一起答
单选

实现容错计算的主要手段是冗余。(7)中动态冗余的典型例子是热备系统和冷备系统。

  • A.结构冗余
  • B.信息冗余
  • C.时间冗余
  • D.冗余附加技术
参考答案
查看试卷详情
相关试题
  1. (86)

    • A.same
    • B.different
    • C.difference
    • D.some
  2. (84)

    • A.synchronous
    • B.Asynchronous
    • C.symmetric
    • D.asymmetric
  3. (85)

    • A.two related keys are
    • B.a key is
    • C.two unrelated keys are
    • D.three keys are
  4. In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private-key encryption methods are called(71)ciphers, information is encrypted with(72)both the sender and receiver hold privately. Public-key encryption methods are called(73)ciphers,(74)created for each user, encryption key and deception key are(75)

    • A.synchronous
    • B.Asynchronous
    • C.symmetric
    • D.asymmetric
  5. (83)

    • A.a key
    • B.two keys
    • C.three keys
    • D.four keys
  6. (81)

    • A.in general
    • B.in any term
    • C.in set terms
    • D.in terms of
  7. (80)

    • A.faced on
    • B.faced with
    • C.faced about
    • D.faced up to
  8. (79)

    • A.consolidates
    • B.consists
    • C.considerate
    • D.consoles
  9. In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. Heterogeneous network environments consist of computer systems from(66)vendors that run(67)operating systems and communication protocols. An organization that(68)its computer resources is usually(69)the task of integrating its heterogeneous systems. Typically, each deparlment or division has defined its own network needs(70)OS, LAN topology, communication protocols,applications, and other components.

    • A.same
    • B.similar
    • C.different
    • D.difference
  10. (78)

    • A.same
    • B.similar
    • C.different
    • D.difference