Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

SSD8

.doc
Скачиваний:
24
Добавлен:
25.02.2016
Размер:
1.3 Mб
Скачать

See section 3.3.3 of the course notes.

--------------------------------------------------------------------------------

2.

Which of the following do RPC/RMI packages typically support?

Heterogeneity across platforms

Heterogeneity across languages environments

Support for dynamic interfaces

(a) I and II only

(b) II only

(c) I only

(d) I, II, and III

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.3.1 of the course notes.

--------------------------------------------------------------------------------

3.

Which of the following statements are true about CORBA?

Using the CORBA IDL, existing code written in procedural languages can be made to look like objects using IDL wrappers

IDL code can be generated automatically from the code of many OO languages

The IDL code can be used to generate implementation code automatically in one of many OO languages

(a) I and II only

(b) II and III only

(c) I, II, and III

(d) I only

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes. See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

4.

Where is marshalling handled in CORBA?

(a) In the client IDL stubs

(b) In the Interface Repository

(c) In the DII

(d) In the ORB interface

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

5.

To convert a CORBA object reference to a string, one could use

(a) the DSI

(b) the Implementation Repository

(c) the ORB Interface

(d) the Object Adapter

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes.

1.

Which of the following does CORBA support but DCOM not support?

(a) Inheritance

(b) Both static and dynamic method invocation

(c) A name service

(d) Language independence

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.3 of the course notes.

--------------------------------------------------------------------------------

2.

Which of the following statements are true about CORBA?

Using the CORBA IDL, existing code written in procedural languages can be made to look like objects using IDL wrappers

IDL code can be generated automatically from the code of many OO languages

The IDL code can be used to generate implementation code automatically in one of many OO languages

(a) I and II only

(b) I, II, and III

(c) I only

(d) II and III only

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes. See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

3.

Where is marshalling handled in CORBA?

(a) In the Interface Repository

(b) In the DII

(c) In the client IDL stubs

(d) In the ORB interface

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

4.

Which of the following stubs does the IDL compiler generate?

Client stubs

Server stubs

(a) II only

(b) I and II

(c) I only

(d) None

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

5.

Which of the following do RPC/RMI packages typically support?

Heterogeneity across platforms

Heterogeneity across languages environments

Support for dynamic interfaces

(a) I only

(b) I and II only

(c) I, II, and III

(d) II only

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.1 of the course notes.

1.

To convert a CORBA object reference to a string, one could use

(a) the ORB Interface

(b) the Object Adapter

(c) the DSI

(d) the Implementation Repository

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

2.

Where is marshalling handled in CORBA?

(a) In the client IDL stubs

(b) In the DII

(c) In the Interface Repository

(d) In the ORB interface

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

3.

Which of the following are supported by Jini?

Entire object passing

Discovery service that looks up services based on a set of attributes

(a) I and II

(b) I only

(c) II only

(d) None

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.3 of the course notes.

--------------------------------------------------------------------------------

4.

In a traditional distributed computing environment, _____ decides what services are needed and configures a set of servers to provide those services.

(a) the system manager

(b) a central server

(c) a process load table

(d) the user

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.1 of the course notes.

--------------------------------------------------------------------------------

5.

Which of the following are true of CORBA's dynamic discovery of interfaces?

Parameter values are matched by the number and type of the parameters.

Parameter values can be provided by a human user at run time.

(a) II only

(b) I only

(c) None

(d) I and II

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes.

1.

Which of the following statements are true about CORBA?

Using the CORBA IDL, existing code written in procedural languages can be made to look like objects using IDL wrappers

IDL code can be generated automatically from the code of many OO languages

The IDL code can be used to generate implementation code automatically in one of many OO languages

(a) I and II only

(b) I, II, and III

(c) I only

(d) II and III only

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes. See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

2.

Which of the following does CORBA support but DCOM not support?

(a) A name service

(b) Inheritance

(c) Language independence

(d) Both static and dynamic method invocation

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.3.3 of the course notes.

