anh 10

Màu nền
Font chữ
Font size
Chiều cao dòng

_ At the receiving node, the presentation layer expandsè decrypts

_ Press Backspace, the letters to the left of the ècursor

_____ backup copies all the selected filesè Incremental/ differential

_____ backup copies all the selected filesè. Full

_____ copies all the files created or modifiedè Differential

_____ depend onsearch robots which browseè Keyword search engines

_____ indicates that the drive or folder carriesèToggle-box

_____ is a device for controlling a set of hard disksè RAID controller

_____ is a device installed on a PC to allowè TA

_____ is a process of spreading dataèStripin

_____ is a system of  encoded instructionsè markup language

_____ is a way of making phone callsè VOIP

_____ is necessary for downloadingèFTP

_____ is the main transmission path, handlingèbackbone

_____ is the term used for differences in theè Jitter

_____ networks are more complex to set upè Because

_____ transmission is not usedè Asynchronous

_____ using the ISPs is free, we still haveè Although

_____ viruses store themselves in theè. boot sector

_____ you click on a URL, yourè When

______the DSN server has found the IP addressè Once

_____are group of user è Newsgroups

_A ………….. is a simple computer comprisingè thin client

_A free ISP's sign-up software on CD-ROM automaticallyè configures

_A GPS receiver contains a microprocessorè altitude

_A higher numbered RAID arrayè. Integrity

_A network… a small area such as an officeè covers

_A server is a powerful computerè storing/ shared

_A site map offers a good overviewè additional

_A special computer that directs communicating messagesè server

_A special hard disk controller, called aè RAID controller

_A(n) ……………….. calculates and verifies the checksumè intermediate node

_A… causes the payload to be activated atè trigger

_A… is a device used for reading smart cardsè smart card reader

_A… is a hardware and software combinationè bridge

_A… is a network transmission pathè backbone

_A… is a special computer directing messagesè router

_A… is an electronic device connectingè hub

_A… one main part of a virus,è payload

_Adding concealed… What kind of computer crimeè Trojan Horse

_Advanced home networks are likely to have aè client/server

_After you receive an email massage, you canè forward

_All computers are connected through another electronic deviceè would lose

_Although the format of a email message is definedè hold

_Although the format of a email message is definedè protocols

_An additional display featureè called

_An increasingly popular way of communicatingè using

_An interface that enables dissimilar networks toè gateway

_An intermediate nodeè reroutes

_An Internet service called………………….. can be used by usersè MOOs

_An optical character recognition programè must be used

_Apart from military uses, GPS can be usedè navigation

_At receiving node,data link layer … è recalculated

_At receiving node,the transport layer… è reassembles

_Avoid… your personal information such as real nameè giving

_Barbara has just created a siteè using/ called

_By defining your own markup tagsè explicitly

_Cable companies can also offerè affordable

_Changing the information shown on anotherè Defacing

_CMC stands forè Computer-Mediated Communication

_Computers are controlled by sets of instructionsè called

_Computers can be connected… various types of cablingè to use

_Computers thatè uses

_Data-link layer confirms theèchecksum

_Each user has a keypadè that enables

_Experts predict that a new kind ofè spit

_For safety reasons, this applianceè must be earthed

_Gaining unauthorized… What kind of computer crimeè. Hacking

_Groups of usersè sharing

_Hey Matt, the navigation systemè should be based

_Home networking is just a matter of connecting someècabling

_HTML is a language that is all about theè presentation language

_I advise you to useèpower-saving

_I strongly recommend that youè. hardware and software

_If someone wants to chat to other users in real-timeè IRC

_If you added more RAM memory, your computerè would process

_If you do not use any anti-virus programs, your computerè by

_If you have to use frames on your pageè include

_If you want to adjust the space allocated to each paneè divider

_If you… a better search engineè used

_In network communications… makes sure that the messages is transmittedè presentation layer

