Packet-switching wireless networks are preferable(71)when transmissions are(72)because of the way charges are(73)per packet. Circuit-switched networks are preferable for transferring large files or for other lengthy transmissions because customers are(74)for the(75)of time they use the network.A.toB.forC.thanD.only

Packet-switching wireless networks are preferable(71)when transmissions are(72)because of the way charges are(73)per packet. Circuit-switched networks are preferable for transferring large files or for other lengthy transmissions because customers are(74)for the(75)of time they use the network.

A.to

B.for

C.than

D.only


相关考题:

He had no plans to retire _______he is now very comfortably off. (A) until(B) when(C) because(D) even though

●A firewall is a (71) system designed to (72) an organization′s network against threats.(71) A.operatingB.programmingC.securityD.data(72) A.preventB.protectC.examineD.exploit

● The (71) is a general description of the architecture of a workflow management system used by the WFMC, in which the main components and the associated interfaces are summarized. The workflow enactment service is the heart of a workflow system which consists of several (72).(71)A. waterfall modelB. workflow reference modelC. evolutionary modelD. spiral model(72)A. workflow enginesB. processesC. workflow threadsD. tasks

A basic premise of OGSA is that everything is(71)by a service: a network enabled entity that(72)some capability through the exchange of messages. Computational resources, storage resources, networks, programs, databases, and so forth are all(73). This adoption of a uniform. service-oriented model means that all components of the environment are virtual. More specifically, OGSA represents everything as a Grid service: a Web service that conforms(74)a set of conventions and supports standard interfaces for such purposes as lifetime management. This core set of consistent interfaces, from which all Grid services are implemented,(75)the construction of hierarchical, higher-order services that can be treated in a uniform. way across layers of abstraction.A.definedB.representedC.usedD.passed

71-72第71题:

Asystems architecture is a representation of a system in which there is amapping of(71)onto hardware and softwarecomponents, a mapping of the(72)onto thehardware architecture. and a concern for the human interaction with thesecomponents. That is, system architecture is concerned with a total system, includinghardware. software, and humans.Softwarearchitectural structures can be divided into three major categories, dependingon the broad nature of the elements they show.1)(73)embodydecisions as a set of code or data units that have to be constructed orprocured.2)(74)embody decisions as to how the systemis to be structured as set of elements that have runtime behavior. andinteractions.3)(75)embody decisions as to how thesystem will relate to nonsoftware structures in itsenvironment(suchas CPUs, file systems, networks, development teams, etc.).71.( )A.attributesB.constraintC.functionalityD.requirements

● One of the most widely used routing protocols in IP networks is the Routing Information Protocol (RIP). RIP is the canonical example of a routing protocol built on the (71)algorithm. Routing protocols in internetworks differ slightly from the idealized graph model. In an internetwork, the goal of the routers to forward packets to various (72).Routers running RIP send their advertisement about cost every (73) seconds. A router also sends an update message whenever an update from another router causes it to change its routing table.It is possible to use a range of different metrics or costs for the links in a routing protocol. RIP takes the simplest approach, with all link costs being equal (74). Thus it always tries to find the minimum hop route. Valid distances are 1 through (75).This also limits RIP to running on fairly small networks.(71)A. distance vectorB. link stateC. floodingD. minimum spanning tree(72)A. computersB. routersC. switchesD. networks(73)A. 10B. 30C. 60D. 180(74)A. 1B. 15C. 16D. length of the link(75)A. 6B. 10C. 15D. 16

(72)A.computersB.routersC.switchesD.networks

Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from(71),competitors,or even employees.Many of the organizations that manage their own(72)network security and use the Internet for more than just sending/receiving e-mails experience a network(73)—and more than half of these companies do not even know they were attacked.Smaller(74)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are trapped in a situation where they do not have the necessary time and(75)to spend on security.A.usersB.campusesC.companiesD.networks

1、下列序列中哪个是最小堆?A.2, 55, 52, 72, 28, 98, 71B.2, 28, 71, 72, 55, 98, 52 ‍C.2, 28, 52, 72, 55, 98, 71‍D.28, 2, 71, 72, 55, 98, 52