全国计算机软考网管英语试题及答案

上传人:ni****g 文档编号:499223315 上传时间:2022-09-14 格式:DOC 页数:5 大小:21.01KB
返回 下载 相关 举报
全国计算机软考网管英语试题及答案_第1页
第1页 / 共5页
全国计算机软考网管英语试题及答案_第2页
第2页 / 共5页
全国计算机软考网管英语试题及答案_第3页
第3页 / 共5页
全国计算机软考网管英语试题及答案_第4页
第4页 / 共5页
全国计算机软考网管英语试题及答案_第5页
第5页 / 共5页
亲,该文档总共5页,全部预览完了,如果喜欢就下载吧!
资源描述

《全国计算机软考网管英语试题及答案》由会员分享,可在线阅读,更多相关《全国计算机软考网管英语试题及答案(5页珍藏版)》请在金锄头文库上搜索。

1、全国计算机软考网管英语试题及答案(1)Heterogeneous network environments consist of computer systems from(1)vendors that run(2)operating systems and communication protocolsAn organization that(3)its computer resources is usually(4)the task of integrating its heterogeneous systemsTypically,each deparlment or division h

2、as defined its own network needs(5)0S,LAN topology,communication protocols,applications,and other components(1)AsameBsimilarCdifferentDdifference(2)AsameBsimilarCdifferentDdifference(3)AconsolidatesBconsistsCconsiderateDconsoles(4)Afaced onBfaced withCfaced aboutDfaced up to(5)Ain generalBin any ter

3、mCin set termsDin terms of答案:(1)C (2)C (3)A (4)B (5)D解析:异构网络环境由不同制造商生产的计算机系统组成,这些计算机运行不同的操作系统和通信协议。任何一个想统计计算机资源的组织通常会面临整合异构系统的任务。典型地,每一个部门或分部已经规定了自己的网络需要,根据操作系统、局域网拓扑结构、通信协议、应用程序及其它因素。 There are two types of key technology:private key and public keyPrivate-key encryption methods are called(1)ciphers

4、,information is encrypted with(2)both the sender and receiver hold privatelyPublickey encryption methods are called(3)ciphers,(4)created for each user,encryption key and decryption key are(5)(1)AsynchronousBasynchronousCsymmetricDasymmetric(2)Aa keyBtwo keysCthree keysDfour keys(3)AsynchronousBasync

5、hronousCsymmetricDasymmetric(4)Atwo related keys areBa key isCtwo unrelated keys areDthree keys are(5)AsameBdifferentCdifferenceDsome答案:(1)C (2)A (3)D (4)A (5)B解析:有两种加密技术:私有密钥和公开密钥。私有密钥加密方法被称为对称密钥加密,在发送者和接受者之间的信息共同具有同一个密钥,公开密钥加密方法被称为非对称密钥加密,对于每一个使用者,都建立两个相关的加密与解密密钥,但它们不同。 (1) is a channels capacity

6、which directly reflects the data transfer rate of the channel(2)functions in a NetWare network which is used to define addressing schemes(3)is a network layer device that supports multiple LAN interfacesand segments LANs into smaller collision and broadcast domains.(4)is the popular LAN developed un

7、der the direction of the IEEE8023.(5)is a device which enables digital microcomputers to communicate across analog telephone lines.(1)AThe volumeBThe bandwidthCThe noiseDThe delay(2)ANetBEUIBIPCIPXD.NCP(3)AThe repeaterBThe hubCThe bridgeDThe muter(4)AToken RingBToken BusCEthernetDFDDI(5)AThe repeate

8、rBThe modemCThe hubD.The printer答案:(1)B (2)C (3)D (4)C (5)B解析:带宽是指信道的容量,它能够直接反映出信道数据传输速率。IPX作用在Netware网络中。目的是定义寻址方法。路由器是网络层设备。支持多局域网接口,并把局域网分为更小冲突域和广播域。以太网是在IEEE8023标准的基础上发展起来的流行网络。调制解调器是一种能使得数字信号通过模拟线路进行通信的设备。 Communicating via email is by far the most common Internet activityYou can (1)with anyone

9、 in the world who has an Internet address or email(2)with a system connection to the Internet. All you need is(3)the Internet and an e-mail programTwo of the most widely used e-mail programs are Microsofts (4)and Netscapes NavigatorA typical email message has three basic(5):header,message,and signat

10、ure(1)AconnectBexchangeCcommunicateD.game(2)AaccountBN0CuserDadministrator(3)Aattach withBgraspCPossessD.access to(4)AYahooBExplorerCFoxmailDOutlook Express(5)ApacketsBelementsCframesDcells答案:(1)C (2)A (3)D (4)D (5)B考试大全国最大教育类网站(wwwExamda。com)解析:到目前为止,使用Email通信是一种最常用的网络行为,你可以与世界上任何人进行通信,只要他拥有IP地址或者E

11、mail帐号,并且他还必须与Internet连接。而你需要的是有权使用因特网和Email。两个最广泛使用Email的程序是微软的和。一个E-mail消息有三个基本元素:信头、消息内容和签名。考试大论坛 (1)means“Any HTML document on an HTTP Server”(1)AWeb ServerBWeb pageCWeb BrowserDWeb siteThe term“(2)program”means a program written in highlevel language.(2)AcompilerBexecutableCsourceD.objectVery l

12、ong,complex expressions in program are difficult to write correctly and difficult to(3).(3)AdefendBdetectCdefaultD.debugIn C languagefunctions are important because they provide a way to(4)code so that a large complex program can be written by combining many smaller parts.(4)AmodifyBmodularizeCblock

13、D.boardThe standard(5)in C language contain many useful functions for input and output,string handing,mathematical computations,and system programming tasks.(5)AdatabaseBfilesC1ibrariesD.subroutineIn(6)programming,the user determines the sequence of instructions to be executed,not the programmer(6)A

14、top-downBstructureCdatadrivenDeventdriven(7)is a clickable string or graphic that points to another Web page or document(7)ALinkBAnchorCBrowserDHyperlinkOne solution to major security problems is(8),which are frequently installed to fix known security holes(8)ApatchesBcompensationsCcomplementsDadditionsA programmer must know about a functions(9)to call it correctly(9)Alocation

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 高等教育 > 习题/试题

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号