Currently 94% of Web users use either Internet Explorer or Firefox, but recently some new (71) have been developed that are beginning to attract attention. The browser Opera is becoming very(72)because of its speed, it is currently the world’s fastest bro

题目
Currently 94% of Web users use either Internet Explorer or Firefox, but recently some new (71) have been developed that are beginning to attract attention. The browser Opera is becoming very(72)because of its speed, it is currently the world’s fastest browser, and because it is much smaller(73) existing browsers (it can almost fit on a single diskette). It can also (74)the last Web page you visited, so the next time you surf, you can start where you left off. And like the big two, you can get it for free; the catch is that you have to watch blinking ads in one corner, or pay $40 for the ad-free (75) of Opera.

A. readers
B.machines
C. techniques
D.browsers

相似考题

1.WWW is popular for its multimedia transmission and friendly(71). Although the speed of network has been improved considerably in recent years, the rapid(72)of using the Internet, the inherited character of delay in the network and the Request/Response working mode of WWW still make the Internet traffic very(73)and give no guarantee on the Quality of Service. Because HTTP has no states, the web server cannot know the users' demand and the users' requests cannot be predicted Taking advantage of a cache mechanism and the time locality of WWW accesses, the browser can preserve the documents ever accessed in the local machine. By this means, for the documents in the local cache, the browser does not need to send the requests to the remote server or to receive the whole responses from the remote one Pre-fetching uses the space locality of accesses First, the users' access requests are predicted according to the users' current request. Secondly, the expected pages are fetched into the local cache when the user is brow sing the current page. Finally, the users can access these pages downloaded from the local cache. And this can reduce the access delay to some degrees. Pre-fetching is one kind of active caches that can cache the pages which are still not requested by the user. The application of pre-fetching technology in the web can greatly reduce the waiting time after users have sent their requests. This paper brings forward an intelligent technique of web pre-fetching, which can speed up fetching web pages. In this technique, we use a simplified WWW data model to represent the data in the cache of web browser to mine the association rules. We store these rules in a knowledge base so as to(74)the user's actions. In the client sides, the agents are responsible for mining the users' interest and pre-fetching the web pages, which are based on the interest association repository. Therefore it is(75)for the users to speed up the browsing.A.interactiveB.interactionC.interactivityD.infection

更多“Currently 94% of Web users use either Internet Explorer or Firefox, but recently some new (71) have been developed that are beginning to attract attention. The browser Opera is becoming very(72)becau”相关问题
  • 第1题:

    A user states that their web browser was recently updated and continuously crashes. Which of the following could the technician use to gather more information about the issue?()

    A. NTBACKUP log

    B. Advanced tab in the System applet in Control Panel

    C. Event Log

    D. Internet Options applet in Control Panel


    参考答案:C

  • 第2题:

    Internet Explorer、Firefox、Opera等软件属于()。

    A.网络管理软件

    B.网络浏览器

    C.下载软件

    D.媒体播放软件


    正确答案:C


  • 第3题:

    All computers need some sort of(71)(OS). Tile majority of modem home computers use some form. of Microsofts OS. The original Microsoft OS was called DOS though most computers use Windows. Windows comes in various versions beginning with(72)x then 95, 98, ME and currently XP. A few computers use IBMs O/SApples Mac uses their own OS beginning with OS I though most modem Macs use version x or x. Apples latest version is OS 10.x. In the past large companies and institutions would have an OS design exclusively for them but as the Commercial OS become more sophisticated the benefits of this practice is becoming less apparent. Some computer professionals,(73)(ISP)and(74)computer users use an OS such as UNIX(or a variant such as Linux), Windows NT or 2000(Win2k)or one of the other network or(75)based OS.

