试卷相关题目
- 1● 在TCP/IP 网络中,为各种公共服务保留的端口号范围是__(64)____。
A.1~255
B.1~1023
C.1~1024
D.1~65535
开始考试点击查看答案 - 2● 以下选项中,可以用于Internet 信息服务器远程管理的是____(63)____。
A.Telnet
B.RAS
C.FTP
D.SMTP
开始考试点击查看答案 - 3● 一个局域网中某台主机的IP 地址为176.68.160.12,使用22 位作为网络地址,那么该局域网的子网掩码为_____(61)____,最多可以连接的主机数为____(62)_____。
A.255.255.255.0
B.255.255.248.0
C.255.255.252.0
D.255.255.0.0
开始考试点击查看答案 - 4● 采用瀑布模型进行系统开发的过程中,每个阶段都会产生不同的文档。以下关于产生这些文档的描述中,正确的是_____(60)____ 。
A.外部设计评审报告在概要设计阶段产生
B.集成测试计划在程序设计阶段产生
C.系统计划和需求说明在详细设计阶段产生
D.在进行编码的同时,独立的设计单元测试计划
开始考试点击查看答案 - 5● 下列叙述中,与提高软件可移植性相关的是_____(59)____ 。
A.选择时间效率高的算法
B.尽量用高级语言编写系统中对效率要求不高的部分
C.选择空间效率高的算法
D.尽可能减少注释
开始考试点击查看答案 - 6● DOM is a platform-and language-____(66)___API that allows programs and scripts todynamically access and update the content, structure and style of WWW documents( currently,definitions for HTML and XML documents are part of the specification ).The document can be further processed and the results of that processing can be incoprporated backinto the presented ___(67)____.DOM is a ___(68)___-based API to documents ,which requiresthe whole document to be represented in ____(69)___while processing it .A simpler alternativeto DOM is the event –based SAX,which can be used to process very large___(70)___documents that do not fit info the memory available for processing.
A.specific
B.neutral
C.contained
D.related
开始考试点击查看答案 - 7● Melissa and LoveLetter made use of the trust that exists between friends or colleagues.Imagine receiving an __(71)___from a friend who asks you to open it. This is what happens withMelissa and several other similar email __(72)___.Upon running ,such worms usually proceedto send themselves out to email addresses from the victim's address book, previous emails, webpages__(73)___. As administrators seek to block dangerous email attachments through the recognition ofwell-known ___(74)____,virus writers use other extensions to circumvent such protection.Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and willstill run and successfully infect target users. Frequently ,hackers try to penetrate networks by sending an attachment that looks like a flashmovie ,which, while displaying some cute animation ,simultaneously runs commands in thebackground to steal your passwords and give the __(75)__access to your network.
A.attachment
B.packet
C.datagram
D.message
开始考试点击查看答案
最新试卷
注册安全工程师注册安全工程师安全生产法及相关法律知识2018
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2018
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它