资源描述
Heterogeneous network environments consist of computer systems from(1)vendors that run(2)operating systems and communication protocols.An organization that(3)its computer resources is usually(4)the task of integrating its heterogeneous systems.Typically,each deparlment or division has defined its own network needs(5)0S,LAN topology,communication protocols,applications,and other components.
(1)A.same
B.similar
C.different
D.difference
(2)A.same
B.similar
C.different
D.difference
(3)A.consolidates
B.consists
C.considerate
D.consoles
(4)A.faced on
B.faced with
C.faced about
D.faced up to
(5)A.in general
B.in any term
C.in set terms
D.in terms of
答案:(1)C (2)C (3)A (4)B (5)D
解析:异构网络环境由不同制造商生产的计算机系统组成,这些计算机运行不同的操作系统和通信协议。任何一个想统计计算机资源的组织通常会面临整合异构系统的任务。典型地,每一个部门或分部已经规定了自己的网络需要,根据操作系统、局域网拓扑结构、通信协议、应用程序及其它因素。
There are two types of key technology:private key and public key.Private-key encryption methods are called(1)ciphers,information is encrypted with(2)both the sender and receiver hold privately.Public—key encryption methods are called(3)ciphers,(4)created for each user,encryption key and decryption key are(5).
(1)A.synchronous
B.asynchronous
C.symmetric
D.asymmetric
(2)A.a key
B.two keys
C.three keys
D.four keys
(3)A.synchronous
B.asynchronous
C.symmetric
D.asymmetric
(4)A.two related keys are
B.a key is
C.two unrelated keys are
D.three keys are
(5)A.same
B.different
C.difference
D.some
答案:(1)C (2)A (3)D (4)A (5)B
解析:有两种加密技术:私有密钥和公开密钥。私有密钥加密方法被称为对称密钥加密,在发送者和接受者之间的信息共同具有同一个密钥,公开密钥加密方法被称为非对称密钥加密,对于每一个使用者,都建立两个相关的加密与解密密钥,但它们不同。
(1) is a channel’s capacity which directly reflects the data transfer rate of the channel.
(2)functions in a NetWare network which is used to define addressing schemes.
(3)is a network layer device that supports multiple LAN interfacesand segments LANs into smaller collision and broadcast domains.
(4)is the popular LAN developed under the direction of the IEEE802.3.
(5)is a device which enables digital microcomputers to communicate across analog telephone lines.
(1)A.The volume
B.The bandwidth
C.The noise
D.The delay
(2)A.NetBEUI
B.IP
C.IPX
D.NCP
(3)A.The repeater
B.The hub
C.The bridge
D.The muter
(4)A.Token Ring
B.Token Bus
C.Ethernet
D.FDDI
(5)A.The repeater
B.The modem
C.The hub
D.The printer
答案:(1)B (2)C (3)D (4)C (5)B
解析:带宽是指信道的容量,它能够直接反映出信道数据传输速率。
IPX作用在Netware网络中。目的是定义寻址方法。
路由器是网络层设备。支持多局域网接口,并把局域网分为更小冲突域和广播域。
以太网是在IEEE802.3标准的基础上发展起来的流行网络。
调制解调器是一种能使得数字信号通过模拟线路进行通信的设备。
Communicating via e—mail is by far the most common Internet activity.You can (1)with anyone in the world who has an Internet address or e—mail(2)with a system connection to the Internet. All you need is(3)the Internet and an e-mail program.Two of the most widely used e-mail programs are Microsoft’s (4)and Netscape’s Navigator.A typical e—mail message has three basic(5):header,message,and signature.
(1)A.connect
B.exchange
C.communicate
D.game
(2)A.account
B.N0.
C.user
D.administrator
(3)A.attach with
B.grasp
C.Possess
D.access to
(4)A.Yahoo
B.Explorer
C.Foxmail
D.Outlook Express
(5)A.packets
B.elements
C.frames
D.cells
答案:(1)C (2)A (3)D (4)D (5)B考试大-全国最大教育类网站(www.Examda。com)
解析:到目前为止,使用E—mail通信是一种最常用的网络行为,你可以与世界上任何人进行通信,只要他拥有IP地址或者E—mail帐号,并且他还必须与Internet连接。而你需要的是有权使用因特网和E—mail。两个最广泛使用E—mail的程序是微软的和。一个E-mail消息有三个基本元素:信头、消息内容和签名。考试大论坛
(1)means“Any HTML document on an HTTP Server”.