--------------------------------------------------------------------------------

3.

Where is marshalling handled in CORBA?

(a) In the client IDL stubs

(b) In the ORB interface

(c) In the DII

(d) In the Interface Repository

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

4.

In ORB environments, services are implemented as _____, and they are invoked through a(n) _____.

(a) objects, RMI

(b) procedures, RPC

(c) stateless functions, interpreter

(d) URLs, Web browser

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.1 of the course notes.

--------------------------------------------------------------------------------

5.

Which of the following are true of CORBA's dynamic discovery of interfaces?

Parameter values are matched by the number and type of the parameters.

Parameter values can be provided by a human user at run time.

(a) I and II

(b) I only

(c) None

(d) II only

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes.

View Assessment Result: Multiple-Choice Quiz 1

Your performance was as follows:

You took 104 minutes on this assessment from Sun Apr 8 10:12:03 UTC+0800 2007 to Sun Apr 8 11:55:20 UTC+0800 2007.

Total score: 40.00

9.

Packet collisions occur in an Ethernet network because

(a) two different Ethernet networks may be spliced together

(b) the Ethernet switching mechanism may occasionally send two packets through the same route

(c) the Ethernet uses a ring topology

(d) two Ethernet nodes can send packets at the same time

Correct answer is (d)

Your score on this question is: 0.00

Your performance was as follows:

1.

Every Protocol Data Unit (PDU) that is sent by a protocol layer to its remote peer on the destination system always includes:

The headers for all the protocols of the layers above it

The headers for the protocol of the layer below it

Application Data

(a) I and III only

(b) III only

(c) None

(d) I, II, and III

Correct answer is (c)

Your score on this question is: 0.00

Feedback:

See section 1.1.5 of the course notes.

--------------------------------------------------------------------------------

2.

Why do network applications send "messages," but the network transmits information in "packets?"

Buffer allocation and error handling is easier when done for smaller chunks of data.

Multiple messages can be sent in a single large packet to decrease overhead.

Network engineers and application programmers just use different terminology for the same unit of application data.

A message needs to be packaged with the instructions to process it at the destination.

(a) I and II only

(b) I, II, III, and IV

(c) II and III only

(d) II and IV only

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

3.

Which of the following parameters can be specified in the header of a request in the Hypertext Transfer Protocol (HTTP)?

The types of image formats that a browser understands

The type of browser (e.g., Netscape, Internet Explorer) making the request

The method by which the request is to be satisfied—for example, whether the request is a GET of a form submission

(a) I and II only

(b) I, II, and III

(c) III only

(d) II and III only

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

4.

You have recently become the first network engineer of a large corporation with offices worldwide. The company is considering the installation of a data network, but the Board of Directors is rather old-fashioned and does not see the need to change the company's time-honored business practices. Your first task at the job is to justify your salary and the cost of a new network, and for this purpose you are about to give a presentation to the Board of Directors. Which of the following would you include in your presentation? Assume the directors are extremely intelligent, though perhaps not knowledgeable in your field.

Lower expenditures on computer hardware

Higher availability of customer services

Better protection of the company's proprietary information

(a) I and II only

(b) II and III

(c) I and III only

(d) II only

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 1.1 of the course notes.

--------------------------------------------------------------------------------

5.

The transmission of high-quality, interactive voice and video over the current Internet is difficult because today's Internet

(a) uses connectionless protocols

(b) is unable to guarantee minimum throughput or maximum latency for a given connection

(c) gives higher priority to bulk data transfers

(d) does not really have sufficient throughput

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.1.4 of the course notes.

--------------------------------------------------------------------------------

6.

All store-and-forward networks are

(a) broadcast networks

(b) packet or message switched networks

(c) connectionless networks

(d) connection-based networks

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

7.

