Packet-switching wireless networks are preferable(66)when transmissions are(67)because of the way charges are(68)per packet. Circuit-switched networks are preferable for transferring large files or for other lengthy transmissions because customers are(69)for the(70)of time they use the network.A.toB.forC.thanD.only

Packet-switching wireless networks are preferable(66)when transmissions are(67)because of the way charges are(68)per packet. Circuit-switched networks are preferable for transferring large files or for other lengthy transmissions because customers are(69)for the(70)of time they use the network.

A.to

B.for

C.than

D.only


相关考题:

●For each blank,choose the best answer from the four choices and write down on the answer sheet.(66) is a protocol that a host uses to inform. a router when it joins or leaves an Internet multicast group.(67) is an error detection code that most data communication networks use.(68) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.(69) is a transfer mode in which all types of information are organized into fixed form. cells on an asynchronous or non-periodic basis over a range of media.(70) is an identifier of a web page.(66) A.SMTPB.ICMPC.RARPD.IGMP(67) A.4B/SBB.CRCC.Manchester CodeD.Huffman Code(68) A.OSPFB.RIPC.RARPD.BGP(69) A.ADSLB.ATMC.Frame. RelayD.DDN(70) A.HTTPB.URLC.HTMLD.TAG

●Communication protocols are (66) connection-oriented or connectionless, (67) whether the sender of a message needs to contact and maintain a dialog with the recipient or (68) send a message without any prior connect and with the hope that the recipient receives everything (69) .These methods(70) the two ways that communication is implemented on networks.(66) A.notB.neitherC.eitherD.all(67) A.fulledB.floodedC.depending onD.defined by(68) A.immediatelyB.simplyC.accordinglyD.properly(69) A.in orderB.in arrayC.in seriesD.in queueing(70) A.make knownB.discloseC.revealD.discover

● (66) is a protocol that a host uses to inform. a router when it joins or leaves anInternet multicast group.(67) is an error detection code that most data conlmunication networks use.(68) is an interior gateway protocol that uses a distance vector algorithm to propagaterouting information.(69) is a transfer mode in which all types of information are organized into fixed form. cells on all asynchronous or nonperiodic basis over a range of mediA.(70) is an identifier of a web page.(66) A.ICMPB.SMTPC.IGMPD.ARP(67) A.4B/5BB.CRCC.Manchester CodeD.Huffman Code(68) A.OSPFB.RIPC.RARPD.BGP(69) A.ISDNB.x.25C.Frame. RelayD.ATM(70) A.HTTPB.URLC.HTMLD.TAG

When the transmissions of a radio station or a Decca chain, etc., have broken down, switch off or suspended, it is ______.A.UnfunctionalB.Break downC.Off powerD.Off air

The Internet is a(66)network of networks which interconnects(67)ranging from the simplest personal computers to the most sophisticated mainframes and supercomputers. This network of networks is used for an extraordinary range of purposes - long distance collaborations, retrieving free software and documents,(68)library catalogs,(69)in t6 supercomputers - the list of current Internet activities and(70)is large and the range of possible future applications is as unlimited as our imagination.A.worldwideB.abroadC.largeD.extensive

In recent years, TCP/IP has also begun to be used by telephone companies to provide faster, cheaper telephone(67)A.transmittingB.transmitedC.transfersD.transmissions

Communication protocols are(66)connection-oriented or connectionless,(67)whether the sender of a message needs to contact and maintain a dialog with the recipient or(68)send a message without any, prior connect and with the hope that the recipient receives everything.(69).These methods(70)the two ways that communication is implemented on networks.A.notB.neitherC.eitherD.all

For each blank, choose the best answer from the four choices and write down on the answer'sheet.(66)is a protocol that a host uses to inform. a router when it joins or leaves an Internet multicast group.(67)is an error detection code that most data communication networks use.(68)is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.(69)is a transfer mode in which all types of information are organized into fixed form. cells on an asynchronous or non-periodic basis over a range of media.(70)is an identifier of a web page.A.ICMPB.SMTPC.IGMPD.ARP

Packet-switching wireless networks are preferable(66)when transmissions are(67)bemuse of the way charges are(68)per packet. Circuit-switched networks are preferable for transferring large files or for other lengthy transmissions because customers are(69)for the(70)of time they use the network.A.toB.forC.thanD.only

