电子商务Gary P.Schneider 章二模拟题

2020-06-18 20:26

1. Networks of computers and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce.

2. The USENET was the earliest of the networks that eventually combined to become what we now call the Internet.

3. E-mail was born in 1972 when a researcher wrote a program that could send and receive messages over the Defense Department network.

4. In 1989, the NSF permitted two commercial e-mail services, MCI Mail and CompuServe, to establish limited connections to the Internet for the sole purpose of exchanging e-mail transmissions with users of the Internet.

5. A network of computers that are located close together—for example, in the same building—is called a local area network.

6. The Internet provides a high degree of security in its basic structure.

7. Although fax, telephone, e-mail, and overnight express carriers have been the main communications tools for business for many years, extranets can replace many of them at a lower cost.

8. An intranet extends beyond the organization that created it.

9. The “virtual” part of VPN means that the connection seems to be a temporary, internal network connection, but the connection is actually permanent. 10. VPN software must be installed on the computers at both ends of the transmission.

11. The technologies used (public networks, private networks, or VPNs) are independent of organizational boundaries. 12. IP addresses appear as five numbers separated by periods.

13. SMTP is a common protocol used for sending and retrieving e-mail.

14. IMAP is a newer e-mail protocol that performs the same basic functions as POP, but includes additional features.

15. The POP protocol provides support for MIME.

16. At a technological level, the Web is nothing more than software that runs on computers that are connected to the Internet.

17. The set of rules for delivering Web page files over the Internet is in a protocol called the Hypertext Transfer Protocol (HTTP).

18. An HTML document is similar to a word-processing document in that it specifies how a particular text element will appear.

1。计算机网络和Internet连接彼此,形成基本的技术结构,是几乎所有的电子商务。

2。Usenet是最早的网络相结合,最终成为了我们现在所称的互联网。

3。电子邮件是天生的在1972时,研究者写的一个可能在国防部的网络发送和接收消息的程序。

4。1989,美国国家科学基金会允许两个商业电子邮件服务,MCI邮件和

CompuServe,建立有限的连接到互联网的互联网用户交换电子邮件传输的唯一目的。

5。一个是位于接近例如电脑网络,在同一栋大楼被称为局域网。

6。互联网提供了其基本结构高度的安全性。

7。虽然传真,电话,电子邮件,和隔夜快递已成为主要的通信工具为业务多年,

它可以取代很多人在一个较低的成本。

8。Intranet超出它所创造的组织。

9。VPN是指连接似乎是一个临时的“虚拟”的一部分,内部网络连接,但连接是永久性的。

10。VPN软件必须安装在计算机在传输的两端。

11。使用的技术(公用网,专用网,或VPN)是独立的组织边界。

12。IP地址显示为五用句点分隔的数字。

13。SMTP用于发送和接收电子邮件的常用协议。

14。IMAP是一种较新的电子邮件协议,执行相同的基本功能是流行,但包含更多的功能。

15。流行的协议提供了支持MIME。

16。在技术层面,网络不过是运行在连接到Internet的计算机软件。

17。用于在互联网上提供的网页文件的规则集是一个协议称为超文本传输协议(HTTP)。

18。一个HTML文件,类似于字处理文档,它指定了一个特定的文本元素将出现

19. Domain names are sets of words that are assigned to specific IP addresses.

20. The Internet Corporation for Actualized Names and Nuances has the

responsibility of managing domain names and coordinating them with the IP address registrars.

21. HTML is a meta language because users can create their own markup elements that extend the usefulness of XML.

22. SGML offers a system of marking up documents that is independent of any software application.

23. The term cascading is used because designers can apply many style sheets to the same Web page, one on top of the other.

24. The higher the bandwidth, the faster data files travel and the faster Web pages appear on your screen. 25. Asymmetric connections provide the same bandwidth for each direction. Multiple Choice

Identify the choice that best completes the statement or answers the question.

