网络工程计算机网络原理参考复习题四(有答案)__网络工程复习题和答案

其他范文 时间:2020-02-28 15:22:12 收藏本文下载本文
【www.daodoc.com - 其他范文】

网络工程计算机网络原理参考复习题四(有答案)_由刀豆文库小编整理,希望给你工作、学习、生活带来方便,猜你可能喜欢“网络工程复习题和答案”。

Which Layer 1 devices can be used to enlarge the area covered by a single LAN segment?(Select two)DE A.Switch B.Router C.NIC D.hub E.Repeater F.RJ-45 transceiver1.An ISDN link can be encapsulated using either PPP or HDLC.What are the advantages of using PPP?(Select two answer choices)BD A.PPP is easier to configure and maintain than HDLC.B.PPP is consistently implemented among different equipment vendors.C.PPP will run faster and more efficiently than HDLC on circuit-switched ISDN links.D.PPP authentication will prevent unauthorized callers from establishing an ISDN circuit.E.PPP can be routed acro public facilities, while HDLC is not routable in circuit-switched networks.F.PPP supports asynchronous communication.Which of the following protocols operate at the 'Application layer' of the OSI model?(Select all valid answers)BC A.TCP B.Telnet C.FTP D.ARP E.IP F.None of the above 4 Which three of the protocols below belong to the application layer?(Select three answer choices)BCE A.ARP B.HTTPS C.SMTP D.CDP E.TFTP F.ICMP 5 In which Spanning-Tree states does a switch port learn MAC addrees?(Select two)CD A.Blocking B.Listening C.Forwarding D.Learning E.Relaying 6 Which OSI layer is aociated with the following: The acknowledgement of transmiions, sequencing, and flow control acro a network?(choose one)C A.Layer 2 B.Layer 3 C.Layer 4 D.Layer 5 E.Layer 6 F.Layer 7Refer to the graphic.Two 2950 switches connect through ports Fa0/24 and a straight-through cable.Based on the output of the show cdp neighbor command from both switches and the information given, what can be concluded?

A.Port Fa/24 on each switch must be configured in VLAN 1 in order for the switches to see neighbor information.B.Port Fa0/24 on each switch must be configured as a trunk port in order for neighbor information to be received.C.The switches are not cabled properly.D.An IP addre needs to be aigned to both switches.E.VTP is incorrectly configured on switch TK1.Which of the protocols below, operates at Layer 2 of the OSI model, and is used to maintain a loop-free network?(choose one)B A.RIP B.STP C.IGRP D.CDP E.VTP 9 You have set up an Internet based FTP server, where people can upload and download files.In terms of the OSI model, what is the highest layer used during the FTP seions.A A.Application B.Presentation C.Seion D.Transport E.Internet F.Data Link G.Physical 10 Four TestKing switches are connected together as shown in the diagram below: Study the Exhibit carefully.What is the purpose of the Spanning Tree Protocol that is operating in the exhibited switch topology?B A.To elect a particular switch as backup designated switch.B.To have one active Layer 2 path through the switches network.C.To select the best path to a remote destination that is on a different network.D.To learn the MAC addrees of host attached to the switches network.E.To distribute VLAN configuration information throughout the switched network.11 Which OSI layer header contains the addre of a destination host that is another network? E A.application B.presentation C.seion D.transport E.network F.data link G.physical 12 In the communications industry, what are the features and benefits of using the layered OSI model?(Select the two best answers)AD A.It encourages industry standardization by defining what functions occur at each layer of the model.B.It neceitates changes in functionality in one layer to other layers.C.It enables equipment efficiency from different vendors to use the same electronic components.D.It divides the network communication proce into smaller and simpler components, thus aiding component development, design, and troubleshooting.E.It supports the evolution of multiple competing standards, and thus enhances busine equipment manufacturing opportunities.13 Which of the statements below are true regarding the availability of bandwidth on a network?(Select all that apply.)CD A.Bandwidth availability is decreasing.B.Bandwidth availability is infinite.C.Bandwidth is used when analyzing network performance.D.Bandwidth availability is finite.E.Bandwidth availability is fixed.14 Which one of the following is the most commonly used layer 2 network device? C A.Hub B.Bridge C.Switch D.Router E.Repeaters F.None of the above 15.A Corporation office's network topology is shown in the diagram below: Host PC1 needs to communications with the e-mail server shown above.What addre will be placed on the destination addre field of the frame when it leaves host PC1?

