重要提示:请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
首页 > 汉语言文学> 外国文学史
网友您好,请在下方输入框内输入要搜索的题目:
搜题
拍照、语音搜题,请扫码下载APP
扫一扫 下载APP
题目内容 (请给出正确答案)
[主观题]

One use of networks is to let several computers share ______ such as file system, printers, and tape

drives.

A.CPU B.memory C.resources D.data

答案
查看答案
更多“One use of networks is to let several computers share ______ such as file system, printers, and tape”相关的问题

第1题

Computer networks can provide those who use them with one of the following except ______. A.access

Computer networks can provide those who use them with one of the following except ______.

A.access to remote information B.person-to-person communication

C.economic returns D.interactive entertainment

点击查看答案

第2题

A recent development is the local area network (LAN).【21】its name implies, it【22】a local a

A recent development is the local area network (LAN).【21】its name implies, it【22】a local area—possibly as small as a single room, typically an area like an university campus or the premises of a particular business. Local area networks were developed to【23】a need specific to microcomputers—the sharing of expensive resources. Microcomputers are cheap,【24】highcapacity disc stores, fast and/or good quality printers, etc. are expensive. The object of the LAN is to allow【25】microcomputers shared access to these expensive resources. Since the microcomputers are【26】, it is a necessary feature of a LAN that the method of connection to the network, and the network hardware【27】, must also be cheap.

A local area network links a number of computers and a number of sewers【28】provide communal facilities, e. g. file storage. (A server usually includes a small microprocessor for control purposes.) The computers and servers are known【29】stations. There are two methods of【30】in common use, tings and broadcast networks.

In the ring method(often called a Cambridge Ring)all the stations are linked in a ring,【31】includes one special station, the monitor station.

In broadcast networks, all the stations are【32】to a single linear cable (usually co-ax cable), and any transmission will be received by all stations.

【33】technology is used, local area networks are a development of the greatest importance.【34】as programming is simplified by an approach that thinks in terms of small procedures or programs, each doing a well-defined job, the computer system of tomorrow is likely to be【35】lots of small systems, each doing a specific job, linked by a local area network.

(41)

A.As

B.Like

C.Since

D.Because

点击查看答案

第3题

Networks use microwave radio to link the computers when ______. A.they are close together B.they a

Networks use microwave radio to link the computers when ______.

A.they are close together

B.they are far away from each other

C.coaxial cables are used

D.fiber optical is used

点击查看答案

第4题

We can draw a conclusion that ______. A.to continue to develop and improve computer networks is one

We can draw a conclusion that ______.

A.to continue to develop and improve computer networks is one of our aims in the near future

B.the development of computers has already reached its peak

C.electronic computers have hindered the development of molecular computers

D.our society would have developed faster without computers

点击查看答案

第5题

6.We can draw a conclusion that ______. A.to continue to develop and improve computer networks is o

6.We can draw a conclusion that ______.

A.to continue to develop and improve computer networks is one of our aims in the near future

B.the development of computers has already reached its peak

C.electronic computers have hindered the development of molecular computers

D.our society would have developed faster without computers

点击查看答案

第6题

Topology[1] and Router Configurations 拓扑及路由配置 Routers provide physical connectivity between

Topology[1]and Router Configurations

拓扑及路由配置

Routers provide physical connectivity between networks by virtue of their physical attachments to either local-area networks (LANs), such as Token Ring or Ethernet[2], or wide-area networks (WANs), such as Frame Relay or ISDN.

A router can be used to connect only LANs together, only WANs together, or any other combination. The term physical connection should not be taken too literally. Many networks make use of Microwave links for WAN connectivity. This means that no actual physical connection exists between two connected routers communicating over cellular modems[3].

The Router Interface

A router's attachment to a LAN or a WAN is usually referred to as an interface but may also be referred to as a port. For example, a connection to a Token Ring LAN is with a Token Ring interface.

When discussing a router's connections to a network, it is common to say the following: "We connect the Finance department's Token Ring network to the corporate backbone via Bbone-1 first Token Ring interface. " Bbone-1, in this case, is the logical name of a router in a corporate network. Routers are typically assigned names that provide some information about their locations and functions.

When a router is routing IP, each LAN or WAN it is connected to must have a unique IP network or subnetwork assigned to it. In the case of some serial links, it must borrow an address from another interface. This borrowing, called IP unnumbered[4]is covered later. Each interface on the router must have a valid IP host address for the subnet it is attached to. In most cases, a router can have only one connection to any single subnet. One exception to this rule is that Cisco routers allow up to four serial links to share the same subnet, provided that they all terminate at the same destination router.

