1.Data communications equipment (DCE) accepts the serial data stream from the DTE. | |
| 2.PPM refers to the number of pages that a printer prints per minute. | |
| 3.We can use multimedia in Education, Edutainment and so on. | |
| 4.The basic function of transport layer is to accept data from the session layer, and pass them to the network layer. | |
| 5.The hosts are connected by the cables. | |
| 6.All virus scanners can kill most known viruses. | |
| 7.The physical layer is concerned with transmitting raw bytes over a communication channel. | |
| 8.When you send an e-mail you should provide the sender's e-mail address. | |
| 9.Video cameras are peripheral. | |
| 10.In the e-mail a user needs a message transfer agent. | | 1.The ( ) is a collection of computers connected together by phone lines allows for the global sharing of information. | |
| 2.The RGB value is composed of ( ) components. | |
| 3.( ) is used to communicate with another computer over telephone lines. | |
| 4.Computer ( ) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing. | |
| 5.Multimedia includes ( ). | |
| 6.A ( ) copies a photograph,drawing or page of text into the computer. | |
| 7.Networks, in terms of transmission technology, can be divided into ( ). | |
| 8.One use of networks is to let several computers share ( ) such as file system,printers,and tape drives. | |
| 9.A firewall is a ( ) system designed to protect an organization’s network against threats. | |
| 10.Communication through the Internet, the ( ) performs the reverse function. | |
| 11.Network software consists of ( ) , or rules by which processes can communicate. | |
| 12.The display screen is the most common ( ) device used to show you what the computer is doing. | |
| 13.The firewall device is a ( ) system for connecting a computer network to other computer network. | |
| 14.Virus is a ( ). | |
| 15.( ) is not a linear structure. | |
| 16.One of the basic rules of computer security is to change your ( ) regularly. | |
| 17.Modem is ( ). | |
| 18.Which of the following expressions is true about the Internet? | |
| 19.The OSI model has ( ) layers. | |
| 20.The Internet is an open system, and most information is available to everyone. It is very important to add ( ) to existing system for protecting the secret information. | | 1.The subnet consists of two basic components:( ). | |
| 2.Types of media include ( ). | |
| 3.Which of the following structure is the topology? | |
| 4.The main areas of network use are ( ). | |
| 5.The general types of designs for the communication subnet are ( ). | |
| 6.Data transfer rules include ( ). | |
| 7.Many viruses do harmful things such as ( ). | |
| 8.With an Internet connection you can get some of the basic services available are:( ). | |
| 9.Applications in the Internet can be found everywhere: ( ). | |
| 10.We can ( ) through the Internet. | | |
来源:网络整理 免责声明:本文仅限学习分享,如产生版权问题,请联系我们及时删除。
相关文章:
以"成败"为内容的古诗04-30
2.3克某物质在空气中完全燃烧,生成4.4克二氧化碳和2.704-30
有三个完全相同的金属小球A、B、C,其中,A球带电荷量为04-30
在比例尺是1比30000000在地图上,量得福州到成都的距离04-30
2003年上旬,英美等国对伊拉克进行了狂轰滥炸,图2所示的04-30
在链球运动中,运动员使链球高速旋转,在水平面内做圆周运04-30
连续进位加法是连续2位或2位以上需要进位的加法,如18804-30
1234=7里面填什么运算符号?该怎样做?不用勾股定理1前04-30
旅行社推出一条从三明发经福州到上海看世博的旅游路线04-30
钓鱼岛及其附属岛屿自古就是中国领土,钓鱼岛距福建省福04-30