Traditional Culture Encyclopedia - Traditional culture - A few questions 5
A few questions 5
The difference between FTP and Telnet is that Telnet only allows the remote computer to perform limited operations, including viewing files, changing file directories, etc.
The working principle of PING is very simple. It sends a PING
The packet is sent to the remote host to be detected, and waits for the return response packet from the remote host.
To change the start page in IE, you should click "Internet Options" under the "Tools" menu.
In the following "Email Header" information, the title or subject is sent by the user
Title or subject
E-MAIL of the sender
E-MAIL address of the recipient
Email delivery on schedule and time
WEB server is the basic element of WEB
Website
Web page
WEB server
Hyperlink
21. The physical security of computer information includes three aspects: environmental security, equipment security, and c.
A. Operational security B. Media security C. Information security. D. Personnel security
22. a is a barrier set up between the protected network and the external network using comprehensive network technology to separate the protected network from the external network system to prevent unpredictable and Potentially destructive intrusion, it is the only entry and exit for information between different networks or network security domains
A. Firewall technology B. Cryptotechnology C. Access control technology D. Virtual private network
23. b is to achieve the purpose of computer information attack through theft or analysis. It will not cause any changes to the information contained in the system, and the operation and status of the system will not be changed.
< p>A. Active attack B. Passive attack C. Hacker attack D. Computer virus24. Computer viruses mainly destroy data c.
A. Confidentiality B. Reliability. C. Integrity D. Availability
25. The following statement is correct: None of the above three is correct:
Information leakage only occurs during the transmission of information.
p>Information leakage only occurs during the storage process of information.
Information leakage only occurs during the transmission and storage process of information.
None of the above three is correct. .
26. The following description of computer viruses is incorrect: Computer viruses spread through the network are much more destructive than stand-alone systems.
Computer viruses are contagious.
Computer viruses spread through the network are much more destructive than stand-alone systems.
Computer viruses are generally difficult to detect if infected. Mainly destroys the integrity of data
27. A computer virus is a:
A. A program B. An infectious virus C. A computer hardware D. Computer system software< /p>
28. The following are not characteristics of computer viruses: c
A. Infectiousness B. Suddenity C. Predictability D. Hiddenness
29 , Computer viruses b
A. All are destructive B. Some viruses are not destructive
C. All destroy .exe files D. Do not destroy data, only files
30. Computer viruses are all man-made.
It is caused by carelessness in the production of computer hardware.
They are all man-made.
You must clear your computer before you can use it.
It is possible that people made it accidentally.
- Previous article:Which cake is delicious in Suining, Chengdu?
- Next article:What is the current economic development model of China?
- Related articles
- What is the representative work of the peak of realism in China's classical novels, and who is the author?
- What is the Dragon Boat Festival in Korea?
- What exactly is cement fence
- How do Internet information service websites make profits?
- A Brief Introduction to Flower Man
- What delicious food and specialties are there in Yuanyang?
- Interpreting the Meaning of Su Shi's "Fisherman"
- How to write a good newsletter
- How to make butter tea How to make butter tea
- How about Chongqing University of Arts and Sciences?