Network Layer Addresses

In addition to providing physical connectivity between networks, routers also possess the capability to move information across multiple networks by forwarding datagrams based on their network layer addresses. In this case, the network layer is the third layer in the OSI[5]seven-layer model. For IP, the layer three addresses are 32-bit binary numbers.

Datagrams

The term datagram is commonly used to describe any information generated by a higher-layer application or protocol that is being handled at the network layer in the OSI model. One example of a datagram is a Telnet login request from a host to a remote UNIX server.

The users indicate via their Telnet application—Telnet being an application layer function—that they want to log into a server. The Telnet application passes this request to the next lower layer in the protocol stack—TCP, in this case—and waits for a response from the remote system.

The TCP layer adds its own information to what it received from the Telnet application and hands this combined message to the IP layer—the network layer—of the protocol stack. TCP will hold onto the request it received from Telnet in case the first attempt to contact the remote host fails. The message the IP layer receives from Telnet and TCP is called the datagram. The term packet is often used interchangeably with datagram.

If the destination host had not received the original IP datagram in the previous example, TCP would have made at least one more attempt to initiate the login. TCP would have handed another copy of its information to the IP layer, and IP would have attempted to deliver the datagram again.

When routers forward datagrams based on their level three addresses, all layer two information that arrived with the packet is discarded. The router recreates the required layer two information before forwarding the datagram to the next routers which allows routers to connect networks with different layer two frame and addressing formats. Sometimes certain routers are deployed only for the purpose of connecting dissimilar LAN or WAN types because it is usually impossible to bridge routable protocols (protocols with layer three addresses) in these situations.

MAC Addresses

Some routers are also able to move information across networks by forwarding frames based on their layer two addresses, which are more commonly known as MAC (Medium Access Control)[6]addresses.

This activity is really bridging, not routing. Bridges forward frames based on their layer two addresses and leave the layer two packet and addressing formats unchanged. It is usually impossible for a host on an Ethernet network to exchange information with a host on a Token Ring network when one or more routers exists between them. The exception is when a bridge or a router acting as a bridge is set up to translate layer two addresses and frame formats between different types of LANs or WANs.

Several years ago, an attempt was made to call devices that performed both routing and bridging functions brouters. This never really took off. However, it is important to distinguish between a protocol being bridged or routed when configuring routers, and a protocol being bridged or routed when trouble-shooting network problems. Some protocols do not have layer three addresses and thus must be bridged using their layer two addresses. Routable protocols, such as IP and Novell's IPX, can be either bridged or routed.

IP Address Formats

IP addresses are typically written in a format known as dotted decimal to avoid working with binary numbers (for example, writing 201. 124.76. 210 instead of 11001001. 01111100. 01001100. 11010010). Each of the four sections of the address represents one byte or eight bits.

IP addresses are broken into two sections: a network section and a host section. Routers make decisions on forwarding datagrams based on the network portion of the IP address. The amount of an IP address allocated to the network portion is determined by the class of IP address in use and the subnet mask applied to it.

Assume, for example, that the address shown previously 201. 124. 76. 210—has a subnet mask of 255. 255. 255. 0. The subnet mask associated with this address (255. 255. 255. 0) tells the router where the network portion stops and the host portion begins.

The router would only have to know where addresses with the prefix (network portion) 201. 124.76.0 exist and forward the datagram accordingly. It is not necessary for the router to keep track of the entire address.

Network prefixes are stored in a router's memory in what is usually referred to as a routing table. The information a routing table contains can be learned by listening to information provided by other routers via a dynamic routing protocol or by information coded directly into it. Don't worry if you don't understand this completely yet. It should become clearer as you move on.

Network Reference Models

Figure 1-1 shows a representation of the OSI (Open System Interconnection) seven- layer model.

A representation of the OSI seven-layer model. All layers are independent of on another.

It is important to note that, with few exceptions, most networks today are not based on the OSI seven-layer model. Instead, they are based on the IEEE LAN[7]reference model or the Ethernet Ⅱ standard.

