In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.
A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the browser knows how to deal with (1) , and that it has a mechanism for (2) graphical files. Display text, display graphics, and (3) hyperlinks ——there’s 99 percent of the (4) value. That’s not to say that the manufacturers didn’t go all - out to attach a hyperactive efflorescence of useless capabilities onto their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you can’t wait to delete from your favorites of bookmarks menu Remember when client -side Java applets were supposed to become the preferred (5) , for application development Remember frames and all their
A. displaying
B. illustrating
C. drawing
D. writing
In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.
In security, an (1) is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or (2) of legitimate access to computing. A vulnerability is a weakness in the security system that might be exploited to cause loss or harm. A human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software (3) . Finally, a control is a protective measure an action, a device, a procedure, or a technique - that reduces a vulnerability. The major (4) of computing systems are hardware, software, and data. There are four kinds of threats to the securi
A. betrayal
B. uncover
C. emerge
D. exposure
我来回答: