Currently 94% of Web users use either Internet Explorer or Firefox, but recently some new (71) have been developed that are beginning to attract attention. The browser Opera is becoming very(72)because of its speed, it is currently the world’s fastest browser, and because it is much smaller(73) existing browsers (it can almost fit on a single diskette). It can also (74)the last Web page you visited, so the next time you surf, you can start where you left off. And like the big two, you can get it for free; the catch is that you have to watch blinking ads in one corner, or pay $40 for the ad-free (75) of Opera.A.versionB.revisionC.softwareD.book
Currently 94% of Web users use either Internet Explorer or Firefox, but recently some new (71) have been developed that are beginning to attract attention. The browser Opera is becoming very(72)because of its speed, it is currently the world’s fastest browser, and because it is much smaller(73) existing browsers (it can almost fit on a single diskette). It can also (74)the last Web page you visited, so the next time you surf, you can start where you left off. And like the big two, you can get it for free; the catch is that you have to watch blinking ads in one corner, or pay $40 for the ad-free (75) of Opera.
A.version
B.revision
C.software
D.book
B.revision
C.software
D.book
参考解析
解析:参考译文:目前,有94%的网络用户使用Internet Explorer或firefox浏览器,但最近也开发出了一些新的浏览器,并吸引了用户的注意。Opera浏览器现在变得非常受欢迎,因为它是目前世界上速度最快的浏览器,也因为它远小于现存浏览器(它几乎可以存放在一个单一的软盘)。它可以记住上次访问过的网页,因此当你下次上网时,它会从这一页面开始。和两个主流的浏览器一样,你也可以免费使用Opera,只不过你必须观赏角落里的广告,或支付40美元来获得没有广告的Opera版本。
相关考题:
WWW is popular for its multimedia transmission and friendly(71). Although the speed of network has been improved considerably in recent years, the rapid(72)of using the Internet, the inherited character of delay in the network and the Request/Response working mode of WWW still make the Internet traffic very(73)and give no guarantee on the Quality of Service. Because HTTP has no states, the web server cannot know the users' demand and the users' requests cannot be predicted Taking advantage of a cache mechanism and the time locality of WWW accesses, the browser can preserve the documents ever accessed in the local machine. By this means, for the documents in the local cache, the browser does not need to send the requests to the remote server or to receive the whole responses from the remote one Pre-fetching uses the space locality of accesses First, the users' access requests are predicted according to the users' current request. Secondly, the expected pages are fetched into the local cache when the user is brow sing the current page. Finally, the users can access these pages downloaded from the local cache. And this can reduce the access delay to some degrees. Pre-fetching is one kind of active caches that can cache the pages which are still not requested by the user. The application of pre-fetching technology in the web can greatly reduce the waiting time after users have sent their requests. This paper brings forward an intelligent technique of web pre-fetching, which can speed up fetching web pages. In this technique, we use a simplified WWW data model to represent the data in the cache of web browser to mine the association rules. We store these rules in a knowledge base so as to(74)the user's actions. In the client sides, the agents are responsible for mining the users' interest and pre-fetching the web pages, which are based on the interest association repository. Therefore it is(75)for the users to speed up the browsing.A.interactiveB.interactionC.interactivityD.infection
When you are(71)a home or small office network, it is recommended that you use the Network Setup Wizard in Windows XP Home Edition to enable Internet Connection Sharing. The Network Setup Wizard automatically provides all of the network settings you need to(72)one Internet connection with all the computers in your network.After ICS is enabled, and you make sure that all of your computers can(73)with each other and they have Internet(74), you can use programs such as Internet Explorer and Outlook Express as if they were(75)connected to the Internet service provider(ISP). When a request to the Internet is made, the ICS host computer connects to the ISP and creates the connection so that other computers can reach a specified Web address or download E-mail.A.creatingB.reachC.going forD.setting up
When you think of the Internet, you probably think of ".com." Just what do those three letters at the end of a World Wide Web address mean? Every computer that hosts data on the Internet has a(71)numerical address. For example, the numerical address for the White House is 198.137.240.100. But since(72)people want to remember long strings of numbers, the(73)was developed. It is a critical part of the Internet's technical infrastructure, correlates a numerical address to a word. To(74)the White House website, you could type its numerical address into the address box of your web browser. But most people prefer to use "www. whitehouse. gov." In this case, the domain name is(75).A.uniqueB.isolatedC.similarD.same
Currently 94% of Web users use either Internet Explorer or Firefox, but recently some new(71) have been developed that are beginning to attract attention. The browser Opera is becoming very(72) because of its speed, it is currently the world's fastest browser, and because it is much smaller(73) existing browsers (it can almost fit on a single diskette). It can also(74) the last Web page you visited, so the next time you surf, you can start where you left off. And like the big two, you can get it for free; the catch is that you have to watch blinking ads in one comer, or pay $40 for the ad-free (75) of Opera.A.readersB.machinesC.techniquesD.browsers
