单选

●有关内联网的错误叙述是 (62) ,下列有关网络安全的叙述中,不正确的是 (63) ,对于Intr

  • anet,可通过设置&n
  • bsp;(64) 来防止内部数据泄密、篡改和黑客入侵。    (62) A.内联网地理分布只能集中在很小范围之内
  • B.内联网使用的是互联网的协议    
  • C.通常使用防火墙来保障内联网的安全性    
  • D.内联网通常是由一组Web服务器和安装了浏览器的工作站所组成    (63) A.网络中的不安全因素主要来自网络外部,也有一部分来自网络内部
  • B.有害信息侵入不是一种不安全因素
  • C.信息泄露是网络的一种不安全因素
  • D.对Internet的威胁分故意危害和无意危害    (64) A.专用密码
  • B.专用账户
  • C.专用命令
  • D.防火墙
参考答案
您可能感兴趣的试题

●When

  • a string constant is written in C program,the compiler creates&n
  • bsp;(75) of
  • characters containing the characters of the string,an
  • d terminating it with"\0".    (75) A.a group
  • B.an array
  • C.a stack
  • D.a series

  • A disk scheduling mechanism in an operating system causes the disk arm to sweep
  • ba
  • ckan
  • d forth across the disk Surface servicing all requests in its path.This is a (73) .    (73) A.First Come First Serve
  • B.Shortest Seek Time First
  • C.Scan
  • D.None of the above

● (74) functions with two l

  • ayers of protocols.It can connect networks of different speeds and can
  • be adapted to an environment as it expands.    (74) A.The hub
  • B.The bridge    
  • C.The router    
  • D.The proxy

●Which of the following st

  • atements a
  • bout obje
  • ct oriente
  • d database is not correct? (72) .    (72) A.Each object has a unique object identify in the system
  • B.Encapsulation and inheritance are two important features of object oriented database
  • C.A subclass can inherit the attributes and methods of all its superclasses
  • D.A supereloss includes the attributes and methods at all subclasses

●In C progr

  • am,all varia
  • bles must be (70) before use,usually at the beginning of the fun
  • ction before any (71) statements.    (70) A.state
  • d
  • B.writed
  • C.illustrated
  • D.declared    (71) A.operate
  • B.active
  • C.executable
  • D.processing

●Let R

  • and S
  • be the relation respe
  • ction respectively:    Relation R:A B C Relation S:B C
  • D    1 2 3 2 3 4    6 7 8 2 3 5    9 7 8 7 8 1    The number of tuples that the result of the expression R∞S(Here if natural join of relations R and S) is  (69)
  • B.4
  • C.7
  • D.10

●In terms of M.J.Flynn'S t

  • axonomy,the systolic array falls into&n
  • bsp;(68) .    (68) A.SISD
  • B.MIMD    
  • C.MIS
  • D
  • D.SIMD

●The Progr

  • amming Counter(PC)is normally used to point out&n
  • bsp;(67) .    (67) A.Programmed exe
  • cution instruction
  • B.5The a
  • ddress of last execution instruction
  • C.The address of current execution instruction
  • D.The address of next execution instruction

●For rel

  • ation where primary key contains multiple attri
  • butes,no non-key attribute should be fun
  • ctionally
  • dependent on a part of primary key.This relation R is at least in (66) .    (66) A.3NF
  • B.2NF
  • C.INF
  • D.BCNF

●计算机网络按照其覆盖的地理区域大小可分为 (65) 。

(65)

  • A.广域网、校园网、接入网    &n
  • bsp;  B.广域网、城域网、局域网    
  • C.校园网、地区网、接入网    
  • D.电信网、校园网、城域网
¥

订单号:

遇到问题请联系在线客服

订单号:

遇到问题请联系在线客服