1.The TCP/IP Internet protocol suite is formed from five standards. | |
| 2.Factors that influence the quality of a monitor are screen size, resolution, and dot pitch. | |
| 3.The basic function of transport layer is to accept data from the session layer, and pass them to the network layer. | |
| 4.Only users need to view the internet as a network. | |
| 5.The hosts are connected by the cables. | |
| 6.All virus scanners can kill most known viruses. | |
| 7.Video cameras are peripheral. | |
| 8.PPM refers to the number of pages that a printer prints per minute. | |
| 9.The set fo layers and protocols is called network architecture. | |
| 10.In the e-mail a user needs a message transfer agent. | | 1.You might work for an organization whose computer system is spread ( ) a building. | |
| 2.Anti-Virus protects your computer from viruses by ( ) your computer's memory and disk devices. | |
| 3.A ( ) computer is a personal computer whose hardware is capable of using any or all of the following media in a program : audio,text,graphics,video and animation. | |
| 4.Which of the following expressions is true about the Internet? | |
| 5.The ( ) in e-mail messages has affected almost every computer around the world and has caused the damage of up to US$1 billion in North America. | |
| 6.A ( ) is used to communicate with another computer over telephone lines. | |
| 7.( ):Messages that are sent electronically over a network. | |
| 8.One use of networks is to let several computers share ( ) such as file system,printers,and tape drives. | |
| 9.( ) is not a linear structure. | |
| 10.The RGB value is composed of ( ) components. | |
| 11.Photoshop is the leading professional ( ) program, released by Adobe. | |
| 12.Modem is ( ). | |
| 13.The firewall device is a ( ) system for connecting a computer network to other computer network. | |
| 14.Multimedia will become increasingly ( ) throughout every aspect of our lives. | |
| 15.With ( ) you can communicate in real time with people all around the world. | |
| 16.Most ( ) measures involve data encryption and password. | |
| 17.Computer ( ) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing. | |
| 18.One of the basic rules of computer security is to change your ( ) regularly. | |
| 19.The Internet is an open system, and most information is available to everyone. It is very important to add ( ) to existing system for protecting the secret information. | |
| 20.Virus is a ( ). | | 1.Many viruses do harmful things such as ( ). | |
| 2.The general types of designs for the communication subnet are ( ). | |
| 3.The subnet consists of two basic components:( ). | |
| 4.Types of media include ( ). | |
| 5.Which of the following structure is the topology? | |
| 6.The main areas of network use are ( ). | |
| 7.Data transfer rules include ( ). | |
| 8.We can ( ) through the Internet. | |
| 9.Applications in the Internet can be found everywhere: ( ). | |
| 10.The Internet is ( ). | | |
来源:网络整理 免责声明:本文仅限学习分享,如产生版权问题,请联系我们及时删除。
相关文章:
以"成败"为内容的古诗04-30
2.3克某物质在空气中完全燃烧,生成4.4克二氧化碳和2.704-30
有三个完全相同的金属小球A、B、C,其中,A球带电荷量为04-30
2003年上旬,英美等国对伊拉克进行了狂轰滥炸,图2所示的04-30
在链球运动中,运动员使链球高速旋转,在水平面内做圆周运04-30
连续进位加法是连续2位或2位以上需要进位的加法,如18804-30
1234=7里面填什么运算符号?该怎样做?不用勾股定理1前04-30
旅行社推出一条从三明发经福州到上海看世博的旅游路线04-30
钓鱼岛及其附属岛屿自古就是中国领土,钓鱼岛距福建省福04-30
一道关于自由下落的物理题一颗自由下落的小石头,经过04-30