第 6 頁:參考答案 |
試題60
通常在WLAN體系結(jié)構(gòu)中,系統(tǒng)誤碼率應(yīng)低于 (60) 。
(60) A.10-10 B.10-9 C.10-8 D.10-5
試題61
有一脈沖信號周期為20ms,信號有效值狀態(tài)個數(shù)為16。用八進制代碼表示上述信號,其數(shù)據(jù)傳輸速率是 (61) 。
(61) A.100b/s B.150b/s C.1 000b/s D.1 500b/s
試題62
在Windows 2003操作系統(tǒng)中,如需要經(jīng)常對多臺計算機進行“遠(yuǎn)程桌面”管理,可在“運行”窗口中輸入 (62) 命令。
(62)A.command B.msconfig C.RIS D.MMC
試題63
Windows 2003的活動目錄必須安裝在 (63) 分區(qū)中。
(63)A.FAT16 B.FAT32 C.NTFS D.交換
試題64
在Telnet中,引入NVT的主要目的是 (64) 。
64 A.提升用戶使用Telnet的速度 B.為Telnet增加文件下載功能
C.避免用戶多次輸入用戶名和密碼 D.屏蔽不同計算機系統(tǒng)對鍵盤輸入的差異
試題65
下面列出了系統(tǒng)維護工作流程中的幾項關(guān)鍵步驟,正確的工作順序是 (65) 。
、儆脩籼峤痪S護申請報告 、诮桓妒褂谩 、鄹挛臋n ④測試
、莺藢嵑驮u價維護申請報告 、拗贫ňS護計劃 、邔嵤┚S護
(65)A.①→⑤→⑥→⑦→④→③→② B.①→⑥→⑤→⑦→③→④→②
C.①→⑤→⑥→⑦→③→④→② D.①→⑥→⑤→⑦→④→③→②
試題66~試題70
One of the difficulties in building an SQL-like query lange for the Web is the absence of a database schema for this huge, heterogeneous repository of information. However, if we are interested in HTML documents only, we can construct a virtual (66) from the implicit structure of these files.Thus, at the highest level of (67) , every such document is identified by its Uniform Resource Locator(URL), has a title and a text Also, Web servers provide some additional information such as the type, length, and the last modification date of a document. So, for data mining purposes, we can consider the site of all HTML documents as arelation:
Document(url, (68) , text, type, length, modify)
Where all the (69) are character strings. In this framework, anindividual document is identified with a (70) in this relation. Of course, if some optional information is missing from the HTML document,the associate fields will de left blank, but this is not uncommon in any database.
(66) A.schema B.relation C.platform D.module
(67) A.presentation B.control C.abstraction D.protocol
(68) A.event B.title C.driver D.table
(69) A.characteristics B.1inks C.typ D.attributes
(70) A.field B.relation C.script D.tuple
試題71~試題75
While the Internet is inherently insecure,businesses still need to preserve the privacy of data as it travels over the network .To help do that,the Internet Engineering Task Force an international group of network designers,operators,vendors,and researchers concerned with the evolution of (71) has developed a suite of (72) called Internet Protocol Security(IPSec).
IPSec creates a standard platform to develop secure networks and electronic (73) between two machines.Secure tunneling via IPSec creates (74) connections in a network through which data packets can move.It creates these tunnels between remote users and within a local network .It also (75) each data packet in a new packet that contains the information neccessary to set up,maintain and tear down the tunnel when it's no longer needed.
(71)A.channels B.Web browser C.Internet data D.Internet architecture
(72)A.messages B.protocols C.directories D.certificates
(73)A.tunnels B.interfaces C.systems D.passwords
(74)A.conformance B.circuitlike C.searching D.secrecy
(75)A.supports B.drives C.encapsulates D.transmits
北京 | 天津 | 上海 | 江蘇 | 山東 |
安徽 | 浙江 | 江西 | 福建 | 深圳 |
廣東 | 河北 | 湖南 | 廣西 | 河南 |
海南 | 湖北 | 四川 | 重慶 | 云南 |
貴州 | 西藏 | 新疆 | 陜西 | 山西 |
寧夏 | 甘肅 | 青海 | 遼寧 | 吉林 |
黑龍江 | 內(nèi)蒙古 |