一起答
单选

  • ● At a basic level, cloud computing is simply a means of delivering IT resources as(71) Almost all IT resources can be delivered as a cloud service: applications, compute power, storage capacity, networking, programming tools, even communication services
  • Cloud computing began as large-scale Internet service providers such as Google, Amazon,and others built out their infrastructure. An architecture emerged: massively scaled,   (73)distributed system resources, abstracted as virtual IT servic
  • Both clouds and grids are built to scale horizontally very efficiently. Both are built to withstand failures of(75)elements or nodes. Both are charged on a per-use basis. But while grids typically process batch jobs, with a defined start and end point, cl
  • B.computers 
  • C.services    
  • D.software    (72) A.computers     
  • B.disks      
  • C.machines    
  • D.tools    ( 73 ) A. horizontally             
  • B. vertically             
  • C. inclined                
  • D. decreasingly    ( 74) A. clients                        
  • B. middleware         
  • C. servers                  
  • D. hard disks    (75) A. entire                       
  • B. individual           
  • C. general                
  • D. separate
参考答案
查看试卷详情
相关试题
    • ● At a basic level, cloud computing is simply a means of delivering IT resources as(71) Almost all IT resources can be delivered as a cloud service: applications, compute power, storage capacity, networking, programming tools, even communication services
    • Cloud computing began as large-scale Internet service providers such as Google, Amazon,and others built out their infrastructure. An architecture emerged: massively scaled,   (73)distributed system resources, abstracted as virtual IT servic
    • Both clouds and grids are built to scale horizontally very efficiently. Both are built to withstand failures of(75)elements or nodes. Both are charged on a per-use basis. But while grids typically process batch jobs, with a defined start and end point, cl
    • B.computers 
    • C.services    
    • D.software    (72) A.computers     
    • B.disks      
    • C.machines    
    • D.tools    ( 73 ) A. horizontally             
    • B. vertically             
  1. ●如果子网172.6.32.0/20被划分为子网172.6.32.0/26,则下面的结论中正确的是(70)。

    (70)

    • ●如果子网172.6.32.0/20被划分为子网172.6.32.0/26,则下面的结论中正确的是(70)。    (70)A.被划分为62个子网
    • B.每个子网有64个主机地址
    • C.被划分为32个子网
    • D.每个子网有62个主机地址
  2. ●建筑物综合布线系统中的园区子系统是指(69)。

    (69)

    • ●建筑物综合布线系统中的园区子系统是指(69)。    (69)A.由终端到信息插座之间的连线系统
    • B.楼层接线间到工作区的线缆系统
    • C.各楼层设备之间的互连系统
    • D.连接各个建筑物的通信系统
  3. ●网络中存在各种交换设备,下面的说法中错误的是(66)。

    (66)

    • ●网络中存在各种交换设备,下面的说法中错误的是(66)。    (66)A.以太网交换机根据MAC地址进行交换
    • B.帧中继交换机只能根据虚电路号DLCI进行交换
    • C.三层交换机只能根据第三层协议进行交换
    • D.ATM交换机根据虚电路标识进行信元交换
  4. ●SMTP传输的邮件报文采用(67)格式表示。

    (67)

    • ●SMTP传输的邮件报文采用(67)格式表示。    (67) A.ASCII
    • B.ZIP
    • C.PNP
    • D.HTML
  5. ●网络的可用性是指(68)。

    (68)

    • ●网络的可用性是指(68)。    (68)A.网络通信能力的大小
    • B.用户用于网络维修的时间
    • C.网络的可靠性
    • D.用户可利用网络时间的百分比
  6. ●以下关于钓鱼网站的说法中,错误的是(65)。

    (65)

    • ●以下关于钓鱼网站的说法中,错误的是(65)。    (65)A.钓鱼网站仿冒真实网站的URL地址以及页面内容
    • B.钓鱼网站是一种新型网络病毒
    • C.钓鱼网站的目的主要是窃取访问者的账号和密码
    • D.钓鱼网站可以通过Email传播网址
  7. ●IIS6.0支持的身份验证安全机制有4种验证方法,其中安全级别最高的验证方法是(64)。

    (64)

    • ●IIS6.0支持的身份验证安全机制有4种验证方法,其中安全级别最高的验证方法是(64)。    (64) A.匿名身份验证
    • B.集成Windows身份验证
    • C.基本身份验证
    • D.摘要式身份验证
  8. ●在Windows系统中,默认权限最低的用户组是(63)。

    (63)

    • ●在Windows系统中,默认权限最低的用户组是(63)。    (63) A.everyone
    • B.adnunistrators
    • C.powerusers
    • D.Users
  9. ●甲和乙要进行通信,甲对发送的消息附加了数字签名,乙收到该消息后利用(62)验证该消息的真实性。

    (62)

    • ●甲和乙要进行通信,甲对发送的消息附加了数字签名,乙收到该消息后利用(62)验证该消息的真实性。    (62)A.甲的公钥
    • B.甲的私钥
    • C.乙的公钥
    • D.乙的私钥