Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc.空白(3)处应选择()A、tableB、eventcC、objectsD、function

Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc. 空白(3)处应选择()

  • A、table
  • B、eventc
  • C、objects
  • D、function

相关考题:

Microsoft's COM is a software(146)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(147)standard developed by Microsoft. OLE makes it possible to create(148)with one application and link or embed them in a second application. Embedded objects retain their original format and(149)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(150)compound document standard developed mainly by Apple and IBM is called OpenDoc.A.architectureB.protocolC.procedureD.structure

NET is both a business strategy from Microsoft and its(6)of(7)support for what are known as Web services, the ability to use the Web rather than your own computer for various services. Microsoft's goal is to provide individual and business users with a(8)interoperable and Web-enabled interface for applications and computing devices and to make computing activities increasingly Web browser-oriented. The NET(9)includes servers; building-block services, such as Web-based data storage; and device software. It also includes Passport, Microsoft's fill-in-the-form-only-once identity(10)service.A.individualB.collectionC.setD.unit

Your network consists of numerous domains within a LAN, plus one remote location that is configured as another domain within the tree. Each domain contains several organizational units. The remote domain is connected to the main office network by using 56-Kbps connection, as shown in the Exhibit.The remote location is running a previous service pack for Windows 2000, and the LAN is running the most recent service pack.You want to configure a group policy for the remote location so that users can repair a problem with a service pack system file. You also want to reduce the traffic on the LAN and ease administration of the group policies. You want to retain the domain administrator's access to the group policy configuration.What should you do?A.Configure a group policy for each OU in the west.litware.com domain. Configure a service pack software package for each group policy.B.Configure a group policy for each OU in the litware.com domain. Configure a service pack software package for each group policy.C.Configure a group policy for west.litware.com domain. Configure a service pack software package for the group policy.D.Configure a group policy for the litware.com domain. Configure a service pack software package for the group policy.

Microsoft's COM is a software(71) that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(72) standard developed by Microsoft. OLE makes it possible to create(73) with one application and link or embed them in a second application. Embedded objects retain their original format and(74) to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(75) compound document standard developed mainly by Apple and IBM is called OpenDoc.A.structureB.procedureC.protocolD.architecture

Microsoft's COM is a software(73) that allows applications to be built from binary software components。A.structureB.protocolC.procedureD.architecture

Software Engineering is best described as ( ).A.the practice of designing, building, and maintaining off-the-shelf software from prefabricated partsB.the practice of designing, building, and maintaining ad-hoc software without the use of formal methodsC.the practice of designing, building, and maintaining reliable and cost-effective software using standard techniquesD.the practice of designing, building, and maintaining fast and flexible software specifically for engineering applications

Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.A.network B.virus C.security D.architecture

Microsoffs COM is a software(66)that allows applications to be built from binary software components. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(67)standard developed by Microsoft. OLE makes it possible to create(68)with one application and link or embed them in a second application. Embedded objects retain their original format and(69)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(70)compound document standard developed mainly by Apple and IBM is called OpenDoc.A.architectureB.protocolC.procedureD.structure

Cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers ( )through a real-time communication network such as the Internet.In science,cloud computing is a ( )for distributed computing over a network,and means the ( )to run a program or application on many connected computers at the same time.The architecture of a cloud is developed at three layers: infrastructure,platform,and application,The infrastructure layer is built with virtualized compute,storage,and network resources.The platform layer is for general-purpose and repeated usage of the collection of software resources.The application layer is formed with a collection of all needed software modules for SaaS applications.The infrastructure layer serves as the( )for building the platform layer of the cloud. In turn,the platform layer is a foundation for implementing the(请作答此空)layer for SaaS applications.A.resoruceB.serviceC.applicationD.software

TCP/IP ( )layer protocols provide services to the application(请作答此空)running on a computer. The application layer does not define the application itself, but rather it defines( )that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an( )between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP( )layer consists of two main protocol options--the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).A.hardware]B.software]C.packetD.equipment

Software Engineering is best described as ( ). A. the practice of designing, building, and maintaining off-the-shelf software from prefabricated parts B. the practice of designing, building, and maintaining ad-hoc software without the use of formal methods C. the practice of designing, building, and maintaining reliable and cost-effective software using standard techniques D. the practice of designing, building, and maintaining fast and flexible software specifically for engineering applications

Cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers ( )through a real-time communication network such as the Internet. In science, cloud computing is a ( )for distributed computing over a network, and means the ( )to run a program or application on many connected computers at the same time.The architecture of a cloud is developed at three layers: infrastructure, platform, and application. The infrastucture layer is built with virtualized computestorageand network resources. The platform lay-er is for general-purpose and repeated usage of the collection of software resources. The application layer is formed with a collection of all needed software modules for SaaS applications. The infrastucture layer serves as the ( )for building the platform layer of the cloud. In turn, the platform layer is foundation for implementing the (请作答此空)layer for SaaS applicationA.resourceB.serviceC.applicationD.software

Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc.空白(1)处应选择()A、architectureB、protocolC、procedureD、structure

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange 2010 environment. The employees of TestKing.comuse Microsoft Outlook 2003 to connect to their Mailboxes. You have received instructions from the CIO tochange the network to Exchange Server 2010. However, the CIO wants you to propose a solution for Mailboxes access that will keep the support and software cost to a minimum as well as ensuring access tothe public folders. What should you do?()A、This can be accomplished using Personal Archive and forms-based authentication.B、This can be accomplished by upgrading all client computers to Outlook 2010 and use Autodiscover.C、This can be accomplished using Outlook Anywhere and changin the Outlook RPC encryption settings.D、This can be accomplished using using POP3 and IMAP4 access.

Which statement about Software Maintenance Upgrade is true?()A、CRS-1 SMU can be applied to a different platform, and vice versaB、SMU is an executable code for running a process or libraries that are shared between the different processesC、SMUs for each release are individually downloadable from Cisco.com and come in the form of a tar ballD、SMUs provide software fixes for critical network down and qualification blocking issues Therefore,every software defect has a corresponding SMUE、SMUs are release-specific. If an issue affects multiple platforms or releases,an SMU is built separately for each release and each platform

If XYZ LTD needs to upgrade the Cisco IOS Software of a Cisco Router, Where is the best place to download the upgrade image file from?()A、The best option is to download it from the Cisco TAC websiteB、The best option is to download it from the Cisco.Com Software support siteC、The best option is to download it form the Cisco Advanced Services websiteD、The best option is to download it from the TFTP site on Cisco.com

Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE.COM defines a binary standard for function calling between components,a way for components to dynamically discover the interfaces implemented by other components,and a mechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft.OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them.Support for OLE is built into the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoC.空白(4)处应选择()A、characteristicsB、addressC、pageD、links

Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE.COM defines a binary standard for function calling between components,a way for components to dynamically discover the interfaces implemented by other components,and a mechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft.OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them.Support for OLE is built into the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoC.空白(1)处应选择()A、architectureB、protocolC、procedureD、structure

对URL:http://www.teach.com/software/test.htm的描述哪个不正确?()A、software是主机的二级机器名B、使用http协议C、主机是www.teach.comD、运行的是test.htm文件

You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()A、ExecutableB、TrojanC、VirusD、Worm

Which of the following is an advantage of hardware RAID over software RAID?()A、Hardware RAID costs less than software RAIDB、Hardware RAID is built into the operating system’s softwareC、Hardware RAID has better performance than software RAIDD、Hardware RAID requires no configuration and software RAID does

Cer-tech .com has an Active Directory domain installed on a server that runs Windows Server 2008.Another server named S3 also runs Windows Server 2008. All client machines have Windows Vista. Cer-tech .com has instructed you to install the Terminal Services role, Terminal Services Gateway role andTerminal Services Web Access role service on S3. To protect the network, you want to ensure that all client machines have firewall, antivirus software and anti-spyware software installed. Which actions shouldyou perform to achieve this task?()A、Configure Windows Authorization Access domain local security group and add Terminal Services clientcomputersB、Configure Terminal Services client computers to access the Terminal Services health policy.C、Set the Request clients to sent a health option statement in the Terminal Services client access policyD、Install and configure Network Access Protection (NAP) on the server in the domain

Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()A、Trigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual serverB、On CKT’s physical network interface, activate the Internet Connection Sharing (ICS)C、Use Certkiller .com intranet IP addresses on all virtual servers on CKT.D、Add and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.E、None of the above

You are a network administrator for Alpine Ski House. The network consists of a single Active Directory domain named alpineskihouse.com.Your company acquires a company named Adventure Works. The Adventure Works network consists of a single Active Directory domain named adventure-works.com. A server named Server32 is a network-management application server in the adventure-works.com domain. Server32 accesses all of the desktop client computers to perform automated software upgrades and hardware inventory. The network-management software on Server32 references desktop computers by unqualified host names, which are resolved to clientname.adventure-works.com by using a DNS server. You join Server32 to your domain to become server32.alpineskihouse.com. The Server32 IP address is 10.10.10.90.You are gradually migrating all adventure-works.com desktop client computers to your domain to become clientname.alpineskihouse.com. You do not have access to the adventure-works.com DNS server. When Server32 attempts to apply an update to the client computers, the network-management software returns many alerts that say that desktop computers cannot be found.   You want to allow the network-management software on Server32 to resolve unqualified client computer host names in adventure-works.com or alpineskihouse.com, and you want to use the minimum amount of administrative effort. What should you do?()A、On the DNS server for alpineskihouse.com, add a zone for adventure-works.com. Create a host (A) record for server32.adventure-works.com that points to 10.10.10.90.B、On Server32, in System Properties, type adventure-works.com in the Primary DNS suffix of this computer field in the DNS Suffix and Netbios Computer Name setting.C、On Server32, configure a Hosts file that contains the name and IP address of every network computer.D、On Server32, in Advanced TCP/IP Settings, add adventure-works.com and alpineskihouse.com to the Append these DNS suffixes (in order) setting.

问答题Questions 1 to 5 are based on the following passage.  Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed by Mozilla.  “It’s reflective of a trend that we’ve seen over the last year with more web users becoming frustrated with the Internet experience,” said Chris Hoffmann of the Mozilla Foundation, a non-profit group supported by Sun Microsystems, IBM and other companies, backing as an alternative to Microsoft.  Much of that frustration has centered on Microsoft, which has been heavily criticized for producing software vulnerable to hand virus writers. Microsoft has responded with a series of patches designed to plug vulnerabilities in its Windows operating system, Internet Explorer web browser and other software.  But computer owners are growing weary of continuously updating software to protect against new threats. One incident last month enabled hackers to gain access to web surfers’ computers by taking advantage of vulnerabilities in Microsoft’s browser.  Hackers could then install remote access Trojan programs that enabled them to control a victim’s computer. The hackers could also install software to capture a victim’s keystrokes to steal data such as bank account numbers and passwords.  Mr. Hoffmann hoped publicity stemming from Microsoft’s security woes(灾难) would translate into a market share increase for Mozilla’s software, which includes the new highly regarded Firefox Internet browser.  But Mozilla suffered a setback last week when it was forced to issue a software patch to counter a newly discovered vulnerability affecting its Internet browsers.  Still, Mr. Hoffmann said Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience. Security experts agree that has made it easier for hackers to exploit computers running on Microsoft software.  Others suggest Microsoft has been targeted by hackers and virus writers simply because more than 90 per cent of the world’s computers run on the software giant’s operating system.  Questions:  1.What is the meaning of the phrase “fed up with” (Para.1)?  2.It can be guessed that the word “plug” (Para.3) means ________________.  3.Why more web users have become frustrated?  4.What happened to Mozilla’s Internet browsers last week?  5.How would Microsoft be less vulnerable?

单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange 2010 environment. The employees of TestKing.comuse Microsoft Outlook 2003 to connect to their Mailboxes. You have received instructions from the CIO tochange the network to Exchange Server 2010. However, the CIO wants you to propose a solution for Mailboxes access that will keep the support and software cost to a minimum as well as ensuring access tothe public folders. What should you do?()AThis can be accomplished using Personal Archive and forms-based authentication.BThis can be accomplished by upgrading all client computers to Outlook 2010 and use Autodiscover.CThis can be accomplished using Outlook Anywhere and changin the Outlook RPC encryption settings.DThis can be accomplished using using POP3 and IMAP4 access.

单选题If XYZ LTD needs to upgrade the Cisco IOS Software of a Cisco Router, Where is the best place to download the upgrade image file from?()AThe best option is to download it from the Cisco TAC websiteBThe best option is to download it from the Cisco.Com Software support siteCThe best option is to download it form the Cisco Advanced Services websiteDThe best option is to download it from the TFTP site on Cisco.com