- 1
-
(102)
- A.names
- B.eookies
- C.software
- D.extensions
- 5
-
(103)
- A.cracker
- B.user
- C.customer
- D.client
- 5
-
(101)
- A.memory
- B.caehes
- C.ports
- D.registers
- 5
-
(100)
- A.virtual
- B.virus
- C.worms
- D.bacteria
- As administrators seek to block dangerous email attachments through the recognition of well- known (69), virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to . bat and . cnd plus a whole list of oth
- A.attachment
- B.paeket
- C.datagram
- D.message
- 6
-
(97)
- A.2位
- B.3位
- C.4位
- D.8位
- 5
-
(98)
- A.分组装拆
- B.网络互联
- C.差错控制
- D.编、译码
- 5
-
(96)
- A.X.28
- B.X.75
- C.X.25
- D.X.29
- 5
-
(95)
- A.永久虚电路方式
- B.交换虚电路方式
- C.数据报方式
- D.电路交换方式