ID
int64 383
2.08k
| Split
stringclasses 1
value | Domain
stringclasses 4
values | SubDomain
stringclasses 24
values | Format
stringclasses 1
value | Tag
stringclasses 2
values | Language
stringclasses 1
value | Question
stringlengths 28
336
| Answer
stringclasses 2
values | Explanation
stringlengths 29
771
⌀ |
|---|---|---|---|---|---|---|---|---|---|
995
|
Test
|
Computer Organization
|
Input/Output System
|
Assertion
|
Knowledge
|
English
|
Chinese characters are displayed using a dot matrix font, with each character represented by a 16x16 dot matrix. Therefore, the font library capacity for 7500 Chinese characters is 1MB.
|
False
| null |
996
|
Test
|
Computer Organization
|
Input/Output System
|
Assertion
|
Reasoning
|
English
|
Only in computers with specialized I/O instructions can I/O devices be addressed independently.
|
True
|
Under the isolated I/O addressing mode, the CPU needs to use dedicated input/output instructions to access I/O devices.
|
997
|
Test
|
Computer Organization
|
Input/Output System
|
Assertion
|
Reasoning
|
English
|
Under unified addressing, the corresponding I/O address for I/O devices can be arbitrarily located anywhere in the address space.
|
True
|
Under unified addressing, I/O addresses should follow certain rules and be fixed, and cannot be arbitrarily assigned.
|
998
|
Test
|
Computer Organization
|
Input/Output System
|
Assertion
|
Reasoning
|
English
|
The purpose of setting up interrupt priority queuing logic is to ensure that the highest priority request among those presented simultaneously receives a timely response.
|
True
|
The purpose of the interrupt priority queuing logic is to ensure that the highest priority request among those presented simultaneously can receive a timely response.
|
999
|
Test
|
Computer Organization
|
Input/Output System
|
Assertion
|
Reasoning
|
English
|
In DMA transfer mode, a DMA request is issued by the DMA controller, and during the transfer, the bus control is dominated by the DMA controller.
|
False
|
In DMA transfer mode, the external device sends a DMA request signal to the DMA controller, which then sends a bus request signal to the CPU.
|
1,444
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
The total length of the MAC frame header and trailer is 18 bytes.
|
True
| null |
1,445
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
In the data link layer, common protocols include ARP, ICMP, IP, and OSPF.
|
False
| null |
1,446
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
The collision domain refers to the number of stations that can receive the signal.
|
True
| null |
1,447
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
The total length range of a MAC frame is from 46 bytes to 1500 bytes.
|
False
| null |
1,448
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
The control part of the MAC frame occupies 18 bytes.
|
True
| null |
1,449
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
In the flag field of the IP datagram, DF indicates that fragmentation is allowed, and MF indicates that it is not the last fragment.
|
False
| null |
1,450
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
The primary operational layer of a router is the Data Link Layer.
|
False
| null |
1,451
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
The functions of computer networks include connecting various computers, enabling resource sharing, message transmission, and maintaining the relative independence of each computer.
|
True
| null |
1,452
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
Computer software is a device belonging to the resource subnet.
|
True
| null |
1,453
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
Computer networks are divided into Wide Area Networks (WAN), Metropolitan Area Networks (MAN), and Local Area Networks (LAN), primarily based on the scope of the network's functionality.
|
True
| null |
1,454
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
Metropolitan Area Network (MAN) is a new technology proposed to phase out Local Area Networks (LAN) and Wide Area Networks (WAN).
|
False
| null |
1,455
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
WANs typically adopt a bus topology.
|
False
| null |
1,456
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
In a star topology with n nodes, there are n-1 physical links.
|
True
| null |
1,457
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Knowledge
|
English
|
In the OSI reference model, the relationship between layer n and the layer above it, layer n+1, is that layer n and layer n+1 do not affect each other.
|
False
| null |
1,458
|
Test
|
Computer Network
|
Overview and Architecture
|
Assertion
|
Reasoning
|
English
|
In the OSI reference model, the protocol layer that implements end-to-end acknowledgment, packet sequencing, and flow control is the Transport Layer.
|
True
|
Only communication at the transport layer and above can be referred to as end-to-end. The session layer manages dialogues between processes on different machines, while the transport layer implements acknowledgment, packet sequencing, and flow control functions.
|
1,459
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
Nyquist's theorem limits bandwidth.
|
False
| null |
1,460
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
Shannon's theorem applies to situations with limited bandwidth.
|
True
| null |
1,461
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
In computer networks,mechanical properties are primarily concerned with timing.
|
False
| null |
1,462
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
The characteristic of a hub is that it has the ability to direct signal transmission.
|
False
| null |
1,463
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
If the conditions of both the Nyquist theorem and Shannon's theorem are met, the smaller value should be chosen to set the limit.