(1)A.Web Server
B.Web page
C.Web Browser
D.Web site
The term“(2)program”means a program written in high—level language.
(2)A.compiler
B.executable
C.source
D.object
Very long,complex expressions in program are difficult to write correctly and difficult to(3).
(3)A.defend
B.detect
C.default
D.debug
In C language.functions are important because they provide a way to(4)code so that a large complex program can be written by combining many smaller parts.
(4)A.modify
B.modularize
C.block
D.board
The standard(5)in C language contain many useful functions for input and output,string handing,mathematical computations,and system programming tasks.
(5)A.database
B.files
C.1ibraries
D.subroutine
In(6)programming,the user determines the sequence of instructions to be executed,not the programmer.
(6)A.top-down
B.structure
C.data—driven
D.event—driven
(7)is a clickable string or graphic that points to another Web page or document.
(7)A.Link
B.Anchor
C.Browser
D.Hyperlink
One solution to major security problems is(8),which are frequently installed to fix known security holes.
(8)A.patches
B.compensations
C.complements
D.additions
A programmer must know about a function’s(9)to call it correctly
(9)A.location
B.algorithm
C.Interface
D.statements
On a(30)memory system,the logical memory space available to the program is totally independent of the physical memory space.
(30)A.cache
B.virtual
C.RAM
D.ROM
答案:(1)B
解析:Web页面表示HTTP服务器上的HTML文档。
答案:(2)C
解析:源程序是用高级语言写的程序。
答案:(3)D
解析:在程序中,一个长且复杂的表达式很难被正确书写和调试。
答案:(4)B
解析:在C语言中,函数是非常重要的。因为函数具有把代码模块化的功能,因此,一个大且复杂的程序能够写成许多个小程序的组合。
答案:(5)C
解析:在C语言中。标准库函数包括很多用于输入、输出、字符串处理、数学计算、系统调用的函数。
答案:(6)D
解析:在事件驱动的程序中,是用户而不是程序员来决定被执行的指令序列。
答案:(7)D
解析:超级链接是一种可点击的宇符串或图片,它可以连接到另一个Web页面或文档。
答案:(8)A
解析:打补丁是解决主要安全问题的一种方法,它通常被用来解决已知的安全漏洞。答案:(9)C
解析:程序员需要知道函数的接口才能正确调用它。
答案:(10)B
解析:虚拟存储系统中,程序的逻辑存储空间与物理存储空间完全独立。
●Communication protocols are(1)connection—oriented or connectionless,(2)whether the sender ofa message needs to contact and maintain a dialog with the recipient or(3)senda message without any prior connect and with the hope that the recipientreceives everything(4).These methods(5)the two waysthat communication is implemented on networks.
(1)A.not
B.neither
C.either
D.all
(2)A.fulled
B.flooded
C.dapending on
D.defined by
(3)A.immediately
B.simply
C.accordingly
D.properly
(4)A.inorder
B.in array
C.in series
D.in queueing
(5)A.make known
B.disclose
C.reveal
D.discover
答案:(1)C(2)C(3)B (4)A(5)C
解析:通信协议或者是面向连接的或者是面向无连接的。这要看消息的发送者是否需要事先于接收者建立起对话,或者仅仅简单是接收者希望按一定的顺序接收。这两种方式正说明了网路中实现通信的两种手段。
●The major problem with E—mail is that it is(1)easy to use that people can become (2)with messages.(3)they can possibly answer in a day.In addition,mail boxes require some management to(4)messages or archive those that might be requried later.Senders don’t always know about your E-mail backlog and often send(5)messages.
(1)A.too
B.so
C.very来源:
D.much
(2)A.full
B.lost
C.inundated
D.filled
(3)A.more than
B.than
C.that
D.which
(4)A.manage
B.save
C.backup
D.dispose of
(5)A.too many
B.redundant
C.long
D.trivial
答案:(1)B (2)C (3)A (4)D(5)B考试大论坛
解析:使用Email的主要问题是。它使用起来是如此的简单以致于人们会沉浸于短信息中。比他们能够在一天中可能的回答要多。另外,邮箱要求一些管理来删除或者保存一些以后才需要的东西。发送者通常是不知道你的邮箱中储存的内容并经常发送一些多余的信息。
●CDDI的英文全称是(1)。
(1)A.copper distributed data interface
B.COM distributed datainteraction
C.CORBA distributed data interface
D.Copper distributed data interaction
答案:(1)A
解析:铜线分布式数据接口。
● A local area network(LAN)is the communication of a number of computers by(2)connecting to each one in a single location,usually a single floor of a building or all the computers in a small company.
