题目列表(包括答案和解析)

 0  313800  313808  313814  313818  313824  313826  313830  313836  313838  313844  313850  313854  313856  313860  313866  313868  313874  313878  313880  313884  313886  313890  313892  313894  313895  313896  313898  313899  313900  313902  313904  313908  313910  313914  313916  313920  313926  313928  313934  313938  313940  313944  313950  313956  313958  313964  313968  313970  313976  313980  313986  313994  447348 

2.  推断题。D项不属于利用科学技术。

Passage 52   1. C   2. A   3. B   4. A

基因技术会给人类带来更多的好处。

试题详情

1.  细节题。答案:C。

试题详情

5.    A system frequently used in decentralized organizations in which computing power is located and shared at different sites is _________

A.   client / server

B.    centralized

C.    mainframe

D.   distributed

专题六  科学技术练习答案及详解

Passage 51   1. C   2. D

科学和我们日常生活紧密相连。

试题详情

4.    Rules for exchanging data on a network are called _______.

A.   protocol

B.    asynchronous transmission

C.    configuration

D.   serial transmission

试题详情

3.    What communications channel transfers data as pulses of light? ______

A.   Telephone lines

B.    Coaxial cable

C.    Fiber-optic cable

D.   Microwave

试题详情

2.    Transferring data from a larger computer to your microcomputer is called

A.   a LAN

B.    time-sharing

C.    downloading

D.   uploading

试题详情

1.    A special sequence of numbers or letters that limits access to electronic boxes is a ____________

A.   combination

B.    code

C.    password

D.   modem

试题详情

4.According to the passage, which is NOT true about “I love you” virus?

A.   Have found who made it

B.    Have found the solution to it

C.    Have been attacked by it

D.   Have no effective method to

Passage 60   Application proxy

To understand the application proxy, consider this scenario where you needed to deliver your neat little package of network data. With application-level proxies, the scenario is similar, but now you need to rely on someone else to deliver the package for you. Hence the term proxy illustrates this new scenario. The same rules apply as they do for packet filtering, except that you don’t get to deliver your package past the gate. Someone will do it for you, but that agent needs to look inside the package first to confirm its contents. If the agent has permission to deliver the contents of the package for you, he will.

Most commercial routers do not have proxy capabilities today, although I believe that proxy technology will be integrated with router code in the future. Until then, you need to rely on a standalone system that can support application-level proxy services.

Since an application proxy needs to communicate on behalf of the sender, it needs to understand the specific language or protocols associated with a particular application. Take as an example the widely used HTTP (Hypertext Transfer Protocol) proxy. If you are using a browser on your network, it is highly likely that your IS group has an HTTP proxy configured to allow you to access the Web via a central server. That single machine understands HTTP conversations and can speak on behalf of the requesting client. This is application level proxying.

Of course, security and encryption also come into play, since the proxy must be able to open the “package” to look at it or decode its contents. These are important issues obviously, but to do them justice would require another article.

试题详情

3.All the following countries have been attacked by “I Love You” Virus EXCEPT __________

A.   Britain

B.    Australia

C.    Switzerland

D.   Japan

试题详情

2.The most terrible character “I Love You” Virus is _______

A. it can hide in computers for long

B. it can damage computer’s normal programs

C. it can get rid of all the information that the operator stores

D .it can reproduce itself in great quantities in a short time

试题详情


同步练习册答案