网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
试题(72)
(72)is a client/server protocol for transferring files across the Internet.
(72)
A.POP3
B.IMAP
C.FTP
D.HTTP
参考答案
更多 “ 试题(72)(72)is a client/server protocol for transferring files across the Internet.(72)A.POP3B.IMAPC.FTPD.HTTP ” 相关考题
考题
●A computer virus is a computer program that is created to make and spread (72) of itself.(72) A.programsB.virusC.copiesD.files
考题
●In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks, this approach often works poorly, because in the (71) between sending the notification and notification arriving at the source, thousands of additional (72) may arrive.In ATM network , a major tool for preventing (73) is (74) control.When a host wants a new virtual (75) ,it must describe the traffic to be offered and the service expected.(71) A.intervalB.timeC.slotD.delay(72) A.packetsB.cellsC.messageD.files(73) A.collisionB.congestionC.dropD.delay(74) A.flowB.admissionC.trafficD.time(75) A.pathB.routC.circuitD.way
考题
● An embedded operating system is the(71) program that manages all the other programs in an embedded device after initial load of programs by a(an) (72). It normally guarantees a certain capability within a specified(73) size and (74) constraint as well as with application programs. It also normally has small foot print including initial boot loader, OS kernel, required device drivers, (75) for the user data and so forth. It has very-likely structure of a normal operating system however mainly differentiated by some factors such as type of pre-installed device, functional limits, taking designed job only.(71)A. hardware B. business C. software D. external(72)A. driver B. application C. kernel D. boot loader(73)A. data B. storage C. bus D. CPU(74)A. time B. format C. controller D. packet(75)A. JAFFS B. format C. file systems D. protocol
考题
WhichtwomethodsenableaPCconnectedtothePartnerNettoconnecttoaserveronDMZ1butdenyitaccesstobothDMZ2andtheInsidenetwork?(Choosetwo.)()
A.EnableportaddresstranslationfortrafficsourcedfromthePartnerNetPCtotheDMZ1server.B.DisableNATcontrolonDM72andtheInsideinterfacesonly.C.EnablestaticNATtranslationfortheDMZ1server,andthenuseanACLtopermitthePartnerNetPCtraffictotheDMZ1server.D.DisableNATcontrolontheDMZ1interfaceonly.E.LowerthesecurityleveloftheDMZ2interfaceto30.F.RaisethesecuritylevelofthePartnerNetinterfaceto55.
考题
●One ofthe main resposibilities ofICMP is to report (71). Although technology has produced increasingly reliable transmission media, errors still exist and must be handled. IP is an (72) protocol. This means that error checking and error control are not a concem ofIP.ICMP was designed, in part, to compensate for this shortcoming. Howerver, ICMP does not _(73) errors, it simply reports them. Error correction is left to the higher-level potocols. Error messages are always sent to the original__(74) because the only information available in the datagram about the route is the source and destination lP addresses. ICMP uses the source IP address to send the error massage to the source ofthe(75) .(71)A, numbersB. functionsC. stringsD. errors(72)A. reliableB. unreliableC. availableD. unavailable(73)A. correctB. conductC. produceD. connect(74)A. userB. destinationC. sourceD. program(75)A. datagramB. frameC. serviceD. protocol
考题
In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71)between sending the notification and notification arriving at the source,thousands of additional(72)may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.packets
B.cells
C.message
D.files
考题
整个 X-Window 由三部分组成:X-Server,X-Client,X-Protocol。
热门标签
最新试卷