For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information.These rules are known as______.A.E-mail B.Internet C.network D.protocols

题目
For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information.These rules are known as______.

A.E-mail
B.Internet
C.network
D.protocols

相似考题
更多“For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information.These rules are known as______.”相关问题
  • 第1题:

    For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information. These rules are known as( ).

    A.E-mail B.Intemet C.network D.protocols


    正确答案:D

  • 第2题:

    For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information. These rules are known as ( ).

    A.E-mail
    B.Internet
    C.network
    D.protocols

    答案:D
    解析:
    为成功地传输数据,发送设备和接收设备必须遵循一套信息交换的通信规则。这些规则称为协议。

  • 第3题:

    When setting an access point to a non-root role, what two parameters,other than Role in theRadio Network,must be configured on the SSID Manager page?()

    • A、Infrastructure devices to associate only to this SSID
    • B、Enable IP redirection on this SSID
    • C、Set Data Beacon Rate
    • D、Multiple Basic Service Set Identification (BSSID)
    • E、Set infrastructure SSID

    正确答案:A,E

  • 第4题:

    A Windows Communication Foundation (WCF) service is responsible for transmitting XML documents between systems. The service has the following requirements: It must minimize the transmission size by attaching the XML document as is without using escape characters or base64 encoding. It must interoperate with systems that use SOAP but are not built on the .NET plafform. You need to configure the service to support these requirements. Which message encoding should you use?()

    • A、Binary message encoding
    • B、MTOM (Message Transmission Optimization Mechanism) message encoding
    • C、Text message encoding with message version set to none
    • D、Text message encoding with message version set to SOAP 1.2

    正确答案:B

  • 第5题:

    You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices.  You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month.  What should you do?()

    • A、Create a Data Collector Set.
    • B、Install and run the Exchange Server User Monitor (ExMon).
    • C、Export and review the Internet Information Services (IIS) logs.
    • D、Enable User Agent logging, and then review the agent logs.

    正确答案:C

  • 第6题:

    You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network has a DNS server named XXX-SR04.What actions must you take to have the Hub Transport servers do not use XXX-SR04 to resolve names on the Internet?()

    • A、You must change the DNS forwarding.
    • B、You must change the Hub Transport server object properties.
    • C、You must change the Transport Protection Rules.
    • D、You must set the Net.TCP Port Sharing service to Automatic.

    正确答案:B

  • 第7题:

    单选题
    Your company has a single Active Directory domain. All servers run Windows Server 2008. You install an iSCSI storage area network (SAN) for a group of file servers.  Corporate security policy requires that all data communication to and from the iSCSI SAN must be as secure as possible.  You need to implement the highest security available for communications to and from the iSCSI SAN. What should you do?()
    A

    Create a Group Policy object (GPO) to enable the System objects: Strengthen default permission ofinternal systems objects setting.

    B

    Create a Group Policy object (GPO) to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing setting.

    C

    Implement IPsec security in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.

    D

    Implement mutual Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network contains a Mailbox server named XXX-EX10.What action must you take to have mailboxes retained for 8 weeks after deletion?()
    A

    You must create a legal hold.

    B

    You must change the mailbox database properties.

    C

    You must create Transport Protection Rules.

    D

    You must create Personal archives.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)
    A

    Addresses used for NAT pools should never overlap.

    B

    If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.

    C

    If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.

    D

    Dynamic source NAT rules take precedence over static source NAT rules.


    正确答案: D,A
    解析: 暂无解析

  • 第10题:

    单选题
    You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.It has come to the attention of Xxx management that a network user named Rory Allen is using Exchange ActiveSync to abuse the company’s e-mail policy by downloading huge attachments that does not pertain to his work detail.Consequently you receive instruction from Xxx to restrict the attachments size for Rory Allen’s to 100 KB. How can you achieve the goal by ensure that only Rory Allen is restricted?()
    A

    You must set up a new ActiveSync Device Access rule.

    B

    You must set up a managed folder mailbox policy.

    C

    You must set up a new role assignment policy.

    D

    You must set up Outlook Protection Rules.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Windows Communication Foundation (WCF) application uses a data contract that has several data members. You need the application to throw a Serialization Exception if any of the data members are not present when a serialized instance of the data contract is deserialized. What should you do?()
    A

     Add the Known Type attribute to the data contract.Set a default value in each of the data member declarations.

    B

     Add the Known Type attribute to the data contract.Set the Order property of each data member to unique integer value.

    C

     Set the Emit Default Value property of each data member to false.

    D

     Set the Is Required property of each data member to true.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    问答题
    Practice 2  (1) In order to communicate thoughts and feelings, there must be a conventional system of signs or symbols which mean the same to the sender and the receiver. The means of sending communications are too numerous and varied for systematic classification. Therefore, the analysis must begin with the means of receiving communication. (2) Reception of communication is achieved by our senses.

    正确答案:
    (1) 为了交流思想和情感,必须有一个对发送者和接受者有着相同含义传统的符号或象征系统。
    (2) 人们用感官知觉来接受人际交流。
    解析: 暂无解析

  • 第13题:

    We must abide by the rules.

