首页 > 汉语言文学> 外国文学史
题目内容 (请给出正确答案)
[主观题]

选出应填入下面一段英语中______内的正确答案。 When the system upon which a transport entity is runnin

选出应填入下面一段英语中______内的正确答案。

When the system upon which a transport entity is running fails and subsequently restarts, the(1)information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.

The still active side of a half-open connections can close the connection using a(2)timer. This timer measures the time transport machine will continue to await an(3)of a transmitted segment after the segment has been retransmitted the maximum number of times. When the timer(4)the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user.

In the event that a transport entity fails and quickly restart, half-open connections can be terminated more quickly by the use of the RST segment. The failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the(5)number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination.

查看答案
答案
收藏
如果结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能还需要:
您的账号:
发送账号密码至手机
发送
安装优题宝APP,拍照搜题省时又省心!
更多“选出应填入下面一段英语中______内的正确答案。 When…”相关的问题
第1题
选出应填入下面一段英语中______内的正确答案。 In a public-key cryptosystem, (1) encrypted with th

选出应填入下面一段英语中______内的正确答案。

In a public-key cryptosystem,(1)encrypted with the public key can only be deciphered with the private key from the same(2). Conversely,(1)encrypted with the private key can be decrypted only with the public key. Users can make their public keys(3)available or place them at a key distribution center or others to access. However, the private key must be(4)safe. In public-key systems there's no(5)to find a safe channel for communicating a shared secret key.

点击查看答案
第2题
选出应填入下面一段英语中______内的正确答案 The terms FIFO and LIFO refer to two techniques for (1

选出应填入下面一段英语中______内的正确答案

The terms FIFO and LIFO refer to two techniques for(1)with collection of items to which additions and(2)are to be made. The acronym FIFO(3)for first-in-first-out and LIFO represents last-in-first-out. Derived from business accounting and investing management(4), these techniques have found widespread application in computer science. For example, the LIFO technique has been used in the parsing techniques employed by compilers and in the(5)of data.

供选择的答案:

(1) producing (2) dealing (3) networking (4) searching

(5) deletions (6) locations (7) observations (8) notations

(9) stands (10) represents (11) finds (12) replaces

点击查看答案
第3题
选出应填入下面一段英语中______内的正确答案。 VRML is a (1) for 3D multimedia and shared virtual

选出应填入下面一段英语中______内的正确答案。

VRML is a(1)for 3D multimedia and shared virtual worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structured graphics, and extra(2)(z and time) to the presentation of documents. The applications of VRML are(3), ranging from simple business graphics to entertaining WWW page graphics, manufacturing, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communities.

X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwards(4)with VRML. Furthermore, it is componentized, profiled, and extensible, which makes it possible to use X3D in very different(5), from high-end visualizations to lightweight applications.

点击查看答案
第4题
选出应填入下面一段英语中______内的正确答案。 Most IP layer-based proxy mechanisms, such as network a

选出应填入下面一段英语中______内的正确答案。

Most IP layer-based proxy mechanisms, such as network address translation (NAT), only support unidirectional proxy, from the internal network to external network (the Internet). The proxy establishes the communication channel by(1)IP addresses. The IP addresses must be(2). These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. IP layer-based proxy mechanisms need additional software(3)for each application that uses.(4)channels. SOCKS identifies communication targets through domain names, overcoming the restriction of using private IP addresses. SOCKS can use domain names to establish communication between separate LANs,with(5)IP addresses.

点击查看答案
第5题
从供选择的答案中选出应填入下面一段英文中______内的正确答案。 In computers, encoding is the process o

从供选择的答案中选出应填入下面一段英文中______内的正确答案。

In computers, encoding is the process of putting a sequence of(1)characters (letters, numbers, punctuation, and certain symbols) into a specialized(2)format for efficient transmission or storage.(3)Decoding is the opposite process—the conversion of an encoded format back into the original(4)sequence of characters. Encoding and decoding are used in data communications, networking, and storage. The term is especially(5)applicable to radio (wireless) communications systems.

The terms encoding and decoding are often used in reference to the(6)processes of analog-to-digital conversion and digital-to-analog conversion. In this sense, these(7)terms can apply to any form of data, including text, images, audio, video,(8)multimedia, computer programs, or signals in sensors, telernetry, and control systems. Encoding should not be confused with encryption, a process in which data is deliberately altered so as to(9)concealits content. Encryption can be done without changing the particular(10)code that the content is in, and encoding can be done without deliberately concealing the content.

供选择的答案:

1.terms 2.Decoding 3.processes 4.format 5.code

6.multimedia 7.applicable 8.conceal 9.equence 10.characters

点击查看答案
第6题
从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 Software quality assurance is now an

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

Software quality assurance is now an(1)sub-discipline of software engineering. As Buckly and Oston point out,(2)software quality assurance is likely to lead to an ultimate(3)of software costs. However, the major hurdle in the path of software management in this area is the lack of(4)software standards. The development of accepted and generally applicable standards should be one ofthe principal goals of(5)in software engineering.

点击查看答案
第7题
从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 Applications put computers to practic

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

Applications put computers to practical business(1), but below the(2)it's the heart of an operating system-the kernel-that provides the technical wizardry to juggle multiple program,connect to networks and store(3)

A traditional kernel provides all the functions for applications.The kemel(4)memory, I/O devices and parcels out processor time.

The kernel also supports securityand fault(5), which is the ability to recover automatically when parts of the system fail.

点击查看答案
第8题
从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 Mobile computers—which (1) laptop

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

Mobile computers—which(1)laptops, notebooks, subnotebooks and handhelds—(2)so ubiquitous in such a short time, no surprise to hear who say:"It will define the leading edge(3)the next five years or so."The most remarkable(4)mobile computers is the amount of data storage and memory packed(5)their tiny boxes. These devices not only handle windows easily but also run storage-hungry programs.

点击查看答案
第9题
从下列英语叙述中,选出5条正确的叙述,把编号依次写在下面。 (1) The language translator converts the sym

从下列英语叙述中,选出5条正确的叙述,把编号依次写在下面。

(1) The language translator converts the symbolic program into source program.

(2) The coded program written by a programmer is called an object program.

(3) COBOL is self-documenting unlike many technical language.

(4) FORTRAN has high capabilities for performing input/output operations and in handling nonnumeric data.

(5) Loading is a process through which the information on the diskettes or tapes is read by the input unit and stored in the proper memory location.

(6) The assemble program executes source codes directly by determining the meaning of each statement as it is encounted.

(7) Magnetic tape uses cylinders for finding data.

(8) Hexadecimal is used as a shorthand for the internal codes.

(9) Another name of diskette is floppy disk.

(10) An IF-THEN-ELSE selection technique can never be part of a loop.

(11) The most popular language for scientific computing is FORTRAN.

(12) It is much easier to access data in a file than in a database.

点击查看答案
第10题
Instructions:建议你在30分钟内,根据下面所给的题目和提纲用英语写出一篇不少于80词的短文。1.回忆值得记忆的一天;2.说明为什么值得记忆。A Day to Remember

点击查看答案
第11题
下面哪一项不属于语言与政治之间的关系:()

A.英语中北欧词汇遗留

B.英语中本土词汇的存在

C.英语中法语词汇遗留

D.英语中意大利词汇的遗留

点击查看答案
退出 登录/注册
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改