A packet with no data is sent from host A to host B on an otherwise idle network. The packet is found to have taken 35 milliseconds to reach B. The incremental overhead to send an additional byte (usually called the "throughput") is estimated to be five microseconds by repeatedly measuring the transmission times of long packets. Approximately, how long will an eight Kbytes (8192 bytes) packet take to reach B when sent from A?

(a) 76 milliseconds

(b) cannot be determined from the information given

(c) 40 milliseconds

(d) 55 milliseconds

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 1.1.4 of the course notes.

--------------------------------------------------------------------------------

8.

Ethernet (IEEE 802.3) is an example of

(a) an a priori standard

(b) a successful example of the Internet's strategy of developing standards through "rough consensus and running code"

(c) a de facto standard later developed into a de jure standard

(d) a standard developed by the International Telecommunications Union

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 1.1.6 of the course notes.

--------------------------------------------------------------------------------

9.

A computer sends 100 Kbytes of aggregate data to another computer through the network. If this transmission time takes 10 seconds and setup time is negligible, the throughput of this network is

(a) in the range from 60 to 120 Kbps (kilobits per second)

(b) not able to be determined with the information given

(c) exactly 10 Kbps

(d) in the range from 6 to 12 Kbps (kilobits per second)

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 1.1.4 of the course notes.

--------------------------------------------------------------------------------

10.

Which of the following are specified by the HTTP protocol?

The syntax of the request header

The syntax of the response header

The specific legal names of the request header fields

(a) I, II, and III

(b) I only

(c) I and II only

(d) I and III only

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

(c) All header field names are valid; it is up to the client and the server to understand each other's field names, or to ignore them.

1.

John is using his bank's Web server to pay his telephone bill electronically. Which kind(s) of network interaction take(s) place in this Scenario, from the moment John logs into his bank's Web site until the telephone company receives the money?

People-people

People-computer

Computer-computer

(a) II and III only

(b) III only

(c) I, II, and III

(d) II only

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 1.1 of the course notes.

--------------------------------------------------------------------------------

2.

Which of the following methods are invoked by a server implemented with sockets?

connect( )

listen( )

accept( )

(a) II and III only

(b) II only

(c) I, II, and III

(d) III only

Correct answer is (a)

Your score on this question is: 0.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

3.

Which of the following activities use an inter-network?

A phone call from Pittsburgh in the United States to Chennai in India

A phone call from a wired phone to a mobile ("cell") phone

A chat session between two computers connected to an office Ethernet

(a) I only

(b) I and II only

(c) III only

(d) I, II, and III

Correct answer is (b)

Your score on this question is: 0.00

Feedback:

See section 1.1.6 of the course notes.

--------------------------------------------------------------------------------

4.

When you connect your computer to the Internet, the protocol(s) your computer uses is (are) selected according to

(a) the application client and server you use at each moment

(b) which operating system is running on your computer

(c) which HTTP (Web) server you connect to

(d) what vendor your Internet service provider purchased equipment from

Correct answer is (a)

Your score on this question is: 0.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

5.

The Maximum Transfer Unit (MTU) is a parameter of

(a) the technology of the physical network

(b) the size of data sent by the application

(c) the operating system

(d) the application protocol

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

6.

An application on a computer sends data through a socket to another computer. Which of the following are specified by the communication protocol?

The contents of the message body

The speed of transmission

The header format, which specifies the header field sizes and meanings

(a) I and III only

(b) III only

(c) I only

(d) II and III only

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

7.

In a broadcast network

(a) only the destination computer sees a packet

(b) all computers see and process the application data within all packets

(c) all computers see all packets, but the application data in each packet is only processed by the destination computer

(d) only the computers that are tuned to a channel see and process the packets in that channel

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

8.

What can be said about the protocol used by the implementation of the transport layer of an Internet host?

It guarantees delivery.

It is the Transmission Control Protocol (TCP).

It uses services provided by the session layer.

(a) I and III only

(b) I and II only

(c) I only

(d) none

Correct answer is (d)

Your score on this question is: 0.00

Feedback:

See section 1.1.5 of the course notes.