    A.Operated System

    B.Operated System

    C.Operating System

    D.Operation System


    正确答案:C
    解析:OperatingSystem:操作系统

  • 第4题:

    Currently 94% of Web users use either Internet Explorer or Firefox, but recently some new (71) have been developed that are beginning to attract attention. The browser Opera is becoming very(72)because of its speed, it is currently the world’s fastest browser, and because it is much smaller(73) existing browsers (it can almost fit on a single diskette). It can also (74)the last Web page you visited, so the next time you surf, you can start where you left off. And like the big two, you can get it for free; the catch is that you have to watch blinking ads in one corner, or pay $40 for the ad-free (75) of Opera.

    A.think
    B.read
    C.write
    D.remember

    答案:D
    解析:
    参考译文:目前,有94%的网络用户使用Internet Explorer或firefox浏览器,但最近也开发出了一些新的浏览器,并吸引了用户的注意。Opera浏览器现在变得非常受欢迎,因为它是目前世界上速度最快的浏览器,也因为它远小于现存浏览器(它几乎可以存放在一个单一的软盘)。它可以记住上次访问过的网页,因此当你下次上网时,它会从这一页面开始。和两个主流的浏览器一样,你也可以免费使用Opera,只不过你必须观赏角落里的广告,或支付40美元来获得没有广告的Opera版本。

  • 第5题:

    You share your computer with other users.  You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users.  What should you do?()

    • A、Uninstall the new Windows Internet Explorer add-on.
    • B、Log on as an administrator and disable the new Windows Internet Explorer add-on.
    • C、Direct other users to log on and disable the new Windows Internet Explorer add-on.
    • D、Select the Turn off Automatic Website Checking option for the Phishing filter.

    正确答案:C

  • 第6题:

    A user states that their web browser was recently updated and continuously crashes. Which of the following could the technician use to gather more information about the issue?()

    • A、NTBACKUP log
    • B、Advanced tab in the System applet in Control Panel
    • C、Event Log
    • D、Internet Options applet in Control Panel

    正确答案:C

  • 第7题:

    You are the administrator of an Active Directory domain. All servers run Windows Server 2003.  You configure a server named Server3 as the DNS server for the domain.The company recently started using a new ISP. Since the change to the new ISP occurred, users report that they cannot access Internet Web sites by using their fully qualified domain names (FQDNs).You manually configure a test computer to use the DNS server address of the new ISP. The test computer can successfully access Internet Web sites by using their FQDNs.You need to ensure that network users can access Internet Web sites by using their FQDNs, while ensuring that user access to internal resources is not disrupted.   What are two possible ways to achieve this goal?()

    • A、Create a root zone on Server3.
    • B、Configure Server3 to use the default root hints.
    • C、Configure a forwarder on Server3 to the new ISP’s DNS server.
    • D、Configure all computers on your network to use the new ISP’s DNS server.

    正确答案:B,C

  • 第8题:

    You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers.  Users occasionally change the Internet Explorer settings on individual client computers.  The company wants to maintain a standard Internet Explorer configuration on all client computers.   You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers.   What should you do?()

    • A、Enable User Group Policy loopback processing mode.
    • B、Use the Group Policy Update utility to refresh Group Policy.
    • C、Enable Internet Explorer Maintenance Policy Processing in Group Policy.
    • D、Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box.

    正确答案:C

  • 第9题:

    单选题
    Which of the following statements is true according to the passage?
    A

    The address system was used to make web pages.

    B

    The World Wide Web was created in Switzerland.

    C

    The fist web browser was very expensive to buy

    D

    Many people could use the Internet before 1990


    正确答案: A
    解析:
    根据第三段的内容“In 1990, while still at the science centre in Switzerland, he put them together to make the first Internet browser.”可知选项B正确。

  • 第10题:

    单选题
    Your network has client computers that run Windows 7.   A custom Web-based application requires specific security settings.   You need to prevent users from permanently modifying their Internet Explorer browser’s security settings.   What should you do?()
    A

    Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode.

    B

    Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode.

    C

    Reset the Internet Explorer settings.