1. The combination of telephone lines and the closed switches that connect them to each other is called a ____. a. LAN c. circuit b. WAN d. pathway

2. On a packet-switched network, files and e-mail messages are broken down into small pieces, called ____. a. messages c. circuits b. pieces d. packets

3. When packets leave a network to travel on the Internet, they must be translated into a standard format. ____ usually perform this translation function. a. Switches c. Routers

b. Bridges d. Routing algorithms

4. Routers and the telecommunications lines connecting them are collectively referred to as ____.

a. backbone routers c. an asynchronous backbone b. Internet routers d. the Internet backbone

5. A(n) ____ does not extend beyond the boundaries of a particular organization. a. Internet c. intranet b. extranet d. ARPANET

6. A(n) ____ is like a separate, covered commuter lane on a highway (the Internet) in which passengers are protected from being seen by the vehicles traveling in the other lanes.

a. VPN c. extranet b. IP wrapper d. IAP

19。域名的话,被分配到特定的IP地址设置。

20。互联网公司的名称和细微差别,实施有管理的域名和协调他们的IP地址注册机构的责任。

21。HTML是一种元语言,用户可以创建自己的标记元素扩展XML的有用性。

22。SGML的标记的文件,提供了一个独立于任何软件应用系统。

23。这个词的使用是因为设计师级联样式表可以使用相同的网页,一个在另一个的上面。

24。更高的带宽,更快的数据文件的旅行和更快的网页出现在你的屏幕上。

25。非对称连接在每个方向提供相同的带宽。 多项选择

找出最好的完成的陈述或回答问题的选择。

1。通过电话线和关闭开关,他们彼此连接,被称为____。 A.兰C.电路 B.婉婷通路

2。在分组交换网络中,文件和电子邮件被分解成小块,称为____。 A信息C.电路 B. D.包块

3。当数据包离开网络在互联网上旅行,他们必须翻译成标准格式。____通常执行这个翻译功能。 交换机路由器

B.桥梁D.路由算法

4。路由器和连接他们的电信线路统称为____。 A.骨干路由器C异步骨干 B.路由器D互联网骨干网

5。一个(N)____不超出一个特定的组织的边界。 A. C. Intranet网络 B. D.阿帕网

6。一____(n)是一个独立的,覆盖的通勤车道公路上(互联网),乘客被保护的车辆在其他车道行驶过。 A. C. Extranet VPN B. IP包D. IAP

7. A(n) ____ is a connection that uses public networks and their protocols to send data in a way that protects the data as well as a private network would, but at a lower cost.

a. public network c. virtual private network b. virtual public network d. private network

8. A ____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

a. routing algorithm c. protocol b. backbone router d. packet

9. ____ determine how the sending device indicates that it has finished sending a message, and how the receiving device indicates that it has received the message. a. Routers c. Protocols b. Bridges d. Adapters

10. In networking applications, an 8-bit number is often called a(n) ____. a. octet c. piconet b. netbit d. bit 11. Network engineers have devised a number of stopgap techniques to stretch the supply of IP addresses. One of the most popular techniques is ____. a. subnetting c. sub-blocking b. subletting d. piconetting 12. A computer called a ____ converts private IP addresses into normal IP address when it forwards packets from those computers to the Internet. a. routing algorithm device c. subnet translation device

b. network address translation device d. private network device 13. The ____ numbering system uses 16 characters. a. hexadecimal c. binary b. decimal d. ASCII

14. IPv6 uses a ___ number for addresses. a. 32-bit c. 128-bit b. 56-bit d. 256-bit

15. The purpose of a(n) ____ is to respond to requests for Web pages from Web clients.

a. URL c. Web server

b. e-mail d. top-level domain

16. ____ specifies the format of a mail message and describes how mail is to be administered on the e-mail server and transmitted on the Internet. a. SMTP c. MIME b. TCP/IP d. POP

17. A newer e-mail protocol that performs the same basic functions as POP, but includes additional features, is known as ____. a. IMAP c. POPI b. SMTP d. IPOP

18. ____ lets users create and manipulate e-mail folders and individual e-mail messages while the messages are still on the e-mail server. a. POP c. IMAP b. SMTP d. MIME


电子商务Gary P.Schneider 章二模拟题.doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:微机原理实验

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: