Heterogeneous network environments consist of computer systems from(1)vendors that run(2)operating systems and communication protocols.An organization that(3)its computer resources is usually(4)the task of integrating its heterogeneous systems.Typically,each deparlment or division has defined its own network needs(5)0S,LAN topology,communication protocols,applications,and other components.
(1)A.same
B.similar
C.different
D.difference
(2)A.same
B.similar
C.different
D.difference
(3)A.consolidates
B.consists
C.considerate
D.consoles
(4)A.faced on
B.faced with
C.faced about
D.faced up to
(***.in general
B.in any term
C.in set terms
D.in terms of
答案:(1)C (2)C (3)A (4)B (5)D
解析:异构网络环境由不同制造商生产的计算机系统组成,这些计算机运行不同的操作系统和通信协议。任何一个想统计计算机资源的组织通常会面临整合异构系统的任务。典型地,每一个部门或分部已经规定了自己的网络需要,根据操作系统、局域网拓扑结构、通信协议、应用程序及其它因素。
#p#
There are two types of key technology:private key and public key.Private-key encryption methods are called(1)ciphers,information is encrypted with(2)both the sender and receiver hold privately.Public—key encryption methods are called(3)ciphers,(4)created for each user,encryption key and decryption key are(5).
(1)A.synchronous
B.asynchronous
C.symmetric
D.asymmetric
(2)A.a key
B.two keys
C.three keys
D.four keys
(3)A.synchronous
B.asynchronous
C.symmetric
D.asymmetric
(4)A.two related keys are
B.a key is
C.two unrelated keys are
D.three keys are
(***.same
B.different
C.difference
D.some
答案:(1)C (2)A (3)D (4)A (5)B
解析:有两种加密技术:私有密钥和公开密钥。私有密钥加密方法被称为对称密钥加密,在发送者和接受者之间的信息共同具有同一个密钥,公开密钥加密方法被称为非对称密钥加密,对于每一个使用者,都建立两个相关的加密与解密密钥,但它们不同。
#p#
(1) is a channel’s capacity which directly reflects the data transfer rate of the channel.
(2)functions in a NetWare network which is used to define addressing schemes.
(3)is a network layer device that supports multiple LAN interfacesand segments LANs into smaller collision and broadcast domains.
(4)is the popular LAN developed under the direction of the IEEE802.3.
(5)is a device which enables digital microcomputers to communicate across analog telephone lines.
(1)A.The volume
B.The bandwidth
C.The noise
D.The delay
(2)A.NetBEUI
B.IP
C.IPX
D.NCP
(3)A.The repeater
B.The hub
C.The bridge
D.The muter
(4)A.Token Ring
B.Token Bus
C.Ethernet
D.FDDI
(***.The repeater
B.The modem
C.The hub
D.The printer
答案:(1)B (2)C (3)D (4)C (5)B
解析:带宽是指信道的容量,它能够直接反映出信道数据传输速率。
IPX作用在Netware网络中。目的是定义寻址方法。
路由器是网络层设备。支持多局域网接口,并把局域网分为更小冲突域和广播域。
以太网是在IEEE802.3标准的基础上发展起来的流行网络。
调制解调器是一种能使得数字信号通过模拟线路进行通信的设备。
#p#
Communicating via e—mail is by far the most common Internet activity.You can (1)with anyone in the world who has an Internet address or e—mail(2)with a system connection to the Internet. All you need is(3)the Internet and an e-mail program.Two of the most widely used e-mail programs are Microsoft’s (4)and Netscape’s Navigator.A typical e—mail message has three basic(5):header,message,and signature.
(1)A.connect
B.exchange
C.communicate
D.game
(2)A.account
B.N0.
C.user
D.administrator
(3)A.attach with
B.grasp
C.Possess
D.access to
(4)A.Yahoo
B.Explorer
C.Foxmail
D.Outlook Express
(***.packets
B.elements
C.frames
D.cells
答案:(1)C (2)A (3)D (4)D (5)B
解析:到目前为止,使用E—mail通信是一种最常用的网络行为,你可以与世界上任何人进行通信,只要他拥有IP地址或者E—mail帐号,并且他还必须与Internet连接。而你需要的是有权使用因特网和E—mail。两个最广泛使用E—mail的程序是微软的和。一个E-mail消息有三个基本元素:信头、消息内容和签名。
#p#
(1)means“Any HTML document on an HTTP Server”.
(1)A.Web Server
B.Web page
C.Web Browser
D.Web site
The term“(2)program”means a program written in high—level language.
(2)A.compiler
B.executable
C.source
D.object
Very long,complex expressions in program are difficult to write correctly and difficult to(3).
(3)A.defend
B.detect
C.default
D.debug
In C language.functions are important because they provide a way to(4)code so that a large complex program can be written by combining many smaller parts.
(4)A.modify
B.modularize
C.block
D.board
The standard(5)in C language contain many useful functions for input and output,string handing,mathematical computations,and system programming tasks.
(***.database
B.files
C.1ibraries
D.subroutine
In(6)programming,the user determines the sequence of instructions to be executed,not the programmer.
