- ars,TCP/IP has also
- begun to be used by telephone
- companies to provi
- de faster,cheaper telephone (74) . (74) A.transmitting
- B.transmited
- C.transfers
- D.transmissions
- A.o
- bje
- ct-oriente
- d
- B.object-based
- C.face to object
- D.face to target
- ake&n
- bsp;(72) regularly in data pro
- cessing. (72) A.e
- dit
- B.insert
- C.format
- D.Back up
- ast few years,it has
- been realized that maintenan
- ce of programs is more expensive than
- development,so reading of programs by humans is as important as (73) them. (73) A.editing
- B.writed
- C.written
- D.writing
- as full rights and permissions to all resources on a network. (71) A.user &n
- bsp; B.guest
- C.a
- dministrator
- D.owner
- As administrators seek to block dangerous email attachments through the recognition of well-known (69) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a who
- B.packet
- C.datagram
- D.message (67) A.virtual
- B.virus
- C.worms
- D.bacteria (68) A.memory
- B.caches
- C.ports
- D.registers (69) A.names
- A.包过滤、入侵检测和数据加密 &n
- bsp; B.包过滤、入侵检测和应用代理
- C.IP过滤、线路过滤和入侵检测
- D.IP过滤、线路过滤和应用代理
- A.物理故障 &n
- bsp; B.配置故障
- C.程序故障
- D.系统故障
- A.维护网络设备,保证网络性能 &n
- bsp; B.监视网络运行过程中的主要性能指标,报告网络性能变化趋势,提供决策依据
- C.在脱机条件下分析故障,找出可能的问题
- D.限制非法用户使用网络资源
- A.信息过滤 &n
- bsp; B.地址转换
- C.域名解析
- D.信息缓存