网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

● The connection between two networks to form. an internet is handled by a machine known as a (71) .

(71)

A.bridge

B.client

C.router

D.switch


参考答案

更多 “ ● The connection between two networks to form. an internet is handled by a machine known as a (71) .(71)A.bridgeB.clientC.routerD.switch ” 相关考题
考题 The connection between two networks from an intemet is handled by a machine known as a() A.bridgeB.serverC.routerD.switch

考题 ●One use of networks is to let several computers share (71) such as file systems,printers,and tape drives.(71) A.CPUB.memoryC.resourcesD.data

考题 ●In the following essay, each blank has four choices.Choose the best answer and write down on the answer sheet.Communicating via Email is by far the most common Internet activity.You can (71) with anyone in the world who has an Internet address or Email (72) with a system connection to the Internet.All you need is (73) the Internet and an Email program.Two of the most widely used Email programs are Microsoft's (74) and Netscape's Navigator.A typical Email message has three basic (75) : header, message, and signature.(71) A.connectB.exchangeC.communicateD.game(72) A.accountB.No.C.userD.administrator(73) A.attach withB.graspC.possessD.access to(74) A.YahooB.ExplorerC.FoxmailD.Outlook Express(75) A.packetsB.elementsC.framesD.cells

考题 ●The two goals of an operation system are(71)and efficiency.(71)A.convenienceB.quickC.optimizeD.standardize

考题 The connection between two networks to form. an internet is handled by a machine known as a ______.A.bridgeB.clientC.routerD.switch

考题 ● The Internet is the worlds largest computer (71) .(71)A.networkB.deviceC.displayD.disk

考题 For (71) service, we need a virtual-circuit subnet. Let us see how that works. The idea behind virtual circuits is to avoid having to choose a new (72) for every packet sent. Instead, when a connection is established, a route from the (73)machine to the destination machine is chosen as part of the connection setup and stored in tables inside the (74) That route is used for all traffic flowing over the connection, exactly the same way that the telephone system works. When the connection is released, the virtual circuit is also terminated. With connection-oriented service, each packet carries an (75) telling which virtual circuit it belongs to.A.connectionlessB.connection-orientedC.datagramD.telegram

考题 ● A glue that holds the whole Internet together is the network layer protocol,(71). Unlike most older network layer protocols, it was designed from the beginning with internetworking in mind. Its job is to provide a -(72) way to transport datagrams from source to destination, without regard to whether these machines are on the same network or whether there are other networks in between them.Communication in the Internet works as follows. The (73)layer takes data streams and breaks them up into datagrams. Each datagram is transmitted through the Internet, possibly being fragmented into smaller units as it goes. When all the pieces finally get to the destination machine, they are reassembled by the(74) layer into the original datagram. This datagram is then handed to the transport layer, which inserts it into the receiving process' input stream.An IP datagram consists of a header part and a text part. The header has a (75) part and a variable length optional part.(71) A. IP (Internet Protocol)B. IP (Interworking Protocol)C. TCP (Transport Control Protocol)D. TCP (Transfer Communication Protocol)(72) A. best-qualityB. quality-guaranteedC. connection-orientedD. best-efforts(73) A. data linkB. transportC. networkD. application(74) A. data linkB. transportC. networkD. application(75) A. 40-byte fixedB. 64-byte fixedC. 20~64 bytes variableD. 20-byte fixed

考题 Networks can be interconnected by different devices in the physical layer networks can be connected by (71) or hubs.which just move the bits from one network to an identical network.One layer up we find bridges and switches which operate at data link layer.They can accept (72) ,examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process in me network layer,we have routers that can connect two networks,If two networks have (73) network layer,the router may be able to translate betweenthe packer formats.In the transport layer we find transport gateway,which can interface between two transport connections Finally,in the application layer,application gateways translate message (74) .As an example,gateways between Internet e-mail and X,400 e-mail must (75) thee-mail message and change various header fields.(68)A.reapersB.relaysC.packagesD.modems

考题 An Intranet is(71)the application of Internet technology within an internal or closed user group.Internets are company(72)and do not have a(73)connection to the Internet.Used properly an Internet is highly effective corporate tool,capable of regularly(74)information to empower the workforce with the information needed to perform. their roles.Used in this way,Internet represent a step towards the(75)office.(58)A.simpleB.simplyC.singleD.singly

