单选题通常并不是所有的协议都能够通过路由器,如 (50) 在路由器中就不能通过。
单选题设有下列4条路由:192.168.129.0/24、192.168.130.0/24、192.168.132.0/24和192.168.133/24,如果进行路由汇聚,能覆盖这4条路由的地址是 (28) 。
单选题目前微型计算机中采用的逻辑元件是 (9) 。
单选题在计算机网络中,当信息从信源向信宿流动时,可能会遇到安全攻击,在下列选,项中,属于信息可能受到安全攻击的是 (36) 。 Ⅰ.中断 Ⅱ.修改 Ⅲ.截取 Ⅳ.捏造 Ⅴ.陷门
单选题
单选题 Melissa and Love Letter made use of the trust that exists
between friends or colleagues. Imagine receiving an{{U}} {{U}} 38
{{/U}} {{/U}}from a friend who asks you to open it. This is what happens with
Melissa and several other similar email{{U}} {{U}} 39 {{/U}}
{{/U}}. Upon running, such worms usually proceed to send themselves out to email
addresses from the victim' s address book ,previous emails, web pages{{U}}
{{U}} 40 {{/U}} {{/U}}. As administrators seek to
block dangerous email attachments through the recognition of well-
known{{U}} {{U}} 41 {{/U}} {{/U}}, virus writers use other
extensions to circumvent such protection. Executable (.exe) files are renamed to
. bat and . cnd plus a whole list of other extensions and will still run and
successfully infect target users. Frequently, hackers try to penetrate networks
by sending an attachment that looks like a flash movie, which, while displaying
some cute animation, simultaneously runs commands in the background to steal
your passwords and give the{{U}} {{U}} 42 {{/U}} {{/U}}access to
your network.
单选题数据处理流水线如图4-1所示。若每隔△t流入一个数据,连续流入4个数据,则该流水线的实际吞吐率为(5)。
单选题In C language, ______ are used to create variables and are grouped at the top of a program block. A.declarations B.dimensions C.comments D.descriptions
单选题下列应用层协议中,没有使用传输层TCP的是 (36) 。
单选题 (4) 不是Word文档视图中的版式。
单选题TCP/IP协议集由Internet工作委员会发布并已成为 (26) 标准。与 (27) 的情况不同,从来不存在正式的TCP/IP层次结构模型,但根据已开发的协议标准,可以根据通信任务将其分成4个比较独立的层次,即网络接9层、网络互联层、 (28) 、应用层。
单选题在一个办公室内,将12台计算机通过一台具有16个电端口的交换机进行相互连接。该网络的物理拓扑结构为 (35) 。
单选题与3.5英寸软盘相比,U盘的优点__________。
单选题使用数据库的主要目的之一是为了解决数据的__________问题。
单选题
单选题计算机系统中的信息资源只能被授予权限的用户修改,这是网络安全的 (50) 。
单选题“冲击波”病毒属于{{U}} (6) {{/U}}类型的病毒,它利用Windows操作系统的{{U}}(7){{/U}}漏洞进行快速传播。
单选题
单选题