(6)A.top-down
B.structure
C.data—driven
D.event—driven
(7)is a clickable string or graphic that points to another Web page or document.
(7)A.Link
B.Anchor
C.Browser
D.Hyperlink
One solution to major security problems is(8),which are frequently installed to fix known security holes.
(8)A.patches
B.compensations
C.complements
D.additions
A programmer must know about a function’s(9)to call it correctly
(9)A.location
B.algorithm
C.Interface
D.statements
On a(30)memory system,the logical memory space available to the program is totally independent of the physical memory space.
(30)A.cache
B.virtual
C.RAM
D.ROM
答案:(1)B
解析:Web页面表示HTTP服务器上的HTML文档。
答案:(2)C
解析:源程序是用高级语言写的程序。
答案:(3)D
解析:在程序中,一个长且复杂的表达式很难被正确书写和调试。
答案:(4)B
解析:在C语言中,函数是非常重要的。因为函数具有把代码模块化的功能,因此,一个大且复杂的程序能够写成许多个小程序的组合。
答案:(5)C
解析:在C语言中。标准库函数包括很多用于输入、输出、字符串处理、数学计算、系统调用的函数。
答案:(6)D
解析:在事件驱动的程序中,是用户而不是程序员来决定被执行的指令序列。
答案:(7)D
解析:超级链接是一种可点击的宇符串或图片,它可以连接到另一个Web页面或文档。
答案:(8)A
解析:打补丁是解决主要安全问题的一种方法,它通常被用来解决已知的安全漏洞。
答案:(9)C
解析:程序员需要知道函数的接口才能正确调用它。
答案:(10)B
解析:虚拟存储系统中,程序的逻辑存储空间与物理存储空间完全独立。
#p#
●Communication protocols are(1)connection—oriented or connectionless,(2)whether the sender ofa message needs to contact and maintain a dialog with the recipient or(3)senda message without any prior connect and with the hope that the recipientreceives everything(4).These methods(5)the two waysthat communication is implemented on networks.
(1)A.not
B.neither
C.either
D.all
(2)A.fulled
B.flooded
C.dapending on
D.defined by
(3)A.immediately
B.simply
C.accordingly
D.properly
(4)A.inorder
B.in array
C.in series
D.in queueing
(***.make known
B.disclose
C.reveal
D.discover
答案:(1)C(2)C(3)B (4)A(5)C
解析:通信协议或者是面向连接的或者是面向无连接的。这要看消息的发送者是否需要事先于接收者建立起对话,或者仅仅简单是接收者希望按一定的顺序接收。这两种方式正说明了网路中实现通信的两种手段。
#p#
●The major problem with E—mail is that it is(1)easy to use that people can become (2)with messages.(3)they can possibly answer in a day.In addition,mail boxes require some management to(4)messages or archive those that might be requried later.Senders don’t always know about your E-mail backlog and often send(5)messages.
(1)A.too
B.so
C.very
D.much
(2)A.full
B.lost
C.inundated
D.filled
(3)A.more than
B.than
C.that
D.which
(4)A.manage
B.save
C.backup
D.dispose of
(***.too many
B.redundant
C.long
D.trivial
答案:(1)B (2)C (3)A (4)D(5)B
解析:使用Email的主要问题是。它使用起来是如此的简单以致于人们会沉浸于短信息中。比他们能够在一天中可能的回答要多。另外,邮箱要求一些管理来删除或者保存一些以后才需要的东西。发送者通常是不知道你的邮箱中储存的内容并经常发送一些多余的信息。
#p#
●CDDI的英文全称是(1)。
(1)A.copper distributed data interface
B.COM distributed datainteraction
C.CORBA distributed data interface
D.Copper distributed data interaction
答案:(1)A
解析:铜线分布式数据接口。
● A local area network(LAN)is the communication of a number of computers by(2)connecting to each one in a single location,usually a single floor of a building or all the computers in a small company.
(2)A.1ine
B.cable
C.copper
D.copper cash
答案:(2)B
解析:一个局域网通常是由一些分布在某个建筑物的一层或者一个小公司中的计算机通过电缆连接起来的一个通信实体。
●The standard(3)in C language contain many useful functions for input and output,string handling,mathematical computations,and system programming tasks.
(3)A.database
B.files
C.1ibraries
D.subroutine
答案:(3)C
解析:C语言标准库中包含很多有用的函数,由输入、输出函数。字符串函数,数学计算函数和系统调用函数。
●The OSI(4)model,sometimes also called ISO or 7 layers reference model for communication.has been developed by the International Standards Organization in early l980’s.
(4)A.referent
B.reference
C.Referance
D.referring
答案:(4)B
解析:用于通信的0SI叁考模型,也被成为IS0或者七层参考模型早在1980年代就由估计标准组织提出来了。
●If your diskette has been(5),the computer can not store any new information on it.
(***.formatted
B.write protected
C.tested
D.Certified
答案:(5)B
解析:如果你的磁盘被设置了写保护,那么你的计算机将不能存储新的内容。
【编辑推荐】