77 The person sending a message is NOT influenced by which of the followingA. sender's credibilityB. receiver's assumptionsC. receiver's evaluative and tendencyD. receiver's attitude and needsE. sender's knowledge

77 The person sending a message is NOT influenced by which of the following

A. sender's credibility

B. receiver's assumptions

C. receiver's evaluative and tendency

D. receiver's attitude and needs

E. sender's knowledge


相关考题:

The person sending a message is NOT influenced by which of the followingA sender's credibilityB receiver's assumptionsC receiver's evaluative and tendencyD receiver's attitude and needsE sender's knowledge

195 The person sending a message is NOT influenced by which of the followingA. sender's credibilityB. receiver's assumptionsC. receiver's evaluative and tendencyD. receiver's attitude and needsE. sender's knowledge

●TCP service is obtained by having both the sender and the receiver create and points,which are called (75) .(75) A.Network addressB.supenet addressC.socketD.IP address

If the EDI net work requires the receiver's computer to be in a ready-to-receive mode, it is less common.() 此题为判断题(对,错)。

TCP service is obtained by having both the sender and the receiver create end points, which are calledA.network addressB.supernet addressC.socketD.IP address

在直接通信方式中,系统提供的发送原语是A.send(receiver,message)B.send(sender,message)C.send(sender,receiver)D.send(receiver,sender)

Which two statements are true about TCP communication?() A. The receiver acknowledges the final packet in each communications stream.B. The receiver adds sequencing numbers to the packets received.C. The sender adds sequencing numbers to the packets it sends.D. The receiver acknowledges each packet it receives from the sending device.

Scrambling of SONET signals is done to (). A. prevent the leakage of external fiber emissionsB. provide the optical network with the highest level of security possibleC. assure an even distribution of 1‘s and 0‘s for extended transmitter lifeD. assure an adequate number of transitions for clock recovery at the receiverE. prevent the receiver from assuming AIS inadvertently when all 0‘s are received

A TCP/IP Transfer is diagrammed in the exhibit.A window size of three has been negotiated for this transfer. Which message will be returned from the receiver to the sender as part of this TCP/IP transfer?()A.Send ACK 1-3B.Send ACK 3C.Send ACK 4D.Send ACK 4-6E.Send ACK 6F.Send ACK 7

What does not contribute to the commercial GPS receiver position error ________.A.Satellite clockB.Ship's speedC.Atmospheric/ionospheric propagationD.Receiver

You are cordially invited to a formal_____being held in honor of the company's new vice president.A. receipt B. receivingC. receiver D. reception

Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (_______) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's () key tp decipher the digital signature to verify the sender's identity.横线处应选( )。 A. interpretationB.signaturesC. encryptionD.decryption

Anytime a host or a router has an IP datagram to send to another host or router, it has the( )address of the receiver. This address is obtained from the DNS if the sender is the host or it is found in a routing table if the sender is a router. But the IP data gram must be( ) in a frame to be able to pass through the physical network. This means that the sender needs the ( )address of the receiver. The host or the router sends an ARP query packet. The packet includes the physical and IP addresses of the sender and the IP address of the receiver. Because the sender does not know the physical address of the receiver, the query is( ) over the network.Every host or router on the network receives and processes the ARP query packet, but only the intended recipient recognizes its IP address and sends back an ARP response packet.The response packet contains the recipient's IP and physical addresses. The packet is(请作答此空) directly to the inquirer by using the physical address received in the query packet. A. multicastB. unicastC. broadcastD. multiple unicast

国外不少旅游管理专家在考核导游人员时,坚持A.S.K的原则,它们分别是指()。A.“A” ( Active )B.“S” ( Smile )C.“A” ( Attitude )D.“S”(Skill)E.“K”(Knowledge)

Which two steps does a receiver perform to validate a message using HMAC? ()  A、 decrypts the received MAC using a secret keyB、 compares the computed MAC vs. the MAC receivedC、 authenticate the receivedmessage using the sender’s public keyD、 look up the sender’s public keyE、 extracts the MAC from the receivedmessage thenencrypts the received message with a secret keyto producethe MACF、 Computes the MAC using the receivedmessage and a secret key as inputs to the hash function

Scrambling of SONET signals is done to ().A、prevent the leakage of external fiber emissionsB、provide the optical network with the highest level of security possibleC、assure an even distribution of 1's and 0's for extended transmitter lifeD、assure an adequate number of transitions for clock recovery at the receiverE、prevent the receiver from assuming AIS inadvertently when all 0's are received

With PGP, which of the following entity signs a users’s public key?()A、 The sender of the message.B、 The receipient of the message.C、 The sender’s administrator who provides the sender with the PGP program.D、 A third party that belongs to what’s often known as "web of trust", that can verify the relationship between the user and the key.E、 The vendor of the PGP program.

Which two statements are true about TCP communication?()A、The receiver acknowledges the final packet in each communications stream.B、The receiver adds sequencing numbers to the packets received.C、The sender adds sequencing numbers to the packets it sends.D、The receiver acknowledges each packet it receives from the sending device.

在直接通信方式中,系统提供的发送原语是()。A、send(receiver,message)B、send(sender,message)C、send(sender,receiver)D、send(receiver,sender)

Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions

单选题With PGP, which of the following entity signs a users’s public key?()A The sender of the message.B The receipient of the message.C The sender’s administrator who provides the sender with the PGP program.D A third party that belongs to what’s often known as web of trust, that can verify the relationship between the user and the key.E The vendor of the PGP program.

单选题Scrambling of SONET signals is done to ().Aprevent the leakage of external fiber emissionsBprovide the optical network with the highest level of security possibleCassure an even distribution of 1's and 0's for extended transmitter lifeDassure an adequate number of transitions for clock recovery at the receiverEprevent the receiver from assuming AIS inadvertently when all 0's are received

单选题What does not contribute to the commercial GPS receiver position error().ASatellite clockBShip's speedCAtmospheric/ionospheric propagationDReceiver

多选题Which two statements are true about TCP communication?()AThe receiver acknowledges the final packet in each communications stream.BThe receiver adds sequencing numbers to the packets received.CThe sender adds sequencing numbers to the packets it sends.DThe receiver acknowledges each packet it receives from the sending device.

问答题Practice 2  (1) In order to communicate thoughts and feelings, there must be a conventional system of signs or symbols which mean the same to the sender and the receiver. The means of sending communications are too numerous and varied for systematic classification. Therefore, the analysis must begin with the means of receiving communication. (2) Reception of communication is achieved by our senses.

单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A the business knowledge of the IT staffB the technical knowledge of the IT staffC the company’s business objectivesD the company’s network topologyE the IT future directions

多选题Which two steps does a receiver perform to validate a message using HMAC? ()Adecrypts the received MAC using a secret keyBcompares the computed MAC vs. the MAC receivedCauthenticate the receivedmessage using the sender’s public keyDlook up the sender’s public keyEextracts the MAC from the receivedmessage thenencrypts the received message with a secret keyto producethe MACFComputes the MAC using the receivedmessage and a secret key as inputs to the hash function