位置:首页 > 题库频道 > 其它分类 > 计算机其它 > 专业技术中级资格软件设计师基础知识2005年上半年软件设计师上午试题

手机扫码关注微信
随时随地刷题

专业技术中级资格软件设计师基础知识2005年上半年软件设计师上午试题

推荐等级:
  • 卷面总分:0分
  • 试卷类型:模拟试题
  • 测试费用:¥5.00
  • 试卷答案:
  • 练习次数:0
  • 作答时间:0分钟

试卷介绍

试卷预览

  • 41● 以下选项中,可以用于Internet信息服务器远程管理的是____(63)____。

    A.Telnet

    B.RAS

    C.FTP

    D.SMTP

    开始考试练习点击查看答案
  • 42● 在TCP/IP 网络中,为各种公共服务保留的端口号范围是__(64)____。

    A.1~255

    B.1~1023

    C.1~1024

    D.1~65535

    开始考试练习点击查看答案
  • 43● 在以下网络应用中,要求带宽最高的应用是___(65)___。

    A.可视电话

    B.数字电视

    C.拨号上网

    D.收发邮件

    开始考试练习点击查看答案
  • 44● DOM is a platform-and language-____(66)___API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents ( currently,definitions for HTML and XML documents are part of the specification ).The document can be further processed and the results of that processing can be incoporporated back into the presented ___(67)____.DOM is a ___(68)___-based API to documents ,which requires the whole document to be represented in ____(69)___while processing it .A simpler alternative to DOM is the event –based SAX,which can be used to process very large ___(70)___documents that do not fit info the memory available for processing.

    A.specific

    B.neutral

    C.contained

    D.related

    开始考试练习点击查看答案
  • 45● Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an __(71)___from a friend who asks you to open it. This is what happens with Melissa and several other similar email __(72)___.Upon running ,such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages__(73)___.As administrators seek to block dangerous email attachments through the recognition of well-known ___(74)____,virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the __(75)__access to your network.

    A.attachment

    B.packet

    C.datagram

    D.message

    开始考试练习点击查看答案
 5/5   首页 上一页 3 4 5
返回顶部