traversed the same route
(b) only in the order A-B, after possibly having traversed different routes
(c) in any order, after having traversed the same route
(d) in any order, after possibly having traversed different routes
Correct answer is (a)
Your score on this question is: 0.00
Feedback:
See section 1.1.2 of the course notes.
--------------------------------------------------------------------------------
6.
The throughput of a network link for an HTTP session is measured in two ways. Measurement A is the total amount of data received by the browser, divided by the duration of the session. Measurement B is the total amount of data received by the operating system on behalf of the browser, divided by the duration of the session. Which of the following statements about A and B is true?
(a) A is smaller than B
(b) B is equal to A
(c) B and A are not related
(d) B is smaller than A
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.4 of the course notes.
--------------------------------------------------------------------------------
7.
What can be said concerning the protocol that is used by the implementation of the network layer of an Internet host?
It guarantees delivery.
It is the Internet Protocol (IP).
It uses services provided by the session layer.
(a) none
(b) I only
(c) I and II only
(d) II only
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.5 of the course notes.
--------------------------------------------------------------------------------
8.
The Internet received its name in the 1980s because
(a) it consisted of many interconnected networks
(b) it was meant to be a network internal to the United States Department of Defense
(c) it achieved international scope with the addition of the City University of London
(d) it was an interim (temporary) design of what it later became, but the name stuck
Correct answer is (a)
Your score on this question is: 0.00
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
9.
Which of the following methods are invoked by a server implemented with sockets?
connect( )
listen( )
accept( )
(a) I, II, and III
(b) III only
(c) II and III only
(d) II only
Correct answer is (c)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
10.
In a broadcast network
(a) only the destination computer sees a packet
(b) all computers see all packets, but the application data in each packet is only processed by the destination computer
(c) only the computers that are tuned to a channel see and process the packets in that channel
(d) all computers see and process the application data within all packets
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
1.
Every Protocol Data Unit (PDU) that is sent by a protocol layer to its remote peer on the destination system always includes:
The headers for all the protocols of the layers above it
The headers for the protocol of the layer below it
Application Data
(a) I, II, and III
(b) I and III only
(c) III only
(d) None
Correct answer is (d)
Your score on this question is: 0.00
Feedback:
See section 1.1.5 of the course notes.
--------------------------------------------------------------------------------
2.
Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination
(a) only in the order A-B, after possibly having traversed different routes
(b) in any order, after having traversed the same route
(c) in any order, after possibly having traversed different routes
(d) only in the order A-B, after having traversed the same route
Correct answer is (d)
Your score on this question is: 0.00
Feedback:
See section 1.1.2 of the course notes.
--------------------------------------------------------------------------------
3.
When you connect your computer to the Internet, the protocol(s) your computer uses is (are) selected according to
(a) what vendor your Internet service provider purchased equipment from
(b) which operating system is running on your computer
(c) which HTTP (Web) server you connect to
(d) the application client and server you use at each moment
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
4.
How does an operating system identify the application to which data coming in from the network should be relayed?
(a) By the file extension of the data
(b) By the port number carried by the transport protocol
(c) By the protocol with which the data was sent
(d) Only one application at a time is given access to the network.
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
5.
You have recently become the first network engineer of a large corporation with offices worldwide. The company is considering the installation of a data network, but the Board of Directors is rather old-fashioned and does not see the need to change the company's time-honored business practices. Your first task at the job is to justify your salary and the cost of a new network, and for this purpose you are about to give a presentation to the Board of Directors. Which of the following would you include in your presentation? Assume the directors are extremely intelligent, though perhaps not knowledgeable in your field.
Lower expenditures on computer hardware
Higher availability of customer services
Better protection of the company's proprietary information
(a) I and II only
(b) I and III only
(c) II and III
(d) II only
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1 of the course notes.
--------------------------------------------------------------------------------
6.
Which of the following methods are invoked by a server implemented with sockets?
connect( )
listen( )
accept( )
(a) II and III only
(b) II only
(c) I, II, and III
(d) III only
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
7.
Which of the following activities use an inter-network?
A phone call from Pittsburgh in the United States to Chennai in India
A phone call from a wired phone to a mobile ("cell") phone
A chat session between two computers connected to an office Ethernet
(a) III only
(b) I and II only
(c) I only
(d) I, II, and III
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
8.
Ethernet (IEEE 802.3) is an example of
(a) an a priori standard
(b) a de facto standard later developed into a de jure standard
(c) a successful example of the Internet's strategy of developing standards through "rough consensus and running code"
(d) a standard developed by the International Telecommunications Union
Correct answer is (b)
Your score on this question is: 10.00
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
9.
Packet collisions occur in an Ethernet network because
(a) the Ethernet switching mechanism may occasionally send two packets through the same route
(b) the Ethernet uses a ring topology
(c) two different Ethernet networks may be spliced together
(d) two Ethernet nodes can send packets at the same time
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.2 of the course notes.
--------------------------------------------------------------------------------
10.
A packet with no data is sent from host A to host B on an otherwise idle network. The packet is found to have taken 35 milliseconds to reach B. The incremental overhead to send an additional byte (usually called the "throughput") is estimated to be five microseconds by repeatedly measuring the transmission times of long packets. Approximately, how long will an eight Kbytes (8192 bytes) packet take to reach B when sent from A?
(a) 76 milliseconds
(b) cannot be determined from the information given
(c) 40 milliseconds
(d) 55 milliseconds
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.4 of the course notes.
1.
Which of the following distinguish stream sockets (e.g., TCP) from datagram sockets (e.g., UDP)?
Stream sockets guarantee delivery of the data sent through them.
Stream sockets can be used to send application data to a remote host, whereas datagram sockets can only send control commands.
Stream sockets have greater overhead.
(a) I and III only
(b) I only
(c) II and III only
(d) I and II only
Correct answer is (a)
Your score on this question is: 10.00
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
2.
Ethernet (IEEE 802.3) is an example of
(a) a standard developed by the International Telecommunications Union
(b) a successful example of the Internet's strategy of developing standards through "rough consensus and running code"
(c) an a priori standard
(d) a de facto standard later developed into a de jure standard
Correct answer is (d)
Your score on this question is: 10.00
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
3.
The Internet received its name in the 1980s because
(a) it consisted of many interconnected networks
(b) it was an interim (temporary) design of what it later became, but the name stuck
(c) it achieved internati
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -