1.PPM refers to the number of pages that a printer prints per minute. | |
| 2.We can use multimedia in Education, Edutainment and so on. | |
| 3.The hosts are connected by the cables. | |
| 4.The network architecture is a layer-based. | |
| 5.The set fo layers and protocols is called network architecture. | |
| 6.The physical layer is concerned with transmitting raw bytes over a communication channel. | |
| 7.The basic function of transport layer is to accept data from the session layer, and pass them to the network layer. | |
| 8.Only users need to view the internet as a network. | |
| 9.Just about any modern computer can handle text processing and produce basic sounds. | |
| 10.Data communications equipment (DCE) accepts the serial data stream from the DTE. | | 1.A ( ) computer is a personal computer whose hardware is capable of using any or all of the following media in a program : audio,text,graphics,video and animation. | |
| 2.The ( ) in e-mail messages has affected almost every computer around the world and has caused the damage of up to US$1 billion in North America. | |
| 3.A computer virus is a computer program that is created to make and spread ( ) of itself. | |
| 4.The OSI model has ( ) layers. | |
| 5.( ) is a device that enables the computer to handle sounds. | |
| 6.One use of networks is to let several computers share ( ) such as file system,printers,and tape drives. | |
| 7.A ( ) infected computer may lose its data. | |
| 8.The Internet is an open system, and most information is available to everyone. It is very important to add ( ) to existing system for protecting the secret information. | |
| 9.Which of the following expressions is true about the Internet? | |
| 10.One of the basic rules of computer security is to change your ( ) regularly. | |
| 11.The ( ) is a collection of computers connected together by phone lines allows for the global sharing of information. | |
| 12.Most ( ) measures involve data encryption and password. | |
| 13.The display screen is the most common ( ) device used to show you what the computer is doing. | |
| 14.The source code of a Web page consists of ( ). | |
| 15.( ):Messages that are sent electronically over a network. | |
| 16.Anti-Virus protects your computer from viruses by ( ) your computer's memory and disk devices. | |
| 17.( ) is used to communicate with another computer over telephone lines. | |
| 18.One of the greatest features of a home ( ) is the ability to share one Internet connection simultaneously over two or more computers. | |
| 19.Multimedia is a ( ). | |
| 20.The best way to describe the concept of playing a guitar is use of ( ). | | 1.The subnet consists of two basic components:( ). | |
| 2.Which of the following structure is the topology? | |
| 3.The Internet is ( ). | |
| 4.Applications in the Internet can be found everywhere: ( ). | |
| 5.Types of media include ( ). | |
| 6.Viruses can delay their attack for ( ). | |
| 7.Data transfer rules include ( ). | |
| 8.Many viruses do harmful things such as ( ). | |
| 9.We can ( ) through the Internet. | |
| 10.The general types of designs for the communication subnet are ( ). | | |
来源:网络整理 免责声明:本文仅限学习分享,如产生版权问题,请联系我们及时删除。
相关文章:
以"成败"为内容的古诗04-30
2.3克某物质在空气中完全燃烧,生成4.4克二氧化碳和2.704-30
2003年上旬,英美等国对伊拉克进行了狂轰滥炸,图2所示的04-30
在链球运动中,运动员使链球高速旋转,在水平面内做圆周运04-30
连续进位加法是连续2位或2位以上需要进位的加法,如18804-30
1234=7里面填什么运算符号?该怎样做?不用勾股定理1前04-30
旅行社推出一条从三明发经福州到上海看世博的旅游路线04-30
钓鱼岛及其附属岛屿自古就是中国领土,钓鱼岛距福建省福04-30
一道关于自由下落的物理题一颗自由下落的小石头,经过04-30
一本((成语故事))共有110页,编印这本书的页码共用了多04-30