M软件公司的软件产品注册商标为M,为确保公司在市场竞争中占据优势,对员工进行了保密约束。此情形下该公司不享有__________。(2012年下半年试题)
在运行IP协议的网络层为其高层用户提供的服务中,当发生错误时,没有机制保证一定可以通知发送方和接收方,这种服务称为(54)。
一个Lan拓扑可以使用令牌传递或CSMA/CD控制媒体访问,其拓扑属于下列的(69),若仅使用像令牌传递这样的确定性媒体控制方法,其拓扑属于下列的(70)。
Although the bulk of industry resources and energies have focused on developing the fastest(71)or slickest(72)more and more mindshare is turning to the evolution of the computer interface. Advancements in the areas of input devices,(73)processing and vitual reality could lead to fundamental changes in the way human and computer interact. The technological battlefield of the future will be adding layers between the user and the raw machine to make the(74)as invisible as possible.(75)represents the next evolutionary step for the interface.
下列关于软件著作权中翻译权的叙述不正确的是:翻译权是指__________的权利。(2011年上半年试题)
计算机系统中的信息资源只能被授予权限的用户修改,这是网络安全的(25)。
Bluetooth is a universal radio interface in the(71)frequency hand that enables portable electronic devices to connect and communicate wirelessly via short-range, ad hoc networks. Each unit can simultaneously communicate with up to(72)other units per piconet. Moreover, each unit can simultaneously(73)to several piconets. Eliminates the need for wires, cables and connectors for and between cordless or mobile phones, modems, headsets, PDAs, Computers, printers, projectors, local area networks, and so on, and paves the way for new and completely different devices and applications. Technology Characteristics(74)symbol rate exploits maximum available(75)bandwidth。
符合V.90建议的Modem数据速率可达__________。
FTP协议是Internet常用的应用层协议,它通过(56)协议提供服务,它是基于Client/Server结构通信的,作为服务器一方的进程,通过监听(57)端口得知有服务请求。在一次会话中,存在(58)个TCP连接。另一个简单的文件传输协议是(59),它的特点是使用UDP协议,且(60)。
使用路由器对局域网进行分段的好处是__________。(2013年上半年试题)
In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.In low-speed network, it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down. In high-speed networks, this approach often works poorly, because in the(71)between sending the notification and notification arriving at the source, thousands of additional(72)may arrive. In ATM network, a major tool for preventing(73)is(74)control. When a host wants a new virtual(75), it must describe the traffic to be offered and the service expected.
802.11在MAC层采用了__________协议。(2012年上半年试题)
程序的(39)理论是虚拟存储管理系统的基础。根据这个理论,Denning又提出了工作集理论。工作集是进程运行时被频繁地访问的页面集合。在进程运行时,如果它的工作集页面都在(40)内,能够使该进程有效地运行,否则会出现频繁的页面调入/调出现象。
下列文件中属于逻辑结构的文件是(8)。
设信道带宽为4kHz,采用4相调制技术,则信道支持的最大数据速率是(15)。
(66)is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network.(67), an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction. Networks that use(68)to secure data traffic can automatically authenticate devices by using(69), which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require secure connections among many devices. Users deploying IPsec can(70)their network infrastructure without affecting the applications on individual computer. The protocol suite is available as a software-only upgrade to the network infrastructure. This alows security to be implemented without costly changes to each computer. Most important, IPsec allows interoperability among different network devices, PCs and other computing systems.
为了确定一个网络是否可以连通,主机应该发送ICMP__________报文。(2011年上半年试题)
以下关于帧中继网的叙述中,错误的是__________。(2010年上半年试题)
ping远程网络主机的IP地址得到反应,可以确认__________。
以下关于IEE802.3ae 10Gb/s以太网描述正确的是(59)。