A.The MAC addre of PC1 B.The MAC addre of switch Switch1 C.The MAC addre of the fa0/0 interface of the router.D.The MAC addre of the Eth1/0 interface of the router.E.The MAC addre of switch TestKing2 F.The MAC addre of the email server 17.Which of the following layers of the TCP/IP model most closely corresponds to the network layer of the OSI model? B A.Application B.Internet C.Transport D.Network E.Data Link 18You have an Ethernet network.Which of the conditions below can lead to increased congestion on your network?(Select two answer choices)DF A.The use of Full-Duplex Mode.B.The Creation on New Collision Domains.C.The Creation on New Broadcast Domains.D.The Addition of Hubs to the Network.E.The use of switches in the Network.F.The Amount of ARP or IPX SAP Traffic.19 What is the purpose of the spanning-tree algorithm in a switched LAN?C A.To provide a monitoring mechanism for networks in switched environments.B.To manage VLANs acro multiple switches.C.To prevent switching loops in networks with redundant switched paths.D.To segment a network into multiple collision domains.E.To prevent routing loops in networks.20 A Corporation LAN is displayed in the diagram below:Host B sends a frame to host C.What will the switch do with the frame? A.Drop the frame B.Send the frame out all ports except port 0/9 C.Return the frame to host B D.Send an ARP request for host C E.Send an ICMP Host Unreachable meage to Host B F.Record the destination MAC addre in the switching table and send the frame directly to Host C

22.The Corporation LAN consists of 6 switches connected together as shown in the diagram below:What is the name of the potential problem of this switch setup, and what protocol can prevents its occurrence.(Select only one answer choice)F A.routing loops, hold down timers B.switching loops, split horizon C.routing loops, split horizon D.switching loops, VTP E.routing loops, STP F.switching loops, STP 24 You have been contracted by TestKing to replace the network cabling of their LAN's.The System Administrator gives you specific instructions that he needs to use cabling in the LAN that is NOT susceptible to EMI.What kind of cable would you use to satisfy the administrator's needs?E A.Thicknet coaxial cable.B.Thinnet coaxial cable.C.Category 5 UTP cable.D.Category 5 STP cable.E.Fiber optic cable.F.All of the above 25.Which two of the following values does STP take into consideration when it elects the root bridge?(Select two answer choices)CE A.The BPDU version number B.The acce layer bridge setting C.The Bridge ID D.The spanning-tree update number E.The bridge priority F.The VLAN number

26.Which one of the following actions would actually increase congestion on an Ethernet network? C A.Increasing the number of collision domains.B.Micro-segmenting the network.C.Adding hubs for connectivity to the network.D.Putting additional switches in the network.E.Implementing VLANs in the network.27 What is the IEEE standard aociated with Gigabit Ethernet?(Select two answer choices)CE A.802.11 B.802.5 C.802.3ab D.802.3ae E.802.3z F.802.3u 28.In a switched LAN network, what is the Spanning-Tree algorithm used for? C A.It is used to provide a mechanism for routing updates in switched environments.B.It is used to prevent routing loops in networks with redundant routes.C.It is used to prevent switching loops in networks with redundant switched routes.D.It is used to manage, the addition, deletion, and naming of VLANs acro multiple switches.E.It is used to segment a network into multiple collision domains.F.None of the above.G.All of the above are functions of STP.29.On a half-duplex Ethernet LAN, two hosts attempt to send data simultaneously, resulting in a collision.Following this collision, what will the hosts do?(Select all valid answers)C A.The destination host sends a request to the source for retransmiion.B.The hosts will attempt to resume transmiion after a time delay has expired.C.The hosts will do nothing, as the higher layers are responsible for data error correction and re-transmiion.30.Why is full-duplex Ethernet superior to its single-duplex counterpart?(Select two answer choices.)BD A.It uses inexpensive hubs B.It operates without collisions C.It operates on switches D.It provides faster data transfer E.It utilizes fewer wiring pairs

Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?(Select two answer choices.)BD A.Full-duplex Ethernet uses CSMA/CD to prevent collisions.B.Half-duplex Ethernet uses a loopback circuit to detect collisions.C.A full-duplex Ethernet card allows 20Mbps for data transmiion.D.Full-duplex Ethernet makes use of two pairs of wires for data.E.An Ethernet hub can operate both half and full duplex simultaneously.32.Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?(Select two answer choices.)BD A.Full-duplex Ethernet uses CSMA/CD to prevent collisions.B.Half-duplex Ethernet need to detect collisions.C.An Ethernet hub can operate both half and full duplex simultaneously.D.Full-duplex Ethernet makes use of two pairs of wires for data.33.Which of the following procees, is used to find the hardware addre of a LAN device? D A.Inverse-ARP B.Reverse-ARP C.Proxy ARP D.ARP 34 What are the differences between full-duplex Ethernet and half-duplex Ethernet?(Select all that apply)AD A.Half-duplex Ethernet operates in a shared collision domain.B.Full-duplex Ethernet has a lower effective throughput.C.Half-duplex Ethernet operates in a private collision domain.D.Full-duplex Ethernet allows two-way communication.E.Half-duplex Ethernet operates in a private broadcast domain.35.Which IEEE standard is used to define Wi-Fi? E A.IEEE 802.3 B.IEEE 802.5 C.IEEE 802.16 D.IEEE 802.8 E.IEEE 802.11 36.What does a Layer 2 switch use to decide where to forward a received frame? F A.source MAC addre B.source IP addre C.source switch port D.destination IP addre E.destination port addre F.destination MAC addre 37 When you compare the differences between half-duplex and full-duplex Ethernet, which of the following characteristics are exclusive to half-duplex?(Select two answer choices)AD A.Half-duplex Ethernet operates in a shared collision domain.B.Half-duplex Ethernet operates in an exclusive broadcast domain.C.Half-duplex Ethernet has efficient throughput.D.Half-duplex Ethernet has lower effective throughput.E.Half-duplex Ethernet operates in an exclusive collision domain.38.Auming you build networks to exact specifications, what is the recommended maximum length a 10BaseT cable can be before it has to be segmented or repeated?A A.100 meters B.100 feet C.100 yards D.200 meters 39.Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?(Select two)DE A.Spanning Tree Protocol B.Shortest path first tree C.Link-state advertisements(LSA)D.Hold-down timers E.Split horizon

40.The Sales and Production networks are separated by a router as shown in the diagram below:

Which of the following statements most accurately describes the characteristics of the above networks broadcast and collision domains?(Select the two best answer choices)AF A.There are two broadcast domains in the network.B.There are four broadcast domains in the network.C.There are six broadcast domains in the network.D.There are four collision domains in the network.E.There are five collision domains in the network.F.There are six collision domains in the network.42 The Sales and Production networks are separated by a Testking router as shown in the diagram below: Which of the following statements most accurately describes the characteristics of the above networks broadcast and collision domains?(Select the two best answer choices)AF A.There are two broadcast domains in the network.B.There are four broadcast domains in the network.C.There are six broadcast domains in the network.D.There are four collision domains in the network.E.There are five collision domains in the network.F.There are seven collision domains in the network.43.Which statements are true regarding clale routing protocols? Select two.BE

A.The use of discontiguous subnets is not allowed B.The use of variable length subnet masks is permitted C.RIP v1 is a clale routing protocol D.IGRP supports clale routing within the same autonomous system E.RIP v2 supports clale routing

44.Which of the addrees below is an example of a valid unicast addre? A A.172.31.128.255/18 B.255.255.255.255 C.192.168.24.59/30 D.FFFF.FFFF.FFFF E.224.0.0.5 F.All of the above 45.Some of the routers have been configured with default routes.What are some of the advantages of using default routes?(Choose two)BD A.They establish routes that will never go down.B.The keep routing tables small.C.They require a great deal of CPU power.D.The allow connectivity to remote networks that are not in the routing table.E.They direct traffic from the Internet into corporate networks.46 A trunk is configured between two Catalyst switches in the Testking network as shown in the diagram below: Based on the information above, how many broadcast domains exist in the diagram?C A.One B.Two C.Three D.Four E.Five F.Six

