一起答
单选

In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private - key encryption methods are called(66)ciphers, information is encrypted with(67)both the sender and receiver hold privately. Public - key encryption methods are called(68)ciphers,(69)created for each user, encryption key and decryption key ale(70).

  • A.synchronous
  • B.Asynchronous
  • C.symmetric
  • D.asymmetric
试题出自试卷《软件水平考试(初级)网络管理员上午(基础知识)模拟试卷13》
参考答案
查看试卷详情
相关试题
  1. (103)

    • A.plane
    • B.plant
    • C.plate
    • D.platform
  2. (102)

    • A.Web browser's
    • B.terminal's
    • C.emulator's
    • D.network's
  3. (100)

    • A.displaying
    • B.illustrating
    • C.drawing
    • D.writing
  4. (101)

    • A.direct
    • B.navigate
    • C.indicate
    • D.go on
  5. (98)

    • A.same
    • B.different
    • C.difference
    • D.some
  6. For each blank, choose the best answer from the four choices and write down on the answer sheet. Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the browser knows how to deal with(71), and that it has a mechanism for(72)graphical fries. Display text, display graphics, and(73)hyperlinks-there' s 99 percent of the(74)value. That's not to say that the manufacturers didn't go all-out to attach a hyperactive efflorescence of useless capabilities onto their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you can't wait to delete from your favorites of bookmarks menu? Remember when client - side Java applets were supposed to become the preferred(75)for application development? Remember frames and all their nasty side effects?

    • A.superlinks
    • B.links
    • C.hyperlinks
    • D.connections
  7. (97)

    • A.two related keys ale
    • B.a key is
    • C.two unrelated keys ale
    • D.three keys ale
  8. (96)

    • A.synchronous
    • B.Asynchronous
    • C.symmetric
    • D.asymmetric
  9. (95)

    • A.a key
    • B.two keys
    • C.three keys
    • D.four keys
  10. In a data warehouse environmem, data is only valuable when it is organized and displayed as(75)

    • A.data
    • B.information
    • C.file
    • D.document