A user states that their web browser was recently updated and continuously crashes. Which of the following could the technician use to gather more information about the issue?() A. NTBACKUP logB. Advanced tab in the System applet in Control PanelC. Event LogD. Internet Options applet in Control Panel
The most accurate and most boring way to(105)Java is that it is a new computer programming language developed by Sun Microsystems that creates(106)independent programs that can be distributed and nm remotely. To run Java programs, a computer must have a Java interpreter. Currently(107)Java programs are small "applets" that are(107)as part of web pages.When you use a Java(108)browser to view a Web page that includes a Java applet, the browser loads the applet onto your computer through your modem or network. Then the Java interpreter runs the applet, which could include animation or sound, on your computer rather than transmitting the code bit by bit over Internet. A few thousand bytes of Java code can tam into a powerful program on your computer.So an applet could include(109)with Java interpreter.A.commandB.commentC.describeD.discover
All computers need some sort of(71)(OS). Tile majority of modem home computers use some form. of Microsofts OS. The original Microsoft OS was called DOS though most computers use Windows. Windows comes in various versions beginning with(72)x then 95, 98, ME and currently XP. A few computers use IBMs O/SApples Mac uses their own OS beginning with OS I though most modem Macs use version x or x. Apples latest version is OS 10.x. In the past large companies and institutions would have an OS design exclusively for them but as the Commercial OS become more sophisticated the benefits of this practice is becoming less apparent. Some computer professionals,(73)(ISP)and(74)computer users use an OS such as UNIX(or a variant such as Linux), Windows NT or 2000(Win2k)or one of the other network or(75)based OS.A.Operated SystemB.Operated SystemC.Operating SystemD.Operation System
You are a network administrator for The network consists of a single Active Directory domain named.The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.The financial application suite and the browser-based application are frequently updates with patches or new versions.You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.Which three actions should you perform to configure software restriction polices?()(Each correct answer presents part of the solution. Choose three)
Currently 94% of Web users use either Internet Explorer or Firefox, but recently some new (71) have been developed that are beginning to attract attention. The browser Opera is becoming very(72)because of its speed, it is currently the world’s fastest browser, and because it is much smaller(73) existing browsers (it can almost fit on a single diskette). It can also (74)the last Web page you visited, so the next time you surf, you can start where you left off. And like the big two, you can get it for free; the catch is that you have to watch blinking ads in one corner, or pay $40 for the ad-free (75) of Opera.A.think B.readC.write D.remember
You share your computer with other users. You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users. What should you do?()A、Uninstall the new Windows Internet Explorer add-on.B、Log on as an administrator and disable the new Windows Internet Explorer add-on.C、Direct other users to log on and disable the new Windows Internet Explorer add-on.D、Select the Turn off Automatic Website Checking option for the Phishing filter.
The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()A、A new default gateway has been setup.B、A new Internet shortcut has been added.C、A new web browser has been installed and is now the default.D、A proxy server has been enabled.
A user states that their web browser was recently updated and continuously crashes. Which of the following could the technician use to gather more information about the issue?()A、NTBACKUP logB、Advanced tab in the System applet in Control PanelC、Event LogD、Internet Options applet in Control Panel
A user reports they can no longer change the web browser home page. Which of the following is MOSTlikely the problem? ()A、They are using the wrong WEP key.B、They have been infected with malware.C、They have lost Internet connectivity.D、They need to update their network device drivers.
You are the administrator of an Active Directory domain. All servers run Windows Server 2003. You configure a server named Server3 as the DNS server for the domain.The company recently started using a new ISP. Since the change to the new ISP occurred, users report that they cannot access Internet Web sites by using their fully qualified domain names (FQDNs).You manually configure a test computer to use the DNS server address of the new ISP. The test computer can successfully access Internet Web sites by using their FQDNs.You need to ensure that network users can access Internet Web sites by using their FQDNs, while ensuring that user access to internal resources is not disrupted. What are two possible ways to achieve this goal?()A、Create a root zone on Server3.B、Configure Server3 to use the default root hints.C、Configure a forwarder on Server3 to the new ISP’s DNS server.D、Configure all computers on your network to use the new ISP’s DNS server.
You deploy Windows 7 and several custom Internet Explorer add-ons to 1,000 client computers. Internet Explorer closes when users run a specific Web application. You need to find out whether an add-on is the cause of the problem. What should you do?()A、Start Internet Explorer in No Add-ons mode.B、Reset all Internet Explorer security zones to the default levels.C、Use Group Policy to turn on Internet Explorer 7 Standards mode.D、Use Group Policy to disable the Programs tab in Internet Explorer for all client computers.
