- 1
-
●
- A small network may only connect two computers inside a home to share a single printer and Internet&n
- bsp;(74) . (74) A.
- connect
- B.connecting
- C.connection
- D.connective
- a programming language. (75) A.CO
- BOL
- B.Java
- C.UML
- D.Basic
- 6
-
●The sm
- allest physical units on a hard disk are called&n
- bsp;(72) . (72) A.Tra
- cks
- B.Clusters
- C.Sectors
- D.Cylinders
- 7
-
●There
- are several applications called We
- b (73) that make it easyto a
- ccess the Worl
- d Wide We
- B.two of the most popular being Netscape Navigator and Microsoft's Internet Explorer. (73) A.views
- B.homepages
- C.browsers
- D.sites
- 9
-
●Users
- also need&n
- bsp;(71) systems to help them explore the web and dis
- cover interesting
- data sources and interfaces that support different query and search paradigms. (71) A.negative
- B.adaptive
- C.passive
- D.adaption
- a channel's capacity which directly reflects the data transfer rate of the channel.&n
- bsp; (67) fun
- ctions in a NetWare network which is use
- d to define addressing schemes. (68) is a network layer device that suports multiple LAN interfaces and segments LANs into smaller collision and broadcast domains. (69) 。is the popular LAN develped under the direction
- B.The bandwidth
- C.The noise
- D.The delay (67) A.NetBEUI
- B.IP
- C.IPX
- D.NCP (68) A.The repeater
- A.侵犯了乙的著作权,但未侵犯《计算机应用》的著作权 &n
- bsp; B.同时侵犯了乙和《计算机应用》的著作权
- C.侵犯了《计算机应用》的著作权,但未侵犯乙的著作仅
- D.既未侵犯乙的著作权,也未侵犯《计算机应用》的著作权
- A. G
- B
- B. QJ
- C. Q
- D. DB
- A.服务攻击是针对某种特定网络的攻击 &n
- bsp; B.非服务攻击是针对网络层协议而进行的
- C.主要的渗入威胁有特洛伊木马和陷井
- D.潜在的网络威胁主要包括窃听、通信量分析、人员疏忽和媒体清理等
- A.能处理任意大小的信息,其生成的信息摘要数据块长度总是具有固定的大小 &n
- bsp; B.对同一个源数据反复执行该函数得到的信息摘要相同
- C.具有可逆性,可以通过信息摘要重新生成原始数据信息
- D.生成的信息摘要是不可预见的,原始数据信息的一个微小变化都会对新产生的信息摘要产生很大影响