    D

    Restore the advanced settings in Internet Explorer.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    多选题
    You are a systems administrator responsible for configuring a Windows Server 2008 SMTP server. Yourorganization is currently using the default SMTP virtual server for sending order notifications from a single Web application called ContosoOrderManagement. Recently, you have noticed that a largenumber of messages have been sent to the SMTP virtual server from other computers and users. Which two methods can you use to prevent unauthorized access to the SMTP server?()
    A

    Enable Basic Authentication.

    B

    Configure a smart host for use by the SMTP virtual server.

    C

    Add Connection Control entries to limit which IP addresses can use the SMTP server.

    D

    Modify settings on the Security tab of the properties of the SMTP virtual server.


    正确答案: A,B
    解析: 暂无解析

  • 第12题:

    问答题
    Questions 1 to 5 are based on the following passage.  Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed by Mozilla.  “It’s reflective of a trend that we’ve seen over the last year with more web users becoming frustrated with the Internet experience,” said Chris Hoffmann of the Mozilla Foundation, a non-profit group supported by Sun Microsystems, IBM and other companies, backing as an alternative to Microsoft.  Much of that frustration has centered on Microsoft, which has been heavily criticized for producing software vulnerable to hand virus writers. Microsoft has responded with a series of patches designed to plug vulnerabilities in its Windows operating system, Internet Explorer web browser and other software.  But computer owners are growing weary of continuously updating software to protect against new threats. One incident last month enabled hackers to gain access to web surfers’ computers by taking advantage of vulnerabilities in Microsoft’s browser.  Hackers could then install remote access Trojan programs that enabled them to control a victim’s computer. The hackers could also install software to capture a victim’s keystrokes to steal data such as bank account numbers and passwords.  Mr. Hoffmann hoped publicity stemming from Microsoft’s security woes(灾难) would translate into a market share increase for Mozilla’s software, which includes the new highly regarded Firefox Internet browser.  But Mozilla suffered a setback last week when it was forced to issue a software patch to counter a newly discovered vulnerability affecting its Internet browsers.  Still, Mr. Hoffmann said Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience. Security experts agree that has made it easier for hackers to exploit computers running on Microsoft software.  Others suggest Microsoft has been targeted by hackers and virus writers simply because more than 90 per cent of the world’s computers run on the software giant’s operating system.  Questions:  1.What is the meaning of the phrase “fed up with” (Para.1)?  2.It can be guessed that the word “plug” (Para.3) means ________________.  3.Why more web users have become frustrated?  4.What happened to Mozilla’s Internet browsers last week?  5.How would Microsoft be less vulnerable?

    正确答案:
    1.tired of be fed up with的含义是“厌倦的”。
    2.stop plug的原意是“塞住,堵住”,上文提到微软的Windows操作系统容易受到攻击,微软就设计了一系列补丁来防止Windows操作系统受攻击。由此可知plug的意思是stop。
    3.Because Microsoft software is increasingly threatened by hackers 文章开头提到Computer Users fed up with hacker attacks and other security threats,“很多的计算机使用者受到黑客的攻击”,第三段也谈到人们对微软的Windows操作系统感到很失望,因为微软的Windows操作系统容易受到黑客的攻击。
    4.They were affected by a newly discovered vulnerability 文章倒数第三段第一句话提到Mozilla suffered a setback…counter a newly discovered vulnerability...这段话所隐含的意思是由于微软操作系统非常容易受到病毒的攻击,使得Mozilla互联网浏览器的使用者受到了不少影响。
    5.If its browser hadn’t been integrated into Windows. 文章倒数第二段开头一句话指出Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience.即微软操作系统的安全受到威胁部分是因为微软的使用者为方便把Windows界面与网络浏览器连接在一起,这样就使得微软的操作系统更容易受到病毒的攻击,因而要使微软免于病毒的攻击就只能把浏览器与Windows界面分开。
    解析: 暂无解析

  • 第13题:

    The most accurate and most boring way to(105)Java is that it is a new computer programming language developed by Sun Microsystems that creates(106)independent programs that can be distributed and nm remotely. To run Java programs, a computer must have a Java interpreter. Currently(107)Java programs are small "applets" that are(107)as part of web pages.When you use a Java(108)browser to view a Web page that includes a Java applet, the browser loads the applet onto your computer through your modem or network. Then the Java interpreter runs the applet, which could include animation or sound, on your computer rather than transmitting the code bit by bit over Internet. A few thousand bytes of Java code can tam into a powerful program on your computer.So an applet could include(109)with Java interpreter.