_In the… on the right of the window, just double-clickingè navigation pane

_In Windows Explorer, these handyè toggle-box

_Internet Relay Chat… exmple of..,èsynchronous

_Inundating an email… What kind of computer crimeè Mail bombing

_It is impossible… with any certainty how computersè to predict

_It's a good ideaè to base

_It's advisable… up-to-date anti-virus softwareè to use

_Japan has the most VOIP usersè likely

_Just double-click this icon to start the virus scanningè has found

_Keyword search engines can produceè hits

_Leaving, within a… What kind of computer crimeè Trapdoors

_Liquids mustn'tè be taken

_Manipulating programs…What kind of computer crimeè Salami Shaving

_Many free ISPs require you toè sign in

_Medical cards, which store information about users'è may become

 _Most future home network are likely to be wirelessè receiver

_Most search engines offer advanced searchè. Exclude

_Never phone inè. peak

_Never… ICs with a screwdriver asè remove

_Normal copper telephone wiresè can be used

_Once a message… using SMTP, it can't beè has been delivered

_Once you… on a hyperlink, you have toè have clicked

_Packets of data are passed from router to routerè until

_Packets of data may travel by different routes beforeè reaching

_PCs with Ethernet… can be connected to formè adapter

_Peripherals are pieces of equipmentè connected

_POP is a message-retrieval protocolè used

_POP3 email can be … è downloaded

_Program usually..tested and alterd.. èdebugged

_Pull-mode is the email transfer process in whichè initiates

_Push operation is not suitableè for

_RAID stands forè Redundant Array of Inexpensive Disks

_Redirecting anyone… What kind of computer crimeè Hijacking

_Searching for phrases or aè combination

_Server manufacturers connect hard drives toè adequately

_SGML is not true languageè metalanguage

_SMTP is the only protocol for transferringè servers

_SMTP is used toè transfer

_SMTP stands forè Simple Mail Transfer Protocol

_Standard Generalized Markup Languageè. Spawned

_Streaming is a way of dealing withè bandwidth

_Swamping a server… What kind of computer crimeè Denial of Service attack     

_The advantage of …transmission is that the è Asynchronous

_The ALT text will make itè. Possible

_The application layer… a message's data from humanè converts

_The GPS was developed by the USè pinpoint

_The language from which you can createèmetalanguage

_The network can… the owners' presence makingè simulate

 _The physical layer encodes the packets intoè analog signal Lưu lại

_The price of a ‘free’è domain

_The simplest network allow basicè file-sharing

_The technology… to set up a home networkè needed

_The transmission mode in which each computer takes turnè half-duplex

_The transport layer… the data into segmentsè identifies

_There are different standards methods ofè connecting

_There are many Internet services such as email forè browsing webpages

_There are plenty of sites for fans of particularè genres

_They have designed a siteè dedicating

_This house has an electronic doorkeeperè which is programmed

_To … means to connect to a network system accountè log on

_To have a good site, no pageè mustn't be

_To set boundaries to the beginning and theè bracket

_Transmission via the Internet can be of two typesè Asynchronous

_Tricking a user… What kind of computer crimeè Phishing

_Unauthorised copying… What kind of computer crimeè Software Piracy

_Using another person’s… What kind of computer crimeè Piggybacking

_Video conferencing is a more advanced form of communicationè which enables

_VoIP deals with theè loss

_VOIP uses a …at the receiving è Buffer

_VR is likelyè to be used_

_We can be certain that eventually all ofè packet-switching technology

_Web designers shouldè avoid using

_What does the italic part meanè encrypt

_When a message is sent from one computer to anotherèheader

_When both computers send and receive at the same timeè full-duplex

_When connection slowdowns or interruptions occurè buffer

_When you use a search engine, it providesè related

_Which network communication è Physical layer

_Which network communications layer protects the dataè transport layer

_Which network communications layer starts è session layer

_With…DSL system separates the digital è splitter-based services

_XML and its associated applicationsè blow/off

_XML defines a specific method for creatingè text formats

_XML documents useè HTML

_XML is extensible because it letsè customized

_XML stands forè Extensible Markup Language

_XML, unlike HTML, is concerned with theè identity

_You should figure out how to openè at fault

_You should reboot your PCè recurs

Bạn đang đọc truyện trên: Truyen2U.Pro