1.In the e-mail a user needs a message transfer agent. | |
| 2.The set fo layers and protocols is called network architecture. | |
| 3.The basic function of transport layer is to accept data from the session layer, and pass them to the network layer. | |
| 4.The physical layer is concerned with transmitting raw bytes over a communication channel. | |
| 5.Just about any modern computer can handle text processing and produce basic sounds. | |
| 6.Video cameras are peripheral. | |
| 7.The TCP/IP Internet protocol suite is formed from five standards. | |
| 8.Viruses can cause programs crashing but can't cause entire hard disk deleting. | |
| 9.All virus scanners can kill most known viruses. | |
| 10.Factors that influence the quality of a monitor are screen size, resolution, and dot pitch. | | 1.The Internet is the world's largest computer ( ). | |
| 2.Communication through the Internet, the ( ) performs the reverse function. | |
| 3.Which of the following expressions is true about the Internet? | |
| 4.Virus is a ( ). | |
| 5.The source code of a Web page consists of ( ). | |
| 6.A firewall is a ( ) system designed to protect an organization’s network against threats. | |
| 7.The OSI model has ( ) layers. | |
| 8.Photoshop is the leading professional ( ) program, released by Adobe. | |
| 9.Networks, in terms of transmission technology, can be divided into ( ). | |
| 10.Network software consists of ( ) , or rules by which processes can communicate. | |
| 11.The firewall device is a ( ) system for connecting a computer network to other computer network. | |
| 12.Anti-Virus protects your computer from viruses by ( ) your computer's memory and disk devices. | |
| 13.( ) is not a linear structure. | |
| 14.A ( ) computer is a personal computer whose hardware is capable of using any or all of the following media in a program : audio,text,graphics,video and animation. | |
| 15.Modem is ( ). | |
| 16.( ):Messages that are sent electronically over a network. | |
| 17.Bitmap images use a grid of small squares known as ( ) to represent images. | |
| 18.( ) means the conducting of business communication and transaction over network and through computers. | |
| 19.( ) is a device that enables the computer to handle sounds. | |
| 20.The Internet is an open system, and most information is available to everyone. It is very important to add ( ) to existing system for protecting the secret information. | | 1.Data transfer rules include ( ). | |
| 2.Types of media include ( ). | |
| 3.The Internet is ( ). | |
| 4.The general types of designs for the communication subnet are ( ). | |
| 5.Viruses can delay their attack for ( ). | |
| 6.Which of the following structure is the topology? | |
| 7.We can ( ) through the Internet. | |
| 8.The subnet consists of two basic components:( ). | |
| 9.The main areas of network use are ( ). | |
| 10.Many viruses do harmful things such as ( ). | | |
来源:网络整理 免责声明:本文仅限学习分享,如产生版权问题,请联系我们及时删除。
相关文章:
如图所示,轰炸机沿水平方向匀速飞行,到达山坡底端正上方04-30
以"成败"为内容的古诗04-30
2.3克某物质在空气中完全燃烧,生成4.4克二氧化碳和2.704-30
有三个完全相同的金属小球A、B、C,其中,A球带电荷量为04-30
在比例尺是1比30000000在地图上,量得福州到成都的距离04-30
2003年上旬,英美等国对伊拉克进行了狂轰滥炸,图2所示的04-30
在链球运动中,运动员使链球高速旋转,在水平面内做圆周运04-30
连续进位加法是连续2位或2位以上需要进位的加法,如18804-30
1234=7里面填什么运算符号?该怎样做?不用勾股定理1前04-30
旅行社推出一条从三明发经福州到上海看世博的旅游路线04-30