47.What does a Layer 2 switch do if it receives a frame with a destination MAC addre that is not found in its MAC addre table? C A.The frame is dropped.B.The frame is addreed with a broadcast MAC addre and sent out all ports.C.The frame is sent out all ports except the receiving port.D.An ARP request is sent out all ports except the receiving port.E.A destination unreachable meage is sent back to the source addre.F.None of the above.48.Which of the following protocols utilize UDP as the layer 4 transport mechanism?(Choose all that apply)DF A.TACACS B.Telnet C.SMTP D.SNMP E.HTTP F.TFTP 49 What does a Layer 2 switch do if it receives a frame with a destination MAC addre that is not found in its MAC addre table?C A.The frame is dropped.B.The frame is addreed with a broadcast MAC addre and sent out all ports.C.The frame is sent out all ports except the receiving port.D.An ARP request is sent out all ports except the receiving port.E.A destination unreachable meage is sent back to the source addre.F.None of the above.50.Part of the job as a network administrator is being able to make a distinction between routed protocols and routing protocols.Which of the following statements is true regarding them?(Choose all that apply)BC A.A routing protocol is aigned to an interface and determines the method of packet delivery.B.A routed protocol is aigned to an interface and determines the method of packet delivery.C.A routing protocol determines the path of a packet through a network.D.A routed protocol determines the path of a packet through a network.E.A routing protocol operates at the transport layer of the OSI model.F.A routed protocol updates the routing table of a router.51.Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addrees, subnet masks, default gateways, and DNS server information? C A.CDP B.SNMP C.DHCP D.ARP E.DNS F.None of the above 52 What does a Layer 2 switch use to decide where to forward a received frame?F A.source MAC addre B.source IP addre C.source switch port D.destination IP addre E.destination port addre F.destination MAC addre

53.Which one of the routing protocol below does NOT use a distance vector algorithm to calculate a route to a given destination?(Choose one answer)DE A.RIP B.IPX RIP C.IGRP D.OSPF 54, When comparing and contrasting the similarities and differences between bridges and switches, which of the following are valid statements? Choose all the valid answer choices)BC A.Bridges are faster than switches because they have fewer ports.B.A switch is a multiport bridge, C.Bridges and switches learn MAC addrees by examining the source MAC addre of each frame received.D.A bridge will forward a broadcast but a switch will not.E.Bridges and switches increase the size of a collision domain.F.None of the above statements are true.55 Non-contiguous networks can pose a problem for network reachability in certain circumstances.Which of the following routing protocols have means of minimizing the risk?(Select three choices)BCE A.RIP v1 B.RIP v2 C.EIGRP D.IGRP E.OSPF F.VLSM

routing protocols?(Choose all that apply.)ACE A.The exchange of an advertisement is triggered by a change in the network.B.All routers exchange routing tables with each other in a multipoint network.C.Packets are routed based upon the shortest path to the destination.D.Paths are chosen depending on the cost efficiency factor.E.Every router in an OSPF area is capable of representing the entire network topology.F.Only the designated router in an OSPF area can represent the entire network topology.57.What functions do routers perform in a network?(Choose two).AC A.Packet Switching B.Acce Layer Security C.Path Selection.D.VLAN Membership Aignment.E.Bridging between LAN segments.F.Micro-segmentation of Broadcast Domains.58 Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?(Select two)DE A.Spanning Tree Protocol B.Shortest path first tree C.Link-state advertisements(LSA)D.Hold-down timers E.Split horizon F.VRP 59.What are the different characteristics of distance vector and link state routing protocols? AD A.Distance vector protocols send the entire routing table to directly connected neighbors.B.Distance vector protocols are responsible for sending updates to all networks listed in the routing table.C.Link state protocols are responsible for sending the entire routing table to the whole network.D.Link state protocols send updates regarding their own links status to all other routers on the network.E.None of the above 60.Which of one the following fields is contained within an IEEE Ethernet frame header? A A.source and destination MAC addre B.source MAC addre and destination network addre only C.source and destination network addre only D.source network addre and destination MAC addre E.source and destination MAC addre and source and destination network addre 61 Which of the following statements describe the characteristic of link state routing protocols?(Choose all that apply.)ACE A.The exchange of an advertisement is triggered by a change in the network.B.All routers exchange routing tables with each other in a multipoint network.C.Packets are routed based upon the shortest path to the destination.D.Paths are chosen depending on the cost efficiency factor.E.Every router in an OSPF area is capable of representing the entire network topology.F.Only the designated router in an OSPF area can represent the entire network topology.62.Which of the following statements are correct in regard to clale routing protocols?(Select two)BE A.Discontiguous subnets are not allowed.B.Variable length subnet masks are allowed.C.RIP v1 is a clale routing protocol.D.IGRP supports clale routing within the same autonomous system.E.RIP v2 supports clale routing.63.Which two of the addrees below are available for host addrees on the subnet 192.168.15.19/28?(Select two answer choices)AC A.192.168.15.17 B.192.168.15.14 C.192.168.15.29 D.192.168.15.16 E.192.168.15.31 F.None of the above

