当前位置:初级网络管理员题库>计算机软件基础知识题库

问题:

[单选] 下列选项中不受我国《著作权法》保护的作品是()。

A . 计算机程序
B . Flash软件制作的动画
C . 计算机文档
D . 计算机软件保护条例

()属于系统软件,它直接执行高级语言源程序或与源程序等价的某种中间代码。 编译程序。 预处理程序。 汇编程序。 解释程序。 With hundreds of millions of electronic (11)taking place daily, businesses and organizations have a strong incentive to protect the. (12) of the data exchanged in this manner, and to positively ensure the (13) of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations,and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(14) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (15) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.空白处(12)应选择() A.operation。 completeness。 integrity。 interchange。 调用递归过程或函数时,处理参数及返回地址需要用一种称为()的数据结构。 队列。 栈。 多维数组。 顺序表。 To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks.These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(6) .Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(7)activity. For many organizations, however,the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle's security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch (8) of service attacks or steal (9) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (10) and worms acquired from unprotected public networks. Hackers masquer-ading as internal users can take advantage of weak internal security to gain access to confidential information.空白处(10)应选择() A.sickness。 disease。 viruses。 germs。 To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks.These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(6) .Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(7)activity. For many organizations, however,the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle's security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch (8) of service attacks or steal (9) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (10) and worms acquired from unprotected public networks. Hackers masquer-ading as internal users can take advantage of weak internal security to gain access to confidential information.空白处(9)应选择() A.reserved。 confidential。 complete。 mysterious。 下列选项中不受我国《著作权法》保护的作品是()。
参考答案:

  参考解析

《著作权法》及实施条件的客体是指受保护的作品,作品的类型有以下几种。
●文字作品,包括小说、诗词、散文、论文等以文字形式表现的作品。
●口述作品,是指即兴的演说、授课、法庭辩论等以口头语言形式表现的作品。
●音乐、戏剧、曲艺、舞蹈、杂技作品。
●美术、摄影作品。
●电影、电视、录像作品。
●工程设计、产品设计图纸及其说明。
●地图、示意图等图形作品。
●计算机软件。
●法律、行政法规规定的其他作品。

相关题目:

在线 客服