--------------------------------------------------------------------------------

9.

Two packets A and B are sent in that order through a connectionless communication network. They will arrive at the destination

(a) in any order, after possibly having traversed different routes

(b) in the order A-B, after having traversed the same route

(c) in the order A-B, after possibly having traversed different routes

(d) in any order, after having traversed the same route

Correct answer is (a)

Your score on this question is: 0.00

Feedback:

See section 1.1.2 of the course notes.

--------------------------------------------------------------------------------

10.

The transmission of high-quality, interactive voice and video over the current Internet is difficult because today's Internet

(a) does not really have sufficient throughput

(b) is unable to guarantee minimum throughput or maximum latency for a given connection

(c) gives higher priority to bulk data transfers

(d) uses connectionless protocols

Correct answer is (b)

Your score on this question is: 0.00

Feedback:

See section 1.1.4 of the course notes.

(a) While the problem can be solved with infinite throughput, the cause of the problem is that the available throughput is not judiciously allocated according to application needs.

--------------------------------------------------------------------------------

Go to top of assessment.

Total score: 40.00

Your performance was as follows:

1.

What can be said about the protocol used by the implementation of the transport layer of an Internet host?

It guarantees delivery.

It is the Transmission Control Protocol (TCP).

It uses services provided by the session layer.

(a) I and II only

(b) I only

(c) I and III only

(d) none

You did not answer this question.

Correct answer is (d)

Your score on this question is: 0.00

Feedback:

See section 1.1.5 of the course notes.

--------------------------------------------------------------------------------

2.

Two packets A and B are sent in that order through a connectionless communication network. They will arrive at the destination

(a) in any order, after possibly having traversed different routes

(b) in any order, after having traversed the same route

(c) in the order A-B, after having traversed the same route

(d) in the order A-B, after possibly having traversed different routes

Correct answer is (a)

Your score on this question is: 0.00

Feedback:

See section 1.1.2 of the course notes.

--------------------------------------------------------------------------------

3.

The Internet received its name in the 1980s because

(a) it consisted of many interconnected networks

(b) it was meant to be a network internal to the United States Department of Defense

(c) it achieved international scope with the addition of the City University of London

(d) it was an interim (temporary) design of what it later became, but the name stuck

Correct answer is (a)

Your score on this question is: 0.00

Feedback:

See section 1.1.6 of the course notes.

--------------------------------------------------------------------------------

4.

Which of the following distinguish stream sockets (e.g., TCP) from datagram sockets (e.g., UDP)?

Stream sockets guarantee delivery of the data sent through them.

Stream sockets can be used to send application data to a remote host, whereas datagram sockets can only send control commands.

Stream sockets have greater overhead.

(a) I and II only

(b) II and III only

(c) I and III only

(d) I only

Correct answer is (c)

Your score on this question is: 0.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

5.

Which of the following are specified by the HTTP protocol?

The syntax of the request header

The syntax of the response header

The specific legal names of the request header fields

(a) I and III only

(b) I, II, and III

(c) I only

(d) I and II only

Correct answer is (d)

Your score on this question is: 0.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

6.

How does an operating system identify the application to which data coming in from the network should be relayed?

(a) By the protocol with which the data was sent

(b) By the port number carried by the transport protocol

(c) By the file extension of the data

(d) Only one application at a time is given access to the network.

Correct answer is (b)

Your score on this question is: 0.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

7.

Which of the following methods are invoked by a server implemented with sockets?

connect( )

listen( )

accept( )

(a) II and III only

(b) I, II, and III

(c) III only

(d) II only

Correct answer is (a)

Your score on this question is: 0.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

8.

An application on a computer sends data through a socket to another computer. Which of the following are specified by the communication protocol?

The contents of the message body

The speed of transmission

The header format, which specifies the header field sizes and meanings

(a) III only

(b) I and III only

(c) II and III only

(d) I only

Correct answer is (a)

Your score on this question is: 0.00

Feedback:

See section 1.1.1 of the course notes.