64.Which of the protocols below use TCP at the transport layer?(Select four)BDEF A.TFTP B.SMTP C.SNMP D.FTP E.HTTP F.HTTPS 65.You have a Cla C network, and you need ten subnets.You wish to have as many addrees available for hosts as poible.Which one of the following subnet masks should you use? C A.255.255.255.192 B.255.255.255.224 C.255.255.255.240 D.255.255.255.248 E.None of the above 66 In EIGRP, what kind of route information is stored in RAM and maintained by way of hello packets and update packets?(Select two answer choices)AD A.Neighbor Table B.SRF Table C.RTP Table D.Topology Table E.Query Table F.Dual Table

67.A PC on a network segment sends data to another PC on a different segment.Which of the following correctly describe the correct order of how this data will be encapsulated? F A.Data, Frame, Packet, Segment, Bit B.Data, Frame, Segment, Packet, Bit C.Data, Packet, Frame, Segment, Bit D.Data, Packet, Segment, Frame, Bit E.Data, Segment, Frame, Packet, Bit F.Data, Segment, Packet, Frame, Bit 68.What is the subnet for the host IP addre 201.100.5.68/28? C A.201.100.5.0 B.201.100.5.32 C.201.100.5.64 D.201.100.5.65 E.201.100.5.31 F.201.100.5.1 69.A router receives a packet on interface 172.16.45.66/26.The source IP of the packet is 172.16.45.127/26 and the destination is 172.16.46.191/26.How will the router handle the packet?(Please be very careful)C A.The destination is a host on another subnet, so the router will not forward the packet.B.The destination is a host on the same subnet, so the router will forward the packet.C.The destination is a broadcast addre, so the router will not forward the packet.D.The destination is a network addre, so the router will forward the packet.70.Which one of the binary bit patterns below denotes a Cla B addre? B A.0xxxxxxx B.10xxxxxx C.110xxxxx D.1110xxxx E.11110xxx 71 You are an administrator and you've just configured OSPF on a router with both physical and logical interfaces.Which of the following factors determine the router ID?C A.The lowest network number of any interface.B.The highest network number of any interface.C.The highest IP addre of any logical interface.D.The middle IP addre of any logical interface.E.The lowest IP addre of any physical interface.F.The highest IP addre of any physical interface.G.The lowest IP addre of any logical interface.72.How many sub networks and hosts are available per subnet if you apply a /28 mask to the 210.10.2.0 cla C network? E A.30 networks and 6 hosts.B.6 networks and 30 hosts.C.8 networks and 32 hosts.D.32 networks and 18 hosts.E.14 networks and 14 hosts.F.None of the above 73.You have a cla B network with a 255.255.255.0 mask.Which of the statements below are true of this network?(Select all valid answers)D A.There are 256 usable subnets.B.There are 256 usable hosts per subnet.C.There are 50 usable subnets.D.There are 254 usable hosts per subnet.E.There are 24 usable hosts per subnet.F.There is one usable network.74 If the bandwidth of an OSPF interface is 64, what would be the calculated cost of the link?C A.1 B.10 C.1562 D.64000 E.128000 F.None of the above

75.What is the subnet for the host IP addre 172.16.210.0/22? C A.172.16.42.0 B.172.16.107.0 C.172.16.208.0 D.172.16.252.0 E.172.16.254.0 F.None of the above 76.You have a network that supports VLSM and you need to reduce IP addre waste in your point to point WAN links.Which of the masks below would you use? B A./38 B./30 C./27 D./23 E./18 F./32 77 What are two characteristics of the OSPF proce identifier?(Select two answerAC choices)A.It is needed to identify a unique instance of an OSPF database.B.It is an optional parameter only neceary if multiple OSPF procees are used.C.It is locally significant.D.It is globally insignificant E.All routers in the same OSPF area must have the same proce ID to exchange routing information.78.You have a single Cla C IP addre and a point-to-point serial link that you want to implement VLSM on.Which subnet mask is the most efficient?D A.255.255.255.0 B.255.255.255.240 C.255.255.255.248 D.255.255.255.252 E.255.255.255.254 79.If an Ethernet port on router was aigned an IP addre of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? C A.1024 B.2046 C.4094 D.4096 E.8190 80 What kind of information does a router running a link-state routing protocol need to create and maintain its topological database?(Select two answer choices.)AC A.LSAs from other routers B.Beacons received on point-to-point links C.hello packets D.Routing tables received from neighbors E.SAP packets sent by other routers F.TTL packets from exclusive routers

