- 1、本文档共33页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
1.1.1
1.In a broadcast network Correct answer is (d)
(a) only the computers that are tuned to a channel see and process the packets in that channel
(b) all computers see and process the application data within all packets
(c) only the destination computer sees a packet
(d) all computers see all packets, but the application data in each packet is only processed by the destination computer
2.The Maximum Transfer Unit (MTU) is a parameter of Correct answer is (d)
(a) the size of data sent by the application
(b) the application protocol
(c) the operating system
(d) the technology of the physical network
3.When you connect your computer to the Internet, the protocol(s) your computer uses is (are) selected according to (a)
(a) the application client and server you use at each moment
(b) which HTTP (Web) server you connect to
(c) which operating system is running on your computer
(d) what vendor your Internet service provider purchased equipment from
4.Which of the following methods are invoked by a client implemented with sockets? (d)
I connect( ) II listen( ) III read( )
(a) III only
(b) I, II, and III
(c) I only
(d) I and III only
5. An advantage of defining network protocols through agreement among many companies and individuals is that (c)
(a) only one implementation need then be created
(b) a protocol designed by committee always has better performance than that designed by a single company or research project
(c) different implementations can then communicate with each other
(d) otherwise source code would need to be shipped with all networking applications
(a) It is unlikely to be true that one implementation can work well in all platforms and situations, and even if this were true, standardization would not make it any more possible.
6. Which of the following methods are invoked by a server implemented with sockets? (d)
I connect( ) II listen( ) III accept( )
(a) I, II, and III
(b) III only
(c) II only
(d)
您可能关注的文档
- ICCA Sector Meetings Management Sector Meeting ICCA 会议管理类型会员会议).ppt
- introduction to cloud computing - 云计算入门).ppt
- Labview英文文献翻译).doc
- Lesson twenty-two、three Accounting for Corporations).ppt
- Linux umount 报 device is busy 的处理方法).doc
- LNG的液化知识).ppt
- machine learning在线公开课第 3 期:Logistic Regression).ppt
- MARKVI培训教材 -中英文-2011年10月10日).doc
- Matrix固瑞克无线控制加注系统).ppt
- Module 5 Great People and Great Inventions of Ancient China教案).doc
文档评论(0)