(1) 是关于质量管理体系的一系列标准,有助于企业交付符合用户质量要求的产品。商业秘密是我国 (2) 保护的一项重要内容,它包括技术秘密和经营秘密两项基本内容。某程序员利用他人已有的财务管理信息系统软件中所用的处理过程和运算方法,为某企业开发出财务管理软件,则该程序员 (3) 。 3()
A. 不侵权,因为计算机软件开发所用的处理过程和运算方法不属于著作权法的保护
B. 侵权,因为处理过程和运算方法是他人已有的
C. 侵权,因为计算机软件开发所用的处理过程和运算方法是著作权法的保护对象
D. 是否侵权,取决于该程序员是不是合法的受让者
查看答案
对照ISO/OSI参考模型各个层中的网络安全服务,在传输层主要解决进程到进程间的加密,最常见的传输层安全技术有 (1) ;为了将低层安全服务进行抽象和屏蔽,最有效的一类做法是可以在传输层和应用层之间建立中间件层次实现通用的安全服务功能,通过定义统一的安全服务接口向应用层提供 (2) 安全服务。在数据链路层,可以采用 (3) 进行链路加密;在网络层可以采用 (4) 来处理信息内外网络边界流动和建立透明的安全加密信道;在物理层可以采用 (5) 加强通信线路的安全。 2()
A. 身份认证
B. 访问控制
C. 数据加密
D. 身份认证、访问控制和数据加密
I/O系统主要有三种方式来与主机交换数据,其中主要用软件方法来实现,CPU的效率低的是 (1) ;要有硬件和软件两部分来实现,它利用专门的电路向CPU中的控制器发出 I/O服务请求,控制器则 (2) 转入执行相应的服务程序的是 (3) ;主要由硬件来实现,此时高速外设和内存之间进行数据交换 (4) 的是 (5) 。供选择的答案 1()
A. 程序查询方式
B. DMA方式
C. 数据库方式
D. 客户/服务器方式
In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the browser knows how to deal with (1) , and that it has a mechanism for (2) graphical files. Display text, display graphics, and (3) hyperlinks ——there’s 99 percent of the (4) value. That’s not to say that the manufacturers didn’t go all - out to attach a hyperactive efflorescence of useless capabilities onto their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you can’t wait to delete from your favorites of bookmarks menu Remember when client -side Java applets were supposed to become the preferred (5) , for application development Remember frames and all their nasty side effects 5()
A. plane
B. plant
C. plate
D. platform
For each blank, choose the best answer from the four choices and write down on the answer sheet.In (1) the strength of the carrier signal is varied to represent binary 1 or 0. (2) is a system that can map a name to an address and conversely an address to an name. (3) is a three -way handshaking authentication protocol that it’s packets are encapsulated in the point - to -point protocol. (4) is an approach that enables an ATM Switch to behave like a LAN switch. (5) is an guided media which is made of glass or plastic and transmits signals in the form of light. 1()
A. FDM
B. DSK
C. FCK
D. ASK