1.Just about any modern computer can handle text processing and produce basic sounds. | |
| 2.Only users need to view the internet as a network. | |
| 3.The basic function of transport layer is to accept data from the session layer, and pass them to the network layer. | |
| 4.In the e-mail a user needs a message transfer agent. | |
| 5.The set fo layers and protocols is called network architecture. | |
| 6.We can use multimedia in Education, Edutainment and so on. | |
| 7.Viruses can cause programs crashing but can't cause entire hard disk deleting. | |
| 8.Video cameras are peripheral. | |
| 9.The TCP/IP Internet protocol suite is formed from five standards. | |
| 10.The physical layer is concerned with transmitting raw bytes over a communication channel. | | 1.The Internet is the world's largest computer ( ). | |
| 2.The display screen is the most common ( ) device used to show you what the computer is doing. | |
| 3.A firewall is a ( ) system designed to protect an organization’s network against threats. | |
| 4.The firewall device is a ( ) system for connecting a computer network to other computer network. | |
| 5.You might work for an organization whose computer system is spread ( ) a building. | |
| 6.Computer ( ) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing. | |
| 7.The RGB value is composed of ( ) components. | |
| 8.A computer virus is a computer program that is created to make and spread ( ) of itself. | |
| 9.( ) is a device that enables the computer to handle sounds. | |
| 10.One of the greatest features of a home ( ) is the ability to share one Internet connection simultaneously over two or more computers. | |
| 11.Anti-Virus protects your computer from viruses by ( ) your computer's memory and disk devices. | |
| 12.With ( ) you can communicate in real time with people all around the world. | |
| 13.The usual address for a Web site is the ( ) page address, although you can enter the address of any page and have that page sent to you. | |
| 14.Which of the following expressions is true about the Internet? | |
| 15.A ( ) system placed between the company network and the outside world may limit outside access to the internal network. | |
| 16.Virus is a ( ). | |
| 17.Multimedia will become increasingly ( ) throughout every aspect of our lives. | |
| 18.Multimedia is a ( ). | |
| 19.The purpose of the ( ) is to provide fully integrated analog services to users. | |
| 20.One of the basic rules of computer security is to change your ( ) regularly. | | 1.The main areas of network use are ( ). | |
| 2.Which of the following structure is the topology? | |
| 3.Applications in the Internet can be found everywhere: ( ). | |
| 4.With an Internet connection you can get some of the basic services available are:( ). | |
| 5.Many viruses do harmful things such as ( ). | |
| 6.Data transfer rules include ( ). | |
| 7.Multimedia uses the computer to integrate and control diverse electronic media such as ( ). | |
| 8.The Internet is ( ). | |
| 9.Viruses can delay their attack for ( ). | |
| 10.The subnet consists of two basic components:( ). | | |
来源:网络整理 免责声明:本文仅限学习分享,如产生版权问题,请联系我们及时删除。
相关文章:
某化合物4.6克,在纯氧中燃烧后生成二氧化碳8.8克,水5.04-30
如图所示,轰炸机沿水平方向匀速飞行,到达山坡底端正上方04-30
4.6克某物质在氧气中完全燃烧生成8.8克二氧化碳和5.404-30
以"成败"为内容的古诗04-30
2.3克某物质在空气中完全燃烧,生成4.4克二氧化碳和2.704-30
有三个完全相同的金属小球A、B、C,其中,A球带电荷量为04-30
在比例尺是1比30000000在地图上,量得福州到成都的距离04-30
2003年上旬,英美等国对伊拉克进行了狂轰滥炸,图2所示的04-30
在链球运动中,运动员使链球高速旋转,在水平面内做圆周运04-30
连续进位加法是连续2位或2位以上需要进位的加法,如18804-30