Notes

[1] topology: 布局技术,拓扑学。

[2] Token Ring or Ethernet:令牌环(计算机网络的一种组成方案,是有IBM公司首先提出的)或“以太”网。

[3] cellular modems: 细胞式(蜂窝式)调制解调器。

[4] IP unnumbered:未编号的IP。

[5] OSI(Open System Interconnection):开放式系统互连(模型),一种通信协议的7层抽象的参考模型,其中每一层执行某一特定任务。该模型的目的是使各种硬件在相同的层次上互相通信。这7层是:物理层、数据链路层、网络层、传输层、会话层、表示层和应用层。

[6] MAC (Medium Access Control):媒体存取控制帧。

[7] IEEE(lnstitute of Electric and Electronic Engineers):电气电子工程师学会。

Choose the best answer:

点击查看答案

第7题

从供选择的答案中,选出最确切的解答。 Networks can be interconnected by different devices. In the phys

从供选择的答案中,选出最确切的解答。

Networks can be interconnected by different devices. In the physical layer, networks can be connected by(1)or hubs, which just move the bits from one network to an identical network. One layer up we fine bridges and switches, which operate at data link layer. They can accept(2),examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have(3)network layer, the router may be able to translate between the packer formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message(4). As an example, gateways between Intemet E-mail and X.400 E-mail must(5)the E-mail message and change various header fields.

点击查看答案

第8题

【D10】MAN: OKAY, MR. TAYLOR,LET" S GO AHEAD AND BEGIN. FIRST OF ALL, TELL ME ABOUT YOUR LAS

【D10】

MAN: OKAY, MR. TAYLOR,LET" S GO AHEAD AND BEGI

N. FIRST OF ALL, TELL ME ABOUT YOUR LAST JO

B. MR. TAYLOR: WELL, AS STATED ON MY RESUME, I" VE WORKED FOR FIVE YEARS AT HI-TECH COMPUTERS. MAN: OKAY. HI-TEC

H. AND WHAT DO YOU KNOW ABOUT COMPUTER NETWORKS AND OPERATING SYSTEMS INCLUDING DOS, WINDOWS, MACINTOSH OS, AND UNIX? MR. TAYLOR: UM

M...WELL...I DID COME INTO CONTACT WITH COMPUTERS EVERY NIGHT AT MY LAST JO

B. MAN: HU

H...【D8】______WE ARE LOOKING FOR SOMEONE TO CREATE AND MANAGE OUR COMPANY" S WEBSITE WHICH WOULD INCLUDE THE DEVELOPMENT, CONFIGURATION AND USE OF CGI SCRIPTS. MR. TAYLOR: UM

M...UH, WEB PAGE, WEB PAG

E. HU

H... I DON"T THINK I" VE READ THAT BOOK, AND【D9】______. MAN: HUH AND WHAT ABOUT EXPERIENCE WITH JAVA OR JAVASCRIPT? MR. TAYLOR: WELL. ...I THINK I" VE TRIED JAVA AT A FOREIGN COFFEE SHOP ONE TIME, IF THAT" S WHAT YOU MEAN? MAN:OKAY, MR. TAYLOR, 【D10】______ MR. TAYLOR: OH, AND I REALLY LIKE COMPUTER GAMES. I PLAY THEM EVERYDAY. MAN: RIGHT, RIGHT. THANKS, MR. TAYLOR. WE"LL BE IN TOUC

H. A. AND HOW ABOUT WEBSITE AUTHORING SKILLS?

B. I THINK I HAVE ALL THE INFORMATION I NEED!

C. I"M AFRAID I"VE NEVER USED THOSE CGI THINGS.

D. FIRST OF ALL, TELL ME ABOUT YOURSEL

F.

点击查看答案

第9题

【D9】MAN: OKAY, MR. TAYLOR,LET" S GO AHEAD AND BEGIN. FIRST OF ALL, TELL ME ABOUT YOUR LAST

【D9】

MAN: OKAY, MR. TAYLOR,LET" S GO AHEAD AND BEGI

N. FIRST OF ALL, TELL ME ABOUT YOUR LAST JO

B. MR. TAYLOR: WELL, AS STATED ON MY RESUME, I" VE WORKED FOR FIVE YEARS AT HI-TECH COMPUTERS. MAN: OKAY. HI-TEC

H. AND WHAT DO YOU KNOW ABOUT COMPUTER NETWORKS AND OPERATING SYSTEMS INCLUDING DOS, WINDOWS, MACINTOSH OS, AND UNIX? MR. TAYLOR: UM

