20.A(n)______________isasystemcomposedofhardware,software,orboththatisdesignedtodetectintrusionandpreventunauthorizedaccesstoorfromaprivatenetwork.
A. encryption
B. firewall
C. alarm
D. logicbomb
查看答案
21.BigDataischaracterizedbyallofthefollowingexcept______________.
A. verifiability
B. velocity
C. variety
D. volume
22.AstudentbuyingabookatAmazon.comillustrateswhichofthefollowingcorebusinessprocesses?
A. time-to-purchase
B. order-to-cash
C. plan-to-produce
D. account-to-report
E. hire-to-retire
23.Taggingisadding______________tocontentsuchasmaps,pictures,orwebpages.
A. metadata
B. comments
C. blogs
D. knowledge
24.RonalddownloadsamoviefromtheInternetontohiscompany'scomputer.Duringthisprocess,hissystemgetsinfectedwithavirus.Thevirusspreadsrapidlyinthecompany'snetworkcausingtheservertocrash.Thistypeofvirusismostlikelytobe________.
A. adware
B. phishingmail
C. spam
D. aworm
E. aTrojanhorse