|
True
| null |
1,464
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
With a baud rate of 2400 and 4 bits per baud, the bit rate is 4800 bps.
|
False
| null |
1,465
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
In Shannon's theorem, bandwidth refers to the width of the transmission medium.
|
False
| null |
1,466
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
The main disadvantage of circuit switching is low efficiency.
|
False
| null |
1,467
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
Factors that primarily affect the maximum transmission rate of a channel include the transmit power and the noise power.
|
False
| null |
1,468
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
Twisted pair is made by twisting two insulated wires together, with the purpose of reducing interference.
|
True
| null |
1,469
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
Utilize a coaxial cable to interconnect hosts to form an Ethernet, with the communication method between hosts being indeterminate.
|
False
| null |
1,470
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
Coaxial cables have a faster transmission rate than twisted pair cables, thanks to their higher shielding effectiveness and better noise immunity.
|
True
| null |
1,471
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Knowledge
|
English
|
Generally speaking, networks connected by hubs are topologically classified as mesh.
|
False
| null |
1,472
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Reasoning
|
English
|
The information transmission rate refers to the number of symbols transmitted per second on a communication channel.
|
False
|
The information transmission rate refers to the number of bits transmitted per second (bits per second, bps) on a communication channel, not the number of symbols. The symbol rate (or baud rate) refers to the number of symbols transmitted per second. These are different concepts. The relationship between the information transmission rate and the symbol rate depends on the number of bits each symbol represents. In some cases, they might be equal, but generally, they are different.
|
1,473
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Reasoning
|
English
|
The main improvement of packet switching over message switching is that it simplifies the routing algorithm.
|
False
|
Compared to message switching, packet switching involves dividing messages into packets with a fixed maximum length and transmitting them on a packet-by-packet basis.
|
1,474
|
Test
|
Computer Network
|
Physical Layer
|
Assertion
|
Reasoning
|
English
|
Circuit switching does not provide error control functions.
|
True
|
Circuit switching does not provide error control functions. In circuit switching, a dedicated communication path is established and maintained between the communicating parties until the communication session ends. This method is mainly used in traditional telephone networks. Circuit switching focuses on establishing and maintaining a continuous transmission path, rather than performing error detection and correction during transmission. Error control functions are typically implemented by higher-level protocols (such as transport layer protocols) rather than by circuit switching itself.
|
1,475
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
CSMA/CD is primarily used in Wide Area Network (WAN).
|
False
| null |
1,476
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
The IEEE 802.3 Ethernet uses the CSMA/CD access control method.
|
True
| null |
1,477
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
In zero bit stuffing, the flag for frame start and frame end is 1111110.
|
True
| null |
1,478
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
The primary function of the high-speed buffer memory in data link layer devices is to cache the data between the main memory and the CPU.
|
True
| null |
1,479
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
In CSMA/CD, a random backoff algorithm is used.
|
False
| null |
1,480
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
In the channel reservation process of CSMA/CA, the receiver returns an ACK frame.
|
True
| null |
1,481
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
The most fundamental service of the data link layer is to provide reliable data transmission.
|
True
| null |
1,482
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
The primary protocol of the data link layer is Ethernet.
|
True
| null |
1,483
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
Cyclic Redundancy Check (CRC) is generated based on the length of the data.
|
False
| null |
1,484
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
In the bus topology of the data link layer, collisions may occur when the topology becomes too complex.
|
False
| null |
1,485
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
The functions of the data link layer protocol do not include defining the data format.
|
False
| null |
1,486
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
The main functions of a network card are implemented at the physical layer and the data link layer.
|
True
| null |
1,487
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
The IEEE 802 local area network standards correspond to the Data Link Layer and Network Layer of the OSI reference model.
|
False
| null |
1,488
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
Gigabit Ethernet supports both full-duplex and half-duplex modes.
|
True
| null |
1,489
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
Link aggregation is not an advantage of Virtual Local Area Networks (VLANs).
|
True
| null |
1,490
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
In the commonly used operational modes of HDLC, the transmission process can only be initiated by the primary station in Asynchronous Response Mode.
|
True
| null |
1,491
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
A switch is a device that cannot segment collision domains.
|
False
| null |
1,492
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Knowledge
|
English
|
A set of workstations connected by a switch forms a broadcast domain, but not a collision domain.
|
True
| null |
1,493
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Reasoning
|
English
|
The characteristic of parity check code is that it can detect an error in any single bit of arbitrary length.
|
False
|
The principle of parity check is to add a few extra bits to make the number of "1"s in the codeword remain even or odd. It can only detect an odd number of bit errors.
|
1,494
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Reasoning
|
English
|
For a 10-bit data transmission, if Hamming code is used, an additional 6 bits of redundant information are required.
