●Network software consists of (74), or rules by which processes can communicate.(74)A.protocolsB.programsC.devicesD.computers

题目

●Network software consists of (74), or rules by which processes can communicate.

(74)

A.protocols

B.programs

C.devices

D.computers


相似考题
更多“●Network software consists of (74), or rules by which processes can communicate. (74)A.pro ”相关问题
  • 第1题:

    The Internet is an open system,and most information is available to everyone.It is very important to add(74)to existing system for protecting the secret information.

    A.Web pages

    B.modem

    C.security

    D.network


    正确答案:C

  • 第2题:

    ●The term, (74) loop, refers to a loop that is contained within another loop.

    (74)A.program

    B.nested

    C.statement,

    D.Network


    正确答案:B

  • 第3题:

    A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

    A.channel
    B.path
    C.tunnel
    D.route

    答案:C
    解析:

  • 第4题:

    Mobile computers-which(71)laptops, notebooks, subnotebooks and handhelds-(72)so ubiquitous in such a short time, no surprise to hear who say: "It will define the leading edge(73)the next five years or so." The most remarkable(74)mobile computers is the amount of data storage and memory packed(75)their tiny boxes. These devices not only handle windows easily but also run storage-hungry programs.

    A.included

    B.include

    C.have included

    D.have become

    E.had become


    正确答案:B

  • 第5题:

    A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

    A.encoded
    B.encrypted
    C.stored
    D.transmitted

    答案:D
    解析:

  • 第6题:

    A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

    A.public
    B.private
    C.personal
    D.proper

    答案:B
    解析: