第 6 頁:參考答案 |
試題60
通常在WLAN體系結(jié)構(gòu)中,系統(tǒng)誤碼率應(yīng)低于 (60) 。
(60) A.10-10 B.10-9 C.10-8 D.10-5
試題61
有一脈沖信號(hào)周期為20ms,信號(hào)有效值狀態(tài)個(gè)數(shù)為16。用八進(jìn)制代碼表示上述信號(hào),其數(shù)據(jù)傳輸速率是 (61) 。
(61) A.100b/s B.150b/s C.1 000b/s D.1 500b/s
試題62
在Windows 2003操作系統(tǒng)中,如需要經(jīng)常對(duì)多臺(tái)計(jì)算機(jī)進(jìn)行“遠(yuǎn)程桌面”管理,可在“運(yùn)行”窗口中輸入 (62) 命令。
(62)A.command B.msconfig C.RIS D.MMC
試題63
Windows 2003的活動(dòng)目錄必須安裝在 (63) 分區(qū)中。
(63)A.FAT16 B.FAT32 C.NTFS D.交換
試題64
在Telnet中,引入NVT的主要目的是 (64) 。
64 A.提升用戶使用Telnet的速度 B.為Telnet增加文件下載功能
C.避免用戶多次輸入用戶名和密碼 D.屏蔽不同計(jì)算機(jī)系統(tǒng)對(duì)鍵盤輸入的差異
試題65
下面列出了系統(tǒng)維護(hù)工作流程中的幾項(xiàng)關(guān)鍵步驟,正確的工作順序是 (65) 。
①用戶提交維護(hù)申請(qǐng)報(bào)告 、诮桓妒褂谩 、鄹挛臋n 、軠y(cè)試
、莺藢(shí)和評(píng)價(jià)維護(hù)申請(qǐng)報(bào)告 、拗贫ňS護(hù)計(jì)劃 、邔(shí)施維護(hù)
(65)A.①→⑤→⑥→⑦→④→③→② B.①→⑥→⑤→⑦→③→④→②
C.①→⑤→⑥→⑦→③→④→② D.①→⑥→⑤→⑦→④→③→②
試題66~試題70
One of the difficulties in building an SQL-like query lange for the Web is the absence of a database schema for this huge, heterogeneous repository of information. However, if we are interested in HTML documents only, we can construct a virtual (66) from the implicit structure of these files.Thus, at the highest level of (67) , every such document is identified by its Uniform Resource Locator(URL), has a title and a text Also, Web servers provide some additional information such as the type, length, and the last modification date of a document. So, for data mining purposes, we can consider the site of all HTML documents as arelation:
Document(url, (68) , text, type, length, modify)
Where all the (69) are character strings. In this framework, anindividual document is identified with a (70) in this relation. Of course, if some optional information is missing from the HTML document,the associate fields will de left blank, but this is not uncommon in any database.
(66) A.schema B.relation C.platform D.module
(67) A.presentation B.control C.abstraction D.protocol
(68) A.event B.title C.driver D.table
(69) A.characteristics B.1inks C.typ D.attributes
(70) A.field B.relation C.script D.tuple
試題71~試題75
While the Internet is inherently insecure,businesses still need to preserve the privacy of data as it travels over the network .To help do that,the Internet Engineering Task Force an international group of network designers,operators,vendors,and researchers concerned with the evolution of (71) has developed a suite of (72) called Internet Protocol Security(IPSec).
IPSec creates a standard platform to develop secure networks and electronic (73) between two machines.Secure tunneling via IPSec creates (74) connections in a network through which data packets can move.It creates these tunnels between remote users and within a local network .It also (75) each data packet in a new packet that contains the information neccessary to set up,maintain and tear down the tunnel when it's no longer needed.
(71)A.channels B.Web browser C.Internet data D.Internet architecture
(72)A.messages B.protocols C.directories D.certificates
(73)A.tunnels B.interfaces C.systems D.passwords
(74)A.conformance B.circuitlike C.searching D.secrecy
(75)A.supports B.drives C.encapsulates D.transmits
北京 | 天津 | 上海 | 江蘇 | 山東 |
安徽 | 浙江 | 江西 | 福建 | 深圳 |
廣東 | 河北 | 湖南 | 廣西 | 河南 |
海南 | 湖北 | 四川 | 重慶 | 云南 |
貴州 | 西藏 | 新疆 | 陜西 | 山西 |
寧夏 | 甘肅 | 青海 | 遼寧 | 吉林 |
黑龍江 | 內(nèi)蒙古 |