77范文网 - 专业文章范例文档资料分享平台

2004-2005春夏学期《计算机网络基础》期末试卷(5)

来源:网络收集 时间:2020-11-29 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:或QQ: 处理(尽可能给您提供完整文档),感谢您的支持与谅解。点击这里给我发消息

35. If the congestion window size is 20KB, and the receive window size is 30KB, what is the maximum bytes can the TCP entity transmit?

A. 20KB B. 30KB C. 50KB D. 10KB

36. Port numbers below ________ are called well-known ports and are reserved for standard services.

A. 256 B. 1024 C. 4096 D. 1000

37. ________, which are overlay networks on top of public networks but with most of the properties of private network.

A. PBX B. VPN C. CDMA 1X D. GPRS

38. The problem of running out of IP addresses is not a theoretical problem that might occur at some point in the distant future. Some people felt that a quick fix was needed for the short term. This quick fix came in the form of ____________________. A. IP6 B. DHCP C. RARP D. NAT

39. Public-key algorithms have the property that ____________________ keys are used for encryption and decryption and that the decryption key cannot be derived from the encryption key. These properties make it possible to publish the public key. A. one time B. random C. same D. different

40. The main public-key algorithm is ____________________ which derives its strength from the fact that it is very difficult to factor large numbers. A. DES B. AES C. MD5 D. RSA

41. Various schemes have been devised for digital signatures, using both symmetric-key and ________-key algorithms.

A. public B. private C. one time D. one way

42. Often, authentication is needed but secrecy is not, based on the idea of a one-way hash function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string. This hash function, MD, often called a ________.

A. message digest B. packet-switched C. message-detect D. mini data

43. URL(Uniform Resource Locator) have three parts: the ________, the DNS name of the machine on which the page is located, and a local name uniquely indicating the specific page. A. protocol B. address C. port number D. name

44. HTTP1.1, which supports ________ connections. With them, it is possible to establish a TCP connection, send a request and get a response, and then additional requests and get additional response.

A. one time B. persistent C. stop and wait D. one-way

45. _______, when it is used, a bad frame that is received is discarded, but the good frames received after it are buffered.

A. selective repeat B. go back N C. sliding window D. stop and wait 46. How does the FDM multiplexing schemes work like?

A. each user having exclusive possession of some band

B. each user take turns, periodically getting the entire bandwidth for a litter burst of time C. each user transmit over the entire frequency spectrum all the time with different coding D. each user transmit over a shared fiber using different wavelength

47. When we use a modem, which use 16 phases signal to modulation, then how much can we get the maximum data rate in a 2400 baud channel (in noiseless channel)?

A. 400bps B. 2400bps C. 9.6kbps D. 14.4kbps

48. ______ is a small java program that has been compiled into binary instruction running in JVM,

百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说教育文库2004-2005春夏学期《计算机网络基础》期末试卷(5)在线全文阅读。

2004-2005春夏学期《计算机网络基础》期末试卷(5).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印 下载失败或者文档不完整,请联系客服人员解决!
本文链接:https://www.77cn.com.cn/wenku/jiaoyu/1154928.html(转载请注明文章来源)
Copyright © 2008-2022 免费范文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ: 邮箱:tiandhx2@hotmail.com
苏ICP备16052595号-18
× 注册会员免费下载(下载后可以自由复制和排版)
注册会员下载
全站内容免费自由复制
注册会员下载
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: