首頁 考試吧論壇 Exam8視線 考試商城 網(wǎng)絡(luò)課程 模擬考試 考友錄 實(shí)用文檔 求職招聘 論文下載
2011中考 | 2011高考 | 2012考研 | 考研培訓(xùn) | 在職研 | 自學(xué)考試 | 成人高考 | 法律碩士 | MBA考試
MPA考試 | 中科院
四六級(jí) | 職稱英語 | 商務(wù)英語 | 公共英語 | 托福 | 雅思 | 專四專八 | 口譯筆譯 | 博思 | GRE GMAT
新概念英語 | 成人英語三級(jí) | 申碩英語 | 攻碩英語 | 職稱日語 | 日語學(xué)習(xí) | 法語 | 德語 | 韓語
計(jì)算機(jī)等級(jí)考試 | 軟件水平考試 | 職稱計(jì)算機(jī) | 微軟認(rèn)證 | 思科認(rèn)證 | Oracle認(rèn)證 | Linux認(rèn)證
華為認(rèn)證 | Java認(rèn)證
公務(wù)員 | 報(bào)關(guān)員 | 銀行從業(yè)資格 | 證券從業(yè)資格 | 期貨從業(yè)資格 | 司法考試 | 法律顧問 | 導(dǎo)游資格
報(bào)檢員 | 教師資格 | 社會(huì)工作者 | 外銷員 | 國際商務(wù)師 | 跟單員 | 單證員 | 物流師 | 價(jià)格鑒證師
人力資源 | 管理咨詢師考試 | 秘書資格 | 心理咨詢師考試 | 出版專業(yè)資格 | 廣告師職業(yè)水平
駕駛員 | 網(wǎng)絡(luò)編輯
衛(wèi)生資格 | 執(zhí)業(yè)醫(yī)師 | 執(zhí)業(yè)藥師 | 執(zhí)業(yè)護(hù)士
會(huì)計(jì)從業(yè)資格考試會(huì)計(jì)證) | 經(jīng)濟(jì)師 | 會(huì)計(jì)職稱 | 注冊(cè)會(huì)計(jì)師 | 審計(jì)師 | 注冊(cè)稅務(wù)師
注冊(cè)資產(chǎn)評(píng)估師 | 高級(jí)會(huì)計(jì)師 | ACCA | 統(tǒng)計(jì)師 | 精算師 | 理財(cái)規(guī)劃師 | 國際內(nèi)審師
一級(jí)建造師 | 二級(jí)建造師 | 造價(jià)工程師 | 造價(jià)員 | 咨詢工程師 | 監(jiān)理工程師 | 安全工程師
質(zhì)量工程師 | 物業(yè)管理師 | 招標(biāo)師 | 結(jié)構(gòu)工程師 | 建筑師 | 房地產(chǎn)估價(jià)師 | 土地估價(jià)師 | 巖土師
設(shè)備監(jiān)理師 | 房地產(chǎn)經(jīng)紀(jì)人 | 投資項(xiàng)目管理師 | 土地登記代理人 | 環(huán)境影響評(píng)價(jià)師 | 環(huán)保工程師
城市規(guī)劃師 | 公路監(jiān)理師 | 公路造價(jià)師 | 安全評(píng)價(jià)師 | 電氣工程師 | 注冊(cè)測(cè)繪師 | 注冊(cè)計(jì)量師
繽紛校園 | 實(shí)用文檔 | 英語學(xué)習(xí) | 作文大全 | 求職招聘 | 論文下載 | 訪談 | 游戲

軟件水平考試網(wǎng)絡(luò)工程師英語復(fù)習(xí)練習(xí)題10套

第7套

A digital wallet is (1) that enables users to pay for goods on the  web.It holds credit card numbers and other (2) such as shipping  address. Once entered, the data automatic ally populates order  fields at merchant sites. When using a digital wallet,consumers don’ t need to fill out order forms on each site when they purchase an  item because the information has already been (3) and is  automatically (4) and entered into the order fields across merchant  sites.Consumers also benefit when using digital wallets because  their information is (5) or protechted a private software code.And  merchants benefit by receiving protection against fraud.
(1) A.software  B.hardware C. device  D.document
(2) A.cards     B.secrets  C.public information D.person information
(3) A.distributed B. stored C.addressed  D.registered
(4) A.coded       B.updated C.corrected  D.named
(5) A.encrypted   B.updated C.secured    D.undiscovered
答案:1:A,2:D,3:B,4:B,5:A

