●Communication networks can be classified in terms of their physical arrangement or (73) Three common (73) are the star,bus,and ring.(73) A.structuresB.topologiesC.protocolsD.frames
●Communication networks can be classified in terms of their physical arrangement or (73) Three common (73) are the star,bus,and ring.
(73) A.structures
B.topologies
C.protocols
D.frames
相关考题:
“Must I finish my homework now?” “No, you() . But you() finish it this evening. ” A. mustn’ t…mustB. needn’ t…mustC. can’ t…canD. can’ t…must
The price you quoted is so high that we () help ()this transaction.A、can…to cancelB、can't...cancelingC、can…cancelingD、can't…to cancel
—_______ I return the book to the library this week?— No, you _______.You can keep it until the end of this month. A.Must; needn’tB.Can; can’tC.May; mustn’tD.Can; mustn’t
A basic premise of OGSA is that everything is(71)by a service: a network enabled entity that(72)some capability through the exchange of messages. Computational resources, storage resources, networks, programs, databases, and so forth are all(73). This adoption of a uniform. service-oriented model means that all components of the environment are virtual. More specifically, OGSA represents everything as a Grid service: a Web service that conforms(74)a set of conventions and supports standard interfaces for such purposes as lifetime management. This core set of consistent interfaces, from which all Grid services are implemented,(75)the construction of hierarchical, higher-order services that can be treated in a uniform. way across layers of abstraction.A.definedB.representedC.usedD.passed
---- Look! The man at the gate ________ be our headmaster. He is always standing there every morning.--- - No, it ________ be him. He is holding a meeting in the office now.A.must, can’t B.must, mustn’t C.can’t, can’t D.can’t, mustn’t
Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from(71),competitors,or even employees.Many of the organizations that manage their own(72)network security and use the Internet for more than just sending/receiving e-mails experience a network(73)—and more than half of these companies do not even know they were attacked.Smaller(74)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are trapped in a situation where they do not have the necessary time and(75)to spend on security.A.usersB.campusesC.companiesD.networks