81.Which of the following IP addrees is a private IP addre? Select all that apply.CE A.12.0.0.1 B.168.172.19.39 C.172.20.14.36 D.172.33.194.30 E.192.168.42.34 82.Given the choices below, which addre represents a unicast addre? E A.224.1.5.2 B.FFFF.FFFF.FFFF.C.192.168.24.59/30 D.255.255.255.255 E.172.31.128.255/18

83.The Corporation Texas branch network is displayed in the following diagram:

Of the following choices, which IP addre should be aigned to the PC host? C A.192.168.5.5 B.192.168.5.32 C.192.168.5.40 D.192.168.5.63 B.E.192.168.5.75 84.Which Layer 1 devices can be used to enlarge the area covered by a single LAN segment?(Select two)DE C.A.Switch D.B.Router E.C.NIC F.D.hub G.E.Repeater H.F.RJ-45 transceiver

A RIP router has an entry in the routing table for a specific network destination.It then gets updated with another entry for that same destination, but with a higher path cost(hop count)than the one already in the routing table.What will the router do in this situation?A A.It will ignore the update and take no further action.B.It will add the update information to its routing table.C.It will replace the existing routing table entry with the update information.D.It will delete the existing routing table and will send out hello packets to rebuild the routing table.86.What is the IP addre range for the first octet in a cla B addre, in binary form? C A.00000111-10001111 B.00000011-10011111 C.10000000-10111111 D.11000000-11011111 E.11100000-11101111 F.None of the above 87 A new network has been configured using OSPF as the routing protocol.With which network type will OSPF establish router adjacencies but not perform the DR/BDR election proce?A A.point-to-point B.Backbone area 0 C.Broadcast multicast D.Non-broadcast multi-acce E.The DR/BDR proce is done for all interface types 88.The 213.115.77.0 network was subnetted using a /28 subnet mask.How many usable subnets and host addrees per subnet were created as a result of this? E A.2 networks with 62 hosts B.6 networks with 30 hosts C.16 networks and 16 hosts D.62 networks and 2 hosts E.14 networks and 14 hosts F.None of the above

89.The IP network 210.106.14.0 is subnetted using a /24 mask.How many usable networks and host addrees can be obtained from this? A A.1 network with 254 hosts B.4 networks with 128 hosts C.2 networks with 24 hosts D.6 networks with 64 hosts E.8 networks with 36 hosts 90 In what location are EIGRP succeor routes stored?E A.In the routing table only.B.In the neighbor table only.C.In the topology table only.D.In the routing table and neighbor table.E.In the routing table and topology table.F.In the topology table and neighbor table.91.How many usable IP addrees can you get from a conventional Cla C addre? C A.128 B.192 C.254 D.256 E.510 92 Which statements are true regarding clale routing protocols? Select two.BE A.The use of discontiguous subnets is not allowed B.The use of variable length subnet masks is permitted C.RIP v1 is a clale routing protocol D.IGRP supports clale routing within the same autonomous system E.RIP v2 supports clale routing

《计算机网络原理》第五版复习题

习题1-02 试简述分组交换的要点。答:分组交换实质上是在“存储——转发”基础上发展起来的。它兼有电路交换和报文交换 的优点。分组交换在线路上采用动态复用技术传送按一定......

计算机网络原理答案

第一章计算机网络概述一、选择题。1.下列接入方式不属于宽带网络接入方式的是(A)A.双绞线接入B.钢线接入C.光纤接入D.无线接入2.下列有关多媒体网络中不同类型的数据对传输要......

期末复习题计算机网络基础原理

计算机1、在计算机网络的定义中,一个计算机网络包含多台具有_自主_____功能的计算机;把众多计算机有机连接起来要遵循规定的约定和规则,即_通信协议______;计算机网络的最基本特......

计算机网络原理考试题答案

1、国际标准化组织ISO提出的不基于特定机型、操作系统或公司的网络体系结构OSI模型中,第一层和第三层分别为()。(分数:1 分) A.物理层和网络层 B.数据链路层和传输层 C.网络层和表......

计算机网络原理课后答案

- 1以单计算机为中心的远程联机系统,通过通信线路将信息汇集到一台中心计算机进行集中处理,从而开创了把计算机技术和通信技术相结合的尝试,这类简单的“终端—通信线路—计算......

下载网络工程计算机网络原理参考复习题四(有答案)_word格式文档
下载网络工程计算机网络原理参考复习题四(有答案)_.doc
将本文档下载到自己电脑,方便修改和收藏。
点此处下载文档

文档为doc格式

热门文章
点击下载本文