A socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running on(61)computers attached to the network. A socket(62)two addresses:(63). Sockets provide a(64)communication channel between one or more systems.There are(65)sockets separately using TCP and UDP.A.uniqueB.separateC.sameD.dependent

A socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running on(61)computers attached to the network. A socket(62)two addresses:(63). Sockets provide a(64)communication channel between one or more systems.There are(65)sockets separately using TCP and UDP.

A.unique

B.separate

C.same

D.dependent


相关考题:

根据下面的文字资料回答 71~75 题 In the following essay,each blank has four choices.Choose the most suitable one from the four choices and write down in the answer sheet.A( 1 )is basically an end point of a communication link between two applications.Sockets that extend over a network connect two or more applications running on separate computer sat tached to the network.Asocket( 2 )twoaddresses:( 3 ).Sockets providea ( 4 )communication channel between one or more systems.There are stream and datagram sockets separately using TCP and( 5 ).第6题:文中( 1 )处正确的答案是( )。A.programB.UDPC.socketD.TCP

Basically, a firewall is a(145)process or a set of integrated processes that runs on a router or(146)to control the flow of networked application traffic(147)through it. Typically, firewalls are placed on the entry point to a(148)network such as the Internet. They could be considered traffic cops. The firewall's(149)is to ensure that all communication between an organization's network and the Internet conform. to the organization's policies.A.dependentB.isolatedC.relatedD.standalone

Basically, a(71)is a standalone process or a set of integrated processes that runs on a router or server to control the flow of(72)application traffic(73)through it. Typically, firewalls are(74)on the entry point to a public network such as the Internet. They could be considered traffic cops. The firewall' s(75)is to ensure that all communication between an organization's network and the Internet conform. to the organization's security policies.A.routerB.clientC.firewallD.switch

is the 4th layer of the OSI reference model responsible for reliable network communication between end nodes.A.Data link layerB.Session layerC.Transport layerD.Application layer

In data communication, data link is those parts of two data terminal equipments that are controlled by a protocol along with the(71) data circuit, which together enable data(72). So-called protocol means, in short, a set of rules that determines the behavior. of functional units in achieving communication.Data circuit, however, consists of a pair of(73) transmission channels that provides a means of two-way data transmission. Between data switching exchanges, the data circuit may or may not include data circuit-terminating equipment (DCE), depending on the type of(74) used at the data switching exchange. Between a data station and a data switching exchange or data concentrator, the data circuit includes the DCE at the data station end, and may include equipment(75) to a DCE at the data switching exchange or dam concentrator location.A.handshakingB.interconnectingC.linkageD.joining

Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?() A. use a Layer 2 link between distribution switchesB. use a Layer 3 link between distribution switchesC. use a redundant link to the coreD. use a Layer 3 link between distribution switches with route summarization

If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()A、A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkB、A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedC、A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorD、A SHAM link is part of OSPF network of MPLS-VPN provider

Which statement is correct about an OSPF sham-link?()A、A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.B、A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.C、A sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer traffic across it.D、A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.E、A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.

In a RSTP implementation, which of the following two link types are used? ()(Choose two.)A、SharedB、Point-to-PointC、DesignatedD、Multiaccess non-broadcast

You are using standalone cisco aironet 1400 series wireless bridges for a nine-mile point-to-point wireless link between two buildings. Which distance setting should you use for the bridge configured as the root?()A、20 km [12.4 miles]B、10 km [6.2 miles]C、5 km [3.1 miles]D、25 km [15.5 miles]E、15 km [9.3 miles]

Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs()。A、a switch with a trunk link that is configured between the switchesB、a router with an IP address on the physical interface that is connected to the switchC、a switch with an access link that is configured between the switchesD、a router with subinterfaces configured on the physical interface that is connected to the switch

You have a trunk link operating between two switches and you’re experiencing problems withframes leaking between the two VLANs. Each switch has identical modules, software revisionsand VLAN configuration information. Spanning tree protocol is disabled on all VLANs. What isprobably causing this problem?()A、The link is using IEEE 802.1Q protocolB、The link is using IEEE 802.1E protocolC、Spanning tree is disabledD、Not enough information to determineE、The native VLAN information is identical at each end of the linkF、The native VLAN information is different at each end of the link

You are using standalone Cisco Aironet 1400 Series Wireless Bridges for a nine-mile point-to-point wireless link between two buildings. Which distance setting should you use for the bridgeconfigured as the root?()A、20 km [12.4 miles]B、10 km [6.2 miles]C、5 km [3.1 miles]D、25 km [15.5 miles]E、15 km [9.3 miles]

