1、精品资料 欢迎下载The raw data are stored on the disk using the _ .收藏A. DBAB. DBMSC. file systemD. data dictionary回答错误!正确答案: C A copy is a copy of a current file made in order to protect against loss or damage.收藏A. fileB. hardC. backupD. soft回答错误!正确答案: C Which of the following is WRONG about Web 2.0? _收藏A. T
2、he ideas of Web 2.0 was featured originally in late 2004.B. Web 2.0 enables business to embrace the Web as a platform and user its strengths more effectively.C. Web 2.0 enhances creativity, information sharing and collaboration among Web users.D. Web 2.0 changes the ways of software developers and e
3、nd-users utilizing the web回答错误!正确答案: B ADO.NET is the model for .NET-based applications. (data access)收藏A. data processB. data accessC. data miningD. data achieve回答错误!正确答案: B Which of the following type of wireless devices has the highest power consumption? _收藏A. ZigBeeB. Wi-FiC. BluetoothD. Not men
4、tioned回答错误!正确答案: B In the following descriptions, which is RIGHT about the functions of CPU socket? _收藏A. A CPU socket forms an interface both with the CPU and the PCBB. A CPU socket provides heat sinkC. All above.D. A CPU socket houses a CPU on motherboar回答错误!正确答案: C A mouse is a small device that
5、a computer user pushes across a desk surface in order to point to a place on a _ and to select one or more action to take from that position.收藏A. platformB. desktopC. consoleD. display回答错误!正确答案: D Which of the following is WRONG about the terminology used in software engineering? _收藏A. Smalltalk-Lan
6、guageB. Macro assemblers-ToolC. Offshore outsourcing-PlatformD. Lean software development-Process回答错误!正确答案: A Which one is not a computer languages?收藏A. PASCALB. word 2000C. C+D. C回答错误!正确答案: B In the system development process, the code is written in the ( ) phase.收藏A. testingB. implementationC. des
7、ignD. analysis回答错误!正确答案: B A(n) translates all the source code of a program written in a high-level language into object code prior to the eecution of th program.收藏A. interpreterB. assemblersC. compiler回答错误!正确答案: C The attributes of the stack are ( ).收藏A. built into their circuitryB. queueC. LIFOD.
8、FIFO回答错误!正确答案: D Confidentiality of the message is not enough in a secure communication; ( ) is also needed. The receiver needs to be sure of the senders identity.收藏A. encryptionB. authenticationC. authorizationD. encapsulation回答错误!正确答案: B _ is a fast and powerful operating system, based on the UNIX
9、 O.S.收藏A. Windows 98B. Windows 2000C. LinuxD. Office 2000回答错误!正确答案: CWhich of the following facts is(are) mentioned about the usage on Web 2.0 in this article? _收藏A. WikisB. RSSC. All aboveD. Blogs回答错误!正确答案: C Which of the following RDBMS is not open source according to this article? _收藏A. PostgreSQ
10、LB. SQL ServerC. MySQLD. SQLite回答错误!正确答案: B Many viruses go resident in the memory like a ( ).收藏A. tsr programB. data fileC. .com fileD. .exe file回答错误!正确答案: A Many viruses go resident in the memory like a ( ).收藏A. tsr programB. data fileC. .com fileD. .exe file回答错误!正确答案: A Assembly-language instruct
11、ions are a series of _.收藏A. machine codesB. 0s and 1sC. wordsD. abstract codes回答错误!正确答案: D Videodisc and laser technology provide the ability to_收藏A. cost moreB. enhance other forms of educationC. create some education filesD. store large amounts of data回答错误!正确答案: D Which of the following items is n
12、ot included in the “three companion application ” in Painter Series? _收藏A. Sketch PadB. ExpressionC. SketcherD. Dabbler回答错误!正确答案: A Anti-Virus protects your computer from viruses by ( ) your computers memory and disk devices.收藏A. deletingB. replacingC. changingD. scanning回答错误!正确答案: D Just a minute,
13、Im waiting for the computer to up. It wont take long to start it.收藏A. logB. bootC. activateD. scroll回答错误!正确答案: B If you want to solve the computational problem with a computer, you should learn how to _收藏A. subtractB. calculateC. addD. program回答错误!正确答案: D ADO.NET is the ( ) model for .NET-based appl
14、ications. (data access)收藏A. data miningB. data achieveC. data processD. data access回答错误!正确答案: D Which one is not a computer languages? _收藏A. CB. word 2000C. PASCALD. C+回答错误!正确答案: CIn 2000, the number of viruses topped ( ).收藏A. 50000B. 1000C. 7500D. 500回答错误!正确答案: A In the case of a(n) , a program is
15、translated into eecutable form and eecuted one statment at a time rather than being translated completely before eecution.收藏A. compilerB. assemblersC. DebuggerD. interpreter回答错误!正确答案: D Please find the item that is not belong to the DBA _.收藏A. schema definitionB. storage structure and access method
16、definitionC. DDLD. integrity constrain specification回答错误!正确答案: C Hardware components are used for the purpose of ( ).收藏A. central processingB. outputC. all of the aboveD. input回答错误!正确答案: C Just a minute, Im waiting for the computer to ( ) up. It wont take long to start it.收藏A. bootB. logC. scrollD.