(c) The speed of transmission may affect the communication, but it is not specified by the protocol.

--------------------------------------------------------------------------------

9.

John is using his bank's Web server to pay his telephone bill electronically. Which kind(s) of network interaction take(s) place in this Scenario, from the moment John logs into his bank's Web site until the telephone company receives the money?

People-people

People-computer

Computer-computer

(a) I, II, and III

(b) II and III only

(c) III only

(d) II only

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.1 of the course notes.

--------------------------------------------------------------------------------

10.

What can be said concerning the protocol that is used by the implementation of the network layer of an Internet host?

It guarantees delivery.

It is the Internet Protocol (IP).

It uses services provided by the session layer.

(a) II only

(b) I and II only

(c) none

(d) I only

Correct answer is (a)

Your score on this question is: 0.00

Feedback:

See section 1.1.5 of the course notes.

--------------------------------------------------------------------------------

Go to top of assessment.

Total score: 10.00

View Assessment Result: Multiple-Choice Quiz 1

Your performance was as follows:

1.

An advantage of defining network protocols through agreement among many companies and individuals is that

(a) otherwise source code would need to be shipped with all networking applications

(b) a protocol designed by committee always has better performance than that designed by a single company or research project

(c) only one implementation need then be created

(d) different implementations can then communicate with each other

Correct answer is (d)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

2.

The Internet received its name in the 1980s because

(a) it was an interim (temporary) design of what it later became, but the name stuck

(b) it achieved international scope with the addition of the City University of London

(c) it consisted of many interconnected networks

(d) it was meant to be a network internal to the United States Department of Defense

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 1.1.6 of the course notes.

--------------------------------------------------------------------------------

3.

The transmission of high-quality, interactive voice and video over the current Internet is difficult because today's Internet

(a) uses connectionless protocols

(b) is unable to guarantee minimum throughput or maximum latency for a given connection

(c) gives higher priority to bulk data transfers

(d) does not really have sufficient throughput

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.1.4 of the course notes.

--------------------------------------------------------------------------------

4.

A computer sends 100 Kbytes of aggregate data to another computer through the network. If this transmission time takes 10 seconds and setup time is negligible, the throughput of this network is

(a) in the range from 6 to 12 Kbps (kilobits per second)

(b) not able to be determined with the information given

(c) exactly 10 Kbps

(d) in the range from 60 to 120 Kbps (kilobits per second)

Correct answer is (d)

Your score on this question is: 0.00

Feedback:

See section 1.1.4 of the course notes.

--------------------------------------------------------------------------------

5.

You have recently become the first network engineer of a large corporation with offices worldwide. The company is considering the installation of a data network, but the Board of Directors is rather old-fashioned and does not see the need to change the company's time-honored business practices. Your first task at the job is to justify your salary and the cost of a new network, and for this purpose you are about to give a presentation to the Board of Directors. Which of the following would you include in your presentation? Assume the directors are extremely intelligent, though perhaps not knowledgeable in your field.

Lower expenditures on computer hardware

Higher availability of customer services

Better protection of the company's proprietary information

(a) I and III only

(b) I and II only

(c) II and III

(d) II only

Correct answer is (b)

Your score on this question is: 0.00

Feedback:

See section 1.1 of the course notes.

(c) A network saves money through resource sharing and by lowering the number of servers required.

--------------------------------------------------------------------------------

6.

John is using his bank's Web server to pay his telephone bill electronically. Which kind(s) of network interaction take(s) place in this Scenario, from the moment John logs into his bank's Web site until the telephone company receives the money?

People-people

People-computer

Computer-computer

(a) III only

(b) II and III only

(c) II only

(d) I, II, and III

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.1 of the course notes.

--------------------------------------------------------------------------------

7.

How does an operating system identify the application to which data coming in from the network should be relayed?

(a) Only one application at a time is given access to the network.

