首页
试卷库
试题库
当前位置:
X题卡
>
所有题目
>
题目详情
编号为0、1、2、3、…、15的16个处理器,用单级互联网络互联。当互连函数为Cube3(四维立方体单级互联函数)时,6号处理器与 (42) 号处理器相连接。若采用互连函数Shuffle(全混洗单级互...
查看本题答案
包含此试题的试卷
高级系统分析师《单选集》真题及答案
点击查看
你可能感兴趣的试题
编号为01237的8个处理器当采用PM2+1单级网络互连时与6号处理器相连的处理器号是______
4
6
8
编号为012315的16个处理器用单级互联网络互联 若采用互连函数Shuffle全混洗单级互
15
14
13
12
16个处理器编号为0~15采用PM2+3单级网络互连与13号处理器相连的处理器号是
5
1
7
14
编号为01237的8个处理器当采用PM2+1单级网络互连时与6号处理器相连的处理器号是______
4
6
8
编号为012315的16个处理器用单级互联网络互联当互连函数为Cube34维立方体单级互联函数
15
14
13
12
编号为012315的16个处理器采用单级互联网络联接当互联函数为Cube3时11号处理器连接到1号处
2
3
7
9
编号为01237的8个处理器当采用PM2+1单级网络互连时与6号处理器相连的处理器号是______
4
6
8
编号为012315的16个处理器用单级互联网络互联 当互连函数为Cube34维立方体单级互联
15
14
13
12
编号为012315的16个处理器用cube0互联函数时第7号处理机可以与第______号处理机相联
3
6
11
14
16个处理器编号为0~15用单级互连网络互连互连函数为ShuffleShuffle则第12号处理器将
9
6
3
12
编号为012315的16个处理器用单级互联网络互联当互联函数为Cube34维立方体单级互联函数时6号
15
14
13
12
编号为011315的16个处理器采用单级互联网络连接当互联函数为Cube3时11号处理器连接到10号
2
5
7
11
计算机可以按照指令流和数据流来分为四类传统的顺序处理的计算机属于59类其余三类都是计算机体系结构中发
多级互联网络、交叉开关结构、总线结构
交叉开关结构、多级互联网络、总线结构
总线结构、交叉开关结构、多级互联网络
多级互联网络、总线结构、交叉开关结构
编号为011315的16个处理器采用单级互联网络连接当互联函数为Cube3时11号处理器连接到10号
2
3
7
9
编号为012315的16个处理器用单级互联网络互联当互连函数为Cube34维立方体单级互联函数
15
14
13
12
编号为012315的16个处理器用单级互联网络互联当互联函数为Cube34维立方体单级互联函数时6号
15
14
13
12
计算机可以按照指令流和数据流来分为四类传统的顺序处理的计算机属于59类其余三类都是计算机体系结构中发
多级互联网络、交叉开关结构、总线结构
交叉开关结构、多级互联网络、总线结构
总线结构、交叉开关结构、多级互联网络
总线结构、多级互联网络、交叉开关结构
编号为012315的16个处理器采用单级互联网络联接当互联函数为Cube3时11号处理器连接到1号处
2
5
7
11
16个处理器编号为0115采用单级Cube3互连网络互连与13号处理器相联的处理器号是
2
3
4
5
热门试题
更多
某公司为便于员工在家里访问公司的一些数据允许员工通过Internet访问公司的FTP服务器如图2-2所示为了能够方便地实现这一目标决定在客户机与FTP服务器之间采用1协议在传输层对数据进行加密该协议是一个保证计算机通信安全的协议客户机与服务器之间协商相互认可的密码发生在2[*]
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
Whenthesystemuponwhichatransportentityisrunningfailsandsubsequentlyrestartsthe136informationofallactiveconnectionsislost.Theaffectedconnectionsbecomehalf-openasthesidethatdidnotfaildoesnotyetrealizetheproblem.Thestillactivesideofahalf-openconnectionscanclosetheconnectionusinga137timer.Thistimermeasuresthetimethetransportmachinewillcontinuetoawaitan138ofatransmittedsegmentafterthesegmenthasbeenretransmittedthemaximumnumberoftimes.Whenthetimer139thetransportentityassumesthateithertheothertransportentityortheinterveningnetworkhasfailed.AsaresultthetimerclosestheconnectionandsignalsanabnormalclosetotheTSuser.Intheeventthatatransportentityfailsandquicklyrestartshalf-openconnectionscanbeterminatedmorequicklybytheuseoftheRSTsegmentthefailedsidereturnsanRSTitoeverysegmentithatitreceiveswhentheRSTireachestheothersideitmustbecheckedforvaliditybasedonthe140numberiastheRSTcouldbeinresponsetoanoldsegmentiftheresetisvalidthetransportentityperformsanabnormaltermination.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
Whenthesystemuponwhichatransportentityisrunningfailsandsubsequentlyrestartsthe136informationofallactiveconnectionsislost.Theaffectedconnectionsbecomehalf-openasthesidethatdidnotfaildoesnotyetrealizetheproblem.Thestillactivesideofahalf-openconnectionscanclosetheconnectionusinga137timer.Thistimermeasuresthetimethetransportmachinewillcontinuetoawaitan138ofatransmittedsegmentafterthesegmenthasbeenretransmittedthemaximumnumberoftimes.Whenthetimer139thetransportentityassumesthateithertheothertransportentityortheinterveningnetworkhasfailed.AsaresultthetimerclosestheconnectionandsignalsanabnormalclosetotheTSuser.Intheeventthatatransportentityfailsandquicklyrestartshalf-openconnectionscanbeterminatedmorequicklybytheuseoftheRSTsegmentthefailedsidereturnsanRSTitoeverysegmentithatitreceiveswhentheRSTireachestheothersideitmustbecheckedforvaliditybasedonthe140numberiastheRSTcouldbeinresponsetoanoldsegmentiftheresetisvalidthetransportentityperformsanabnormaltermination.
