首页
试卷库
试题库
当前位置:
X题卡
>
所有题目
>
题目详情
如果主存容量为16MB,且按字节编址,则表示该主存地址至少应需要______位。
查看本题答案
包含此试题的试卷
高级系统分析师《单选集》真题及答案
点击查看
你可能感兴趣的试题
如果主存容量为128MB且按字节编址表示该主存地址至少应需要21位
7
14
24
27
在计算机中最适合进行数字加减运算的数字编码是20如果主存容量为16MB且按字节编址表示该主存地址至少
原码
反码
补码
移码
某32位微型计算机中若存储器容量为1MB按字节编址其主存的地址 寄存器的位数至少应为
20 位
24 位
32 位
16 位
如果主存容量为16M字节且按字节编址表示该主存地址至少应需要位
16
20
24
32
如果主存容量为16MB且按字节编址表示该主存地址至少应需要______位
16
20
24
32
在计算机中最适合进行数字加减运算的数字编码是20如果主存容量为16MB且按字节编址表示该主存地址至少
16
20
24
32
在计算机中最适合进行数字加减运算的数字编码是1如果主存容量为16M字节且按字节编址表示该主存地址至少
原码
反码
补码
移码
如果主存容量为128MB且按字节编址则该土存地址至少需要位
2
7
2
14
2
24
2
27
如果主存容量为128MB且按字节编址则该主存地址至少需要12位
27
214
2TM
227
在计算机中最适合进行数字加减运算的数字编码是1如果主存容量为16M字节且按字节编址表示该主存地址至少
16
20
24
32
如果主存容量为16M字节且按字节编址表示该主存地址至少应需要______位
16
20
24
32
某32位微型计算机中若存储器容量为1MB按字节编址其主存的地址寄存器的位数至少应 为
20 位
24 位
32 位
16 位
在计算机中最适合进行数字加减运算的数字编码是如果主存容量为16M字节且按字节编址表示该主存地址
16
20
24
32
如果主存容量为512MB且按字节编址则该主存地址至少需要______位
29
2
18
2
27
2
29
某32位微型计算机中存储器容量为1MB若按字节编址那么主存的地址寄存器至少应有
20
24
32
16
在计算机中最适合进行数字加减运算的数字编码是1如果主存容量为16MB且按字节编址表示该主存地址至少应
原码
反码
补码
移码
某计算机的Cache采用组相联映象Cache容量为16K字节每块8个字每个字32位并且将Cac
24
32
36
40
在计算机中最适合进行数字加减运算的数字编码是如果主存容量为16M字节且按字节编址表示该主存地址
原码
反码
补码
移码
某计算机的cache采用相联映射方式cache容量为16KB每块8个字每个字32位并且将cac
24
32
36
40
在计算机中最适合进行数字加减运算的数字编码是1如果主存容量为16MB且按字节编址表示该主存地址至少应
16
20
24
32
热门试题
更多
某公司为便于员工在家里访问公司的一些数据允许员工通过Internet访问公司的FTP服务器如图2-2所示为了能够方便地实现这一目标决定在客户机与FTP服务器之间采用1协议在传输层对数据进行加密该协议是一个保证计算机通信安全的协议客户机与服务器之间协商相互认可的密码发生在2[*]
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
Whenthesystemuponwhichatransportentityisrunningfailsandsubsequentlyrestartsthe136informationofallactiveconnectionsislost.Theaffectedconnectionsbecomehalf-openasthesidethatdidnotfaildoesnotyetrealizetheproblem.Thestillactivesideofahalf-openconnectionscanclosetheconnectionusinga137timer.Thistimermeasuresthetimethetransportmachinewillcontinuetoawaitan138ofatransmittedsegmentafterthesegmenthasbeenretransmittedthemaximumnumberoftimes.Whenthetimer139thetransportentityassumesthateithertheothertransportentityortheinterveningnetworkhasfailed.AsaresultthetimerclosestheconnectionandsignalsanabnormalclosetotheTSuser.Intheeventthatatransportentityfailsandquicklyrestartshalf-openconnectionscanbeterminatedmorequicklybytheuseoftheRSTsegmentthefailedsidereturnsanRSTitoeverysegmentithatitreceiveswhentheRSTireachestheothersideitmustbecheckedforvaliditybasedonthe140numberiastheRSTcouldbeinresponsetoanoldsegmentiftheresetisvalidthetransportentityperformsanabnormaltermination.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
Whenthesystemuponwhichatransportentityisrunningfailsandsubsequentlyrestartsthe136informationofallactiveconnectionsislost.Theaffectedconnectionsbecomehalf-openasthesidethatdidnotfaildoesnotyetrealizetheproblem.Thestillactivesideofahalf-openconnectionscanclosetheconnectionusinga137timer.Thistimermeasuresthetimethetransportmachinewillcontinuetoawaitan138ofatransmittedsegmentafterthesegmenthasbeenretransmittedthemaximumnumberoftimes.Whenthetimer139thetransportentityassumesthateithertheothertransportentityortheinterveningnetworkhasfailed.AsaresultthetimerclosestheconnectionandsignalsanabnormalclosetotheTSuser.Intheeventthatatransportentityfailsandquicklyrestartshalf-openconnectionscanbeterminatedmorequicklybytheuseoftheRSTsegmentthefailedsidereturnsanRSTitoeverysegmentithatitreceiveswhentheRSTireachestheothersideitmustbecheckedforvaliditybasedonthe140numberiastheRSTcouldbeinresponsetoanoldsegmentiftheresetisvalidthetransportentityperformsanabnormaltermination.
