首页
试卷库
试题库
当前位置:
X题卡
>
所有题目
>
题目详情
在计算机系统中,某一功能的处理时间为整个系统运行时间的50%,若使该功能的处理速度加快10倍,根据Amdahl定律,这样做可以使整个系统的性能提高 (47) 倍。若要使整个系统的性能提高1.5倍,则该...
查看本题答案
包含此试题的试卷
高级系统分析师《单选集》真题及答案
点击查看
你可能感兴趣的试题
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据Amda
1.6
1.7
1.8
1.9
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据Amda
1.6
1.7
1.8
1.9
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据A
3
5
7
8
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据Amda
1.6
1.7
1.8
1.9
在某计算机系统中若某一功能的处理速度被提高到10倍而该功能的处理使用时间仅占整个系统运行时间的50%
1.51
1.72
1.82
1.91
在计算机系统中某一功能部件的处理时间为整个系统运行时间的50%根据Amdahl定律若要使整个系统的性
3
5
7
8
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据Amda
1.6
1.7
1.8
1.9
系统响应时间是衡量计算机系统负载和工作能力的常用指标用T表示系统对某用户任务的响应时间Tuser表示
T=Tuser
T=Tsys
T=Tuser+Tsys
T=Tuser-Tsys
在某计算机系统中若某一功能的处理速度被提高到10倍而该功能的处理使用时间仅占整个系统运行时间的50%
1.51
1.72
1.82
1.91
在计算机系统中某一功能部件的处理时间为整个系统运行时间的50%根据Amdah1定律若要使整个系统的性
3
5
7
8
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据Amda
3
5
7
8
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若要使整个系统的性能提高1.5倍则该功能的
2倍
3倍
4倍
6倍
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据Amda
3
5
7
8
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据Amda
3
5
7
8
在某计算机系统中若某一功能的处理速度被提高到10倍而该功能的处理使用时间仅占整个系统运行时间的50%
1.51
1.72
1.82
1.91
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据A
1.6
1.7
1.8
1.9
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据Amda
3
5
7
8
在某计算机系统中若某一功能的处理速度被提高到10倍而该功能的处理使用时间仅占整个系统运行时间的50%
1.51
1.72
1.82
1.91
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据Amda
3
5
7
8
在计算机系统中某一功能的处理时间为整个系统运行时间的50%若使该功能的处理速度加快10倍根据Amda
1.6
1.7
1.8
1.9
热门试题
更多
某公司为便于员工在家里访问公司的一些数据允许员工通过Internet访问公司的FTP服务器如图2-2所示为了能够方便地实现这一目标决定在客户机与FTP服务器之间采用1协议在传输层对数据进行加密该协议是一个保证计算机通信安全的协议客户机与服务器之间协商相互认可的密码发生在2[*]
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
在密码学中单向Hash函数具有______所描述的特性
Microsoft’sCOMisasoftware146thatallowsapplicationstobebuiltfrombinarysoftwarecomponents.COMistheunderlyingarchitecturethatformsthefoundationforhigher-levelsoftwareserviceslikethoseprovidedbyOLE.COMdefinesabinarystandardforfunctioncallingbetweencomponentsawayforcomponentstodynamicallydiscovertheinterfacesimplementedbyothercomponentsandamechanismtoidentifycomponentsandtheirinterfacesuniquely.OLEisacompound147standarddevelopedbyMicrosoft.OLEmakesitpossibletocreate148withoneapplicationandlinkorembedtheminasecondapplication.Embeddedobjectsretaintheiroriginalformatand149totheapplicationthatcreatedthem.SupportforOLEisbuiltintotheWindowsandMacOSOperatingSystems.A150compounddocumentstandarddevelopedmainlybyAppleandIBMiscalledOpenDoc.
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
以下关于RSA加密算法的说法中错误的是______
为了保障数据的存储和传输安全需要对一些重要数据进行加密由于对称密码算法11所以特别适合对大量的数据进行加密国际数据加密算法IDEA的密钥长度是12位
用于在网络应用层和传输层之间提供加密方案的协议是______
许多黑客利用缓冲区溢出漏洞进行攻击对于这一威胁最可靠的解决方案是______
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
由L2TPv2构建的VPN网络中主要由LAC和LNS两种网络设备构成以下说法错误的是______
网络安全设计是保证网络安全运行的基础网络安全设计有其基本的设计原则以下关于网络安全设计原则的描述错误的是______
采用Kerberos系统进行认证时可以在报文中加入______来防止重放攻击
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
3DES在DES的基础上使用两个56位的密钥K1和K2发送方用K1加密K2解密再用K1加密接受方用K1解密K2加密再用K1解密这相当于使用______倍于DES的密钥长度的加密效果
Microsoft’sCOMisasoftware146thatallowsapplicationstobebuiltfrombinarysoftwarecomponents.COMistheunderlyingarchitecturethatformsthefoundationforhigher-levelsoftwareserviceslikethoseprovidedbyOLE.COMdefinesabinarystandardforfunctioncallingbetweencomponentsawayforcomponentstodynamicallydiscovertheinterfacesimplementedbyothercomponentsandamechanismtoidentifycomponentsandtheirinterfacesuniquely.OLEisacompound147standarddevelopedbyMicrosoft.OLEmakesitpossibletocreate148withoneapplicationandlinkorembedtheminasecondapplication.Embeddedobjectsretaintheiroriginalformatand149totheapplicationthatcreatedthem.SupportforOLEisbuiltintotheWindowsandMacOSOperatingSystems.A150compounddocumentstandarddevelopedmainlybyAppleandIBMiscalledOpenDoc.
图2-6示意了发送者利用非对称加密算法向接收者传送消息的过程图中a和b处分别是______[*]
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
IPSec提供了在局域网广域网和互联网中安全通信的能力以下关于IPSec说法错误的是______
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
热门题库
更多
中级多媒体应用设计师
高级系统分析师
高级网络规划设计师
高级系统架构师
中级信息系统监理师
初级通信工程师
中级通信工程师
通信新技术、新业务知识
无线通信专业技术
移动通信专业技术
有线传输专业技术
电话交换专业技术
电信网络专业技术
计算机通信专业技术
通信电源专业技术
电信营销专业技术