首页
试卷库
试题库
当前位置:
X题卡
>
所有题目
>
题目详情
已知[X/2]补=0C6H,计算机的机器字长为8位二进制编码,则[X]补=______。
查看本题答案
包含此试题的试卷
高级系统分析师《单选集》真题及答案
点击查看
你可能感兴趣的试题
某计算机字长为8位它用补码原码或反码来表示带符号的二进制整数最高一位为符号位则机器代码1111111
128
1
-1
下列叙述中正确的是8
微型计算机的字长并不一定是字节的倍数
计算机存储器中将8个相邻的二进制位作为一个单位,这种单位称为字节
目前广泛使用的Pentium机器字长为5个字节
字节通常用英文单词“bit”来表示
某计算机字长为8位它用补码原码或反码来表示带符号的二进制整数最高一位为符号位则机器代码1111111
128
127
-0
已知[X/2]补=C6H计算机的机器字长为8位二进制编码则[x]补=69
8CH
18H
E3H
F1H
已知[X/2]补=0C6H计算机的机器字长为8位二进制编码则[X/4]补=
8CH
18H
0A3H
0F1H
在计算机中总线一次传输信息的二进制位数称为总线宽度数据总线的宽度通常情况下等于 ______
18位二进制数
16位二进制数
32位二进制数
计算机的字长
某计算机字长为8位它用补码原码或反码来表示带符号的二进制整数最高一位为符号位则机器代码1111111
128
1
-1
已知[X/2]补=C6H计算机的机器字长为8位二进制编码则[X]补=
8CH
18H
E3H
F1H
若一台计算机的字长为4字节则表明该机器
能处理的数值最大为4位二进制数
能处理的数值最多为4位二进制数组成
在CPU中能够作为一个整体处理32位的二进制代码
在CPU中运算的结果最大为2
32
在计算机中总线一次传输信息的二进制位数称为总线宽度数据总线的宽度通常情况下等于 ______
8位二进制数
16位二进制数
32位二进制数
计算机的字长
某计算机字长为8位它用补码原码或反码来表示带符号的二进制整数最高一位为符号位则机器代码1111111
255
-255
127
-127
已知[X/2]补=C6H计算机的机器字长为8位二进制编码则[X]补=11
8CH
18H
E3H
F1H
已知[X/2]补=C6H计算机的机器字长为8位二进制编码则[X]补=
8CH
18H
E3H
F1H
字符的ASCII编码在计算机中的表示方法描述准确的是
8位二进制代码,最右1位为1
8位二进制代码,最右1位为0
8位二进制代码,最左1位为1
8位二进制代码,最左1位为0
一个字长为16位的计算机则它的一个字的长度是______
8个二进制位
16个二进制位
32个二进制位
不定长
已知[X/2]补=0C6H计算机的机器字长为8位二进制编码则[X/4]补=
8CH
18H
0A3H
0F1H
若一台计算机的机器字长为4字节则表明该机器
能处理的数值最大为4位十进制数
能处理的数值最多为4位二进制数组成
在CPU中能够作为一个整体处理的32位的二进制代码
在CPU中运算的结果最大为2
32
某计算机字长为8位它用补码原码或反码来表示带符号的二进制整数最高一位为符号位则机器代码1111111
128
127
-0
已知[X/2]补=0C6H且该计算机的字长为8位二进制编码则[X/4]补=19
8CH
18H
0A3H
0F1H
某计算机字长为8位它用补码原码或反码来表示带符号的二进制整数最高一位为符号位则机器代码1111111
255
-255
127
-127
热门试题
更多
某公司为便于员工在家里访问公司的一些数据允许员工通过Internet访问公司的FTP服务器如图2-2所示为了能够方便地实现这一目标决定在客户机与FTP服务器之间采用1协议在传输层对数据进行加密该协议是一个保证计算机通信安全的协议客户机与服务器之间协商相互认可的密码发生在2[*]
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
目前在网络上流行的熊猫烧香病毒属于35类型的病毒感染该病毒后的计算机不会出现36的情况
在密码学中单向Hash函数具有______所描述的特性
某电子商务公司的业务员甲使用OutlookExpress撰写发送给业务员乙的邮件他应该使用______的数字证书来对邮件加密
______不属于将入侵检测系统部署在DMZ中的优点
以下关于RSA加密算法的说法中错误的是______
为了保障数据的存储和传输安全需要对一些重要数据进行加密由于对称密码算法11所以特别适合对大量的数据进行加密国际数据加密算法IDEA的密钥长度是12位
某公司的业务员甲与客户乙通过Internet交换商业电子邮件为保障邮件内容的安全采用安全电子邮件技术对邮件内容进行加密和数字签名在如图2-9所示的安全电子邮件技术的实现原理图中1~4应分别填入______[*]
用于在网络应用层和传输层之间提供加密方案的协议是______
以下关于著作权转让的表述中错误的是______
许多黑客利用缓冲区溢出漏洞进行攻击对于这一威胁最可靠的解决方案是______
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
由L2TPv2构建的VPN网络中主要由LAC和LNS两种网络设备构成以下说法错误的是______
网络安全设计是保证网络安全运行的基础网络安全设计有其基本的设计原则以下关于网络安全设计原则的描述错误的是______
标准化工作的任务是制定标准组织实施标准和对标准的实施进行监督______是指编制计划组织草拟审批编号发布的活动
采用Kerberos系统进行认证时可以在报文中加入______来防止重放攻击
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
我国标准分为强制性标准和推荐性标准标准的编号由标准代号标准发布顺序号和标准发布年代号构成______为推荐性行业标准的代号
3DES在DES的基础上使用两个56位的密钥K1和K2发送方用K1加密K2解密再用K1加密接受方用K1解密K2加密再用K1解密这相当于使用______倍于DES的密钥长度的加密效果
数字信封______
图2-6示意了发送者利用非对称加密算法向接收者传送消息的过程图中a和b处分别是______[*]
风险分析和管理是软件开发的一项重要活动在软件工程领域主要基于37以及必须抓住选择机会考虑风险实践中存在许多种软件风险如潜在的设计实现维护等方面的问题属于38风险
IPSec提供了在局域网广域网和互联网中安全通信的能力以下关于IPSec说法错误的是______
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
于2007年2月1日之前实施的国家信息安全标准是______
热门题库
更多
中级多媒体应用设计师
高级系统分析师
高级网络规划设计师
高级系统架构师
中级信息系统监理师
初级通信工程师
中级通信工程师
通信新技术、新业务知识
无线通信专业技术
移动通信专业技术
有线传输专业技术
电话交换专业技术
电信网络专业技术
计算机通信专业技术
通信电源专业技术
电信营销专业技术