● (74) functions with two layers of protocols.It can connect networks of different speeds and can be adapted to an environment as it expands.(74) A.The hubB.The bridgeC.The routerD.The proxy

题目

● (74) functions with two layers of protocols.It can connect networks of different speeds and can be adapted to an environment as it expands.

(74) A.The hub

B.The bridge

C.The router

D.The proxy


相似考题
参考答案和解析
正确答案:B
【解析】译文:网桥涉及了两层网络协议,它能连接不同速度的网络。作为扩展,还可以改变以使用某个环境。
更多“● (74) functions with two layers of protocols.It can connect networks of different speeds ”相关问题
  • 第1题:

    Asystem's architecture is a representation of a system in which there is amapping of(71)onto hardware and softwarecomponents, a mapping of the(72)onto thehardware architecture. and a concern for the human interaction with thesecomponents. That is, system architecture is concerned with a total system, includinghardware. software, and humans.

    Softwarearchitectural structures can be divided into three major categories, dependingon the broad nature of the elements they show.1)(73)embodydecisions as a set of code or data units that have to be constructed orprocured.2)(74)embody decisions as to how the systemis to be structured as set of elements that have runtime behavior. andinteractions.3)(75)embody decisions as to how thesystem will relate to nonsoftware structures in its

    environment(suchas CPUs, file systems, networks, development teams, etc.).

    71.( )

    A.attributes

    B.constraint

    C.functionality

    D.requirements


    正确答案:C
    系统架构是一个系统的一种表示,包含了功能到软硬件构件的映射、软件架构到硬件架构的映射以及对于这些组件人机交互的关注。也就是说,系统架构关注于整个系统,包括硬件、软件和使用者。软件架构结构根据其所展示元素的广义性质,可以被分为三个主要类别。1)模块结构将决策体现为一组需要被构建或采购的代码或数据单元。2)构件连接器结构将决策体现为系统如何被结构化为一组具有运行时行为和交互的元素。3)分配结构将决策体现为系统如何在其环境中关联到非软件结构,如CPU、文件系统、网络、开发团队等。

  • 第2题:

    [A]applications [B]enterprises [C]functions [D]performances


    正确答案:C

    本题考查名词词义的辨析。空格处填入的名词充当extending them to结构中的介词宾语,其中extend...to...意为“扩展……用于……”,them指上文中的its commercial spaces(东日本铁路的商业空地)。因此,所填的名词应与前文一致,表达这些空地的用处或功能,应与use的名词形式usage属同一范畴。 A]、[C]项都有“使用”的意思,但application常与“科技成果、理论、法规”等搭配,强调它们的实际应用,一般不与spaces搭配,如 The new invention would have a wide range of applications in industry(这项新发明会在工业上获得广泛应用),[C]项functions“功能,作用”正确,即“还要把这些商业空地用于更加适应信息时代的功能上”。enterprise“企业,事业,计划”;performance“履行,执行,性能”。

  • 第3题:

    Program ( ) graphically present the detailed sequence of steps needed to solve a programming problem.

    A.modules
    B.flowcharts
    C.structures
    D.functions

    答案:B
    解析:
    程序流程图以图形方式展示了解决程序设计问题所需的一系列步骤。

  • 第4题:

    Program ( ) graphically present the detailed sequence of steps needed to solve a programming problem .

    A. modules B. flowcharts C. structures D. functions


    正确答案:B

  • 第5题:

    ●One ofthe main resposibilities ofICMP is to report (71). Although technology has produced increasingly reliable transmission media, errors still exist and must be handled. IP is an (72) protocol. This means that error checking and error control are not a concem ofIP.ICMP was designed, in part, to compensate for this shortcoming. Howerver, ICMP does not _(73) errors, it simply reports them. Error correction is left to the higher-level potocols. Error messages are always sent to the original__(74) because the only information available in the datagram about the route is the source and destination lP addresses. ICMP uses the source IP address to send the error massage to the source ofthe(75) .

    (71)

    A, numbers

    B. functions

    C. strings

    D. errors

    (72)

    A. reliable

    B. unreliable

    C. available

    D. unavailable

    (73)

    A. correct

    B. conduct

    C. produce

    D. connect

    (74)

    A. user

    B. destination

    C. source

    D. program

    (75)

    A. datagram

    B. frame

    C. service

    D. protocol


    正确答案:D,B,A,C,A

  • 第6题:

    Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from(71),competitors,or even employees.Many of the organizations that manage their own(72)network security and use the Internet for more than just sending/receiving e-mails experience a network(73)—and more than half of these companies do not even know they were attacked.Smaller(74)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are trapped in a situation where they do not have the necessary time and(75)to spend on security.

    A.users
    B.campuses
    C.companies
    D.networks

    答案:C
    解析: