位置:首页 > 题库频道 > 其它分类 > 计算机其它 > 专业技术中级资格数据库系统工程师基础知识2005年上半年数据库系统工程师上午试卷

手机扫码关注微信
随时随地刷题

专业技术中级资格数据库系统工程师基础知识2005年上半年数据库系统工程师上午试卷

推荐等级:
  • 卷面总分:0分
  • 试卷类型:模拟试题
  • 测试费用:¥5.00
  • 试卷答案:
  • 练习次数:0
  • 作答时间:0分钟

试卷介绍

试卷预览

  • 41● DOM is a platform- and language- (66)  API that allows programs and scripts todynamically access and update the content, structure and style of WWW documents (currently,definitions for HTML and XML documents are part of the specification). The document can befurther processed and the results of that processing can be incorporated back into thepresented  (67) . DOM is a  (68) -based API to documents, which requires the wholedocument to be represented in  (69)  while processing it. A simpler alternative to DOM is theevent-based SAX, which can be used to process very large  (70)  documents that do not fitinto the memory available for processing.

    A.specific

    B.neutral

    C.contained

    D.related

    开始考试练习点击查看答案
  • 42● Melissa and LoveLetter made use of the trust that exists between friends or colleagues.Imagine receiving an  (71)  from a friend who asks you to open it. This is what happens withMelissa and several other similar email  (72) . Upon running, such worms usually proceed tosend themselves out to email addresses from the victim's address book, previous emails, webpages  (73) .    As administrators seek to block dangerous email attachments through the recognition ofwell-known  (74) , virus writers use other extensions to circumvent such protection.Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions andwill still run and successfully infect target users.    Frequently, hackers try to penetrate networks by sending an attachment that looks like aflash movie, which, while displaying some cute animation, simultaneously runs commands inthe background to steal your passwords and give the  (75)  access to your network.

    A.attachment

    B.packet

    C.datagram

    D.message

    开始考试练习点击查看答案
 5/5   首页 上一页 3 4 5
返回顶部