相关考题

单项选择题 测试与排错是相互联系而性质不同的两类活动,下列Ⅰ.证实程序有错Ⅱ.修改程序错误Ⅲ.忽视对象细节Ⅳ.了解对象细节( )是排错所应具有的特征。

单项选择题 在Excel中,一个工作薄最大可有(6)上个工作表,其中每个工作表又可包含256列、(7)行。

单项选择题 ICMP的功能是(41),采用ICMP的应用有(42)。

单项选择题 在OSPF路由协议中,OSPF接口可以处于(42)种状态之一,该协议采用路由算法是(43)。

单项选择题 Internet是全球最大的、开放的、由众多网络互联而形成的计算机网络,狭义Internet是指由上述提到网络中采用IP协议的网络互联而成的,广义Internet是指狭义Internet加上所有(92)的网络。Internet体系结构具有良好扩充性的主要原因在于它(93)。广义Internet的这种基于单一主干核心结构的弊端在于(94)。这种结构将逐渐被(95)所取代。

单项选择题 CSMA/CD是在ⅢEE 802.3中制定的访问控制方式,其中的CSMA指的是(43), CD指的是(44),当侦听到冲突时,采用(45)继续侦听,发现冲突后采用的退避算法是(46)。

单项选择题 题1:引入多道程序设计技术的目的是(61)。题2:某节点。(路由器)存放的路由信息如表3-1所示。则该网络使用的路由算法最可能是(62)。节点A根据当前的路由信息计算出的到节点D的路由可能为(63)。将路由信息发送到其他节点所采用的基本算法是(64)。为避免路由信息被重复发送,需要给路由信息包编号。设想每秒钟传送一次路由信息,为确保路由信息包的编号在1年内不重复使用,则编号的最短长度应为(65)位。

单项选择题 IPv6是下一代IP协议。IPv6的基本报头包含(26)B,此外还可以包含多个扩展报头。基本报头中的(27)字段指明了一个特定的源站向一个特定目标站发送的分组序列,各个路由器要对该分组序列进行特殊的资源分配,以满足应用程序的特殊传输需求。一个数据流由(28)命名。在IPv6中,地址被扩充为128bit,并且为IPv4保留了一部分地址空间。按照IPv6的地址表示方法,以下地址中属于IPv4地址的是(29)。(30)是IPv6的测试床,实际上是一个基于IPv4的虚拟网络,用于研究和测试IPv6的标准、实现以及IPv4向IPv6的转变过程。

单项选择题 ATM网络采用(11)多路技术传送信元,典型的数据速率为155.5Mbit/s,这样每秒大约可以传送(12)万个信元。采用短的、固定长度的信元,为使用硬件进行高速数据交换创造了条件。ATM是为B-ISDN定义的传输和交换方式,可以适应各种不同特性的电信业务,CBR(Constant Bit Rate)模拟(13)业务,适用这种业务的ATM适配层是(14),用于ATM局域网仿真的ATM适配层是(15)。

单项选择题 analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems. Ultimately, the system models become the(32)for designing and constructing an improved system. (33)is such a technique. The emphasis in this technique is process-centered. Systems analysts draw a series of process models called(34). (35)is another such technique that integrates data and process concerns into constructs called objects.

单项选择题 In recent years, one of the more popular topics for panel discussions at computer conferences and trade(61)has been the 'RISC versus CISC' debate.RISC processors feature a small number of instructions that each executes in(62)machine cycle. CISC processors use complex instructions that can take several cycles to execute.The RISC versus CISC debate won't be decided by panel discussion; it will be won in the marketplace. And the deciding factor may have little to do with(63)of instructions and registers and more to do with parallelism.Since their conception, RISC processors have been evolving toward micro parallelism, incorporating parallel-processing features(64)the processor, RISC processors feature pipelining, whereby many instructions can be decoded while one instruction executes. RISC processors, however, are moving toward pipelines for each unit of the processor.CISC processors also employ pipelining. They have many integer instructions that execute in one cycle, but the varying execution times of CISC instructions(65)the effectiveness of parallelism.

单项选择题 The Rational Unified Process(RUP)is a software engineering process, which captures many of best practices in modem software development. The notions of(36)and scenarios have been proven to be an excellent way to capture function requirements. RUP can be described in two dimensions - time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive(37)which is concluded with a well-defined(38)and can be further broken down into(39)-a complete development loop resulting in a release of an executable product, a subset of the final product under development, which grows incrementally to become the final system. The content structure refers to the disciplines, which group(40)logically by nature.

单项选择题 The growth of switching has(135)a new generation of network management tools that help(136)cope with the challenges,(137)them to correlate device alarms in order to(138)pinpoint root causes, or to monitor service levels without depending on IP subnet schemes. These new tools have become essential to coping with the primary(139)effect of any treatment that significantly increases network flexibility: added complexity.

单项选择题 The relational database model requires the data be(110)through programs that don't rely on the position of the data in the database. This is in direct(111)to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program(112)a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and(113)the information. The(114)on how the search is done are specific to the DBMS and vary from product to product.

单项选择题 下面哪种攻击属于主动攻击? A.网络嗅探 B.邮件分析 C.流量分析 D.DDOS

单项选择题 关于CMIP的描述中,正确的是: A.MIP是IEEE制定的 B.MIP主要采用trap机制 C.MIP结构复杂 D.MIP支持SNMP服务

单项选择题 关于ADSL接入的描述中,正确的是: A.数据传输需要进行调制解调 B.传输介质采用同轴电缆 C.只支持TCP/IP网络 D.上行速率通常大于下行速率

单项选择题 以下哪种支付验证方式最安全?

单项选择题 防止网上银行账户被盗的有效方式是:

单项选择题 以下选项作为密码较合适的是()