Data can be(75) to another part of the spreadsheet. The original data remains.A.copied and
Data can be(75) to another part of the spreadsheet. The original data remains.
A.copied and pasted
B.cut and pasted
C.copied and cut
D.cut and moved
Data can be(75) to another part of the spreadsheet. The original data remains.
A.copied and pasted
B.cut and pasted
C.copied and cut
D.cut and moved
Because Web servers are platform. and application(71),they can send or request data from legacy or external application including database.All replies,once converted into(72)mark up language,can then be transmitted to a(73).Used in this way,Intranets can(74)lower desktop support costs,easy links with legacy application and databases and,(75)all。ease of use.
(74)
A.coupled
B.dependent
C.independent
D.related
Because Web servers are platform. and application (71) ,they can send or request data fromlegacy or external application including database.All replies,once converted into (72) arkup language,can then be transmitted to a (73) .Used in this way,Intranets can (74) lower desktop support costs,easy links with legacy application and databases and, (75) all,ease of use.
(62)
A.coupled
B.dependent
C.independent
D.related
Because Web servers axe platform. and application(71), they can send or request data from legacy or external applications including databases. All replies, once converted into(72). mark-up language, can then be transmitted to a(73).Used in this way, Intranets can(74)lower desktop support costs, easy links with legacy applications and databases and,(75)all, ease of use.
A.coupled
B.dependent
C.independent
D.related
A.Certificate
B.Encryption
C.Tunnel
D.Presentation
(71)
A. pattern
B. data flow
C. business process
D. position level
(72)
A. metadata
B. components
C. models
D. entities
(73)
A. functions
B. code segments
C. interfaces
D. constraints
(74)
A. semantic models
B. weak entities
C. data schemas
D. business models
(75)
A. event-based
B. object-oriented
C. pipe-and-filter
D. layered
D. For many styles there may also exist one or more (74)that specify how to determine a system's overall properties from the properties of its parts.Many of architectural styles have been developed over the years.
The best-known examples of(75)architectures are programs written in the Unix shell.
(71)
A. pattern
B. data flow
C. business process
D. position level
(72)
A. metadata
B. components
C. models
D. entities
(73)
A. functions
B. code segments
C. interfaces
D. constraints
(74)
A. semantic models
B. weak entities
C. data schemas
D. business models
(75)
A. event-based
B. object-oriented
C. pipe-and-filter
D. layered
Microwave communication uses(1 )frequency radio waves that travel instraighdine sthroughthe air.Because the waves cannot(2 )with the curvature of the earth,they can be (3 )onlyover short distance.Thus,microwave is a good(4 )for sending data between bulldingsin a city or on a large college campus.For longer distances,the waves must berelayed by means of“dishes”or(5 ).These can be installed on towers,highbuildings,and mountain tops.
第71题:文中(1 )处正确的答案是()。
A.high
B.10w
C.1ong
D.short
IPSec creates a standard platform. to develop secure networks and electronic(73)between two machines. Secure tunneling via IPSec creates(74)connections in a network through which data packets can move. It creates these tunnels between remote users and within a local network. It also(75)each data packet in a new packet that contains the information neccessary to set up, maintain and tear down the tunnel when it's no longer needed.
A.channels
B.Web browser
C.Internet data
D.Internet architecture
●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
(71)~(72)A.transmitting devices
B.transmitted devices
C.receiving devices
D.received devices
(73)~(75) A.Buffer
B.Source-quench messages
C.Buffering
D.Windowing
(71)
A.frequencies
B.connections
C.diagrams
D.resources