For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information. These rules are known as( ).A.E-mail B.Intemet C.network D.protocols

For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information. These rules are known as( ).

A.E-mail B.Intemet C.network D.protocols


相关考题:

●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.(71)~(72)A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices(73)~(75) A.BufferB.Source-quench messagesC.BufferingD.Windowing

Flow control is a function that prevents network congestion by ensuring that _( )_ do not overwhelm_( )_ with data.There are three commonly used methods for handling network congestion._( )_is used by network devices to temporarily store bursts of excess data in memory until they can be processed._( )_ are used by receiving devices to help prevent their buffers from overflowing._( )_ is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering

You are managing an Oracle Database 11g database. You want to take a backup on tape drives of the USERS tablespace that has a single data file of 900 MB. You have tape drives of 300 MB each. To accomplish the backup, you issued the following RMAN command:RMAN BACKUPSECTION SIZE 300M TABLESPACE users;Identify the appropriate configuration to accomplish faster and optimized backups using the above command.()A. The SBT channel must be configured, with the MAXPIECESIZE set to 300 mb.B. The SBT channel must be configured, with the parallelism setting for the SBT devices set to 3.C. The COMPATIBLE initialization parameter for the database instance must be set to at least 10.0.D. The SBT channel must be configured, with the default parallelism setting for the SBT devices set to 1

In data communication, data link is those parts of two data terminal equipments that are controlled by a protocol along with the(71) data circuit, which together enable data(72). So-called protocol means, in short, a set of rules that determines the behavior. of functional units in achieving communication.Data circuit, however, consists of a pair of(73) transmission channels that provides a means of two-way data transmission. Between data switching exchanges, the data circuit may or may not include data circuit-terminating equipment (DCE), depending on the type of(74) used at the data switching exchange. Between a data station and a data switching exchange or data concentrator, the data circuit includes the DCE at the data station end, and may include equipment(75) to a DCE at the data switching exchange or dam concentrator location.A.handshakingB.interconnectingC.linkageD.joining

Referring to the exhibit, what is the purpose of the targets section of the configuration?() A. It defines which devices will be sending traps.B. It specifies where to send traps.C. It defines the IP addresses of management systems that can access the device.D. It specifies which devices can be polled for SNMP data.

By default, which IS-IS metric types does JUNOS software support?() A. receiving of wide metrics onlyB. sending of narrow metrics onlyC. receiving of narrow metrics onlyD. sending and receiving of narrow and wide metrics

With regard to Ethernet media access methods, which of the following are true?(Choose all that apply.)A.A device waits for an electronic signal before transmitting.B.A device listens and waits until the media is not busy before transmitting.C.All devices on an Ethernet segment see data that passes on the network medium.D.Only the sender and the receiver devices see data that passes on the network medium.E.Ethernet networks allow you to configured devises with higher transmission priority.

Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices

IP multicasting is a set of technologies that enable efficient delivery of data to many locationson a network. Rather than making multiple copies of a message intended to be distributedto multiple recipients at the __(71)__ of origin of a message, multicasting initially sends justone __(72)__ and does not copy it to the individual recipients until it reaches the closest common pointon the network, thereby __(73)__ the bandwidth consumed. Network performance is significantly(74) because it isn’t bogged down with the processing and transmission of several large data files;each receiving computer doesn’t have to __(75)__ the transmitting server for the file.(71)A. pointB. bottomC. headD. sight

Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices

IP multicasting is a set of technologies that enable efficient delivery of data to many locations on a network. Rather than making multiple copies of a message intended to be distributed to multiple recipients at the(71) of origin of a message, multicasting initially sends just one(72) and does not copy it to the individual recipients until it reaches the closest common point on the network, thereby(73) the bandwidth consumed. Network performance is significantly(74) because it isn't bogged down with the processing and transmission of several large data fries; each receiving computer doesn't have to(75) the transmitting server for the file.A.pointB.bottomC.headD.sight

A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?() A. Drop the data.B. Send the data frames to the default gateway.C. Create an ARP request to get a MAC address for the receiving host.D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

●A (74)is aformal set ofrules for specifying the format and relationship when exchanging data among communicating devices.(74)A. protocolB.languageC.programD.command

For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information. These rules are known as ( ).A.E-mailB.InternetC.networkD.protocols

