网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
The Hypertext Transfer Protocol,the Web's(请作答此空)protocol,is at the heart of the Web.HTTP is implemented in two programs:a( )program and a server program.The client program and server program executing on different end systems,talk to each other by( )HTTP messages.HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients.when a user( )a web page,the browser sends http request messages for the objects in the page to the server.The server( )the requests and responds with http response messages that contain the objects.
A.transport-layer
B.application-layer
C.network-layer
D.link-layer
B.application-layer
C.network-layer
D.link-layer
参考答案
参考解析
解析:Web的应用层协议是超文本传输协议,是web核心。HTTP在两类程序(客户端程序、服务器端程序)中执行。客户端程序、服务器端程序在不同的终端系统中执行,通过交换HTTP消息来进行交互。HTTP定义了Web客户端如何从服务器端请求Web页面以及服务器端如何传送Web页面到服务器。当用户请求一个web页面,浏览器发送页面对象的http请求给服务器。服务器接收请求并用包含对象的http消息进行响应。
更多 “The Hypertext Transfer Protocol,the Web's(请作答此空)protocol,is at the heart of the Web.HTTP is implemented in two programs:a( )program and a server program.The client program and server program executing on different end systems,talk to each other by( )HTTP messages.HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients.when a user( )a web page,the browser sends http request messages for the objects in the page to the server.The server( )the requests and responds with http response messages that contain the objects.A.transport-layer B.application-layer C.network-layer D.link-layer” 相关考题
考题
Program that can destroy another computer’s programs are called () .
A、bugsB、bugsC、virusesD、games
考题
A user opens a webpage that requires the transmission of packets from the Web server to the client‘s browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path.Which two protocol functions allow this type of communication?()A. packet segmentationB. serialized checkingC. packet sequencingD. parallel checking
考题
( ):The capability provided to the consumer is to use the provider’s applications runningon a cloud infrastructure,The applications are accessible from various client devicesthrough either a thin client interface, such as a web browser (e.g.,web-based E-mail),or a program interface.A.laaSB.PaaSC.SaaSD.DaaS
考题
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a (请作答此空) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.browser-server
B.user- server
C.client-server
D.business -customer
考题
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were (请作答此空) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.command-line
B.graphical
C.automation
D.productivity
考题
The Hypertext Transfer Protocol , the Web's ( ) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by (请作答此空) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.exchanging
B.changing
C.declining
D.removing
考题
The Hypertext Transfer Protocol , the Web's (请作答此空) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by ( ) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.transport-layer
B.application-layer
C.network-layer
D.link-layer
考题
The Hypertext Transfer Protocol,the Web's( )protocol,is at the heart of the Web.HTTP is implemented in two programs:a(请作答此空)program and a server program.The client program and server program executing on different end systems,talk to each other by( )HTTP messages.HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients.when a user( )a web page,the browser sends http request messages for the objects in the page to the server.The server( )the requests and responds with http response messages that contain the objects.A.host
B.user
C.client
D.guest
考题
What does RPL stand for?()A、routing primary languageB、routing policy languageC、routing police languageD、routing program languageE、routing protocol language
考题
Within a 64-bit Windows desktop OS, by default where are the program files for 32-bit programs located?()A、C:/WindowsB、C:/Program Files (x86)C、C:/Program FilesD、C:/Windows/System32
考题
What does the term application partitioning refer to?()A、The feature of a forms application enabling it to run both in client-server mode and on the Web. B、Storing PL/SQL program units between the Oracle server and the application to make optimal use of available resources. C、The nature of a three-tier architecture, where the form module and processing software reside on an application server. D、The feature of a forms application that is able to use Ethernet, twisted pair, and wireless data connections.
考题
In a shared server configuration, which two describe the actions that the listener can take to service a client request?()A、The listener hands the connection request directly to a dispatcher. B、A dedicated server inherits the connection request from the listener. C、The client connects to a dedicated server directly using a protocol address provided by the listener. D、The application initiating the session spawns a dedicated server process for the connection request. E、The listener issues a redirect message to the client, containing the protocol address of a dispatcher. The client then terminates the network session to the listener and establishes a network session to the dispatcher, using the network address provided in the redirect message.
