anh 10
_ At the receiving node, the presentation layer expandsè decrypts
_ Press Backspace, the letters to the left of the ècursor
_____ backup copies all the selected filesè Incremental/ differential
_____ backup copies all the selected filesè. Full
_____ copies all the files created or modifiedè Differential
_____ depend onsearch robots which browseè Keyword search engines
_____ indicates that the drive or folder carriesèToggle-box
_____ is a device for controlling a set of hard disksè RAID controller
_____ is a device installed on a PC to allowè TA
_____ is a process of spreading dataèStripin
_____ is a system of encoded instructionsè markup language
_____ is a way of making phone callsè VOIP
_____ is necessary for downloadingèFTP
_____ is the main transmission path, handlingèbackbone
_____ is the term used for differences in theè Jitter
_____ networks are more complex to set upè Because
_____ transmission is not usedè Asynchronous
_____ using the ISPs is free, we still haveè Although
_____ viruses store themselves in theè. boot sector
_____ you click on a URL, yourè When
______the DSN server has found the IP addressè Once
_____are group of user è Newsgroups
_A ………….. is a simple computer comprisingè thin client
_A free ISP's sign-up software on CD-ROM automaticallyè configures
_A GPS receiver contains a microprocessorè altitude
_A higher numbered RAID arrayè. Integrity
_A network… a small area such as an officeè covers
_A server is a powerful computerè storing/ shared
_A site map offers a good overviewè additional
_A special computer that directs communicating messagesè server
_A special hard disk controller, called aè RAID controller
_A(n) ……………….. calculates and verifies the checksumè intermediate node
_A… causes the payload to be activated atè trigger
_A… is a device used for reading smart cardsè smart card reader
_A… is a hardware and software combinationè bridge
_A… is a network transmission pathè backbone
_A… is a special computer directing messagesè router
_A… is an electronic device connectingè hub
_A… one main part of a virus,è payload
_Adding concealed… What kind of computer crimeè Trojan Horse
_Advanced home networks are likely to have aè client/server
_After you receive an email massage, you canè forward
_All computers are connected through another electronic deviceè would lose
_Although the format of a email message is definedè hold
_Although the format of a email message is definedè protocols
_An additional display featureè called
_An increasingly popular way of communicatingè using
_An interface that enables dissimilar networks toè gateway
_An intermediate nodeè reroutes
_An Internet service called………………….. can be used by usersè MOOs
_An optical character recognition programè must be used
_Apart from military uses, GPS can be usedè navigation
_At receiving node,data link layer … è recalculated
_At receiving node,the transport layer… è reassembles
_Avoid… your personal information such as real nameè giving
_Barbara has just created a siteè using/ called
_By defining your own markup tagsè explicitly
_Cable companies can also offerè affordable
_Changing the information shown on anotherè Defacing
_CMC stands forè Computer-Mediated Communication
_Computers are controlled by sets of instructionsè called
_Computers can be connected… various types of cablingè to use
_Computers thatè uses
_Data-link layer confirms theèchecksum
_Each user has a keypadè that enables
_Experts predict that a new kind ofè spit
_For safety reasons, this applianceè must be earthed
_Gaining unauthorized… What kind of computer crimeè. Hacking
_Groups of usersè sharing
_Hey Matt, the navigation systemè should be based
_Home networking is just a matter of connecting someècabling
_HTML is a language that is all about theè presentation language
_I advise you to useèpower-saving
_I strongly recommend that youè. hardware and software
_If someone wants to chat to other users in real-timeè IRC
_If you added more RAM memory, your computerè would process
_If you do not use any anti-virus programs, your computerè by
_If you have to use frames on your pageè include
_If you want to adjust the space allocated to each paneè divider
_If you… a better search engineè used
_In network communications… makes sure that the messages is transmittedè presentation layer
_In the… on the right of the window, just double-clickingè navigation pane
_In Windows Explorer, these handyè toggle-box
_Internet Relay Chat… exmple of..,èsynchronous
_Inundating an email… What kind of computer crimeè Mail bombing
_It is impossible… with any certainty how computersè to predict
_It's a good ideaè to base
_It's advisable… up-to-date anti-virus softwareè to use
_Japan has the most VOIP usersè likely
_Just double-click this icon to start the virus scanningè has found
_Keyword search engines can produceè hits
_Leaving, within a… What kind of computer crimeè Trapdoors
_Liquids mustn'tè be taken
_Manipulating programs…What kind of computer crimeè Salami Shaving
_Many free ISPs require you toè sign in
_Medical cards, which store information about users'è may become
_Most future home network are likely to be wirelessè receiver
_Most search engines offer advanced searchè. Exclude
_Never phone inè. peak
_Never… ICs with a screwdriver asè remove
_Normal copper telephone wiresè can be used
_Once a message… using SMTP, it can't beè has been delivered
_Once you… on a hyperlink, you have toè have clicked
_Packets of data are passed from router to routerè until
_Packets of data may travel by different routes beforeè reaching
_PCs with Ethernet… can be connected to formè adapter
_Peripherals are pieces of equipmentè connected
_POP is a message-retrieval protocolè used
_POP3 email can be … è downloaded
_Program usually..tested and alterd.. èdebugged
_Pull-mode is the email transfer process in whichè initiates
_Push operation is not suitableè for
_RAID stands forè Redundant Array of Inexpensive Disks
_Redirecting anyone… What kind of computer crimeè Hijacking
_Searching for phrases or aè combination
_Server manufacturers connect hard drives toè adequately
_SGML is not true languageè metalanguage
_SMTP is the only protocol for transferringè servers
_SMTP is used toè transfer
_SMTP stands forè Simple Mail Transfer Protocol
_Standard Generalized Markup Languageè. Spawned
_Streaming is a way of dealing withè bandwidth
_Swamping a server… What kind of computer crimeè Denial of Service attack
_The advantage of …transmission is that the è Asynchronous
_The ALT text will make itè. Possible
_The application layer… a message's data from humanè converts
_The GPS was developed by the USè pinpoint
_The language from which you can createèmetalanguage
_The network can… the owners' presence makingè simulate
_The physical layer encodes the packets intoè analog signal Lưu lại
_The price of a ‘free’è domain
_The simplest network allow basicè file-sharing
_The technology… to set up a home networkè needed
_The transmission mode in which each computer takes turnè half-duplex
_The transport layer… the data into segmentsè identifies
_There are different standards methods ofè connecting
_There are many Internet services such as email forè browsing webpages
_There are plenty of sites for fans of particularè genres
_They have designed a siteè dedicating
_This house has an electronic doorkeeperè which is programmed
_To … means to connect to a network system accountè log on
_To have a good site, no pageè mustn't be
_To set boundaries to the beginning and theè bracket
_Transmission via the Internet can be of two typesè Asynchronous
_Tricking a user… What kind of computer crimeè Phishing
_Unauthorised copying… What kind of computer crimeè Software Piracy
_Using another person’s… What kind of computer crimeè Piggybacking
_Video conferencing is a more advanced form of communicationè which enables
_VoIP deals with theè loss
_VOIP uses a …at the receiving è Buffer
_VR is likelyè to be used_
_We can be certain that eventually all ofè packet-switching technology
_Web designers shouldè avoid using
_What does the italic part meanè encrypt
_When a message is sent from one computer to anotherèheader
_When both computers send and receive at the same timeè full-duplex
_When connection slowdowns or interruptions occurè buffer
_When you use a search engine, it providesè related
_Which network communication è Physical layer
_Which network communications layer protects the dataè transport layer
_Which network communications layer starts è session layer
_With…DSL system separates the digital è splitter-based services
_XML and its associated applicationsè blow/off
_XML defines a specific method for creatingè text formats
_XML documents useè HTML
_XML is extensible because it letsè customized
_XML stands forè Extensible Markup Language
_XML, unlike HTML, is concerned with theè identity
_You should figure out how to openè at fault
_You should reboot your PCè recurs
Bạn đang đọc truyện trên: AzTruyen.Top