17、activate回答错误!正确答案: A Communication through the Internet, the_ performs the reverse function.收藏A. DTEB. Data communications equipment (DCE)C. CRTD. A station controller (STACO)回答错误!正确答案: B The control unit fetches _ from memory and decodes them.收藏A. dataB. instructionsC. resultsD. information回答错误!正确答
18、案: B ( )as a significant majority of market share in the desktop收藏A. Microsoft WindowsB. unixC. linuxD. Mac OS回答错误!正确答案: A The largest and fastest computers are ( ).收藏A. hand-held PCsB. workstationsC. supercomputersD. mainframe computers回答错误!正确答案: C In the system development process, the code is wri
19、tten in the phase.收藏A. testingB. analysisC. implementationD. design回答错误!正确答案: C ( )is a network protocol used to transfer data from one computer to another through a network such as the Internet.收藏A. FTPB. HttpC. DNSD. SMTP回答错误!正确答案: A , such as those supplied for OLE DB and ODBC, allow you to use d
20、ata libraries designed for earlier data access technologies.收藏A. Bridge providersB. Native providers回答错误!正确答案: A One of the differences between C# and Java is that Java runs on any platform with a Java Virtual ( ) while C# only runs in Windows for the foreseeable future.收藏A. SoftwareB. HardwareC. Pr
21、ogramD. Machine回答错误!正确答案: D Windows gives you more control over the _ you work.收藏A. wayB. powerC. energyD. operation回答错误!正确答案: D A machine language is a(n) language in binary code that the computer can understand and eecute directly.收藏A. high-levelB. flat levelC. low-level回答错误!正确答案: C A processor is
22、 composed of two functional units, they are _.收藏A. a control unit and some registersB. an arithmetic/logic unit and a storage unitC. a control unit and an arithmetic/logic unitD. some registers an arithmetic/logic unit回答错误!正确答案: C A companys ability to deploy and support customer-oriented ( ) system
23、s will be of vital importance to its prosperity.收藏A. e-LearningB. e-ShoppingC. e-BusinessD. e-Banking回答错误!正确答案: C In the system development process, the system analyst defines the user, needs, requirements and methods in the phase.收藏A. designB. implementationC. analysisD. testing回答错误!正确答案: C is a wo
24、rd processing tool that helps you to creae quality documents.收藏A. ExcelB. OutlookC. WordD. Access回答错误!正确答案: C The _ serves as an interface between hardware and software.收藏A. application programB. systemC. operating systemD. control unit回答错误!正确答案: C What does the phrase “frame-based” mean appearing a
25、t the beginning of the article? _收藏A. All generations of Ethernet are built on improving infrastructure from coaxial cable to twisted pair.B. All generations of Ethernet base on the same physical layer as the underlying frame.C. All generation of Ethernet conform to the multi-layers structure of the
26、 OSI reference model.D. All generations of Ethernet base on the same architecture formats and the same interfaces for higher layers.回答错误!正确答案: A After I finished the last paragraph, I moved the back to the third paragraph and deleted收藏A. iconB. joystickC. cursorD. mouse回答错误!正确答案: C For some time, we
27、ve been experiencing some in this particular program. It cannot run in a normal way.收藏A. bugsB. defaultsC. loopsD. routines回答错误!正确答案: A Multimedia will become increasingly _ throughout every aspect of our lives.收藏A. pervasiveB. permitC. preciseD. pass回答错误!正确答案: A To access a page on the WWW, one nee
28、ds a that usually consists of three parts: a controller, a method, and an interpreter.收藏A. browserB. codeC. routerD. password回答错误!正确答案: A To access a page on the WWW, one needs a ( ) that usually consists of three parts: a controller, a method, and an interpreter.收藏A. browserB. routerC. passwordD. c
29、ode回答错误!正确答案: A A is a set of rules that controls the interaction of different devices in a network or internetwork.收藏A. queryB. dialogC. modelD. protocol回答错误!正确答案: D Whereas a repeater operates only in the physical layer of the OSI model, a bridge operates in both the physical layer and the layer o