|
False
|
Attach r redundant bits to k information bits to form a k+r bit codeword, which must satisfy 2^r >= k + r + 1. If the value of r is less than or equal to 11 and greater than 4, then r = 4. For 10-bit data, 4 redundant bits need to be added.
|
1,495
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Reasoning
|
English
|
If the ARO protocol with N-frame lookback is used for flow control and the sequence number field is 7 bits, then the maximum length of the send window is 127.
|
True
|
When the receive window moves forward as a whole, the sequence numbers in the new window overlap with those in the old window, making it impossible for the receiver to distinguish whether the sender is retransmitting or sending a new frame. Therefore, in the subsequent N ARQ protocols, the transmission window W_T <= 2^(n-1). In this question, n=7, so the maximum length of the transmission window is 127.
|
1,496
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Reasoning
|
English
|
The characteristic of the transmission medium used in TDM is that the bit rate of the medium is higher than the bit rate of a single signal.
|
True
|
Time Division Multiplexing (TDM) shares bandwidth by allocating channels in a time-divided manner. Time is divided into equal-length time slots of TDM, and each user participating in bandwidth sharing occupies a fixed sequence number slot in each TDM. Clearly, in this case, the bit rate of the medium is greater than the bit rate of a single signal.
|
1,497
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Reasoning
|
English
|
Computer networks use TDM more than FDM because TDM can utilize bandwidth more efficiently.
|
False
|
Compared to FDM, TDM has stronger anti-interference capabilities, allowing for progressive regeneration and reshaping to prevent the accumulation of interference. Moreover, digital signals are relatively easy to convert automatically. Therefore, based on the working principles of FDM and TDM, FDM is suitable for transmitting analog signals, while TDM is applicable to transmitting digital signals.
|
1,498
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Reasoning
|
English
|
The primary function of a multiplexer is to combine transmissions from two or more lines.
|
True
|
The primary function of a multiplexer is to combine transmissions from two or more lines to make full use of the channel.
|
1,499
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Reasoning
|
English
|
The HDLC protocol uses the character stuffing method with beginning and ending flag delimiters to achieve transparent transmission.
|
False
|
HDLC uses zero bit stuffing to achieve transparent transmission at the data link layer (while the PPP protocol uses byte stuffing), which means no six consecutive "1" bits appear between two flag fields. The specific method is as follows: at the transmitter, before a bit is added to the flag field, the hardware scans the bit stream, and whenever five consecutive "1" bits are detected, a "0" is inserted after them; at the receiver, the F field is located first to determine the boundary, then the bit stream within it is scanned, and whenever five consecutive "1" bits are found, the "0" following these five "1" bits is removed, thereby restoring the original bit stream.
|
1,500
|
Test
|
Computer Network
|
Data Link Layer
|
Assertion
|
Reasoning
|
English
|
In a local area network using Ethernet switches, multiple ports of the switch can transmit in parallel.
|
True
|
In a local area network using an Ethernet switch, the multiple ports of the switch can transmit in parallel because the switch has an independent switching matrix. Each port has its own bandwidth and connection path, allowing the switch to handle data transmissions between multiple ports simultaneously without conflicts or interference. This enables the switch to efficiently manage and forward data packets, significantly improving network transmission efficiency and throughput.
|
1,501
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
In the classification of IP addresses, the first byte range of Class A addresses is 64-127.
|
True
| null |
1,502
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
The IP address is 192.168.1.100 with a subnet mask of 255.255.255.0, and its subnet range is 192.168.1.0 - 192.168.1.63.
|
False
| null |
1,503
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
The full name of the RIP protocol is Routing Information Protocol.
|
True
| null |
1,504
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
In the ICMP protocol, the Ping command belongs to the Echo Reply message type.
|
False
| null |
1,505
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
The reason for IP packet fragmentation is to prevent packet loss.
|
False
| null |
1,506
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
The IP packet size is 3500B, and the MTU is 1500B, so the packet will be fragmented. In the fragmented packets, the offset of the first fragment is 0.
|
True
| null |
1,507
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
The ARP protocol is used to resolve MAC addresses.
|
False
| null |
1,508
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
In an IPv6 address, 96 bits are used for network identification.
|
False
| null |
1,509
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
The function of the TTL field in an IP datagram is to limit the lifespan of the datagram.
|
True
| null |
1,510
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
The primary function of the Ping application is to test for network faults.
|
True
| null |
1,511
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
A management domain is an Autonomous System (AS).
|
True
| null |
1,512
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
An IPv4 address has 32 bits.
|
True
| null |
1,513
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
ICMP messages are encapsulated within the UDP protocol.
|
False
| null |
1,514
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
A hub is a device that cannot segment broadcast domains.