What is the primary use of a remote access VPN?()A、to secure communication between two remote PCsB、to secure communication between two remote officesC、to secure communication betweenan remote PC and the corporate intranetD、to secure communication between a corporate intranet and the public internet

On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A、a router with subinterfaces configured on the physical interface that is connected to the switchB、a router with an IP address on the physical interface connected to the switchC、a switch with an access link that is configured between the switchesD、a switch with a trunk link that is configured between the switches

A company has installed a new 802.11g point-to-point connection between two buildings and isexperiencing low throughput across the link. The current setup involves a wireless bridge on the roof with an omni-directional antenna. Which of the following would BEST improve the link performance?()A、Replace the wireless bridges with wireless access points.B、Install bi-directional amplifiers at both sites.C、Configure channel hopping on both wireless bridges.D、Replace the omni-directional antennas with Yagi antennas

During a planning session, it is determined that a three node cluster (Node ’A’, Node ’B’, and Node ’C’) will meet the customer’s application needs. Node ’B’ will be a hot-standby fallover node for both Node ’A’ and Node ’C’ resource groups.  A serial network for this cluster will require which connections?()  A、 A single serial network between Node ’A’ and Node ’B’ and Node ’C’B、 A point-to-point link between Node ’A’ and Node ’C’,and Node ’B’ and Node ’C’C、 A serial network between Node ’A’ and Node ’C’,and a serial network between Node ’B’ and Node ’C’D、 A point-to-point link between Node ’A’ and Node ’B’ Node ’B’ and Node ’C’ and Node ’A’ ad Node ’C’

Routers A and B have an OC12c and a GE link between them and are running OSPF over both of these links.Which item is correct, assuming the default JUNOS software OSPF metric calculation?()A、There are two equal cost paths between A and BB、The GE link is the preferred path between A and BC、The OC12c link is the preferred path between A and BD、Manual metric assignment must be configured to determine the outcome.

单选题Hosts on the same VLAN can communicate with each other but are unable to communicate with hosts on different VLANs. What is needed to allow communication between VLANs()。Aa switch with a trunk link that is configured between the switchesBa router with an IP address on the physical interface that is connected to the switchCa switch with an access link that is configured between the switchesDa router with subinterfaces configured on the physical interface that is connected to the switch

单选题Companycom has a p5 595 running 12 LPARs. They are interested in high bandwidth, secure communication between two of the LPARs within the p5 595 server. They do not have any unused Ethernet adapters. Which of the following recommendations will best meet this requirement?()AUtilize the integrated 10/100/1000 network interfaceBImplement Virtual Ethernet to enable inter-partition communicationCImplement shared Ethernet with the Ethernet adapters utilized in the other LPARsDImplement a Point to Point protocol serial communication between the p5 595 serial ports

单选题Barely able to speak because of the cold, the communication among the two explorers had to be done through gestures.Athe communication among the two explorers had to be done through gesturesBthe communication between the two explorers had to be done through gesturesCthe two explorers had to communicate through gesturesDthe two explorers had to communicate between themselves from gesturesEgestures were used to communicate between the two explorers

多选题Which two wireless devices acts as a communication connection between the client and WLAN()AbridgeBaccess pointCwireless adaptorDLayer 3 switchEantenna

单选题What is the primary use of a remote access VPN?()Ato secure communication between two remote PCsBto secure communication between two remote officesCto secure communication betweenan remote PC and the corporate intranetDto secure communication between a corporate intranet and the public internet

单选题Which statement is correct about an OSPF sham-link?()AA sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.BA sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.CA sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer traffic across it.DA sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.EA sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.

单选题On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()Aa router with subinterfaces configured on the physical interface that is connected to the switchBa router with an IP address on the physical interface connected to the switchCa switch with an access link that is configured between the switchesDa switch with a trunk link that is configured between the switches

多选题You have a trunk link operating between two switches and you’re experiencing problems withframes leaking between the two VLANs. Each switch has identical modules, software revisionsand VLAN configuration information. Spanning tree protocol is disabled on all VLANs. What isprobably causing this problem?()AThe link is using IEEE 802.1Q protocolBThe link is using IEEE 802.1E protocolCSpanning tree is disabledDNot enough information to determineEThe native VLAN information is identical at each end of the linkFThe native VLAN information is different at each end of the link

单选题The lowest point between two waves is called().AthoughBtoughCthroughDtrough