计算机网络第四章试题库,计算机网络第四章题库.docx

计算机网络第四章题库

Chapter 4Which of the following is a characteristic of fiber-optic cable?( D)It uses an intense incandescent lightIts core is made of highly reflective KevlarIt relies on total internal cancellation to guide light for long distances It is capable of higher data rates than other types of networking mediaWhich of the following describes attenuation?(A)A.A loss of signal strength B. An increase in signal amplitudeC. The delay experienced during signal travelD. The time it takes a signal to teach it destination3. Which of the following is a cause of crosstalk?(A) A. Poorly terminated network cablingB. The loss of a signal‘s ground referenceC. AC line noise coming from a nearly video monitor or hard disk drive D. FM radio signal, TV signals, various types of office equipment 4. Which of the following are tests specified by the TIA/EIA-B standard for copper cable?(C.E.F)A. signal harmonics B. Conductive responseC. Wire map D. Signal absorptionE. Insertion loss F. Propagation delay5. What are three distinct kind of crosstalk?(A.B.E)A. NEXT B.PEXTC. ANEXT D.SPNEXTE. PSNEXT6. In designing a network, what would be used to calculate an optical link loss budget?(C)A. Amount of data lost during impendence mismatch eventsB. Amount of attenuation signal loss that can occur before data becomes corruptC. Amount of signal power loss that can occur without dropping below receiver requirementsD. Total of amount of data that can be lost before regeneration of signal7. Which numbering system uses 2as its base?(C)A. Octal B. HexadecimalC. Binary D. ASCII 8. Which of the following describes a common function of a cable-testing device?(D)A. TDR test and detects faulty virtual circuitsB. TDR test provide information about the location of a cabling run C. Wire maps provide information abou

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
经典计算机网络教材 Computer Networks, Fourth Edition By Andrew S. Tanenbaum Table of Contents Chapter 1. Introduction Section 1.1. Uses of Computer Networks Section 1.2. Network Hardware Section 1.3. Network Software Section 1.4. Reference Models Section 1.5. Example Networks Section 1.6. Network Standardization Section 1.7. Metric Units Section 1.8. Outline of the Rest of the Book Section 1.9. Summary Chapter 2. The Physical Layer Section 2.1. The Theoretical Basis for Data Communication Section 2.2. Guided Transmission Media Section 2.3. Wireless Transmission Section 2.4. Communication Satellites Section 2.5. The Public Switched Telephone Network Section 2.6. The Mobile Telephone System Section 2.7. Cable Television Section 2.8. Summary Chapter 3. The Data Link Layer Section 3.1. Data Link Layer Design Issues Section 3.2. Error Detection and Correction Section 3.3. Elementary Data Link Protocols Section 3.4. Sliding Window Protocols Section 3.5. Protocol Verification Section 3.6. Example Data Link Protocols Section 3.7. Summary Chapter 4. The Medium Access Control Sublayer Section 4.1. The Channel Allocation Problem Section 4.2. Multiple Access Protocols Section 4.3. Ethernet Section 4.4. Wireless LANs Section 4.5. Broadband Wireless Section 4.6. Bluetooth Section 4.7. Data Link Layer Switching Section 4.8. Summary Chapter 5. The Network Layer Section 5.1. Network Layer Design Issues Section 5.2. Routing Algorithms Section 5.3. Congestion Control Algorithms Section 5.4. Quality of Service Section 5.5. Internetworking Section 5.6. The Network Layer in the Internet Section 5.7. Summary Chapter 6. The Transport Layer Section 6.1. The Transport Service Section 6.2. Elements of Transport Protocols Section 6.3. A Simple Transport Protocol Section 6.4. The Internet Transport Protocols: UDP Section 6.5. The Internet Transport Protocols: TCP Section 6.6. Performance Issues Section 6.7. Summary Chapter 7. The Application Layer Section 7.1. DNS—The Domain Name System Section 7.2. Electronic Mail Section 7.3. The World Wide Web Section 7.4. Multimedia Section 7.5. Summary Chapter 8. Network Security Section 8.1. Cryptography Section 8.2. Symmetric-Key Algorithms Section 8.3. Public-Key Algorithms Section 8.4. Digital Signatures Section 8.5. Management of Public Keys Section 8.6. Communication Security Section 8.7. Authentication Protocols Section 8.8. E-Mail Security Section 8.9. Web Security Section 8.10. Social Issues Section 8.11. Summary Chapter 9. Reading List and Bibliography Section 9.1. Suggestions for Further Reading Section 9.1.1. Introduction and General Works Section 9.2. Alphabetical Bibliography

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值