(2)A.1ine
B.cable
C.copper
D.copper cash
答案:(2)B
解析:一个局域网通常是由一些分布在某个建筑物的一层或者一个小公司中的计算机通过电缆连接起来的一个通信实体。
●The standard(3)in C language contain many useful functions for input and output,string handling,mathematical computations,and system programming tasks.
(3)A.database
B.files
C.1ibraries
D.subroutine
答案:(3)C
解析:C语言标准库中包含很多有用的函数,由输入、输出函数。字符串函数,数学计算函数和系统调用函数。
●The OSI(4)model,sometimes also called ISO or 7 layers reference model for communication.has been developed by the International Standards Organization in early l980’s.
(4)A.referent
B.reference
C.Referance
D.referring
答案:(4)B
解析:用于通信的0SI叁考模型,也被成为IS0或者七层参考模型早在1980年代就由估计标准组织提出来了。
●If your diskette has been(5),the computer can not store any new information on it.
(5)A.formatted
B.write protected
C.tested
D.Certified
答案:(5)B
解析:如果你的磁盘被设置了写保护,那么你的计算机将不能存储新的内容。
● A word processor enables you to create a(1),store it electronically on a disk,display it on a screen,modify it by entering commands and characters from the keyboard,and print it on a printer.
(1)A.file
B.document
C.text
D.paper
答案:(1)B
解析:一个文字处理器可以让你创建一个文档,该文档电子的存储再一个磁盘上。可以显示再屏幕上。通过键盘输入命名和字符你可以修改它,也可以用打印机将它打印出来。来源:
● A high level language is an artificial language with which we can write various(2).
(2)A.files
B.instructions
C.text
D.papers
答案:(2)B
解析:高级语言是由人开发出来。我们可以用它来写各种指令。来源:考试大
● A user interface can be defined as the combination of hardware and software that helps people and computers(3)with each other.
(3)A.intercourse
B.intercommunion
C.communicate
D.intercommunicate
答案:(3)C
解析:用户接口指硬件和软件的结合,通过用户接口可以帮助人机交互。
●In document windows,selected text is(4).
(4)A.copied
B.inserted
C.deleted
D.highlighted
答案:(4)D
解析:在文件窗口,选中文字被高亮显示。考试大论坛
●SQL Server is a RDBMS(Relational Database Management System)made by Microsoft.This means that the data is stored in two dimensional(5).
(5)A.documents
B.databases
C.files
D.tables
答案:(5)D
解析:SQL服务器是一个由微软公司做的关系型数据库,这意味着数据被存储在两个表格中。
●A multimedia system allows end users to share,transfer and process avariety of forms of information in a(1)manller.
(1)A.fixed
B.fix
C.unifying
D.unified
答案:(1)D
解析:一个多媒体系统可以让用户在一个统一的方式下共享、传输、处理各种各样的信息。
●Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine receiving an(2)from a friend who asks you to open it.This is what happens with Melissa and several other similar email(3).Upon running,such worms usually proceed to send themselves out to email addresses from the victim’s address book,previous emails,web pages(4)。
As administrators seek to block dangerous email attachments through the recognition of well-known(5),virus writers use other extensions to circumvent such protection.Executable(.exe)files are renamed to.bat and.cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently,hackers try to penetrate networks by sending an attachment that looks like a flash movie,which,while displaying some cute animation,simultaneously runs commands in the background to steal your passwords and give the(6)access to your network.
(2)A.attachment
B.packet
C.datagram
D.message
(3)A.virtual
B.virus
C.worms
D.bacteria
(4)A.memory
B.caches
C.ports
D.registers
(5)A.names
B.cookies
C.software
D.extensions
(6)A.cracker
B.user
C.ustomer
D.client
答案:(2)A (3)B (4)D (5)C (6)A
解析:梅莉莎和爱虫病毒利用了朋友和同事们之间的信任。假设你从一个朋友那里收到一个附件,且这个朋友要求你打开这个附件,这就是梅莉莎和其它几个病毒耍的小花招,通过运行。这些蠕虫通常利用一些来自被侵入的电脑主人的通讯簿、早先的电子邮件、网页注册者的地址把自己发送出去。
随着管理员开始通过使用著名的软件鉴别附件来阻止危险的电子邮件,病毒编写者通过其它一些扩展名来绕过这种保护。可执行文件被冲命名为.bat和.cmd加上一大堆其它扩展名可以同样被执行并且成功感染目标用户。黑客们经常试图发送一个看起来很想flash电影的附件,flash电影看起来有点活波可爱,同时在后台运行一些命令来偷取你的密码,以此来获得侵入你的网络的通道来入侵这个网络。
●Network(1)has full rights and permissions to all resources on a network.
