首頁 考試吧論壇 Exam8視線 考試商城 網絡課程 模擬考試 考友錄 實用文檔 求職招聘 論文下載 | ||
![]() |
2011中考 | 2011高考 | 2012考研 | 考研培訓 | 在職研 | 自學考試 | 成人高考 | 法律碩士 | MBA考試 MPA考試 | 中科院 |
|
![]() |
四六級 | 職稱英語 | 商務英語 | 公共英語 | 托福 | 雅思 | 專四專八 | 口譯筆譯 | 博思 | GRE GMAT 新概念英語 | 成人英語三級 | 申碩英語 | 攻碩英語 | 職稱日語 | 日語學習 | 法語 | 德語 | 韓語 |
|
![]() |
計算機等級考試 | 軟件水平考試 | 職稱計算機 | 微軟認證 | 思科認證 | Oracle認證 | Linux認證 華為認證 | Java認證 |
|
![]() |
公務員 | 報關員 | 銀行從業資格 | 證券從業資格 | 期貨從業資格 | 司法考試 | 法律顧問 | 導游資格 報檢員 | 教師資格 | 社會工作者 | 外銷員 | 國際商務師 | 跟單員 | 單證員 | 物流師 | 價格鑒證師 人力資源 | 管理咨詢師考試 | 秘書資格 | 心理咨詢師考試 | 出版專業資格 | 廣告師職業水平 駕駛員 | 網絡編輯 |
|
![]() |
衛生資格 | 執業醫師 | 執業藥師 | 執業護士 | |
![]() |
會計從業資格考試(會計證) | 經濟師 | 會計職稱 | 注冊會計師 | 審計師 | 注冊稅務師 注冊資產評估師 | 高級會計師 | ACCA | 統計師 | 精算師 | 理財規劃師 | 國際內審師 |
|
![]() |
一級建造師 | 二級建造師 | 造價工程師 | 造價員 | 咨詢工程師 | 監理工程師 | 安全工程師 質量工程師 | 物業管理師 | 招標師 | 結構工程師 | 建筑師 | 房地產估價師 | 土地估價師 | 巖土師 設備監理師 | 房地產經紀人 | 投資項目管理師 | 土地登記代理人 | 環境影響評價師 | 環保工程師 城市規劃師 | 公路監理師 | 公路造價師 | 安全評價師 | 電氣工程師 | 注冊測繪師 | 注冊計量師 |
|
![]() |
繽紛校園 | 實用文檔 | 英語學習 | 作文大全 | 求職招聘 | 論文下載 | 訪談 | 游戲 |
第7套
A digital wallet is (1) that enables users to pay for goods on the web.It holds credit card numbers and other (2) such as shipping address. Once entered, the data automatic ally populates order fields at merchant sites. When using a digital wallet,consumers don’ t need to fill out order forms on each site when they purchase an item because the information has already been (3) and is automatically (4) and entered into the order fields across merchant sites.Consumers also benefit when using digital wallets because their information is (5) or protechted a private software code.And merchants benefit by receiving protection against fraud.
(1) A.software B.hardware C. device D.document
(2) A.cards B.secrets C.public information D.person information
(3) A.distributed B. stored C.addressed D.registered
(4) A.coded B.updated C.corrected D.named
(5) A.encrypted B.updated C.secured D.undiscovered
答案:1:A,2:D,3:B,4:B,5:A
第8套
The router inspecters the packet’s IP address and performs (1) lookup to see if the destination end station resides on the local (physically connected) network,typically called an IP subber (2) usually is assignted to each of the router’s network interface.If the destination IP address is local,the router searches an internal store of IP address and local-device Media Acess Control(MAC) address.This store is known as the (3) cache. Address Resolution Protocol(ARP)is the universal tool for matching IP addresses to MAC address.If the destination’s MAC address appears,the router installs that MAC address in the pachet header(removing its own MAC address because that’s no longer needed) and sends the packet to the destional end station. In the event that the destional MAC address does not appear in the ARP cache-it might have timed out,for instance-the router must broadcast an ARP request to the subnet referenced by the packet’s destional IP address.The end station with that IP address responds, sending back its MAC address. The router updates its cache,installs the new MAC address into the(4) and launches the packet. If the router table lookup shows that the packet is destined for a non local subnet,the router forwards the packet to the next-hop router using the-hop router’s MAC address.Routing tables are continuously built and rebuilt by intelligent discovery protocols,such as Routing Information Protocol or Open Shortest Path First(OSPF).Each router’ s routing table shows the best route to the destination address:for address that may be severd hops away,it shows(5) next-hop router.
(1) A. a router table B.a signal C.an e-mail D.a file
(2) A. A TCP subnet B.IP headerC. An IP subnet D.TCP/IP
(3) A.OSPF B. Address Resolution Protocol(ARP)C.MAC D.RIP
(4) A.small packet B.space C.packet header D.packet tailor
(5) A.the fewest B.the worst C.the least D.the best
答案:1:A,2:C,3:B,4:C,5:D
第9套
_(1)__ is used to ensure the confidentiality,integrity and authenticity of the two end points in the private etwork .the__(2) __,an application layer protocol,authenticates each peer in an IPsec transaction ,IKE negotiates security policy,determining which algorithm may be used to set up the Runnel .It also handles the exchang of session keys used for that one transaction.Networks that use __(3)__to secure data traffic can automatically authenticate devices by using __(4)__,which Verify the identities of the two users who are sending information back and forth .IPsec can be ideal way to secure data in large networks that require __(5)__ connections among many devices。
(1) A.Encryption B.Code C.Certificate D. Tunnel
(2) A.associated links B.Internet Key Exchange C IPsec D. encryption
(3) A authenticity B.password C.IPsec D. Internet Key Exchange
(4) A.protocols B.keywords C.IKE D. digital certificates
(5) A.free B.strict C.secure D.remote
答案:1:A,2:B,3:C,4:D,5:C
第10套
Bluetooth is a universal radio interface in the __(1)__frequency band that enables portable electronic devices __(2)__ connect and communicate __(3)__via short range,ad hoc net Works .Each unit can simultaneously communicate with up to__(4)__ other units per piconet.Moreover,each unit can simultaneously __(5) __to several piconets,Bluetooth technology which apart from Ericsson,has gained th support of Nokia,IBM,Toshiba,Intel and many other manufactures,eliminates ths need for wires,cables and connectors for and between cordless or mobile phones,modems,headsets,PDAs,Computers,printers.projectors,local area networks,and so on ,and paves the way for new and completely different devices and applications。
(1) A.2.45GHZ B. 4.45GHZ C. 2.95GHZ D. 1.45GHZ
(2) A.in B.on C.to D. with
(3) A.narrowly B.wirelessly C.freely D.widely
(4) A.use B.sever C.host D. base
(5) A.relate B.add C.close D. belong
答案:1:A,2:C,3:B,4:B,5:D
更多軟考資料請訪問:考試吧軟件水平考試欄目
希望與更多網友交流,請進入考試吧軟件水平考試論壇
北京 | 天津 | 上海 | 江蘇 | 山東 |
安徽 | 浙江 | 江西 | 福建 | 深圳 |
廣東 | 河北 | 湖南 | 廣西 | 河南 |
海南 | 湖北 | 四川 | 重慶 | 云南 |
貴州 | 西藏 | 新疆 | 陜西 | 山西 |
寧夏 | 甘肅 | 青海 | 遼寧 | 吉林 |
黑龍江 | 內蒙古 |