Packet-switching wireless networks are preferable(71)when transmissions are(72)because of the way charges are(73)per packet. Circuit-switched networks are preferable for transferring large files or for other lengthy transmissions because customers are(74)for the(75)of time they use the network.A.toB.forC.thanD.only

A chain bridle is preferable to a wire rope towing bridle on a long ocean tow because chain ______.A.is more flexible and has the ability to absorb shock because of its weightB.is less subject to wear and damage from abrasionC.requires little maintenanceD.All of the above

When configuring Cisco Secure ACS to support wireless EAP authentication,which device mustbeconfigured as a AAA client?()A、Location ApplianceB、controller-based access pointsC、wireless clientsD、Wireless Control SystemE、wireless controllers

Which feature is an advantage of the Cisco Small Business VPN Router Series?()A、QuickVPN (QVPN) client software for simplified managementB、minimal configuration requirementsC、802.1g capabilities and support for multiple wireless networks simultaneously (multiple BSSIDs)D、wireless bridging to overcome the lack of physical network cable

Which two statement best describes the Cisco Unified Wireless Network? ()A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wireless networks to deliver the best security for companies that are deploying WLANsB、 The Cisco Unified Wireless Network provides the framework to integrate and extend wired and wireless networks to deliver the lowest-possible total cost of ownership for companies that are deploying WLANsC、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security for WLANs that organizations have come to expect from their VPNsD、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security, sociability, reliability, ease of deployment, and management for WLANs that organizations have come to expect from their wired LANs

What is needed to allow IT managers to design, control, and monitor their wireless networks form a centralized location as wireless networks grow in scale and complexity?()A、 network unificationB、 network managementC、 mobility platformD、 client devices

When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()A、Wireless Control SystemB、wireless clientsC、wireless controllersD、controller-based access pointsE、Location Appliance

Which device is used in wireless networks to send transmissions to a target area?()A、Optical fiberB、Access pointC、Omni-directional antennaD、Directional antenna

Which of the following components is typically used for voice transmissions and has a 10Mbpsmaximum transfer speed?()A、110 blockB、Patch panelC、Vertical cross connectD、66 block

When setting up a wireless network to cover a large area, which of the following needs to beconsidered FIRST?()A、Device placementB、Encryption methodsC、Wireless channelsD、SSID name

Which new key architectural element introduced in WebLogic Server l2c should you take  advantage of when designing Disaster Recovery Centers with active - passive mode?()A、MAN Clusters, because they would allow you to synchronously replicate state in low latency networks B、WAN Clusters, because they would allow you to asynchronously replicate state in nonlow latency networks.  C、Transaction Log in the database, because you could avoid synchronizing two replication technologies (database and file)  D、Data Guard, because it is the most effective way to replicate a state across locationsE、GoldenGate, because it is the most effective way to replicate a state across locations

You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?() A、From the Device Manager, open the wireless network adapter properties and click Advanced. B、From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. C、From the Wireless Network Connection Properties, select View Wireless Networks. D、From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab, select Add a preferred network.

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

单选题What is needed to allow IT managers to design, control, and monitor their wireless networks form a centralized location as wireless networks grow in scale and complexity?()A network unificationB network managementC mobility platformD client devices

单选题Which of the following components is typically used for voice transmissions and has a 10Mbpsmaximum transfer speed?()A110 blockBPatch panelCVertical cross connectD66 block

单选题Which new key architectural element introduced in WebLogic Server l2c should you take  advantage of when designing Disaster Recovery Centers with active - passive mode?()AMAN Clusters, because they would allow you to synchronously replicate state in low latency networks BWAN Clusters, because they would allow you to asynchronously replicate state in nonlow latency networks.  CTransaction Log in the database, because you could avoid synchronizing two replication technologies (database and file)  DData Guard, because it is the most effective way to replicate a state across locationsEGoldenGate, because it is the most effective way to replicate a state across locations

单选题A chain bridle is preferable to a wire rope towing bridle on a long ocean tow because chain().Ais more flexible and has the ability to absorb shock because of its weightBis less subject to wear and damage from abrasionCrequires little maintenanceDAll of the above

单选题You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.  You need to view this connection in the Connect to a network window.  What should you do?()AClick the Diagnose and repair link.BEnable the Turn on notification of new networks option.CConfigure the Connect to a network window to show all networks.DDisable the Connect automatically when this network is in range option, and then enable the Connect even if the network is not broadcasting option.