- 讲师:刘萍萍 / 谢楠
- 课时:160h
- 价格 4580 元
特色双名师解密新课程高频考点,送国家电网教材讲义,助力一次通关
配套通关班送国网在线题库一套
第1套
ISDN,which stands for Integrated Services Digital Network, is a system of digital phone connections, which has been available for over a decade.This system allows data to be transmitted simultaneously across the world using (1) digital connectivity.With ISDN,voice and data are carried by bearer channels occupying a bandwith of (2) (bits per second).Some switches limit B channels to capacity of 56 Kbps.A data channel (3) handles signaling at 16Kbps or 64Kbps,depending on (4) .Note that,in ISDN terminology,"k" means (5),and not 1024(2^10) as in many computer applications;therefore,a 64Kbps channel carries data at a rate of 64000bps. A new set of standard prefixes has recently been created to handle this. Under this scheme,"K"(Kilo) means 1000(10^3),"M" (Mega) means 1000000(10^6),and soon ,and "Ki"(Kibi) means 1024 (2^10),"Mi" (Mebi) means 1048576(2^20).and soon。
(1). A.Multi-ends B.circle C.indirect D.end-to-end
(3). A.D channel B.A channel C.B channel D.C channel
(5). A.100000(10^5) B.1000(10^3) C.10000(10^4) D.100(10^2)
答案:
1:D,2:C,3:A,4:C,5:B
第2套
Bluetooth is a universal radio interface in the (1) frequency band that enables portable celectronic devices (2) connect and communicate (3) via short range,ad hoc networks.Each unit can simultaneously communicate with up to (4) other units per piconet. Moreover,each unit can simultaneously (5) to several piconets,Bluetooth technology which apart from Ericsson,has gained the support of Nokia,IBM,Toshiba,Intel and many other manufactures,eliminates the need for wires,cables and connectors for and between cordless or mobile phones,modems,headsets,PDAs, Computes,printers,progjectors,local ares networks,and so on ,and paves the way for new and completely different devices and applications.
(1). A.2.45GHz B. 4.45GHz C. 2.95GHz D. 3.45GHz
(2). A.in B. on C. to D. with
(4). A.use B.sever C.host D.base
答案:1:A,2:C,3:B,4:B,5:D
第3套
(1)is used to ensure the confidentiality,integrity and authenticity of the two end points in the private network .the(2),an application layer protocol,authenticates each peer in an IPsec transaction ,IKE negotiates security policy,determining which algorithm may be used to set up theRunnel .It also handles the exchang of session keys used for that one transaction.Networks that use (3)to secure data traffic can automatically authenticate devices by using (4)whichVerify the identities of the two users who are sending information back and forth .IPsec can be ideal way to secure data in large networks that require (5) connections among many devices。
(1) A.Encryption B.Code C.Certificate D. Tunnel
(3) A authenticity B.password C.IPsec D. Internet Key Exchange
(5) A.free B.strict C.secure D.remote
责编:罗莉
课程专业名称 |
讲师 |
课时 |
查看课程 |
---|
课程专业名称 |
讲师 |
课时 |
查看课程 |
---|
点击加载更多评论>>