单项选择题

美国某公司与中国某企业谈技术合作,合同约定使用l项美国专利(获得批准并在有效期内),该项技术未在中国和其他国家申请专利。依照该专利生产的产品()需要向美国公司支付这件美国专利的许可使用费。

A.在中国销售,中国企业
B.如果返销美国,中国企业不
C.在其他国家销售,中国企业
D.在中国销售,中国企业不

题目列表

你可能感兴趣的试题

单项选择题

【案例分析题】

完形填空:下面短文有5处空白,请根据短文内容为每处空白确定1个最佳选项。
In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The actof accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权). 
An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources. 
In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also 
incorporate access control functions. External devices, such as firewalls, can also provide access control services.

71、()

A.cooperates
B.coordinates
C.connects
D.mediates

单项选择题

【案例分析题】

完形填空:下面短文有5处空白,请根据短文内容为每处空白确定1个最佳选项。
In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The actof accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also
incorporate access control functions. External devices, such as firewalls, can also provide access control services.

72、()

A.denied
B.permitted
C.prohibited
D.rejected

单项选择题

【案例分析题】

完形填空:下面短文有5处空白,请根据短文内容为每处空白确定1个最佳选项。
In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The actof accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also
incorporate access control functions. External devices, such as firewalls, can also provide access control services.

73、()

A.open
B.monitor
C.grant
D.seek

单项选择题

【案例分析题】

完形填空:下面短文有5处空白,请根据短文内容为每处空白确定1个最佳选项。
In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The actof accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also
incorporate access control functions. External devices, such as firewalls, can also provide access control services.

74、()

A.components
B.users
C.mechanisms
D.algorithms

单项选择题

【案例分析题】

完形填空:下面短文有5处空白,请根据短文内容为每处空白确定1个最佳选项。
In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The actof accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also
incorporate access control functions. External devices, such as firewalls, can also provide access control services.

75、()

A.remote
B.native
C.controlled
D.automated

微信扫码免费搜题