题目内容 (请给出正确答案)
[主观题]

从供选择的答案中,选出最确切的解答。

A Web browser is simply a terminal emulator designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the browser knows how to deal with(1), and that it has a mechanism for(2)graphical files. Display text, display graphics, and(3)hyperlinks-there's 99 percent of the(4)value. That's not to say that the manufacturers didn't go all-out to attach a hyperactive efflorescence ofuseless capabilities onto their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you can't wait to delete from your favorites of bookmarks menu? Remember when client-side Java applets were supposed to become the preferred(5)for application development? Remember frames and all their nasty side effects?

提问人:网友junzai751225 发布时间:2022-01-07
参考答案
查看官方参考答案
如搜索结果不匹配,请 联系老师 获取答案
更多“从供选择的答案中,选出最确切的解答。”相关的问题
第1题
从供选择的答案中,选出最确切的解答。

The Rational Unified Process (RUP) is a software engineering process, which captures many of best practices in modern software development. The notions of(1)and scenarios have been proven to be an excellent way to capture function requirements. RUP can be described in two dimensions-time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive(2)which is concluded with a well-defined(3)and can be further broken down into(4)-a complete development loop resulting in a release of an executable product,a subset of the final product under development, which grows mcrementally to become the final system. The content structure refers to the disciplines, which group(5)logically by nature.

点击查看答案
第2题
从供选择的答案中,选出最确切的解答。

SOCKS is a generic proxy protocol for ICP/IP-based networking, applications. SOCKS includes two(1), the SOCKS server and the SOCKS client. The SOCKS server is implemented at the application layer. The SOCKS client is implemented between applications and the(2)layer. When an application client needs to connect to an application server, the client connects to a SOCKS proxy server. The proxy server connects to the application server instead of the client, and(3)data between the client and the application server. For the application server, the proxy server is the(4). SOCKS is also one of the popular(5)to network firewalls. Because of its simplicity and flexibility, SOCKS has been used as generic application proxy in virtual private network (VPN), and for extranet applications.

点击查看答案
第3题
从供选择的答案中,选出最确切的解答。

MIDI enables people to use(1)computers and electronic musical instruments. There are actually three components to MIDI, the communications"(2)",the Hardware Interface and a distribution(3)called "Standard MIDI Files".In the context of the WWW, the most interesting component is the(4)Format. In principle,MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol(5)are stored in MIDI fles, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use of MIDI today.

点击查看答案
第4题
从供选择的答案中,选出最确切的解答。

(1)analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems. Ultimately, the' system models become the(2)for designing and constructing an improved system.(3)is such a technique. The emphasis in this technique is process-centered. Systems analysts draw a series ofprocess models called(4).(5)is another such technique that integrates data and process concerns into constructs called objects.

点击查看答案
第5题
从供选择的答案中,选出最确切的解答。

Networks can be interconnected by different devices. In the physical layer, networks can be connected by(1)or hubs, which just move the bits from one network to an identical network. One layer up we fine bridges and switches, which operate at data link layer. They can accept(2),examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have(3)network layer, the router may be able to translate between the packer formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message(4). As an example, gateways between Intemet E-mail and X.400 E-mail must(5)the E-mail message and change various header fields.

点击查看答案
第6题
从供选择的答案中,选出应填入下面叙述中______内的最确切的解答。

MIMD systems can be classified into(1)oriented systems, high-availability systems and response-oriented systems. The goal of(1)oriented multiprocess is to obtain high(1)(2)minimal computing cost. The techniques employed by multiprocessor operating systems to achieve this goal take advantage of an inherent processing versus input/output balance in the workload to produce(3)and(4)loading ofsystem(5)

点击查看答案
第7题
从供选择的答案中,选出最确切的解答。

SOCKS is a generic proxy protocol for ICP/IP-based networking, applications. SOCKS includes two(1), the SOCKS server and the SOCKS client. The SOCKS server is implemented at the application layer. The SOCKS client is implemented between applications and the(2)layer. When an application client needs to connect to an application server, the client connects to a SOCKS proxy server. The proxy server connects to the application server instead of the client, and(3)data between the client and the application server. For the application server, the proxy server is the(4). SOCKS is also one of the popular(5)to network firewalls. Because of its simplicity and flexibility, SOCKS has been used as generic application proxy in virtual private network (VPN), and for extranet applications.

点击查看答案
第8题
从供选择的答案中,选出最确切的解答。

Most computer systems are(1)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(2)to an outsider attack by preventing(3)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(4)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(5)by tools referred to as Intrusion Detection Systems.

点击查看答案
第9题
从供选择的答案中,选出最确切的解答。

A typical(1)language contains an applicative sub-language which approximates the mathematical abstractions of "timeless" functions applied to "spaceless" values, where the actual operation sequences and use of storage space during expression evaluation are organized behind the(2). In this setting, values are data structures of low volume, typically afew computer words or less, which means that an illusion of "spacelessness" can be realized by having(3)results during expression evolution stored at the discretion of the language implementation, and effecting parameter(4)and(5)operations through value copying.

点击查看答案
第10题
从供选择的答案中,选出应填入下面叙述中______内的最确切的解答。

MIMD systems can be classified into(1)oriented systems, high-availability systems and response-oriented systems. The goal of(1)oriented multiprocess is to obtain high(1)(2)minimal computing cost. The techniques employed by multiprocessor operating systems to achieve this goal take advantage of an inherent processing versus input/output balance in the workload to produce(3)and(4)loading ofsystem(5)

点击查看答案
账号:
你好,尊敬的用户
复制账号
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改
欢迎分享答案

为鼓励登录用户提交答案,简答题每个月将会抽取一批参与作答的用户给予奖励,具体奖励活动请关注官方微信公众号:简答题

简答题官方微信公众号

警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“简答题”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

微信搜一搜
简答题
点击打开微信
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反简答题购买须知被冻结。您可在“简答题”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
微信搜一搜
简答题
点击打开微信