首页 > 软考
题目内容 (请给出正确答案)
[主观题]

A(66)computer is a personal computer whose hardware is capable of using any or all 0f the

A(66)computer is a personal computer whose hardware is capable of using any or all 0f the following media in a program:audio,text,graphics,video and animation.

A.database

B.multimedia

C.network

D.mainframes

查看答案
答案
收藏
如果结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能还需要:
您的账号:
发送账号密码至手机
发送
安装优题宝APP,拍照搜题省时又省心!
更多“A(66)computer is a personal co…”相关的问题
第1题
●In a computer,if a logical left shift of the operand occurs,its lowest bit is (66) .(66)

●In a computer,if a logical left shift of the operand occurs,its lowest bit is (66) .

(66) A.unchanged

B.1

C.0

D.random

点击查看答案
第2题
In a computer, if a logical left shift of the operand occurs, its lowest bit is(66).A.unch

In a computer, if a logical left shift of the operand occurs, its lowest bit is(66).

A.unchanged

B.1

C.0

D.random

点击查看答案
第3题
Digital computer is controlled by internally stored programs and(66) of using common stora

Digital computer is controlled by internally stored programs and(66) of using common storage for all or part of a program and also for all or part of the data necessary for the execution of the programs; executing user-written or user-designated programs; performing user-designated manipulation of digitally represented discrete data, including.(67) operations and logic operations; and executing programs that(68) themselves during their execution.Analog computer's operations are analogous to the(69) of another system and that accepts, processes, and produces analog data.(70) computer integrates analog computer components and digital computer components by interconnection of digital-to-analog converters and analog-to-digital converters.

A.qualified

B.competent

C.capable

D.able

点击查看答案
第4题
●Heterogeneous network environments consist of computer systems from (66) vendors that run

●Heterogeneous network environments consist of computer systems from (66) vendors that run (67) operating systems and communication protocols. An organization that (68) its computer resources is usually (69) the task of integrating its heterogeneous systems. Typically, each department or division has defined its own network needs (70) OS, LAN topology, communication protocols, applications, and other components.

(66) A.same

B.similar

C.different

D.difference

(67) A.same

B.similar

C.different

D.difference

(68) A.consolidates

B.consists

C.considerate

D.consoles

(69) A.faced on

B.faced with

D.faced about

D.faced up to

(70) A.in general

B.in any term

C.in set terms

D.in terms of

点击查看答案
第5题
● Every valid character in a computer that uses even(66) must always havean even number of

● Every valid character in a computer that uses even(66) must always have an even number of 1 bits.

● The maximum number of data that can be expressed by 8 bits is(67) .

● Integration (68) is the process of verifying that the components of a system work together as described in the program design and system design specifications.

● GIF files are limited to a maximum of 8 bits/pixel, it simply means that no more than 256 colors are allowed in (69) .

● Computer (70) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.

(66)

A. parity

B. check

C. test

D. compare

(67)

A. 64

B. 128

C. 255

D. 256

(68)

A. trying

B. testing

C. checking

D. coding

(69)

A. an image

B. a file

C. a window

D. a page

(70)

A. storage

B. device

C. processor

D. network

点击查看答案
第6题
Most computer systems are(66)to two different groups of attacks: Insider attacks and outsi

Most computer systems are(66)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(67)to an outsider attack by preventing(68)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(69)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(70)by tools referred to as Intrusion Detection Systems.

A.vulnerable

B.week

C.sensitively

D.helpless

点击查看答案
第7题
The purpose of(66)is to enlarge the(67), the set of addresses a program can utilize. For

The purpose of(66)is to enlarge the(67), the set of addresses a program can utilize. For example, it might contain twice as many addresses as main memory. A program using all of it, therefore, would not be able to fit in main memory all at once. Nevertheless, the computer could execute such a program by Copying into main memory those portions of the program needed at any given point during execution.

To facilitate copying(66)into real memory, the operating system divides it into pages, each of which contains a fixed number of addresses. Each page is stored on a disk until ii is needed. When the page is needed, the operating system copies it from disk to main memory, translating the(68)into real addresses. The process of translating virtual addresses into real addresses is called(69). The copying of virtual pages from disk to main memory is known as(70)or swapping.

A.fake memory

B.false memory

C.virtual memory

D.mendacious memory

点击查看答案
第8题
Typically, these are concern with the establishment of(66)the network and with the control

Typically, these are concern with the establishment of(66)the network and with the control of the flow of messages across this channel. The provision of such facilities is only part of the network requirements, however, since in many applications the communicating computers may be of different types. This means that they may use different programming languages and, more importantly, different forms of(67)interface between user(application)program, normally referred to, as application processes or APs, and the underlying communication services may be(68)For example, one computer may be a small single -user computer, while another may be a large(69)system. In the earlier days of computer communication, these issues meantthat only closed communities of computers(that is, from the same manufacturer)could communicate with each other in a meaningful way. IBM’s Systems Network.

Architecture (SNA) and DEC's Digital Network Architecture (DNA) are just two examples of Communication software packages produced by manufacturers to allow their systems to be int erconnected together. These proprietary packages, however, of which there am still many inexistence, do not address the problem of universal interconnect ability, or open systems interconnection. In an attempt to alleviate this problem,(70), in the late 1970s, formulated a reference model to provide a common basis (or the coordination of standards developments and to allow existing and evolving standards activities to beplaced into perspective with one another.

A.communication channel access

B.protocols

C.data channel

D.public communication

点击查看答案
第9题
You can make Windows _____ shut off your computer after it’s been idle for a certain p

A.automatical

B.automatic

C.auto

D.automatically

点击查看答案
第10题
While most recent attention in the AI field has been focused on expert system software, AI
(66)has also seen dramatic advances. Activity in the past years was characterized by new low-cost, powerful Lisp machines, the introduction of AI workstations, Lisp compilers becoming available for all major professional and engineering workstations, and the personal computer emerging as a(67). tool for expert system development. The next few years will see this technology evolves further.Because the(68)of an AI computer represents a sizable investment, companies should carefully(69)all options that are available as well as have a good idea of what the next generation of systems will offer in order to(70)the optimum system. This publication provides the information necessary to gain this understanding.

A.choice

B.read

C.important

D.software

E.hardware

点击查看答案
退出 登录/注册
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改