考题
You have recently created and distributed RDP files for a certain RemoteApp program. However,you findthat the application performs poorly and needs to be migrated to a more powerful server. What should youdo to ensure that users can connect to the RemoteApp program after it is migrated?()A、Create a new TS Web Access site for the new terminal server and publish the application to the newsite.B、Re-create an RDP file for the RemoteApp program after the migration and distribute the file to users.C、Modify the properties of the existing RDP file and re-distribute the file to users.D、In TS RemoteApp Manager on the old terminal server, change the Terminal Server settings so that the server name listed is the new terminal server.
考题
Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) se rver. You enable Microsoft Word as a RemoteApp application on the RD Session Host server. You need to ensure that the RemoteApp application opens when a user double - clicks a Word (.docx) file on a client computer. Which two actions should you perform?()A、Create a Windows Installer (.msi) file.B、Create a Remote Desktop Protocol (.rdp) file.C、In the properties of the RemoteApp application, enable the Allow any command - line arguments setting.D、Enable the Associate client extensions for this program with the RemoteApp program setting for the file.
考题
单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has Terminal Server installed. You have a new multi-user application that you plan to install on the server. The setup program for the application is named setup.exe. You need to install the application on the server. You must ensure that the application can be used by all users. What should you do? ()A
From the command prompt, run setup.exe.B
From Add or Remove Programs, add a new program.C
In Windows Explorer, use the Run As option to run setup.exe.D
In Windows Explorer, use Compatibility mode to run setup.exe.
考题
单选题Within a 64-bit Windows desktop OS, by default where are the program files for 64-bit programs located?()A
C:/Program FilesB
C:/Windows/C
C:/Windows/System32D
C:/Program Files (x86)
考题
单选题TRANSFER:To transfer from one training program to another, you must notify The Grantsmanship Center at least five working days before the original program. There is a $50 fee per transfer, and no more than two transfers will be accepted.A
There is no fee for the first transfer.B
You have to pay for the transfer.C
More money is charged for the second transfer.
考题
多选题In a shared server configuration, which two describe the actions that the listener can take to service a client request?()AThe listener hands the connection request directly to a dispatcher.BA dedicated server inherits the connection request from the listener.CThe client connects to a dedicated server directly using a protocol address provided by the listener.DThe application initiating the session spawns a dedicated server process for the connection request.EThe listener issues a redirect message to the client, containing the protocol address of a dispatcher. The client then terminates the network session to the listener and establishes a network session to the dispatcher, using the network address provided in the redirect message.
考题
单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has Terminal Server installed. You have a new multi-user application that you plan to install on the server. The setup program for the application is named setup.exe. You need to install the application on the server. You must ensure that the application can be used by all users. What should you do? ()A
From the command prompt, run setup.exe.B
From Add or Remove Programs, add a new program.C
In Windows Explorer, use the Run As option to run setup.exe.D
In Windows Explorer, use Compatibility mode to run setup.exe.
考题
单选题What does RPL stand for?()A
routing primary languageB
routing policy languageC
routing police languageD
routing program languageE
routing protocol language
考题
多选题Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You enable Microsoft Word as a RemoteApp application on the RD Session Host server. You need to ensure that the RemoteApp application opens when a user double-clicks a Word (.docx) file on a client computer. Which two actions should you perform?()ACreate a Windows Installer (.msi) file.BCreate a Remote Desktop Protocol (.rdp) file.CIn the properties of the RemoteApp application, enable the Allow any command-line arguments setting.DEnable the Associate client extensions for this program with the RemoteApp program setting for the file.
考题
多选题A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()Apacket segmentationBserialized checkingCpacket sequencingDparallel checking
考题
单选题A transport layer protocol has several responsibilities, One is to create a process-to-process (program-to-program) communication; TCP uses port (1) to accomplish this. Another responsibility of a transport layer protocol is to create a (2) and error-control mechanism at the transport level. TCP uses a sliding (3) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (4) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (5) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.
空白(1)处应选择()A
numbersB
connectionC
diagramsD
resources
考题
多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet. What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.
考题
单选题下列网络上常用的名字缩写对应的中文解释错误的是()。A
WWW(World Wide Web):万维网。B
URL(Uniform Resource Locator):统一资源定位器。C
HTTP(Hypertext Transfer Protocol):超文本传输协议。D
FTP(File Transfer Protocol):快速传输协议。E
TCP(Transfer Control Protocol):传输控制协议。
热门标签
最新试卷