Most Computer operating systems in use today, including all consumer-targeted systems, include a TCP/IP().
第1题:
Computer systems consist of two very different types of elements: Hardware, which includes all the physical things that can be touched and(71)which tells the hardware how to do.
A.Operating system
B.I/O devices
C.Courseware
D.Software
第2题:
The kernel is the(66)of an operating system such as Windows98, Windows NT, Mac OS or Unix. The kernel provides basic services for the other parts of the operating system,(67)it possible for it to run several programs at once(multitasking), read and write files and connect to networks and peripherals. Applications and utility programs use the services provided by the kernel to provide practical business functionality.
In operating systems such as Windows or most versions of Unix, the kernel(68)everything except application and utility programs.
In microkernel operating systems such as Digital Unix and Apples forthcoming Mac OS Server, the kernel(69)supports only multitasking and memory management. Other services such as applications, utilities and the user interface support device drivers, API and graphics which all(70)outside the microkernel.
A.nucleus
B.center
C.core
D.heart
第3题:
Most operating systems have a standard set of () to handle the processing of all input and output instructions.
A.spreadsheet
B.control instructions
C.I/O operation
D.data table
第4题:
Operating systems provide ( ) between users and the computer.
A.a link
B.an interface
C.devices
D.applications
第5题:
The underlined word \\\"hacker\\\" (Para. 1) most probably means \\\"________\\\".
[A] highly recognizable names behind many of the computer technologies used today
[B] the negative connotation of those computer users
[C] a game, employing the tools that are readily available via the Internet
[D] people who break into computer systems
第6题:
第7题:
第8题:
第9题:
第10题:
A manufacturing business is presently supporting multiple UNIX platforms and considering the advantages of consolidating environments, adding new applications and standardizing on HP-UX with IA-64. Which advantage should be communicated as the most compelling reason to consider pSeries as the platform of choice?()
第11题:
You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()
第12题:
virtual machine queue (VMQ)
Virtual Machine Chimney
a synthetic network adapter
an emulated network adapter
第13题:
Software products may be (1)into four basic types: application programs, programming language processors, operating systems, and system utilities.
Application programs are programs that (2) useful tasks such as solving statistical problems, or keeping your company's books.
Programming language processors are programs that (3) the use if a computer language in a computer system. They are tools for the development of application programs.
Operation systems are programs that (4) the system resources and enable you to run application programs.
System utilities are special programs that (5) the usefulness of or add capabilities to a computer.
A.manage
B.perform
C.support
D.reduce
E.divided
第14题:
A(68)is a feature of the system or adescription of something the system is capable of doing in order to fulfill the system's purpose.
A.plan
B.requirement
C.document
D.Design
第15题:
The purpose of systems analysis phase is to build a logical model of the new system. The first step is( ), where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the( ). You use the fact-finding results to build business models, data and process models, and object models. The deliverable for the systems analysis phase is the( ), which describes management and user requirements, costs and benefits, and outlines alternative development strategies. The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase, you need to determine the( ), which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the( ), which is presented to management and users for review and approval.
A.System logical modelingB.use case modelingC.requirements modelingD.application modeling A.systems planning phaseB.systems modeling phaseC.systems analysis phaseD.systems design phase A.system charterB.system scope definitionC.system blueprintD.system requirement document A.application architectureB.system data modelC.system process modelD.implement environment A.system architecture descriptionB.system design specificationC.system technique architectureD.physical deployment architecture
第16题:
Text 3 The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn't have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.
The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above. security managers are being asked to support increasing degrees of network availability and access.
There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, antivirus protection.
第31题:Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?
[A] They are all good examples of today's computer users.
[B] They are driven by greed, power, revenge, or some other malicious intent.
[C] Their goal is to push programs beyond what they are designed to do.
[D] They are all dead.
第17题:
第18题:
第19题:
第20题:
第21题:
Which of the following is the MOST important step in any disaster recovery plan?()
第22题:
You are designing a plan for maintaining the WINS infrastructure on the new Windows Server 2003 Active Directory environment. Which factor or factors necessitate the need to maintain the WINS infrastructure?()
第23题:
plan
requirement
implementation
design