    A: stick to
    B: persist in
    C: safeguard
    D: apply

    答案:A
    解析:
    题干意为“我们必须遵守规定。”句中划线词为动词短语,意为遵守;信守;承担……的后果。A项stick to意为:坚持;粘住;忠于;信守;例句:Obviously we are disappointed but the committee could do nothing less than stick to the rules.我们显然很失望,但委员会只能照章办事,别无他法。B项意为坚持;固执于;C项意为保护,保卫;D项意为申请;涂,敷药;应用;故选A。

  • 第14题:

    Under the terms of the contract,you must give 3 months' notice before you leave.

    A: subjects
    B: expressions
    C: words
    D: rules

    答案:D
    解析:
    句意:按合同规定,你离开前必须出示3个月的假条。画线单词term意为“条款,规定”。A项subject意为“主题,科目”;B项expression意为“表达”;C项word意为“单词,命令”; D项rule意为“规定,章程”,与画线单词同义。故本题选D。

  • 第15题:

    You work as the exchange administrator at Testking.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com. Currently Microsoft Office Outlook is used by all TestKing.com users to connect to their mailboxes. Thecompliance policy of the organization states that a copy of messages sent to the Finance department fromthe Internet is archived. The archived e-mails need to be stored on a third-party archival server. You areinstructed to recommend a solution that will comply with the set criteria. What should you do?()

    • A、You should include Retention Policies.
    • B、You should include Transport Protection Rules.
    • C、You should include Personal archives.
    • D、You should include Journal rules.

    正确答案:D

  • 第16题:

    Windows Communication Foundation (WCF) application uses a data contract that has several data members. You need the application to throw a Serialization Exception if any of the data members are not present when a serialized instance of the data contract is deserialized. What should you do?()

    • A、 Add the Known Type attribute to the data contract.Set a default value in each of the data member declarations.
    • B、 Add the Known Type attribute to the data contract.Set the Order property of each data member to unique integer value.
    • C、 Set the Emit Default Value property of each data member to false.
    • D、 Set the Is Required property of each data member to true.

    正确答案:D

  • 第17题:

    You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution. What actions must you take to stop a user named Mia Hamm from removing information from her mailbox?()

    • A、You must use log transactions.
    • B、You must use a legal hold.
    • C、You must use Outlook Protection Rules.
    • D、You must use the Set-Mailbox Mia Hamm -LitigationHoldEnabled $true.

    正确答案:D

  • 第18题:

    单选题
    If a GMDSS radio operator initiates a DSC distress transmission but does not insert a message,what happens? ()
    A

    The transmission is aborted and an alarm sounds to indicate this data must be provided by the operator

    B

    The transmission is not initiated and ERROR is indicated on the display readout

    C

    The transmission will be made with default information provided automatically

    D

    The receiving station will poll the DSC unit of the vessel in distress to download the necessary information


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to allow your environment to utilize the wildcard certificate so that it can be utilized for Outlook Anywhere?()
    A

    You must change recipient filtering.

    B

    You must change the DNS forwarding.

    C

    You must change the Outlook Protection Rules.

    D

    You must change the EXPR Outlook Provider’s properties.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You work as the enterprise exchange administrator at Xxx .The Xxx network consists of forest with a site. The Xxx network has two Exchange Server 2010 Client Access servers named XXX-EX14 and XXX-EX15 that has IMAP4 installed.Remote users from the internet currently make use of IMAP4 to connect to XXX-EX14 and XXX-EX15.What actions must you take to block IMAP4 access to the mailboxes on XXX-EX15?()
    A

    You must implement Outlook Protection Rules.

    B

    You must implement Transport Protection Rules.

    C

    You must set up a Public Folder Management Console.

    D

    You must deselect the IMAP4 mailbox feature in XXX-EX15.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Your company hosts web services in the company intranet.  The intranet is secured by a firewall.   Devices outside the firewall must be able to access the web services.  Company policies prohibit changes to firewall rules.  You need to recommend an approach for enabling inbound communication.  What should you recommend?()
    A

     Use Windows Server AppFabric.

    B

     Use the Windows Azure AppFabric Service Bus.

    C

     Use the Windows Azure AppFabric Access Control Service.

    D

     Use a Windows Communication Foundation (WCF) service in a Windows Azure role that relays to the internal web service


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to disable notifications by text messages to mobile devices?()
    A

    You must set up a Group Policy Object.

    B

    You must set up an Outlook Web App Mailbox policy.

    C

    You must change the properties of the public folder database.

    D

    You must set up recipient filtering.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    What is special about fox hunting in Britain?
    A

    It involves the use of a deadly poison.

    B

    It is a costly event which rarely occurs.

    C

    The hunters have set rules to follow.

    D

    The hunters have to go through strict training.


    正确答案: C
    解析:
    细节推断题。依据第三段第二句,他们穿着上身红下身白的专门制服,遵循严格的行为规范,这与C项“遵守一套规则”同义;故选C。