IP multicasting is a set of technologies that enable efficient delivery of data to many locations on a network. Rather than making multiple copies of a message intended to be distributed to multiple recipients at the () of origin of a message, multicasting initially sends just one () and does not copy it to the individual recipients until it reaches the closest common point on the network, thereby () the bandwidth consumed. Network performance is significantly () because it isn’t bogged down with the processing and transmission of several large data files; each receiving computer doesn’t have to () the transmitting server for the file.A.loop B.findC.search D.query

Why is QoS important in a converged network?()A、Because data does not need to arrive intact, so data transfer rates can be variableB、Because lost voice-data packets must be retransmittedC、Because voice data packets should arrive quickly and sequentially, and with no lost dataD、Because voice data packets must follow a single dedicated path through the network

When assigning a standalone access point a non-root role, which two parameters, other than Role in theradio network settings,must be configured on the SSID Manager page?()A、Set Data Beacon RateB、Set Infrastructure SSIDC、Enable IP redirection on this SSIDD、Multiple BSSIDE、Force Infrastructure Devices to associate only to this SSID

With regard to Ethernet media access methods, which of the following are true?()A、A device waits for an electronic signal before transmitting.B、A device listens and waits until the media is not busy before transmitting.C、All devices on an Ethernet segment see data that passes on the network medium.D、Only the sender and the receiver devices see data that passes on the network medium.E、Ethernet networks allow you to configured devises with higher transmission priority.

When setting an access point to a non-root role, what two parameters,other than Role in theRadio Network,must be configured on the SSID Manager page?()A、Infrastructure devices to associate only to this SSIDB、Enable IP redirection on this SSIDC、Set Data Beacon RateD、Multiple Basic Service Set Identification (BSSID)E、Set infrastructure SSID

By default, which IS-IS metric types does JUNOS software support?()A、receiving of wide metrics onlyB、sending of narrow metrics onlyC、receiving of narrow metrics onlyD、sending and receiving of narrow and wide metrics

单选题If a GMDSS radio operator initiates a DSC distress transmission but does not insert a message,what happens? ()AThe transmission is aborted and an alarm sounds to indicate this data must be provided by the operatorBThe transmission is not initiated and ERROR is indicated on the display readoutCThe transmission will be made with default information provided automaticallyDThe receiving station will poll the DSC unit of the vessel in distress to download the necessary information

单选题You are managing an Oracle Database 11g database. You want to take a backup on tape drives of the USERS tablespace that has a single data file of 900 MB. You have tape drives of 300 MB each. To accomplish the backup, you issued the following RMAN command: RMAN BACKUP SECTION SIZE 300M TABLESPACE users; Identify the appropriate configuration to accomplish faster and optimized backups using the above command.()AThe SBT channel must be configured, with the MAXPIECESIZE set to 300 mb.BThe SBT channel must be configured, with the parallelism setting for the SBT devices set to 3.CThe COMPATIBLE initialization parameter for the database instance must be set to at least 10.0.DThe SBT channel must be configured, with the default parallelism setting for the SBT devices set to 1

多选题When setting an access point to a non-root role,what two parameters,other than role in the radio network, must be configured on the ssid manager page?()Ainfrastructure devices to associate only to this ssidBenable ip redirection on this ssidCset data beacon rateDmultiple basic service set identification (bssid)Eset infrastructure ssid

单选题A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()ADrop the data.BSend the data frames to the default gateway.CCreate an ARP request to get a MAC address for the receiving host.DSend a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

单选题Referring to the exhibit, what is the purpose of the targets section of the configuration?()A It defines which devices will be sending traps.B It specifies where to send traps.C It defines the IP addresses of management systems that can access the device.D It specifies which devices can be polled for SNMP data.

单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to disable notifications by text messages to mobile devices?()AYou must set up a Group Policy Object.BYou must set up an Outlook Web App Mailbox policy.CYou must change the properties of the public folder database.DYou must set up recipient filtering.

问答题Practice 2  (1) In order to communicate thoughts and feelings, there must be a conventional system of signs or symbols which mean the same to the sender and the receiver. The means of sending communications are too numerous and varied for systematic classification. Therefore, the analysis must begin with the means of receiving communication. (2) Reception of communication is achieved by our senses.