-
1● 静态图像压缩标准JPEG2000中使用的是_____(60)____算法。
A.K-L变换
B.离散正弦变换
C.离散余弦变换
D.离散小波变换
开始考试点击查看答案 -
2● 双层双面的只读DVD盘片的存储容量可以达到_____(59)____。
A.4.7GB
B.8.5GB
C.17GB
D.6.6GB
开始考试点击查看答案 -
3● 电视系统采用的颜色空间中,其亮度信号和色度信号是相分离的。下列颜色空间中,__(58)___不属于电视系统的颜色空间。
A.YUV
B.YIQ
C.YcbCr
D.HSL
开始考试点击查看答案 -
4● PC 机处理人耳能听得到的音频信号,其频率范围是__(57)___。
A.80~3400Hz
B.300~3400Hz
C.20~20kHz
D.20~44.1kHz
开始考试点击查看答案 -
5● 利用动态规划方法求解每对结点之间的最短路径问题(all pairs shortest path problem)时,设有向图G=<V,E>共有n个结点,结点编号1~n,设C是G的成本邻接矩阵,用Dk(i,j)即为图G 中结点i到j并且不经过编号比k还大的结点的最短路径的长度(Dn(i,j)即为图G中结点i到j的最短路径长度),则求解该问题的递推关系式为___(56)___。
A.Dk(i,j)=Dk-1(i,j)+C(i,j)
B.Dk(i,j)=min{Dk-1(i,j),Dk-1(i,j)+C(i,j)}
C.Dk (i,j)=Dk-1(i,k)+Dk-1(k,j)
D.Dk(i,j)=min{Dk-1(i,j),Dk-1(i,k)+Dk-1(k,j)}
开始考试点击查看答案 -
6● 以下选项中,可以用于Internet信息服务器远程管理的是____(63)____。
A.Telnet
B.RAS
C.FTP
D.SMTP
开始考试点击查看答案 -
7● 在TCP/IP 网络中,为各种公共服务保留的端口号范围是__(64)____。
A.1~255
B.1~1023
C.1~1024
D.1~65535
开始考试点击查看答案 -
8● 在以下网络应用中,要求带宽最高的应用是___(65)___。
A.可视电话
B.数字电视
C.拨号上网
D.收发邮件
开始考试点击查看答案 -
9● DOM is a platform-and language-____(66)___API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents ( currently,definitions for HTML and XML documents are part of the specification ).The document can be further processed and the results of that processing can be incoporporated back into the presented ___(67)____.DOM is a ___(68)___-based API to documents ,which requires the whole document to be represented in ____(69)___while processing it .A simpler alternative to DOM is the event –based SAX,which can be used to process very large ___(70)___documents that do not fit info the memory available for processing.
A.specific
B.neutral
C.contained
D.related
开始考试点击查看答案 -
10● Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an __(71)___from a friend who asks you to open it. This is what happens with Melissa and several other similar email __(72)___.Upon running ,such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages__(73)___.As administrators seek to block dangerous email attachments through the recognition of well-known ___(74)____,virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the __(75)__access to your network.
A.attachment
B.packet
C.datagram
D.message
开始考试点击查看答案