30、f the OSI model.收藏A. Physical LayerB. Network LayerC. Transport LayerD. data-link回答错误!正确答案: D All computers can perform basic machine operations under the control of ( ).收藏A. programsB. instructionsC. commandsD. operations回答错误!正确答案: A A ( )is used to communicate with another computer over telephone
31、lines.收藏A. keyboardB. modemC. printerD. mouse回答错误!正确答案: B ( )as a significant majority of market share in the desktop收藏A. linuxB. Mac OSC. Microsoft WindowsD. unix回答错误!正确答案: C Which of the following description is WRONG about Wi-Fi? _收藏A. One can connect Wi-Fi devices in ad-hoc mode for client-to-cl
32、ient connections without a router.B. Communications between two devices need the involvement of an access point with WI-Fi.C. Now most laptops are built with wireless network adapters inside.D. Any standard Wi-Fi device will work anywhere in the world with global operative set of standards.回答错误!正确答案
33、: B primary memory which is stored on chips located ( ).收藏A. on the motherboarDB. outsideC. on the CPUD. inside the processor回答错误!正确答案: A The abbreviation USB stands for Universal Bus.收藏A. SyntacticB. SymmetricC. SerialD. Sequential回答错误!正确答案: C A ( ) copy is a copy of a current file made in order to
34、 protect against loss or damage.收藏A. harDB. fileC. backupD. soft回答错误!正确答案: C A characteristic of operating system is _.收藏A. error recoveryB. all the aboveC. memory managementD. resource management回答错误!正确答案: D The Whale will creae ( ) different versions of itself when it infects files.收藏A. 31B. 33C.
35、32D. 30回答错误!正确答案: B Chemical energy, ( ) from fuel or other matters, can be transformed into heat energy.收藏A. whetherB. not considered thatC. if or notD. no matter how回答错误!正确答案: A what does neural network mean?收藏A. 神经网络B. 社会网络C. 自然网络D. 精神网回答错误!正确答案: A is an architectural framework.收藏A. dnsB. wwwC. h
36、ttpD. ftp回答错误!正确答案: B Which of the following is RIGHT about the current trends in software engineering? _收藏A. Experimental software engineering advances the knowledge on experiments through software.B. Software Product Lines produce successions of individual software system products.C. Agile softwar
37、e development is a light and change-driven process.D. Aspects describe the behavior or all objects or functions in particular circumstances and design particular-purpose code for them.回答错误!正确答案: C A _ is a device that enables the computer to handle sounds.收藏A. monitorB. network cardC. sound cardD. v
38、ideo card回答错误!正确答案: C Each_ is a unit of both atomicity and consistency.收藏A. transactionB. schema detailsC. databaseD. storage structure回答错误!正确答案: A Which of the following descriptions in WRONG about the uses of Wi-Fi? _收藏A. The hardware provides indication to the sender about whether the transmissi
39、on was deliveredB. All stations share a single radio frequency communication channel.C. A carrier wave is used to transmit the data in packets.D. Each station is constantly tuned in on the channel.回答错误!正确答案: A When power is removed, information in the semiconductor memory is _收藏A. remainB. lostC. ma
40、nipulatedD. reliable回答错误!正确答案: B Small as it is, a personal computer can perform the same program instructions as ( ).收藏A. typewriterB. printersC. larger computersD. human beings回答错误!正确答案: CThe attributes of the stack are ( ).收藏A. LIFOB. queueC. FIFOD. built into their circuitry回答错误!正确答案: C A period
41、ic refresh is needed to restore the information for the _ .收藏A. EPROMB. SRAMC. DRAMD. EEPROM回答错误!正确答案: C A(n) is a sequence of code in a program eecuted repeatedly,either fro a fixed number of times or until a certain condition is met.收藏A. LoopB. selected回答错误!正确答案: A The most commonly used tool in t
42、he design phase is the ( ).收藏A. structure chartB. flowchartsC. object-relationship chartD. topology chart回答错误!正确答案: A A Web site is often more effective as a(n) tool than a selling tool.收藏A. ElectronicalB. PoliticC. TechnicalD. Marketing回答错误!正确答案: D Data ( ) can reduce the amount of data sent or stored by partially eliminating inherent redundancy.收藏A. compilationB. compressionC. conversionD. configuration回答错误!正确答案: B The history of programming languages can be traced back almost to the invention of the ( )computer in th 1940s.收藏A. biologicB. analogC. digitalD. electrical回