M...WELL...I DID COME INTO CONTACT WITH COMPUTERS EVERY NIGHT AT MY LAST JO

B. MAN: HU

H...【D8】______WE ARE LOOKING FOR SOMEONE TO CREATE AND MANAGE OUR COMPANY" S WEBSITE WHICH WOULD INCLUDE THE DEVELOPMENT, CONFIGURATION AND USE OF CGI SCRIPTS. MR. TAYLOR: UM

M...UH, WEB PAGE, WEB PAG

E. HU

H... I DON"T THINK I" VE READ THAT BOOK, AND【D9】______. MAN: HUH AND WHAT ABOUT EXPERIENCE WITH JAVA OR JAVASCRIPT? MR. TAYLOR: WELL. ...I THINK I" VE TRIED JAVA AT A FOREIGN COFFEE SHOP ONE TIME, IF THAT" S WHAT YOU MEAN? MAN:OKAY, MR. TAYLOR, 【D10】______ MR. TAYLOR: OH, AND I REALLY LIKE COMPUTER GAMES. I PLAY THEM EVERYDAY. MAN: RIGHT, RIGHT. THANKS, MR. TAYLOR. WE"LL BE IN TOUC

H. A. AND HOW ABOUT WEBSITE AUTHORING SKILLS?

B. I THINK I HAVE ALL THE INFORMATION I NEED!

C. I"M AFRAID I"VE NEVER USED THOSE CGI THINGS.

D. FIRST OF ALL, TELL ME ABOUT YOURSEL

F.

点击查看答案

第10题

【D8】MAN: OKAY, MR. TAYLOR,LET" S GO AHEAD AND BEGIN. FIRST OF ALL, TELL ME ABOUT YOUR LAST

【D8】

MAN: OKAY, MR. TAYLOR,LET" S GO AHEAD AND BEGI

N. FIRST OF ALL, TELL ME ABOUT YOUR LAST JO

B. MR. TAYLOR: WELL, AS STATED ON MY RESUME, I" VE WORKED FOR FIVE YEARS AT HI-TECH COMPUTERS. MAN: OKAY. HI-TEC

H. AND WHAT DO YOU KNOW ABOUT COMPUTER NETWORKS AND OPERATING SYSTEMS INCLUDING DOS, WINDOWS, MACINTOSH OS, AND UNIX? MR. TAYLOR: UM

M...WELL...I DID COME INTO CONTACT WITH COMPUTERS EVERY NIGHT AT MY LAST JO

B. MAN: HU

H...【D8】______WE ARE LOOKING FOR SOMEONE TO CREATE AND MANAGE OUR COMPANY" S WEBSITE WHICH WOULD INCLUDE THE DEVELOPMENT, CONFIGURATION AND USE OF CGI SCRIPTS. MR. TAYLOR: UM

M...UH, WEB PAGE, WEB PAG

E. HU

H... I DON"T THINK I" VE READ THAT BOOK, AND【D9】______. MAN: HUH AND WHAT ABOUT EXPERIENCE WITH JAVA OR JAVASCRIPT? MR. TAYLOR: WELL. ...I THINK I" VE TRIED JAVA AT A FOREIGN COFFEE SHOP ONE TIME, IF THAT" S WHAT YOU MEAN? MAN:OKAY, MR. TAYLOR, 【D10】______ MR. TAYLOR: OH, AND I REALLY LIKE COMPUTER GAMES. I PLAY THEM EVERYDAY. MAN: RIGHT, RIGHT. THANKS, MR. TAYLOR. WE"LL BE IN TOUC

H. A. AND HOW ABOUT WEBSITE AUTHORING SKILLS?

B. I THINK I HAVE ALL THE INFORMATION I NEED!

C. I"M AFRAID I"VE NEVER USED THOSE CGI THINGS.

D. FIRST OF ALL, TELL ME ABOUT YOURSEL

F.

点击查看答案

第11题

Which of the following is true? A.A computer revolution began in 1945 and ended in 1985. B.A micro

Which of the following is true?

A.A computer revolution began in 1945 and ended in 1985.

B.A microcomputer of 32 bits may have the same computing power as a large computer.

C.A Roll Royce of the highest quality has at least 200 page instructions telling a customer how to open the car door.

D.High speed computer networks is one of the three advances in computer technology.

点击查看答案
下载APP
关注公众号
TOP
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案 购买前请仔细阅读《购买须知》
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《服务协议》《购买须知》
立即支付 系统将自动为您注册账号
已付款,但不能查看答案,请点这里登录即可>>>
请使用微信扫码支付(元)

订单号:

遇到问题请联系在线客服

请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示:请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
请用微信扫码测试
优题宝