Microsoft’sCOMisasoftware146thatallowsapplicationstobebuiltfrombinarysoftwarecomponents.COMistheunderlyingarchitecturethatformsthefoundationforhigher-levelsoftwareserviceslikethoseprovidedbyOLE.COMdefinesabinarystandardforfunctioncallingbetweencomponentsawayforcomponentstodynamicallydiscovertheinterfacesimplementedbyothercomponentsandamechanismtoidentifycomponentsandtheirinterfacesuniquely.OLEisacompound147standarddevelopedbyMicrosoft.OLEmakesitpossibletocreate148withoneapplicationandlinkorembedtheminasecondapplication.Embeddedobjectsretaintheiroriginalformatand149totheapplicationthatcreatedthem.SupportforOLEisbuiltintotheWindowsandMacOSOperatingSystems.A150compounddocumentstandarddevelopedmainlybyAppleandIBMiscalledOpenDoc.
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
以下关于RSA加密算法的说法中错误的是______
为了保障数据的存储和传输安全需要对一些重要数据进行加密由于对称密码算法11所以特别适合对大量的数据进行加密国际数据加密算法IDEA的密钥长度是12位
用于在网络应用层和传输层之间提供加密方案的协议是______
许多黑客利用缓冲区溢出漏洞进行攻击对于这一威胁最可靠的解决方案是______
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
由L2TPv2构建的VPN网络中主要由LAC和LNS两种网络设备构成以下说法错误的是______
网络安全设计是保证网络安全运行的基础网络安全设计有其基本的设计原则以下关于网络安全设计原则的描述错误的是______
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
3DES在DES的基础上使用两个56位的密钥K1和K2发送方用K1加密K2解密再用K1加密接受方用K1解密K2加密再用K1解密这相当于使用______倍于DES的密钥长度的加密效果
Microsoft’sCOMisasoftware146thatallowsapplicationstobebuiltfrombinarysoftwarecomponents.COMistheunderlyingarchitecturethatformsthefoundationforhigher-levelsoftwareserviceslikethoseprovidedbyOLE.COMdefinesabinarystandardforfunctioncallingbetweencomponentsawayforcomponentstodynamicallydiscovertheinterfacesimplementedbyothercomponentsandamechanismtoidentifycomponentsandtheirinterfacesuniquely.OLEisacompound147standarddevelopedbyMicrosoft.OLEmakesitpossibletocreate148withoneapplicationandlinkorembedtheminasecondapplication.Embeddedobjectsretaintheiroriginalformatand149totheapplicationthatcreatedthem.SupportforOLEisbuiltintotheWindowsandMacOSOperatingSystems.A150compounddocumentstandarddevelopedmainlybyAppleandIBMiscalledOpenDoc.
图2-6示意了发送者利用非对称加密算法向接收者传送消息的过程图中a和b处分别是______[*]
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
IPSec提供了在局域网广域网和互联网中安全通信的能力以下关于IPSec说法错误的是______
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
热门题库
更多
中级数据库系统工程师
中级多媒体应用设计师
高级系统分析师
高级网络规划设计师
高级系统架构师
中级信息系统监理师
初级通信工程师
中级通信工程师
通信新技术、新业务知识
无线通信专业技术
移动通信专业技术
有线传输专业技术
电话交换专业技术
电信网络专业技术
计算机通信专业技术
通信电源专业技术