首页 > 软考
题目内容 (请给出正确答案)
[主观题]

● The user must interact with the (74) in order to accomplish task. (74)A. printer B. mem

● The user must interact with the (74) in order to accomplish task.

(74)

A. printer

B. memory

C. CPU

D. operating system

查看答案
答案
收藏
如果结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能还需要:
您的账号:
发送账号密码至手机
发送
安装优题宝APP,拍照搜题省时又省心!
更多“● The user must interact with …”相关的问题
第1题
Multipurpose Internet Mail Extension (MIME)is a(76)document messaging standard in the Inte

Multipurpose Internet Mail Extension (MIME)is a(76)document messaging standard in the Internet environment. With MIME, users can send(77)E-mail messages that include audio, video, graphices, and text to any other user of a TCP/IP network. Richtext information can also be(78)into messages. It defines the fonts, formats, and(79)features of a document so the document can be easily(80)on many different types of systems.

A.complete

B.compound

C.simple

D.efficient

点击查看答案
第2题
The user must interact with the(73) in order to accomplish task.A.printerB.memoryC.CPUD.op

The user must interact with the(73) in order to accomplish task.

A.printer

B.memory

C.CPU

D.operating system

点击查看答案
第3题
Password is a secret series of(69)that enables a user to access a file, computer, or progr

Password is a secret series of(69)that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(70). The password helps ensure that(71)users do not access the computer. In addition, data files and programs may require a password.

A.symbol

B.sign

C.characters

D.characteristic

点击查看答案
第4题
In the fields of physical security and information security,access control is the selectiv
e restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).

An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.

In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.

A.cooperates

B.coordinates

C.connects

D.mediates

点击查看答案
第5题
The purpose of systems analysis phase is to build a logical model of the new system. The f
irst step is(), where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(). You use the fact-finding results to build business models, data and process models, and object models. The deliverable for the systems analysis phase is the(), which describes management and user requirements, costs and benefits, and outlines alternative development strategies. The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase, you need to determine the(), which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(), which is presented to management and users for review and approval.

A.System logical modelingB.use case modelingC.requirements modelingD.application modeling A.systems planning phaseB.systems modeling phaseC.systems analysis phaseD.systems design phase A.system charterB.system scope definitionC.system blueprintD.system requirement document A.application architectureB.system data modelC.system process modelD.implement environment A.system architecture descriptionB.system design specificationC.system technique architectureD.physical deployment architecture

点击查看答案
第6题
inte的网络协议是()。

A.tcp/ip协议

B.smtp(简单邮件传送协议)

C.ftp(文件传送协议)

D.arp(地址转换协议)

点击查看答案
第7题
用于从文本文件中导入和导出数据的宏命令是______。A.InputTextB. AddTextC. TransferTextD. InTe

用于从文本文件中导入和导出数据的宏命令是______。

A.InputText

B. AddText

C. TransferText

D. InText

点击查看答案
第8题
下列数组声明语句中,正确的是A.Dim A[3,4]As IntegerB.Dim A(3,4)As IntegerC.Dim A[3;4]As Inte

下列数组声明语句中,正确的是

A.Dim A[3,4]As Integer

B.Dim A(3,4)As Integer

C.Dim A[3;4]As Integer

D.Dim A(3;4)As Integer

点击查看答案
第9题
已知数组e定义为inte[][5]={(1,2,3),{5,},{6,7,8}};,则f是一个()行()列的二维数组,总共有()个元素,安行列列出元素的值()。

点击查看答案
退出 登录/注册
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改