|
False
| null |
1,515
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
In the IP header fields, the field unrelated to fragmentation and reassembly is the Identification.
|
False
| null |
1,516
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
255.255.255.0 is an example of a subnet mask, not a loopback address.
|
False
| null |
1,517
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
A host has two IP addresses, one address is 192.168.11.25, and the other address might be 192.168.11.24.
|
False
| null |
1,518
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
According to the NAT protocol, 192.172.56.23 is not allowed to appear on the Internet.
|
False
| null |
1,519
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Knowledge
|
English
|
The packet forwarding part of the routing table consists of input ports.
|
False
| null |
1,520
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Reasoning
|
English
|
In link-state routing algorithms, after each router obtains the complete topology of the network, it uses the Dijkstra's shortest path algorithm to determine the path lengths to other routers.
|
True
|
In link-state routing algorithms, routers build a complete network topology by exchanging the delay or cost from each node to its neighboring nodes. Once the complete topology is obtained, routers use the Dijkstra shortest path algorithm to calculate the shortest paths to all nodes.
|
1,521
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Reasoning
|
English
|
If a router receives an IPv6 packet that is too large to be forwarded onto a link, the router will forward the packet to a link that can support it.
|
False
|
IPv6 does not allow fragmentation. Therefore, if a router discovers that an incoming datagram is too large to be forwarded onto a link, it will discard the datagram and send an ICMP message to the sender indicating that the packet is too large.
|
1,522
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Reasoning
|
English
|
Typical routers can support multiple network layer protocols and provide packet forwarding between different protocols.
|
True
|
Typical routers can indeed support multiple network layer protocols and provide packet forwarding between different protocols. The main function of a router is to forward data packets from one network to another based on the destination address. This process usually involves supporting and handling multiple network layer protocols, such as IPv4 and IPv6. Additionally, routers can use different routing protocols (such as RIP, OSPF, BGP) for route selection and can perform conversion and packet forwarding between different network layer protocols to ensure that data packets are correctly transmitted across different types of networks.
|
1,523
|
Test
|
Computer Network
|
Network Layer
|
Assertion
|
Reasoning
|
English
|
The algorithm that determines the values in a router's forwarding table is the routing algorithm.
|
True
|
Since the forwarding table is generated based on the routing table, and the routing table is derived from the routing algorithm, the routing algorithm determines the values in the forwarding table.
|
1,524
|
Test
|
Computer Network
|
Transport Layer
|
Assertion
|
Knowledge
|
English
|
The two common protocols at the transport layer are TCP and UDP.
|
True
| null |
1,525
|
Test
|
Computer Network
|
Transport Layer
|
Assertion
|
Knowledge
|
English
|
The establishment of a transport layer connection is achieved through the synchronization phase.
|
True
| null |
1,526
|
Test
|
Computer Network
|
Transport Layer
|
Assertion
|
Knowledge
|
English
|
Multiplexing is achieved through MAC addresses.
|
False
| null |
1,527
|
Test
|
Computer Network
|
Transport Layer
|
Assertion
|
Knowledge
|
English
|
The timeout interval for retransmission is typically determined by the round-trip time (RTT).
|
True
| null |
1,528
|
Test
|
Computer Network
|
Transport Layer
|
Assertion
|
Knowledge
|
English
|
The transport layer is responsible for handling the signal transmission of the physical layer.
|
False
| null |
1,529
|
Test
|
Computer Network
|
Transport Layer
|
Assertion
|
Knowledge
|
English
|
The transport layer provides logical communication between routers.
|
False
| null |
1,530
|
Test
|
Computer Network
|
Transport Layer
|
Assertion
|
Knowledge
|
English
|
The UDP datagram header does not include the length of the UDP datagram header.
|
True
| null |
1,531
|
Test
|
Computer Network
|
Transport Layer
|
Assertion
|
Knowledge
|
English
|
The TCP protocol of the server specifies that the port number for the HTTP process is 80.
|
True
| null |
1,532
|
Test
|
Computer Network
|
Transport Layer
|
Assertion
|
Knowledge
|
English
|
To ensure the reliability of data transmission, TCP employs an acknowledgment mechanism for message segments.
|
True
| null |
1,533
|
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The error detection mechanism used by TCP is a digest algorithm.
|
False
| null |
1,534
|
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
In the four-way handshake process, the second handshake is initiated by the client.
|
True
| null |
1,535
|
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The main methods of TCP congestion control include the window mechanism and flow control.
|
False
| null |
1,536
|
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The establishment phase of a TCP connection is completed through a two-way handshake.
|
False
| null |
1,537
|
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
One of the characteristics of the UDP protocol is that it provides reliable transmission.
|
False
| null |
1,538
|
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The methods of congestion control include the slow start algorithm and the congestion avoidance algorithm.
|
True
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.