(b) By the file extension of the data

(c) By the protocol with which the data was sent

(d) By the port number carried by the transport protocol

Correct answer is (d)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

8.

Which of the following methods are invoked by a server implemented with sockets?

connect( )

listen( )

accept( )

(a) III only

(b) II and III only

(c) I, II, and III

(d) II only

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

9.

Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination

(a) in any order, after possibly having traversed different routes

(b) in any order, after having traversed the same route

(c) only in the order A-B, after having traversed the same route

(d) only in the order A-B, after possibly having traversed different routes

Correct answer is (c)

Your score on this question is: 0.00

Feedback:

See section 1.1.2 of the course notes.

--------------------------------------------------------------------------------

10.

The Protocol Data Unit (PDU) that is sent by a protocol layer to its peer on the destination system typically includes

A payload

A protocol header

A router vendor ID

(a) II only

(b) I and II only

(c) I and III only

(d) I, II, and III

Correct answer is (b)

Your score on this question is: 0.00

Feedback:

See section 1.1.5 of the course notes.

--------------------------------------------------------------------------------

View Assessment Result: Multiple-Choice Quiz 1

Your performance was as follows:

1.

Which of the following are specified by the HTTP protocol?

The syntax of the request header

The syntax of the response header

The specific legal names of the request header fields

(a) I only

(b) I, II, and III

(c) I and II only

(d) I and III only

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

(c) All header field names are valid; it is up to the client and the server to understand each other's field names, or to ignore them.

--------------------------------------------------------------------------------

2.

Which of the following methods are invoked by a client implemented with sockets?

connect( )

listen( )

read( )

(a) I, II, and III

(b) I and III only

(c) I only

(d) III only

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

3.

All store-and-forward networks are

(a) connection-based networks

(b) packet or message switched networks

(c) broadcast networks

(d) connectionless networks

Correct answer is (b)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

4.

_____ can be used to measure latency in the communication network.

(a) Roundtrip time

(b) Percentage of packets retransmitted

(c) Bit Error Rate

(d) Throughput

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 1.1.4 of the course notes.

--------------------------------------------------------------------------------

5.

Ethernet (IEEE 802.3) is an example of

(a) a standard developed by the International Telecommunications Union

(b) an a priori standard

(c) a de facto standard later developed into a de jure standard

(d) a successful example of the Internet's strategy of developing standards through "rough consensus and running code"

Correct answer is (c)

Your score on this question is: 0.00

Feedback:

See section 1.1.6 of the course notes.

--------------------------------------------------------------------------------

6.

An advantage of defining network protocols through agreement among many companies and individuals is that

(a) a protocol designed by committee always has better performance than that designed by a single company or research project

(b) only one implementation need then be created

(c) otherwise source code would need to be shipped with all networking applications

(d) different implementations can then communicate with each other

Correct answer is (d)

Your score on this question is: 10.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

7.

The Maximum Transfer Unit (MTU) is a parameter of

(a) the technology of the physical network

(b) the size of data sent by the application

(c) the operating system

(d) the application protocol

Correct answer is (a)

Your score on this question is: 0.00

Feedback:

See section 1.1.1 of the course notes.

--------------------------------------------------------------------------------

8.

The transmission of high-quality, interactive voice and video over the current Internet is difficult because today's Internet

(a) is unable to guarantee minimum throughput or maximum latency for a given connection

(b) does not really have sufficient throughput

(c) uses connectionless protocols

(d) gives higher priority to bulk data transfers

Correct answer is (a)

Your score on this question is: 10.00

Feedback:

See section 1.1.4 of the course notes.

--------------------------------------------------------------------------------

9.

The Protocol Data Unit (PDU) that is sent by a protocol layer to its peer on the destination system typically includes

A payload

A protocol header

A router vendor ID

(a) II only

(b) I and III only

(c) I and II only

(d) I, II, and III

Correct answer is (c)

Your score on this question is: 10.00

Feedback:

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]