ADSL技术,即Asymmetric Digital Subscriber Line,是一种非对称的传输技术,通过不同的调制方法,在铜缆上实现高速数据传输,MA5100产品中采用()调制方式。

A:CAP B:AM C:FM D:DMT

非对称的信息(Asymmetric information)

Asymmetric Digital Subscriber Line简称(),能提供上下行不对称速率即非对称宽带业务。

A:HDSL B:IDSL C:ADSL D:SDSL

A typical application of this (71) is ADSL. It is emerging as the technology for home-and small-office Internet connectivity. It provides either 1.5 Mb/s~8 Mb/s from the network to the user and 64 kb/s~512 kb/s in the reverse direction depending on the distance, 12000 or 18000 feet. The different speed for each direction gives it the (72) label. ADSL is designed to take advantage of the fact that video-on demand, telecommuting, and Internet access traffic are inherently asymmetrical. The user (73) a brief message up to the network and receives a ton of data coming back, either a movie or a piece of data download. Under such a scenario, low-speed traffic to the network is just fine. ADSL .delivers high (74) where you need it and only uses a single copper pair. Through multiplexing, it also reserves (75) of the bandwidth for POTS.

A:asymmetric B:compressed C:irregularity D:symmetric

In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private-key encryption methods are called (71) ciphers, information is encrypted with (72) both the sender and receiver hold privately. Public-key encryption methods are called (73) ciphers, (74) created for each user, encryption key and decryption key are (75)

A:synchronous B:Asynchronous C:symmetric D:asymmetric

In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private-key encryption methods are called (71) ciphers, information is encrypted with (72) both the sender and receiver hold privately. Public-key encryption methods are called (73) ciphers, (74) created for each user, encryption key and deception key are (75)

A:synchronous B:Asynchronous C:symmetric D:asymmetric

In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private - key encryption methods are called (66) ciphers, information is encrypted with (67) both the sender and receiver hold privately. Public - key encryption methods are called (68) ciphers, (69) created for each user, encryption key and decryption key ale (70) .

A:synchronous B:Asynchronous C:symmetric D:asymmetric

In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private - key encryption methods are called (66) ciphers, information is encrypted with (67) both the sender and receiver hold privately. Public - key encryption methods are called (68) ciphers, (69) created for each user, encryption key and decryption key ale (70) .

A:synchronous B:Asynchronous C:symmetric D:asymmetric

微信扫码获取答案解析
下载APP查看答案解析