首页 考试吧论坛 Exam8视线 考试商城 网络课程 模拟考试 考友录 实用文档 求职招聘 论文下载
2011中考 | 2011高考 | 2012考研 | 考研培训 | 在职研 | 自学考试 | 成人高考 | 法律硕士 | MBA考试
MPA考试 | 中科院
四六级 | 职称英语 | 商务英语 | 公共英语 | 托福 | 雅思 | 专四专八 | 口译笔译 | 博思 | GRE GMAT
新概念英语 | 成人英语三级 | 申硕英语 | 攻硕英语 | 职称日语 | 日语学习 | 法语 | 德语 | 韩语
计算机等级考试 | 软件水平考试 | 职称计算机 | 微软认证 | 思科认证 | Oracle认证 | Linux认证
华为认证 | Java认证
公务员 | 报关员 | 银行从业资格 | 证券从业资格 | 期货从业资格 | 司法考试 | 法律顾问 | 导游资格
报检员 | 教师资格 | 社会工作者 | 外销员 | 国际商务师 | 跟单员 | 单证员 | 物流师 | 价格鉴证师
人力资源 | 管理咨询师考试 | 秘书资格 | 心理咨询师考试 | 出版专业资格 | 广告师职业水平
驾驶员 | 网络编辑
卫生资格 | 执业医师 | 执业药师 | 执业护士
会计从业资格考试会计证) | 经济师 | 会计职称 | 注册会计师 | 审计师 | 注册税务师
注册资产评估师 | 高级会计师 | ACCA | 统计师 | 精算师 | 理财规划师 | 国际内审师
一级建造师 | 二级建造师 | 造价工程师 | 造价员 | 咨询工程师 | 监理工程师 | 安全工程师
质量工程师 | 物业管理师 | 招标师 | 结构工程师 | 建筑师 | 房地产估价师 | 土地估价师 | 岩土师
设备监理师 | 房地产经纪人 | 投资项目管理师 | 土地登记代理人 | 环境影响评价师 | 环保工程师
城市规划师 | 公路监理师 | 公路造价师 | 安全评价师 | 电气工程师 | 注册测绘师 | 注册计量师
缤纷校园 | 实用文档 | 英语学习 | 作文大全 | 求职招聘 | 论文下载 | 访谈 | 游戏
您现在的位置: 考试吧(Exam8.com) > 软件水平考试 > 复习资料 > 网络工程师 > 正文

软件水平考试网络工程师英语复习练习题10套

第7套

A digital wallet is (1) that enables users to pay for goods on the  web.It holds credit card numbers and other (2) such as shipping  address. Once entered, the data automatic ally populates order  fields at merchant sites. When using a digital wallet,consumers don’ t need to fill out order forms on each site when they purchase an  item because the information has already been (3) and is  automatically (4) and entered into the order fields across merchant  sites.Consumers also benefit when using digital wallets because  their information is (5) or protechted a private software code.And  merchants benefit by receiving protection against fraud.
(1) A.software  B.hardware C. device  D.document
(2) A.cards     B.secrets  C.public information D.person information
(3) A.distributed B. stored C.addressed  D.registered
(4) A.coded       B.updated C.corrected  D.named
(5) A.encrypted   B.updated C.secured    D.undiscovered
答案:1:A,2:D,3:B,4:B,5:A

第8套

The router inspecters the packet’s IP address and performs (1)  lookup to see if the destination end station resides on the local (physically connected) network,typically called an IP subber (2)  usually is assignted to each of the router’s network interface.If  the destination IP address is local,the router searches an internal  store of IP address and local-device Media Acess Control(MAC)  address.This store is known as  the (3) cache. Address Resolution  Protocol(ARP)is the universal tool for matching IP addresses to MAC  address.If the destination’s MAC address appears,the router installs that MAC address in the  pachet header(removing its own MAC address because that’s no longer  needed) and sends the packet to the destional end station.    In the event that the destional MAC address does not appear in  the ARP cache-it might have timed out,for instance-the router must  broadcast an ARP request to the subnet referenced by the packet’s  destional IP address.The end station with that IP address responds,  sending back its MAC address. The router updates its cache,installs  the new MAC address into the(4) and launches the packet. If the  router table lookup shows that the packet is destined for a non  local subnet,the router forwards the packet to the next-hop  router using the-hop router’s MAC address.Routing tables are continuously  built and rebuilt by intelligent discovery protocols,such as Routing  Information Protocol or Open Shortest Path First(OSPF).Each router’ s routing table shows the best route to the destination address:for  address that may be severd hops away,it shows(5) next-hop router. 

(1) A. a router table  B.a signal C.an e-mail D.a file
(2) A. A TCP  subnet    B.IP headerC. An IP subnet     D.TCP/IP
(3) A.OSPF     B. Address Resolution Protocol(ARP)C.MAC      D.RIP
(4) A.small packet      B.space     C.packet header  D.packet tailor
(5) A.the fewest        B.the worst C.the least      D.the best
答案:1:A,2:C,3:B,4:C,5:D

第9套

_(1)__ is used to ensure the confidentiality,integrity and  authenticity of the two end points in the private etwork .the__(2) __,an application layer protocol,authenticates each peer in an IPsec  transaction ,IKE negotiates security policy,determining which  algorithm may be used to set up the Runnel .It also handles the exchang of session keys used for that  one transaction.Networks that use __(3)__to secure data traffic can  automatically authenticate devices by using __(4)__,which Verify the identities of the two users who are sending information  back and forth .IPsec can be ideal way to secure data in large  networks that require __(5)__ connections among many devices。

(1) A.Encryption B.Code C.Certificate D. Tunnel
(2) A.associated links B.Internet Key Exchange C IPsec D. encryption
(3) A authenticity  B.password C.IPsec D. Internet Key Exchange
(4) A.protocols  B.keywords C.IKE D. digital certificates
(5) A.free B.strict C.secure D.remote
答案:1:A,2:B,3:C,4:D,5:C

第10套
Bluetooth is a universal radio interface in the __(1)__frequency  band that enables portable electronic devices __(2)__ connect and  communicate __(3)__via short range,ad hoc net Works .Each unit can simultaneously communicate with up to__(4)__  other units per piconet.Moreover,each unit can simultaneously __(5) __to several piconets,Bluetooth technology which apart from  Ericsson,has gained th support of Nokia,IBM,Toshiba,Intel and many  other manufactures,eliminates ths need for wires,cables and  connectors for and between cordless or mobile  phones,modems,headsets,PDAs,Computers,printers.projectors,local area  networks,and so on ,and paves the way for new and completely  different devices and applications。

(1) A.2.45GHZ B. 4.45GHZ C. 2.95GHZ D. 1.45GHZ 
(2) A.in  B.on  C.to  D. with
(3) A.narrowly  B.wirelessly C.freely  D.widely 
(4) A.use B.sever C.host D. base
(5) A.relate  B.add C.close D. belong
答案:1:A,2:C,3:B,4:B,5:D

更多软考资料请访问:考试吧软件水平考试栏目

希望与更多网友交流,请进入考试吧软件水平考试论坛

上一页  1 2 3 4  下一页
文章搜索
软件水平考试栏目导航
版权声明:如果软件水平考试网所转载内容不慎侵犯了您的权益,请与我们联系800@exam8.com,我们将会及时处理。如转载本软件水平考试网内容,请注明出处。