● The user must interact with the (74) in order to accomplish task. (74)A. printer B. mem
● The user must interact with the (74) in order to accomplish task.
(74)
A. printer
B. memory
C. CPU
D. operating system
● The user must interact with the (74) in order to accomplish task.
(74)
A. printer
B. memory
C. CPU
D. operating system
Multipurpose Internet Mail Extension (MIME)is a(76)document messaging standard in the Internet environment. With MIME, users can send(77)E-mail messages that include audio, video, graphices, and text to any other user of a TCP/IP network. Richtext information can also be(78)into messages. It defines the fonts, formats, and(79)features of a document so the document can be easily(80)on many different types of systems.
A.complete
B.compound
C.simple
D.efficient
The user must interact with the(73) in order to accomplish task.
A.printer
B.memory
C.CPU
D.operating system
Password is a secret series of(69)that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(70). The password helps ensure that(71)users do not access the computer. In addition, data files and programs may require a password.
A.symbol
B.sign
C.characters
D.characteristic
An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.
In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.
A.cooperates
B.coordinates
C.connects
D.mediates
A.System logical modelingB.use case modelingC.requirements modelingD.application modeling A.systems planning phaseB.systems modeling phaseC.systems analysis phaseD.systems design phase A.system charterB.system scope definitionC.system blueprintD.system requirement document A.application architectureB.system data modelC.system process modelD.implement environment A.system architecture descriptionB.system design specificationC.system technique architectureD.physical deployment architecture
用于从文本文件中导入和导出数据的宏命令是______。
A.InputText
B. AddText
C. TransferText
D. InText
下列数组声明语句中,正确的是
A.Dim A[3,4]As Integer
B.Dim A(3,4)As Integer
C.Dim A[3;4]As Integer
D.Dim A(3;4)As Integer