首页 > 软考
题目内容 (请给出正确答案)
[主观题]

User programs interact with the kernel through a set of standard(71). They request service

User programs interact with the kernel through a set of standard(71). They request services to be provided by the kernel. Such services would include accessing a file: open close, read, write, link, or execute a file; starting or(72)accounting records; changing ownership of a file or(73); changing to a new directory; creating,(74), or killing a process; enabling access to hardware devices; and setting limits on system resources. Unix is a multi -user, multi -tasking operating system. You can have many users logged into a system simultaneously, each running many programs. It's the kernel's job to keep each process and user separate and to regulate access to(75), including cpu, memory, disk and other L/O devices.

A.system commands

B.system transfer

C.system calls

D.system rings

查看答案
答案
收藏
如果结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能还需要:
您的账号:
发送账号密码至手机
发送
安装优题宝APP,拍照搜题省时又省心!
更多“User programs interact with th…”相关的问题
第1题
Password is a secret series of(69)that enables a user to access a file, computer, or progr

Password is a secret series of(69)that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(70). The password helps ensure that(71)users do not access the computer. In addition, data files and programs may require a password.

A.symbol

B.sign

C.characters

D.characteristic

点击查看答案
第2题
The kernel is the(66)of an operating system such as Windows98, Windows NT, Mac OS or Unix.

The kernel is the(66)of an operating system such as Windows98, Windows NT, Mac OS or Unix. The kernel provides basic services for the other parts of the operating system,(67)it possible for it to run several programs at once(multitasking), read and write files and connect to networks and peripherals. Applications and utility programs use the services provided by the kernel to provide practical business functionality.

In operating systems such as Windows or most versions of Unix, the kernel(68)everything except application and utility programs.

In microkernel operating systems such as Digital Unix and Apples forthcoming Mac OS Server, the kernel(69)supports only multitasking and memory management. Other services such as applications, utilities and the user interface support device drivers, API and graphics which all(70)outside the microkernel.

A.nucleus

B.center

C.core

D.heart

点击查看答案
第3题
The API changes should provide both source and binary (71) for programs written to the ori
ginal API.That is,existing program binaries should continue to operate when run on a system supporting the new API.In addition,existing (72) that are re-compiled and run on a system supporting the new API should continue to operate.Simply put,the API (73) for multicast receivers that specify source filters should not break existing programs.The changes to the API should be as small as possible in order to simplity the task of converting existing (74) receiver applications to use source filters.Applications should be able to detele when the new (75) filter APIs are unavailable(e.g., calls fail with the ENOTSUPP erroe) and react gracefully(e.g., revert to old non-source-filter API or display a meaningful error message to the user).

71.

A.capability

B.compatibility

C.labiality

D.reliability

点击查看答案
第4题
Pharming is a scamming practice in which malicious code is installed on a personal compute
r or server, misdirecting users to(71)Web sites without their knowledge or consent. Pharming has been called "phishing without a lure."

In phishing, the perpetrator sends out legitimate-(72)E-mails, appearing to come from some of the Web's most popular sites, in ah effort to obtain personal and financial information from individual recipients. But in pharming, larger numbers of computer users can be(73)because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form. of pharming attack, code sent in an E-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected(74)entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing(75).

A.few

B.fraudulent

C.normal

D.structured

点击查看答案
第5题
下面SQL语句将USER表的名称更改为USERINFO的是()

A.LTER TABLE USER RENAME AS USERINFO

B.RENAME TO USERINFO FROM USER

C.RENAME USER TO USERINFO

D.RENAME USER AS USERINFO

点击查看答案
第6题
There is a various of programs that one can see on every channel.()
点击查看答案
第7题
Since the 1970s, the civil rights legislation and other government programs have broa
点击查看答案
第8题
下面代码将数据库删除一条记录,请补全代码。

Privatevoiddelete()

{Stringname=mEtName.getText().toString().trim();

();}

A.mSQLiteDatabase.del(“user”,“name=?”,newString[]{name})

B.mSQLiteDatabase.del(“user”,“name=?”,newString{name})

C.mSQLiteDatabase.delete(“user”,“name=?”,newString[]{name})

D.mSQLiteDatabase.delete(“user”,“name=?”,newString{name})

点击查看答案
第9题
如果想要在 JSP 中使用 user 包中的 User 类,则以下写法正确的是()

A.<jsp:useBean id="user" class="user.User" scope="page"/>

B.<jsp:useBean class="user.User.class" />

C.<jsp:useBean name="user" class="user.User"/>

D.<jsp:useBean id="user" class="User" import="user.* "/>

点击查看答案
第10题
●During the last few years,it has been realized that maintenance of programs is more expen
sive than development,so reading of programs by humans is as important as (73) them.

(73) A.editing

B.writed

C.written

D.writing

点击查看答案
退出 登录/注册
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改