1.Video cameras are peripheral. | |
| 2.The TCP/IP Internet protocol suite is formed from five standards. | |
| 3.Viruses can cause programs crashing but can't cause entire hard disk deleting. | |
| 4.The physical layer is concerned with transmitting raw bytes over a communication channel. | |
| 5.The set fo layers and protocols is called network architecture. | |
| 6.Multimedia is just two media: sound and pictures. | |
| 7.PPM refers to the number of pages that a printer prints per minute. | |
| 8.All virus scanners can kill most known viruses. | |
| 9.The network architecture is a layer-based. | |
| 10.When you send an e-mail you should provide the sender's e-mail address. | | 1.One of the basic rules of computer security is to change your ( ) regularly. | |
| 2.One of the greatest features of a home ( ) is the ability to share one Internet connection simultaneously over two or more computers. | |
| 3.Network software consists of ( ) , or rules by which processes can communicate. | |
| 4.( ) is a device that enables the computer to handle sounds. | |
| 5.( ) is used to communicate with another computer over telephone lines. | |
| 6.A ( ) computer is a personal computer whose hardware is capable of using any or all of the following media in a program : audio,text,graphics,video and animation. | |
| 7.Multimedia will become increasingly ( ) throughout every aspect of our lives. | |
| 8.( ):Messages that are sent electronically over a network. | |
| 9.Communication through the Internet, the ( ) performs the reverse function. | |
| 10.Anti-Virus protects your computer from viruses by ( ) your computer's memory and disk devices. | |
| 11.Bitmap images use a grid of small squares known as ( ) to represent images. | |
| 12.A firewall is a ( ) system designed to protect an organization’s network against threats. | |
| 13.The firewall device is a ( ) system for connecting a computer network to other computer network. | |
| 14.The Internet is the world's largest computer ( ). | |
| 15.Photoshop is the leading professional ( ) program, released by Adobe. | |
| 16.Most ( ) measures involve data encryption and password. | |
| 17.Computer ( ) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing. | |
| 18.Modem is ( ). | |
| 19.Virus is a ( ). | |
| 20.The OSI model has ( ) layers. | | 1.Types of media include ( ). | |
| 2.With an Internet connection you can get some of the basic services available are:( ). | |
| 3.Which of the following structure is the topology? | |
| 4.The Internet is ( ). | |
| 5.The general types of designs for the communication subnet are ( ). | |
| 6.Data transfer rules include ( ). | |
| 7.Viruses can delay their attack for ( ). | |
| 8.Many viruses do harmful things such as ( ). | |
| 9.We can ( ) through the Internet. | |
| 10.The subnet consists of two basic components:( ). | | |
来源:网络整理 免责声明:本文仅限学习分享,如产生版权问题,请联系我们及时删除。
相关文章:
文言文:日遣兵薄城下,焚诌草,绝汲道.贼窘欲降,邀忠与04-30
1.请问,电流表的工作原理是什么?2.请问,电压表的工作04-30
关于国庆和中秋英语的好句子。04-30
若某化合物3克在空气中完全燃烧,生成4.4克二氧化碳和304-30
帮帮忙,2017年畅响双优卷八年级物理下册人教版这本答案04-30
液化有那两种主要途径?原理是什么..04-30
写四个描写水的成语,并用一个造句04-30
填成语()水()花04-30
路易斯结构中要表示键之间夹角吗?那么哪些要表示的04-30
用200N竖直向上的拉力将地面上—个质量为10kg的物体提04-30