|
一、单选题(共 10 道试题,共 50 分。)V 1. ( ), in networking, to establish the validity of a user or an object.
A. Authenticate
B. Decrypt
C. Encryption
D. Firewall
满分:5 分
2. ( ) stores data in tables that consist of rows and columns. Each row has a primary key and each column has a unique name.
A. Relational Database
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
满分:5 分
3. ( ):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
满分:5 分
4. ( )(Pravate Key),in encryption, one key is used to both lock and unlock data. Compare with public key.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
满分:5 分
5. An ( ) is a company that provides access to the Internet.
A. TCP/IP
B. APRANET
C. FTP
D. ISP
满分:5 分
6. ( ) shorts for Audio-Video Interleaved. It is a video file format supported by Windows and some other software. It can handle the synchronous problem between audio and video information by using the video lossy compressing technology.
A. AVI
B. DAT
C. BMP
D. GIF
满分:5 分
7. A ( ) is a line rented from a telephone company for the exclusive use of a customer to access Internet.
A. leased line
B. online payment
C. credit card
D. ISP
满分:5 分
8. ( ) shorts for Waveform. It is the audio file format of Microsoft, and it is the waveform sound file format in Windows defined by Microsoft. It is the most common file format of digital sound derived from sampling.
A. MIDI
B. WAV
C. RA
D. Audio
满分:5 分
9. ( )(MIS) are designed to take the relatively raw data available through a TPS and convert them into a summarized and aggregated form for managers, usually in a report format.
A. Decision Support Systems
B. Expert Systems
C. Management Information Systems
D. Data Mining
满分:5 分
10. ( ) is a person who is responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring software and hardware resources as needed.
A. Database Management Administrator
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
满分:5 分
二、判断题(共 10 道试题,共 50 分。)V 1. To protect data, you need to implement a data backup and recovery plan.
A. 错误
B. 正确
满分:5 分
2. The Internet is a worldwide system of computer networks in which any one computer can get information from/or talk to any other connected computer using the TCP/IP protocols.
A. 错误
B. 正确
满分:5 分
3. www.asp.com is an E-mail address.
A. 错误
B. 正确
满分:5 分
4. Program flowchart is an outline of the logic of the program you will write.
A. 错误
B. 正确
满分:5 分
5. Java is a compiled object-oriented programming language used to write applets.
A. 错误
B. 正确
满分:5 分
6. Microsoft Access is a database management system from Microsoft, packaged with Microsoft Office.
A. 错误
B. 正确
满分:5 分
7. FTP is the messages, usually text, send from one person to another via the Internet.
A. 错误
B. 正确
满分:5 分
8. To access the Web, users require a Web browser ,which is the software program used to access the World Wide Web.
A. 错误
B. 正确
满分:5 分
9. A file is a collection of relation fields.
A. 错误
B. 正确
满分:5 分
10. The standard protocol used for sending Internet e-mail is called SMTP. It works in conjunction with POP servers.
A. 错误
B. 正确
满分:5 分 |
|