位置:首页 > 题库频道 > 其它分类 > 计算机其它 > 专业技术中级资格多媒体应用设计师基础知识2005年上半年多媒体应用设计师上午试题

● 在TCP/IP 网络中,为各种公共服务保留的端口号范围是__(64)____。

发布时间:2024-07-09

A.1~255

B.1~1023

C.1~1024

D.1~65535

试卷相关题目

  • 1● 以下选项中,可以用于Internet 信息服务器远程管理的是____(63)____。

    A.Telnet

    B.RAS

    C.FTP

    D.SMTP

    开始考试点击查看答案
  • 2● 一个局域网中某台主机的IP 地址为176.68.160.12,使用22 位作为网络地址,那么该局域网的子网掩码为_____(61)____,最多可以连接的主机数为____(62)_____。

    A.255.255.255.0

    B.255.255.248.0

    C.255.255.252.0

    D.255.255.0.0

    开始考试点击查看答案
  • 3● 采用瀑布模型进行系统开发的过程中,每个阶段都会产生不同的文档。以下关于产生这些文档的描述中,正确的是_____(60)____ 。

    A.外部设计评审报告在概要设计阶段产生

    B.集成测试计划在程序设计阶段产生

    C.系统计划和需求说明在详细设计阶段产生

    D.在进行编码的同时,独立的设计单元测试计划

    开始考试点击查看答案
  • 4● 下列叙述中,与提高软件可移植性相关的是_____(59)____ 。

    A.选择时间效率高的算法

    B.尽量用高级语言编写系统中对效率要求不高的部分

    C.选择空间效率高的算法

    D.尽可能减少注释

    开始考试点击查看答案
  • 5● 在系统验收测试中,_____(57)____是在一个模拟的环境下使用模拟数据运行系统;_____(58)____是在一个实际环境中使用真实运行系统。

    A.确认测试

    B.审计测试

    C.验证测试

    D.模块测试

    开始考试点击查看答案
  • 6● 在以下网络应用中,要求带宽最高的应用是___(65)___。

    A.可视电话

    B.数字电视

    C.拨号上网

    D.收发邮件

    开始考试点击查看答案
  • 7● DOM is a platform-and language-____(66)___API that allows programs and scripts  todynamically  access  and  update  the  content,  structure  and  style  of  WWW  documents(  currently,definitions for HTML and XML documents are part of the specification ).The document can be further processed and the results of that processing can be  incoprporated backinto the presented ___(67)____.DOM is a ___(68)___-based API to  documents ,which requiresthe whole document to be represented in ____(69)___while processing it .A simpler alternativeto  DOM  is  the  event  –based  SAX,which  can  be    used  to  process  very  large___(70)___documents that do not fit info the memory  available for processing.

    A.specific

    B.neutral

    C.contained

    D.related

    开始考试点击查看答案
  • 8● Melissa and LoveLetter made use of the trust that exists between friends or colleagues.Imagine receiving an __(71)___from a friend who asks you to open it. This is what happens withMelissa and several other similar email __(72)___.Upon running ,such worms usually proceedto send themselves out to email addresses from the victim's address book, previous emails, webpages__(73)___.    As administrators seek to block dangerous email attachments through the recognition ofwell-known ___(74)____,virus writers use other extensions to circumvent such protection.Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and willstill run and successfully infect target users.    Frequently ,hackers try to penetrate networks by sending an attachment that looks like a flashmovie ,which, while displaying some cute animation ,simultaneously runs commands in thebackground to steal your passwords and give the __(75)__access to your network.

    A.attachment

    B.packet

    C.datagram

    D.message

    开始考试点击查看答案
返回顶部