Astute service providers realize that the continued support of legacy X.25 and asynchronous network element using separate operations network is cost(16).For example,the maintenance of multiple networks can require additional staff. Often, this staff must be trained on multiple vendor technologies, sometimes requiring parallel groups specializing in each (17) .Hence, additional maintenance procedures must be maintained and administrative records are (18) .The duplication of transport facilities to carry (19)network traffic is an inefficient use of resources. And not surprisingly, more technologies installed in a central office means the necessity for more physical space, and an increase in power connections and power consumption migration of these (20) network elements to IP-based DCns is alogical strategy.空白处(16)应选择()

A、prohibitive

B、feasible

C、connective

D、special

查看答案

相关问题推荐

  • With hundreds of millions of electronic (11)taking place daily, businesses and organizations have a strong incentive to protect the. (12) of the data exchanged in this manner, and to positively ensure the (13) of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations,and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(14) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (15) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.空白处(13)应选择()

    A、identities

    B、homogeneities

    C、creations

    D、operations

    查看答案
  • Linux操作系统与其他传统操作系统相比最大的区别是()。

    A、性能好

    B、价格低

    C、安装简单

    D、开放源代码

    查看答案
  • With hundreds of millions of electronic (11)taking place daily, businesses and organizations have a strong incentive to protect the. (12) of the data exchanged in this manner, and to positively ensure the (13) of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations,and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(14) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (15) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.空白处(14)应选择()

    A、appliances

    B、chips

    C、tools

    D、means

    查看答案
  • 对等式局域网中的各台计算机既是网络服务的()——服务器,又是网络服务的()——工作站。

    查看答案
  • 下列()属于B类IP地址。

    A、132.121.3.24

    B、139.255.255.255

    C、193.23.45.3

    D、225.23.3.8

    查看答案
  • 使用CoreHTML删除和替换节点的方法如下:
    查看答案
  • 防范和应对企业危机的意识有哪些()。

    A.“生于忧患”的危机意识B.“童叟无欺”的诚信意识C.“顾客利益至上”的公众意识D.“无所不及”的沟通意识E.“敢于否定自我”的创新意识
    查看答案
  • 下列哪种疾病可引起呕吐伴右上腹痛、发热、黄疸()

    A.急性胃炎

    B.急性胰腺炎

    C.急性腹膜炎

    D.急性胆囊炎

    E.急性肾盂肾炎
    查看答案
  • Is there a French word that is the exact ____ of the English word “home”?
    A.
    balance
    B.
    match
    C.
    equipment
    D.
    equivalent
    查看答案
  • 小儿肥胖症的预防措施不包括()

    A.控制低出生体重儿的生后肥胖B.改变不良生活方式C.提高对危险人群的识别与监督指导D.使用配方奶喂养
    查看答案