网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Each program module is compiled separately and the resulting.(71)files are linked ether to make an executable application。
A.assembler
B.library
C.object
D.source
参考答案
更多 “ Each program module is compiled separately and the resulting.(71)files are linked ether to make an executable application。A.assemblerB.libraryC.objectD.source ” 相关考题
考题
● A transport layer protocol has several responsibilities. One is to create a process-to-process (program-to-program) communication; TCP uses port (71) to accomplish this. Another responsibility of a transport layer protocol is to create a (72) and error-control mechanism at the transport level. TCP uses a sliding (73) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (74) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (75) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.(71)A. numbersB. connectionsC. diagramsD. resources(72)A. procedureB. functionC. routeD. flow(73)A. pathB. windowC. frameD. diagram(74)A. packetB. timeC. errorD. phase(75)A. portsB. streamsC. packetsD. cells
考题
A transport layer protocol has several responsibilities. One is to create a process-to-process (program-to-program) communication; TCP uses port (71) to accomplish this. Another responsibility of a transport layer protocol is to create a (72) and error-control mechanism at the transport level. TCP uses a sliding (73) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (74) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (75) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.(71)A.numbersB.connectionsC.diagramsD.resources
考题
A computer virus is a computer program that is created to make and spread(71)of itself.A.programsB.virusC.copiesD.files
考题
●A management domain typically contains a large amount of management information. Each individual item of( 71)information is an instance of a managed object type. The definition of a related set of managed (72) types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB( 73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domain(71) A.rotationB.switchC.managementD.transmission(72) A.pathB.objectC.routeD.packet(73) A.connectionB.windowC.moduleD.destination(74) A.packetsB.searchesC.statesD.instances(75) A.deviceB.stateC.typeD.packet
考题
The United States Department of Agriculture and the food industry( )sales statistics and keep accurate records.This information tells us what people are eating and their changes in attitudes and tastes.A.gather
B.accumulate
C.compile
D.compare
考题
A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple () of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domainA.packets
B.searches
C.states
D.instances
考题
A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object () within a management domainA.device
B.state
C.type
D.packet
考题
A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed ()types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domainA.path
B.object
C.route
D.packet
考题
A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB () defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domainA.connection
B.window
C.module
D.destination
考题
In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71)between sending the notification and notification arriving at the source,thousands of additional(72)may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.packets
B.cells
C.message
D.files
热门标签
最新试卷