考题 The presentation layer is concerned with the(71) and semantics of the information exchanged between two systems.The processes in two systems are usually exchanging information in the form. of character (72) numbers, and so on.The information should be changed to bit (73) before being transmitted.Because different computers use different encoding systems, the presentation layer is responsible for (74) between these different encoding methods.The presentation layer at the sender changes the information from its sender-dependent format into a common format. The presentation layer at the receiving machine changes the common format into its (75) dependent format.(71)A.frequencyB.syntaxC.dialogD.format(72)A.numbersB.unctionsC.stringsD.codes(73)A.systemsB.charactersC.layersD. streams(74)A.capabilityB.interoperabilityC.reliabilityD.dependability(75)A.receiverB.userC.serverD. customer

考题 While the Internet is inherently insecure, businesses still need to preserve the privacy of data as it travels over the network. To help do that, the Internet Engineering Task Force an international group of network designers, operators, vendors, and researchers concerned with the evolution of(71)has developed a suite of(72)called Internet Protocol Security(IPSec).IPSec creates a standard platform. to develop secure networks and electronic(73)between two machines. Secure tunneling via IPSec creates(74)connections in a network through which data packets can move. It creates these tunnels between remote users and within a local network. It also(75)each data packet in a new packet that contains the information neccessary to set up, maintain and tear down the tunnel when it's no longer needed.A.channelsB.Web browserC.Internet dataD.Internet architecture

考题 Which of the following describes a secure connection over the Internet between two sites?() A. FTPB. VLANC. VPND. HTTP

考题 A customer has two separate storage networks and is planning to implement an SVC to provide for FlashCopy between the two networks. What is the minimum number of ISL ports required?() A.0B.1C.2D.4

考题 The(71) program is generally translated to an object program, which is in a form. directly understandably by the computer。A.transferB.assembleC.sourceD.compile

考题 The part of the computer that runs the program is known as(71)A.sofiwareB.memoryC.CPUD.storage

考题 ●The presentation layer is concerned with the _(71) and semantics of the informationexchanged between two systems. The processes in two systems are usually exchanginginformation in the form. of character (72)-,numbers, and so on. The information should be changed to bit (73) before .being transmitted. Because different computers use different encoding systems, the presentation layer is responsible for (74) between these different encoding methods. The presentation layer at the sender changes the information from its sender-dependent format into a common format. The presentation layer at the receiving machine changes the common format into its (75) dependent format.(71)A.frequency B.syntax C.dialog D.format(72)A.numbers B.functions C.strings D. codes(73)A.systems B.characters C.layers D. streams(74)A.capability B.interoperability C.reliability D.dependability(75)A.receiver B.user C.server D. customer

考题 ●(71) devices are interface of man and machine.(71) A. I/OB.MemoryC.DiskD.Printer

考题 An Intranet is (71) the application of Internet technology within an internal or closed user group.Internets are company and not do not have a (72) connection to the Internet.Usedproperly an Internet is highly effective corporate tool,capable of regularly (73) information toempower the workforce with the information needed to perform. their roles.Used in this Way,Internet represent a step towards the (74) office.(84)A.simpleB.simplyC.singlcD.singly

考题 The TCP protocolis a (71) layer protocol. Each connection connects two TCPs that may be just one physical network apart or located on opposite sides ofthe globe.A.physical B.network C.transport D.application

考题 A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

考题 The connection between two networks to from an internet is handled by a machine known as a ( ). A.bridge B.server C.router D.switch

考题 Which of the following describes a secure connection over the Internet between two sites?()A、FTPB、VLANC、VPND、HTTP

考题 The connection between two networks from an intemet is handled by a machine known as a()A、bridgeB、serverC、routerD、switch

考题 A machine must have the most direct access possible to two different networks.  However, it cannot act as a router between the networks.  Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()A、ipforwarding turned on and two adaptersB、One adapter, with a route to a default gatewayC、An adapter in each network, and ipforwarding offD、An adapter in each network, with a route only to the default gateway

考题 You have a server that runs Windows Server 2008 and has the Windows Server Virtualization (WSv)server role installed. You create a new virtual machine. You need to configure the virtual machine to meet the following requirements: Allow network communications between the virtual machine and the host system. Prevent communications with other network servers. What should you do first?()A、Install the Microsoft Loopback Adapter.B、Create a new Virtual Network Switch.C、Enable Internet Connection Sharing (ICS).D、Set the Connection to None for the network interface card.

考题 单选题A machine must have the most direct access possible to two different networks.  However, it cannot act as a router between the networks.  Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()A ipforwarding turned on and two adaptersB One adapter, with a route to a default gatewayC An adapter in each network, and ipforwarding offD An adapter in each network, with a route only to the default gateway