Microsoft’sCOMisasoftware146thatallowsapplicationstobebuiltfrombinarysoftwarecomponents.COMistheunderlyingarchitecturethatformsthefoundationforhigher-levelsoftwareserviceslikethoseprovidedbyOLE.COMdefinesabinarystandardforfunctioncallingbetweencomponentsawayforcomponentstodynamicallydiscovertheinterfacesimplementedbyothercomponentsandamechanismtoidentifycomponentsandtheirinterfacesuniquely.OLEisacompound147standarddevelopedbyMicrosoft.OLEmakesitpossibletocreate148withoneapplicationandlinkorembedtheminasecondapplication.Embeddedobjectsretaintheiroriginalformatand149totheapplicationthatcreatedthem.SupportforOLEisbuiltintotheWindowsandMacOSOperatingSystems.A150compounddocumentstandarddevelopedmainlybyAppleandIBMiscalledOpenDoc.
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
以下关于RSA加密算法的说法中错误的是______
为了保障数据的存储和传输安全需要对一些重要数据进行加密由于对称密码算法11所以特别适合对大量的数据进行加密国际数据加密算法IDEA的密钥长度是12位
用于在网络应用层和传输层之间提供加密方案的协议是______
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
由L2TPv2构建的VPN网络中主要由LAC和LNS两种网络设备构成以下说法错误的是______
网络安全设计是保证网络安全运行的基础网络安全设计有其基本的设计原则以下关于网络安全设计原则的描述错误的是______
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
3DES在DES的基础上使用两个56位的密钥K1和K2发送方用K1加密K2解密再用K1加密接受方用K1解密K2加密再用K1解密这相当于使用______倍于DES的密钥长度的加密效果
OneofthedifficultiesinbuildinganSQL-likequerylanguagefortheWebistheabsenceofadatabase131forthishugeheterogeneousrepositoryofinformation.HoweverifweareinterestedinHTMLdocumentsonlywecanconstructavirtualschemafromtheimplicitstructureofthesefiles.Thusatthehighestlevelof132everysuchdocumentisidentifiedbyitsUniformResourceLocatorURLanda133andatext.AlsoWebseversprovidesomeadditionalinformationsuchasthetypelengthandthelastmodificationdateofadocument.SofordataminingpurposeswecanconsiderthesetofallHTMLdocumentsasarelation:DocumenturlrifletexttypelengthmodifWhereallthe134arecharacterstrings.Inthisframeworkanindividualdocumentisidentifiedwitha135inthisrelation.OfcourseifsomeoptionalinformationismissingfromtheHTMLdocumenttheassociatefieldswillbeleftblankbutthisisnotuncommoninanydatabase.
Microsoft’sCOMisasoftware146thatallowsapplicationstobebuiltfrombinarysoftwarecomponents.COMistheunderlyingarchitecturethatformsthefoundationforhigher-levelsoftwareserviceslikethoseprovidedbyOLE.COMdefinesabinarystandardforfunctioncallingbetweencomponentsawayforcomponentstodynamicallydiscovertheinterfacesimplementedbyothercomponentsandamechanismtoidentifycomponentsandtheirinterfacesuniquely.OLEisacompound147standarddevelopedbyMicrosoft.OLEmakesitpossibletocreate148withoneapplicationandlinkorembedtheminasecondapplication.Embeddedobjectsretaintheiroriginalformatand149totheapplicationthatcreatedthem.SupportforOLEisbuiltintotheWindowsandMacOSOperatingSystems.A150compounddocumentstandarddevelopedmainlybyAppleandIBMiscalledOpenDoc.
图2-6示意了发送者利用非对称加密算法向接收者传送消息的过程图中a和b处分别是______[*]
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
IPSec提供了在局域网广域网和互联网中安全通信的能力以下关于IPSec说法错误的是______
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
热门题库
更多
高级系统分析师
高级网络规划设计师
高级系统架构师
中级信息系统监理师
初级通信工程师
中级通信工程师
通信新技术、新业务知识
无线通信专业技术
移动通信专业技术
有线传输专业技术
电话交换专业技术
电信网络专业技术
计算机通信专业技术
通信电源专业技术
电信营销专业技术
网络优化考试