首页
试卷库
试题库
当前位置:
X题卡
>
所有题目
>
题目详情
某计算机的时钟频率为400MHz,测试该计算机的程序使用4种类型的指令。每种指令的数量及所需指令时钟数(CPI)如表4-7所示,则该计算机的指令平均时钟数为 (59) ;该计算机的运算速度约为 (60...
查看本题答案
包含此试题的试卷
高级系统分析师《单选集》真题及答案
点击查看
你可能感兴趣的试题
某计算机的时钟频率为600MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数
106.76
207.32
308.64
1166.40
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数
106.7
169.5
207.3
216.2
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数C
106.7
169.5
207.3
216.2
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数C
106.7
169.5
207.3
216.2
某计算机的时钟频率为600MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数
106.76
207.32
308.64
1166.40
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数C
106.7
169.5
207.3
216.2
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数
1.85
1.93
2.36
3.75
某计算机的时钟频率为600MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数
106.76
207.32
308.64
1166.40
某计算机的时钟频率为600MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数
106.76
207.32
308.64
1166.40
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时
106.7
169.5
207.3
216.2
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时
106.7
169.5
207.3
216.2
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时
106.7
169.5
207.3
216.2
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数C
1.85
1.93
2.36
3.75
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时
1.85
1.93
2.36
3.75
主频指计算机的时钟频率即CPU在单位时间内的平均操作次数是表示计算机运算速度的主要性能指标时钟频率越
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时
1.85
1.93
2.36
3.75
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时
1.85
1.93
2.36
3.75
主频指计算机的时钟频率即CPU在单位时间内的平均操作次数是表示计算机运算速度的主要性能指标时钟频率越
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数C
106.7
169.5
207.3
216.2
某计算机的时钟频率为400MHz测试该计算机的程序使用4种类型的指令每种指令的数量及所需指令时钟数
1 .85
1.93
2.36
3.75
热门试题
更多
某公司为便于员工在家里访问公司的一些数据允许员工通过Internet访问公司的FTP服务器如图2-2所示为了能够方便地实现这一目标决定在客户机与FTP服务器之间采用1协议在传输层对数据进行加密该协议是一个保证计算机通信安全的协议客户机与服务器之间协商相互认可的密码发生在2[*]
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
目前在网络上流行的熊猫烧香病毒属于35类型的病毒感染该病毒后的计算机不会出现36的情况
在密码学中单向Hash函数具有______所描述的特性
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
某电子商务公司的业务员甲使用OutlookExpress撰写发送给业务员乙的邮件他应该使用______的数字证书来对邮件加密
______不属于将入侵检测系统部署在DMZ中的优点
以下关于RSA加密算法的说法中错误的是______
为了保障数据的存储和传输安全需要对一些重要数据进行加密由于对称密码算法11所以特别适合对大量的数据进行加密国际数据加密算法IDEA的密钥长度是12位
某公司的业务员甲与客户乙通过Internet交换商业电子邮件为保障邮件内容的安全采用安全电子邮件技术对邮件内容进行加密和数字签名在如图2-9所示的安全电子邮件技术的实现原理图中1~4应分别填入______[*]
用于在网络应用层和传输层之间提供加密方案的协议是______
许多黑客利用缓冲区溢出漏洞进行攻击对于这一威胁最可靠的解决方案是______
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
由L2TPv2构建的VPN网络中主要由LAC和LNS两种网络设备构成以下说法错误的是______
网络安全设计是保证网络安全运行的基础网络安全设计有其基本的设计原则以下关于网络安全设计原则的描述错误的是______
采用Kerberos系统进行认证时可以在报文中加入______来防止重放攻击
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
3DES在DES的基础上使用两个56位的密钥K1和K2发送方用K1加密K2解密再用K1加密接受方用K1解密K2加密再用K1解密这相当于使用______倍于DES的密钥长度的加密效果
数字信封______
图2-6示意了发送者利用非对称加密算法向接收者传送消息的过程图中a和b处分别是______[*]
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
风险分析和管理是软件开发的一项重要活动在软件工程领域主要基于37以及必须抓住选择机会考虑风险实践中存在许多种软件风险如潜在的设计实现维护等方面的问题属于38风险
IPSec提供了在局域网广域网和互联网中安全通信的能力以下关于IPSec说法错误的是______
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
热门题库
更多
初级信息处理技术员
中级数据库系统工程师
中级多媒体应用设计师
高级系统分析师
高级网络规划设计师
高级系统架构师
中级信息系统监理师
初级通信工程师
中级通信工程师
通信新技术、新业务知识
无线通信专业技术
移动通信专业技术
有线传输专业技术
电话交换专业技术
电信网络专业技术
计算机通信专业技术