题目列表(包括答案和解析)
2. 推断题。D项不属于利用科学技术。
Passage 52 1. C 2. A 3. B 4. A
基因技术会给人类带来更多的好处。
1. 细节题。答案:C。
5. A system frequently used in decentralized organizations in which computing power is located and shared at different sites is _________
A. client / server
B. centralized
C. mainframe
D. distributed
专题六 科学技术练习答案及详解
Passage 51 1. C 2. D
科学和我们日常生活紧密相连。
4. Rules for exchanging data on a network are called _______.
A. protocol
B. asynchronous transmission
C. configuration
D. serial transmission
3. What communications channel transfers data as pulses of light? ______
A. Telephone lines
B. Coaxial cable
C. Fiber-optic cable
D. Microwave
2. Transferring data from a larger computer to your microcomputer is called
A. a LAN
B. time-sharing
C. downloading
D. uploading
1. A special sequence of numbers or letters that limits access to electronic boxes is a ____________
A. combination
B. code
C. password
D. modem
4.According to the passage, which is NOT true about “I love you” virus?
A. Have found who made it
B. Have found the solution to it
C. Have been attacked by it
D. Have no effective method to
Passage 60 Application proxy
To understand the application proxy, consider this scenario where you needed to deliver your neat little package of network data. With application-level proxies, the scenario is similar, but now you need to rely on someone else to deliver the package for you. Hence the term proxy illustrates this new scenario. The same rules apply as they do for packet filtering, except that you don’t get to deliver your package past the gate. Someone will do it for you, but that agent needs to look inside the package first to confirm its contents. If the agent has permission to deliver the contents of the package for you, he will.
Most commercial routers do not have proxy capabilities today, although I believe that proxy technology will be integrated with router code in the future. Until then, you need to rely on a standalone system that can support application-level proxy services.
Since an application proxy needs to communicate on behalf of the sender, it needs to understand the specific language or protocols associated with a particular application. Take as an example the widely used HTTP (Hypertext Transfer Protocol) proxy. If you are using a browser on your network, it is highly likely that your IS group has an HTTP proxy configured to allow you to access the Web via a central server. That single machine understands HTTP conversations and can speak on behalf of the requesting client. This is application level proxying.
Of course, security and encryption also come into play, since the proxy must be able to open the “package” to look at it or decode its contents. These are important issues obviously, but to do them justice would require another article.
3.All the following countries have been attacked by “I Love You” Virus EXCEPT __________
A. Britain
B. Australia
C. Switzerland
D. Japan
2.The most terrible character “I Love You” Virus is _______
A. it can hide in computers for long
B. it can damage computer’s normal programs
C. it can get rid of all the information that the operator stores
D .it can reproduce itself in great quantities in a short time
湖北省互联网违法和不良信息举报平台 | 网上有害信息举报专区 | 电信诈骗举报专区 | 涉历史虚无主义有害信息举报专区 | 涉企侵权举报专区
违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com