位置:首页 > 题库频道 > 其它分类 > 计算机其它 > 专业技术中级资格软件评测师基础知识2005年上半年软件评测师上午试卷

● 在以下网络应用中,要求带宽最高的应用是___(65)___。

发布时间:2024-07-09

A.可视电话

B.数字电视

C.拨号上网

D.收发邮件

试卷相关题目

  • 1● 在TCP/IP 网络中,为各种公共服务保留的端口号范围是__(64)____。

    A.1~255

    B.1~1023

    C.1~1024

    D.1~65535

    开始考试点击查看答案
  • 2● 以下选项中,可以用于Internet信息服务器远程管理的是____(63)____。

    A.Telnet

    B.RAS

    C.FTP

    D.SMTP

    开始考试点击查看答案
  • 3● 一个局域网中某台主机的IP 地址为176.68.160.12,使用22 位作为网络地址,那么该局域网的子网掩码为_____(61)____,最多可以连接的主机数为____(62)_____。

    A.255.255.255.0

    B.255.255.248.0

    C.255.255.252.0

    D.255.255.0.0

    开始考试点击查看答案
  • 4● 静态图像压缩标准JPEG2000中使用的是_____(60)____算法。

    A.K-L变换

    B.离散正弦变换

    C.离散余弦变换

    D.离散小波变换

    开始考试点击查看答案
  • 5● 双层双面的只读DVD盘片的存储容量可以达到_____(59)____。

    A.4.7GB

    B.8.5GB

    C.17GB

    D.6.6GB

    开始考试点击查看答案
  • 6● DOM is a platform-and language-____(66)___API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents ( currently, definitions for HTML and XML documents are part of the specification ).The document can be further processed and the results of that processing can be incorporated back into the presented ___(67)____.DOM is a ___(68)___-based API to documents ,which requires the whole document to be represented in ____(69)___while processing it .A simpler alternative to DOM is the event –based SAX, which can be used to process very large ___(70)___documents that do not fit into the memory available for processing.

    A.specific

    B.neutral

    C.contained

    D.related

    开始考试点击查看答案
  • 7● Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an __(71)___from a friend who asks you to open it. This is what happens with Melissa and several other similar email __(72)___.Upon running ,such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages__(73)___.As administrators seek to block dangerous email attachments through the recognition of well-known ___(74)____,virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the __(75)__access to your network.

    A.attachment

    B.packet

    C.datagram

    D.message

    开始考试点击查看答案
返回顶部