第8套

The router inspecters the packet’s IP address and performs (1)  lookup to see if the destination end station resides on the local (physically connected) network,typically called an IP subber (2)  usually is assignted to each of the router’s network interface.If  the destination IP address is local,the router searches an internal  store of IP address and local-device Media Acess Control(MAC)  address.This store is known as  the (3) cache. Address Resolution  Protocol(ARP)is the universal tool for matching IP addresses to MAC  address.If the destination’s MAC address appears,the router installs that MAC address in the  pachet header(removing its own MAC address because that’s no longer  needed) and sends the packet to the destional end station.    In the event that the destional MAC address does not appear in  the ARP cache-it might have timed out,for instance-the router must  broadcast an ARP request to the subnet referenced by the packet’s  destional IP address.The end station with that IP address responds,  sending back its MAC address. The router updates its cache,installs  the new MAC address into the(4) and launches the packet. If the  router table lookup shows that the packet is destined for a non  local subnet,the router forwards the packet to the next-hop  router using the-hop router’s MAC address.Routing tables are continuously  built and rebuilt by intelligent discovery protocols,such as Routing  Information Protocol or Open Shortest Path First(OSPF).Each router’ s routing table shows the best route to the destination address:for  address that may be severd hops away,it shows(5) next-hop router. 

(1) A. a router table  B.a signal C.an e-mail D.a file
(2) A. A TCP  subnet    B.IP headerC. An IP subnet     D.TCP/IP
(3) A.OSPF     B. Address Resolution Protocol(ARP)C.MAC      D.RIP
(4) A.small packet      B.space     C.packet header  D.packet tailor
(5) A.the fewest        B.the worst C.the least      D.the best
答案:1:A,2:C,3:B,4:C,5:D

第9套

_(1)__ is used to ensure the confidentiality,integrity and  authenticity of the two end points in the private etwork .the__(2) __,an application layer protocol,authenticates each peer in an IPsec  transaction ,IKE negotiates security policy,determining which  algorithm may be used to set up the Runnel .It also handles the exchang of session keys used for that  one transaction.Networks that use __(3)__to secure data traffic can  automatically authenticate devices by using __(4)__,which Verify the identities of the two users who are sending information  back and forth .IPsec can be ideal way to secure data in large  networks that require __(5)__ connections among many devices。

(1) A.Encryption B.Code C.Certificate D. Tunnel
(2) A.associated links B.Internet Key Exchange C IPsec D. encryption
(3) A authenticity  B.password C.IPsec D. Internet Key Exchange
(4) A.protocols  B.keywords C.IKE D. digital certificates
(5) A.free B.strict C.secure D.remote
答案:1:A,2:B,3:C,4:D,5:C

第10套
Bluetooth is a universal radio interface in the __(1)__frequency  band that enables portable electronic devices __(2)__ connect and  communicate __(3)__via short range,ad hoc net Works .Each unit can simultaneously communicate with up to__(4)__  other units per piconet.Moreover,each unit can simultaneously __(5) __to several piconets,Bluetooth technology which apart from  Ericsson,has gained th support of Nokia,IBM,Toshiba,Intel and many  other manufactures,eliminates ths need for wires,cables and  connectors for and between cordless or mobile  phones,modems,headsets,PDAs,Computers,printers.projectors,local area  networks,and so on ,and paves the way for new and completely  different devices and applications。

(1) A.2.45GHZ B. 4.45GHZ C. 2.95GHZ D. 1.45GHZ 
(2) A.in  B.on  C.to  D. with
(3) A.narrowly  B.wirelessly C.freely  D.widely 
(4) A.use B.sever C.host D. base
(5) A.relate  B.add C.close D. belong
答案:1:A,2:C,3:B,4:B,5:D

更多軟考資料請(qǐng)?jiān)L問:考試吧軟件水平考試欄目

希望與更多網(wǎng)友交流,請(qǐng)進(jìn)入考試吧軟件水平考試論壇

上一頁  1 2 3 4  下一頁
文章搜索
軟件水平考試欄目導(dǎo)航
版權(quán)聲明:如果軟件水平考試網(wǎng)所轉(zhuǎn)載內(nèi)容不慎侵犯了您的權(quán)益,請(qǐng)與我們聯(lián)系800@exam8.com,我們將會(huì)及時(shí)處理。如轉(zhuǎn)載本軟件水平考試網(wǎng)內(nèi)容,請(qǐng)注明出處。