一起答
单选

为了进行差错控制,必须对传送的数据帧进行校验。在局域网中广泛使用的校验方法是(7)校验。CRC-16标准规定的生成多项式为G(x)=X16+X15+X2+1,它产生的校验码是(8)位,接收端发现错误后采取的措施是(9)。如果CRC的生成多项式为G(X)=X4+X+1,信息码字为10110,则计算出的CRC校验码是(10)。要检查出d位错,码字之间的海明距离最小值应为(11)。

  • A.奇偶(Parity)
  • B.海明(Hamming)
  • C.格雷(Gray)
  • D.循环冗余(Cyclic Redundancy)
试题出自试卷《软件水平考试(中级)网络工程师上午(基础知识)试题模拟试卷20》
参考答案
查看试卷详情
相关试题
  1. (76)

    • A.hypertext
    • B.computation
    • C.expectation
    • D.bookmark
  2. (77)

    • A.habits signature
    • B.site
    • C.rages
    • D.address
  3. (75)

    • A.victimized
    • B.personate
    • C.identity
    • D.control
  4. (74)

    • A.connecting
    • B.binding
    • C.looking
    • D.contenttagging
  5. Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to(71)fraudulent Web sites without their knowledge or consent. Pharming has been called "phishing without a lure".

     In phishing, the perpetrator sends out legitimate-(72)looking e-malls, appearing to come from some of the Web's most popular sites, in an effort to obtain personal and financial information from individual recipients. But in pharming, larger numbers of computer users can be(73)victimized because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form. of pharming attack, code sent in an e-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected(74)bookmark entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing.(75)habits.

    • A.few
    • B.fraudulent
    • C.normal
    • D.structured
  6. (72)

    • A.messages
    • B.packets
    • C.information
    • D.reengineering
  7. (71)

    • A.retrieval
    • B.route
    • C.path
    • D.save
  8. (70)

    • A.database
    • B.controller
    • C.lifecycle
    • D.center
  9. (69)

    • A.format
    • B.documents
    • C.text
    • D.network
  10. (67)

    • A.rat
    • B.velocity
    • C.rank
    • D.rates