一起答
单选

在Windows系统中,通过设置文件的(14),可以使其成为“存档”文件。

  • A.格式
  • B.状态
  • C.类型
  • D.属性
试题出自试卷《软件水平考试(初级)网络管理员上午(基础知识)模拟试卷28》
参考答案
查看试卷详情
相关试题
  1. (86)

    • A.same
    • B.different
    • C.difference
    • D.some
  2. (84)

    • A.synchronous
    • B.Asynchronous
    • C.symmetric
    • D.asymmetric
  3. (85)

    • A.two related keys are
    • B.a key is
    • C.two unrelated keys are
    • D.three keys are
  4. In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private-key encryption methods are called(71)ciphers, information is encrypted with(72)both the sender and receiver hold privately. Public-key encryption methods are called(73)ciphers,(74)created for each user, encryption key and deception key are(75)

    • A.synchronous
    • B.Asynchronous
    • C.symmetric
    • D.asymmetric
  5. (83)

    • A.a key
    • B.two keys
    • C.three keys
    • D.four keys
  6. (81)

    • A.in general
    • B.in any term
    • C.in set terms
    • D.in terms of
  7. (80)

    • A.faced on
    • B.faced with
    • C.faced about
    • D.faced up to
  8. (79)

    • A.consolidates
    • B.consists
    • C.considerate
    • D.consoles
  9. In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. Heterogeneous network environments consist of computer systems from(66)vendors that run(67)operating systems and communication protocols. An organization that(68)its computer resources is usually(69)the task of integrating its heterogeneous systems. Typically, each deparlment or division has defined its own network needs(70)OS, LAN topology, communication protocols,applications, and other components.

    • A.same
    • B.similar
    • C.different
    • D.difference
  10. (78)

    • A.same
    • B.similar
    • C.different
    • D.difference