相关题目
143、instruction set
142、.secondary storage
141、programming language
140、Suppose you are about to provide your credit card number when ordering merchandise over the World Wide Web.How do you know for sure that the sit you have contacted is the business you think it is? Suppose a brokerage firm receives a request via its Web site to sell a client’s stock.How does it know that the request came from the client rather than an impostor? The Secure Socket layer( ) is a protocol system that uses public-key encryption techniques to resolve such questions.It also allows the messages between the client and server to be encrypted.To communicate via AAL, both a client and a server must register in advance with a third site known as a certification authority.The client then contacts the server using the SSL protocol, which causes both the client and the server to contact the certification authority to confirm the authenticity of each other before further communication.During this authentication process they also obtain the encryption keys needed to encrypt their communication. Most Web browsers support SSL in such a way that its use is transparent to the user.Once a user has registered with a certification authority, SSL is activated merely by contacting a server with a URL beginning with https rather than http as in traditional hypertext protocol communication.(5)、Choose a title for this text.
140、Suppose you are about to provide your credit card number when ordering merchandise over the World Wide Web.How do you know for sure that the sit you have contacted is the business you think it is? Suppose a brokerage firm receives a request via its Web site to sell a client’s stock.How does it know that the request came from the client rather than an impostor? The Secure Socket layer( ) is a protocol system that uses public-key encryption techniques to resolve such questions.It also allows the messages between the client and server to be encrypted.To communicate via AAL, both a client and a server must register in advance with a third site known as a certification authority.The client then contacts the server using the SSL protocol, which causes both the client and the server to contact the certification authority to confirm the authenticity of each other before further communication.During this authentication process they also obtain the encryption keys needed to encrypt their communication. Most Web browsers support SSL in such a way that its use is transparent to the user.Once a user has registered with a certification authority, SSL is activated merely by contacting a server with a URL beginning with https rather than http as in traditional hypertext protocol communication.(4)、Which of the following descriptions about SSL is wrong?
140、Suppose you are about to provide your credit card number when ordering merchandise over the World Wide Web.How do you know for sure that the sit you have contacted is the business you think it is? Suppose a brokerage firm receives a request via its Web site to sell a client’s stock.How does it know that the request came from the client rather than an impostor? The Secure Socket layer( ) is a protocol system that uses public-key encryption techniques to resolve such questions.It also allows the messages between the client and server to be encrypted.To communicate via AAL, both a client and a server must register in advance with a third site known as a certification authority.The client then contacts the server using the SSL protocol, which causes both the client and the server to contact the certification authority to confirm the authenticity of each other before further communication.During this authentication process they also obtain the encryption keys needed to encrypt their communication. Most Web browsers support SSL in such a way that its use is transparent to the user.Once a user has registered with a certification authority, SSL is activated merely by contacting a server with a URL beginning with https rather than http as in traditional hypertext protocol communication.(3)、what is the main idea of the first paragraph?
140、Suppose you are about to provide your credit card number when ordering merchandise over the World Wide Web.How do you know for sure that the sit you have contacted is the business you think it is? Suppose a brokerage firm receives a request via its Web site to sell a client’s stock.How does it know that the request came from the client rather than an impostor? The Secure Socket layer( ) is a protocol system that uses public-key encryption techniques to resolve such questions.It also allows the messages between the client and server to be encrypted.To communicate via AAL, both a client and a server must register in advance with a third site known as a certification authority.The client then contacts the server using the SSL protocol, which causes both the client and the server to contact the certification authority to confirm the authenticity of each other before further communication.During this authentication process they also obtain the encryption keys needed to encrypt their communication. Most Web browsers support SSL in such a way that its use is transparent to the user.Once a user has registered with a certification authority, SSL is activated merely by contacting a server with a URL beginning with https rather than http as in traditional hypertext protocol communication.(2)、According the described in the text, what need to do, before client contacts the server using SSL?
140、Suppose you are about to provide your credit card number when ordering merchandise over the World Wide Web.How do you know for sure that the sit you have contacted is the business you think it is? Suppose a brokerage firm receives a request via its Web site to sell a client’s stock.How does it know that the request came from the client rather than an impostor? The Secure Socket layer( ) is a protocol system that uses public-key encryption techniques to resolve such questions.It also allows the messages between the client and server to be encrypted.To communicate via AAL, both a client and a server must register in advance with a third site known as a certification authority.The client then contacts the server using the SSL protocol, which causes both the client and the server to contact the certification authority to confirm the authenticity of each other before further communication.During this authentication process they also obtain the encryption keys needed to encrypt their communication. Most Web browsers support SSL in such a way that its use is transparent to the user.Once a user has registered with a certification authority, SSL is activated merely by contacting a server with a URL beginning with https rather than http as in traditional hypertext protocol communication.(1)、what problems can be solved by using SSL?
139、The transfer of the contents of a file held on the file system of one computer to a file on another computer is a common requirement n many distributed/networked applications.In some applications the two computers involved may both be large servers each running a different operating system with a different file system and character set.In another application, one of the computers may be a server and the other item of equipment such as a cable modem or a set-top box which does not have a hard disk.Hence in this case all the data that is transferred must have been formatted specifically for running in the cable modem or set-top box.Clearly, therefore, the file transfer protocol associated with the second type of application can be much simpler than the first.Hence to meet the different requirements of these two types of application, there are two Internet application protocols associated with file transfer.The first is called the file transfer protocol ( )and the second the trivial file transfer protocol ( ).FTP is widely used Internet application protocol that has been designed to enable a user at a terminal to initiate the transfer of the contents of a named file from one computer to another using the TCP/IP protocol suite.The two computers may use different operating systems with different file systems and, possibly different character sets.It also supports the transfer of a number of different file types such as character and binary.It is specified in RFC959.We describe first how the file contents are represented and then the operation of the protocol itself.we conclude with some examples.(5)、what is main pint of this text?
139、The transfer of the contents of a file held on the file system of one computer to a file on another computer is a common requirement n many distributed/networked applications.In some applications the two computers involved may both be large servers each running a different operating system with a different file system and character set.In another application, one of the computers may be a server and the other item of equipment such as a cable modem or a set-top box which does not have a hard disk.Hence in this case all the data that is transferred must have been formatted specifically for running in the cable modem or set-top box.Clearly, therefore, the file transfer protocol associated with the second type of application can be much simpler than the first.Hence to meet the different requirements of these two types of application, there are two Internet application protocols associated with file transfer.The first is called the file transfer protocol ( )and the second the trivial file transfer protocol ( ).FTP is widely used Internet application protocol that has been designed to enable a user at a terminal to initiate the transfer of the contents of a named file from one computer to another using the TCP/IP protocol suite.The two computers may use different operating systems with different file systems and, possibly different character sets.It also supports the transfer of a number of different file types such as character and binary.It is specified in RFC959.We describe first how the file contents are represented and then the operation of the protocol itself.we conclude with some examples.(4)、What will be wrote in the next paragraph?