    A.command

    B.comment

    C.describe

    D.discover


    正确答案:C

  • 第14题:

    Internet Explorer、Firefox、Opera等软件属于媒体播放软件。

    此题为判断题(对,错)。


    正确答案:×

  • 第15题:

    You are a network administrator for The network consists of a single Active Directory domain named.

    The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.

    Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.

    Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.

    The financial application suite and the browser-based application are frequently updates with patches or new versions.

    You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.

    Which three actions should you perform to configure software restriction polices?()

    (Each correct answer presents part of the solution. Choose three)


    参考答案:A, E, F

  • 第16题:

    Internet Explorer、Firefox、Opera等软件属于()。


    正确答案:网络浏览器

  • 第17题:

    The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()

    • A、A new default gateway has been setup.
    • B、A new Internet shortcut has been added.
    • C、A new web browser has been installed and is now the default.
    • D、A proxy server has been enabled.

    正确答案:D

  • 第18题:

    A user reports they can no longer change the web browser home page. Which of the following is MOSTlikely the problem? ()

    • A、They are using the wrong WEP key.
    • B、They have been infected with malware.
    • C、They have lost Internet connectivity.
    • D、They need to update their network device drivers.

    正确答案:B

  • 第19题:

    You deploy Windows 7 and several custom Internet Explorer add-ons to 1,000 client computers. Internet Explorer closes when users run a specific Web application.    You need to find out whether an add-on is the cause of the problem.   What should you do?()

    • A、Start Internet Explorer in No Add-ons mode.
    • B、Reset all Internet Explorer security zones to the default levels.
    • C、Use Group Policy to turn on Internet Explorer 7 Standards mode.
    • D、Use Group Policy to disable the Programs tab in Internet Explorer for all client computers.

    正确答案:A

  • 第20题:

    Your network has client computers that run Windows 7.   A custom Web-based application requires specific security settings.   You need to prevent users from permanently modifying their Internet Explorer browser’s security settings.   What should you do?()

    • A、Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode.
    • B、Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode.
    • C、Reset the Internet Explorer settings.
    • D、Restore the advanced settings in Internet Explorer.

    正确答案:B

  • 第21题:

    多选题
    You are a network administrator for The network consists of a single Active Directory domain named. The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO. Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:/Program Files/MT Apps. The financial application suite contains many executable files. Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components. The financial application suite and the browser-based application are frequently updates with patches or new versions. You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration. Which three actions should you perform to configure software restriction polices?() (Each correct answer presents part of the solution. Choose three)
    A

    Set the default security level to Disallowed.

    B

    Set the default security level to Unrestricted.

    C

    Create a new certificate rule.

    D

    Create a new hash rule.

    E

    Create a new Internet zone rule.

    F

    Create a new path rule.


    正确答案: F,E
    解析: 暂无解析

  • 第22题:

    单选题
    You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()
    A

    Run ipconfig /flushdns at the command prompt. 

    B

    Reset the password for the local administrator user account. 

    C

    From the Internet Options in Internet Explorer, clear the AutoComplete history.

    D

    From the Internet Options in Internet Explorer, delete the Temporary Internet Files. 


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()
    A

    A new default gateway has been setup.

    B

    A new Internet shortcut has been added.

    C

    A new web browser has been installed and is now the default.

    D

    A proxy server has been enabled.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    填空题
    Internet Explorer、Firefox、Opera等软件属于()。

    正确答案: 网络浏览器
    解析: 暂无解析