(1)A.user
B.guest
C.administrator
D.owner
答案:(1)C
解析:网络管理员对所有的网络资源有充分的权利。
●Note:Make(2)regularly in data processing.
(2)A.edit
B.insert
C.format
D.Back up
答案:(2)D
解析:注意:在处理数据的过程中做有规则的备份。
During the last few years,it has been realized that maintenance of programs is more expensive than development,so reading of programs by humans is as important as(3)them.
(3)A.editing
B.writed
C.written
D.writing
答案:(3)D
解析:在最近几年里,人们已经认识到维护程序比发展程序的费用更多。因此,阅读程序变得和写程序一样重要了。
●In recent years,TCP/IP has also begun to be used by telephone companies to provide faster,cheaper telephone(4).
(4)A.transmitting
B.transmited
C.transfers
D.transmissions
答案:(4)D
解析:最近几年。电话公司开始利用TCP/IP来提供更加快速、便宜的传输。
●C++is used with proper(5)design techniques.
(5)A.object—oriented
B.object—based
C.face to object
D.face to target
答案:(5)A
解析:C++使用了适当的面向对象的设计技术。
●The World Wide Web is the latest evolution of an effort to make information on computers(1)the world available to as many users as possible.
(1)A.through
B.throughout
C.by
D.with
答案:(1)C
解析:万维网是让尽可能多的人在计算机上获得信息的最新的一次努力。
●You can cut,copy,and paste information quickly by clickin9(2)bar buttons with the mouse.
(2)A.title
B.tool
C.status
D.for mula
答案:(2)B
解析:你可以使用鼠标点击工具栏上的按钮快速的剪切、复制、粘贴信息。
●A firewall is a(3)system designed to(4)all organization's network aga—inst threats.
(3)A.operating
B.programming
C.security
D.service
(4)A.prevent
B.protect
C.develop
D.exploit
答案:(3)C (4)B
解析:防火墙是一个系统开发。用来屏蔽威胁以保护部门、组织的网络。
●Windows XP is Microsoft’s most advanced desktop(1)system.
(1)A.operating
B.programming
C.security
D.service
答案:(1)A
解析:Windows XP是微软公司开发的高级桌面操作系统。来源:
●Functional testing tests whether the output is the expected(2)with the valid input.
(2)A.reason
B.result
C.outcome
D.record
答案:(2)B
解析:功能测试是指测试在正确的输入下。输出结果是否在预料之中。
The basic concept of a data(3)is the difference between data and information-
(3)A.warehouse
B.storage
C.base
D.service
答案:(3)A
解析:数据服务的基本概念是数据和信息的不同之处。
Communication networks can be classified in terms of their physical arrangement or(4),Three common(4)are the star,bus,and ring.
(4)A.structures
B.topologies
C.protocols
D.frames
答案:(4)B
解析:通信网络可以按照物理范围或者拓扑结构来分类,常见的三种拓扑结构是星型、总线型、环型。
An operating system is(5).
(5)A.the highest layer of software
B.the lowest layer of software
C.the highest layer of hardware
D.the lowest layer of hardware
答案:(5)B
解析:操作系统是软件的最底层.
The(1)has several major components,including the system kernel,a memory management system.the file system manager,device drivers,and the system libraries·
(1)A.application
B.information system
C.network
D.operating system
答案:(1)D
解析:操作系统由几个主要部分组成,包括系统内核、存储管理系统、文件管理系统、设备驱动、系统库。
●For each blank,choose the best answer from the four choices and write down on the answer sheet.
(2)is a one—way function that takes an arbitrarily long piece of plain text and from it computes a fixed一length bit string.(3)is a protocol that most USENET machines now use it to allow news articles to propagate from one machine to another over a reliable connection.(4)is an approach preferred by cable TV providers.In this solution the fiber terminates at an optoelectrical converter and the final segment is a sha
展开阅读全文