You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers. Users occasionally change the Internet Explorer settings on individual client computers. The company wants to maintain a standard Internet Explorer configuration on all client computers. You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers. What should you do?()A、Enable User Group Policy loopback processing mode.B、Use the Group Policy Update utility to refresh Group Policy.C、Enable Internet Explorer Maintenance Policy Processing in Group Policy.D、Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box.
Your network has client computers that run Windows 7. A custom Web-based application requires specific security settings. You need to prevent users from permanently modifying their Internet Explorer browser’s security settings. What should you do?()A、Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode.B、Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode.C、Reset the Internet Explorer settings.D、Restore the advanced settings in Internet Explorer.
单选题Which of the following statements is true according to the passage?AThe address system was used to make web pages.BThe World Wide Web was created in Switzerland.CThe fist web browser was very expensive to buyDMany people could use the Internet before 1990
多选题You are a network administrator for The network consists of a single Active Directory domain named. The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO. Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:/Program Files/MT Apps. The financial application suite contains many executable files. Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components. The financial application suite and the browser-based application are frequently updates with patches or new versions. You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration. Which three actions should you perform to configure software restriction polices?() (Each correct answer presents part of the solution. Choose three)ASet the default security level to Disallowed.BSet the default security level to Unrestricted.CCreate a new certificate rule.DCreate a new hash rule.ECreate a new Internet zone rule.FCreate a new path rule.
单选题Your network has client computers that run Windows 7. A custom Web-based application requires specific security settings. You need to prevent users from permanently modifying their Internet Explorer browser’s security settings. What should you do?()AUse Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode.BUse Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode.CReset the Internet Explorer settings.DRestore the advanced settings in Internet Explorer.
单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()ARun ipconfig /flushdns at the command prompt. BReset the password for the local administrator user account. CFrom the Internet Options in Internet Explorer, clear the AutoComplete history.DFrom the Internet Options in Internet Explorer, delete the Temporary Internet Files.
多选题You are a systems administrator responsible for configuring a Windows Server 2008 SMTP server. Yourorganization is currently using the default SMTP virtual server for sending order notifications from a single Web application called ContosoOrderManagement. Recently, you have noticed that a largenumber of messages have been sent to the SMTP virtual server from other computers and users. Which two methods can you use to prevent unauthorized access to the SMTP server?()AEnable Basic Authentication.BConfigure a smart host for use by the SMTP virtual server.CAdd Connection Control entries to limit which IP addresses can use the SMTP server.DModify settings on the Security tab of the properties of the SMTP virtual server.
单选题The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()AA new default gateway has been setup.BA new Internet shortcut has been added.CA new web browser has been installed and is now the default.DA proxy server has been enabled.
问答题Questions 1 to 5 are based on the following passage. Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed by Mozilla. “It’s reflective of a trend that we’ve seen over the last year with more web users becoming frustrated with the Internet experience,” said Chris Hoffmann of the Mozilla Foundation, a non-profit group supported by Sun Microsystems, IBM and other companies, backing as an alternative to Microsoft. Much of that frustration has centered on Microsoft, which has been heavily criticized for producing software vulnerable to hand virus writers. Microsoft has responded with a series of patches designed to plug vulnerabilities in its Windows operating system, Internet Explorer web browser and other software. But computer owners are growing weary of continuously updating software to protect against new threats. One incident last month enabled hackers to gain access to web surfers’ computers by taking advantage of vulnerabilities in Microsoft’s browser. Hackers could then install remote access Trojan programs that enabled them to control a victim’s computer. The hackers could also install software to capture a victim’s keystrokes to steal data such as bank account numbers and passwords. Mr. Hoffmann hoped publicity stemming from Microsoft’s security woes(灾难) would translate into a market share increase for Mozilla’s software, which includes the new highly regarded Firefox Internet browser. But Mozilla suffered a setback last week when it was forced to issue a software patch to counter a newly discovered vulnerability affecting its Internet browsers. Still, Mr. Hoffmann said Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience. Security experts agree that has made it easier for hackers to exploit computers running on Microsoft software. Others suggest Microsoft has been targeted by hackers and virus writers simply because more than 90 per cent of the world’s computers run on the software giant’s operating system. Questions: 1.What is the meaning of the phrase “fed up with” (Para.1)? 2.It can be guessed that the word “plug” (Para.3) means ________________. 3.Why more web users have become frustrated? 4.What happened to Mozilla’s Internet browsers last week? 5.How would Microsoft be less vulnerable?
填空题Internet Explorer、Firefox、Opera等软件属于()。