一起答
单选

计算机网络拓扑是通过网中结点与通信线路之间的几何关系表示网络中各实体间的(30)。

网络拓扑设计的优劣将直接影响到网络的性能、可靠性与(31)。

  • A.联机关系
  • B.结构关系
  • C.主次关系
  • D.层次关系
试题出自试卷《软件水平考试(初级)网络管理员上午(基础知识)模拟试卷21》
参考答案
查看试卷详情
相关试题
  1. (59)

    • A.2kHz
    • B.4kHz
    • C.16kHz
    • D.64kHz
  2. (57)

    • A.sends
    • B.personates
    • C.receives
    • D.writes
  3. (58)

    • A.channel
    • B.computation
    • C.speed
    • D.bandwidth
  4. (56)

    • A.asymmetric
    • B.compressed
    • C.irregularity
    • D.symmetric
  5. (75)is a clickable string or graphic that points to another Web page or document。

    • A.Anchor
    • B.Browser
    • C.Hypertext
    • D.Hyperlink
  6. A typical application of this(71)is ADSL. It is emerging as the technology for home-and small-office Internet connectivity. It provides either 1.5 Mb/s~8 Mb/s from the network to the user and 64 Kb/s~512 Kb/s in the reverse direction depending on the distance, 12 000 or 18 000 feet.. The different speed for each direction gives it the(72)label. ADSL is designed to take advantage of the fact that video-on demand, telecommuting, and Internet access traffic are inherently asymmetrical. The user(73)a brief message up to the network and receives a ton of data coming back, either a movie or a piece of data download. Under such a scenario, low-speed traffic to the network is just fine. ADSL delivers high(74)where you need it and only uses a single copper pair. Through multiplexing, it also reserves(75)of the bandwidth for POTS.

    • A.FTTH
    • B.HFC
    • C.FTTC
    • D.HDSL
  7. (73)is the sending and receiving of the message by computer. It is a fast,  low-cost way of communicating worldwide。

    • A.WWW
    • B.E-mail
    • C.TFTP
    • D.TELNET
  8. (74)is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing。

    • A.Computer network
    • B.Computer device
    • C.Computer processor
    • D.Computer storage
  9. Files can be lost or destroyed accidentally. Keep(72)copies of all data on removable storage media。

    • A.back
    • B.black
    • C.backdown
    • D.backup
  10. One solution to major security problems is(71), which are frequently installed to fix known security holes。

    • A.additions
    • B.compensations
    • C.patches
    • D.complements