云题海 - 专业文章范例文档资料分享平台

当前位置:首页 > 计算机网络英文题库(附答案)chapter2

计算机网络英文题库(附答案)chapter2

  • 62 次阅读
  • 3 次下载
  • 2025/6/6 4:54:59

26. There are three architectures for locating content in P2P file sharing, Napster uses . A Centralized Directory (p137) B Query Flooding

C Exploiting Heterogeneity D Incentive Priorities

27. The following architectures in P2P file sharing, which is an overlay network? A Centralized Directory B Query Flooding(p139) C Exploiting Heterogeneity D Incentive Priorities

28. The time it takes for a small packet to travel from client to server and then back to the client is . A round-travel time B next-hop time C round-trip time D prefix-matching time

29. Suppose A ( with a Web-based e-mail account ) sends a message to B ( who accesses his mail server using POP3), which application-layer protocol is not used? A HTTP B SMTP C POP3 D IMAP

30. In the four following options, which protocol is included in Mail Access Protocol? A SMTP B DHCP C IMAP D FTP 31. In FTP commands, is used to send user password to the server. A User B Pass C Retr D Stor 32. The function of the additional header field in MIME Content-Type is . A to convert the message body to its origin non-ASCII form B to determine what actions it should take on message body

5

C to send an E-mail to the receiving user agent D to indicate what type the message is

33. In the four following options, which application is organized as hybrid of C/S and P2P architecture?

A E-mail B OICQ C File transfer D Web application 34. In the four following options, which is not a centralized DNS design’s problem? A a single point of failure B traffic volume

C distant centralized database D slow (maintenance)

35. In the following options, from the application developer’s perspective, which is not correct?

A the network architecture is fixed

B the network architecture provides a specific set of services to applications C the application architecture is designed by the physical devices

D the application architecture dictates how the application is organized over the various end systems

36. There are three predominant architectures used in modern network applications, which one is not included?

A the client-server architecture B the P2P architecture C a hybrid of the client-server and P2P architecture

D a hybrid of the client-server and browser-server architecture 37. In the following options about C/S architecture, which is not correct? A In C/S architecture, there is an always-on host, called the server.

6

B In C/S architecture, there is an always-on host, called the client. C The server has a fixed, well-known address, called IP address. D Clients do not directly communicate with each other.

38. are often used to create a powerful virtual server in C/S architecture. A Peers B Server farm C server stack D local server

39. A process sends messages into, and receives messages from, the network through its . A socket B program C client D peer 40. Which one is not defined by an application-layer protocol? A the types of messages exchanged B the syntax of various message types C the semantics of the fields

D rules for determining when and how to translate the socket 41. HTTP can use two types of connections, which are . A persistent and non-persistent connection B connection with pipelining and without pipelining C TCP and UDP

D parallel and serial connection

42. takes for a small packet to travel from client to server and then back to the client. A RDT B threshold C RTT D overhead 43. The default mode of HTTP uses . A non-persistent connection with pipelining B non-persistent connection without pipelining C persistent connection with pipelining

7

D persistent connection without pipelining

44. In HTTP request messages, the request line has three fields, there are . A the method field, the URL field and the HTTP version field B the method, the connection and URL field C the user-agent, the method and HTTP version field D the user-agent, the URL and the HTTP version field

45. In the header lines of HTTP request message, if the field of Connection is close, it specifies .

A the host on which object resides B what type of the user agent

C that the browser wants the server to close the connection after sending the requested object

D which language can the browser receive

46. In HTTP response message, if the status code is 404, it means . A request succeeded and the information is returned in the response B requested object has been permanently moved

C the requested HTTP protocol version is not supported by the server D the requested document does not exist on this server

47. is a network entity that satisfies HTTP requests on the behalf of an origin Web server.

A proxy server B local server C DNS server D Web server 48. In the following four options about web cache, which one is not correct? A A web cache is both a server and a client at the same time. B A web cache is purchased and installed by an ISP.

8

搜索更多关于: 计算机网络英文题库(附答案)chapter2 的文档
  • 收藏
  • 违规举报
  • 版权认领
下载文档10.00 元 加入VIP免费下载
推荐下载
本文作者:...

共分享92篇相关文档

文档简介:

26. There are three architectures for locating content in P2P file sharing, Napster uses . A Centralized Directory (p137) B Query Flooding C Exploiting Heterogeneity D Incentive Priorities 27. The following architectures in P2P file sharing, which is an overlay network? A Centralized Directory B Query Flooding(p139) C Explo

× 游客快捷下载通道(下载后可以自由复制和排版)
单篇付费下载
限时特价:10 元/份 原价:20元
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219
Copyright © 云题海 All Rights Reserved. 苏ICP备16052595号-3 网站地图 客服QQ:370150219 邮箱:370150219@qq.com