● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory
● The program and the data are kept inside the computer in a place called
(73) .
(73)
A. bus
B. cache
C. CPU
D. memory
相关考题:
●Traditional structured analysis techniques focus upon the flow of(71)within a system Object-oriented analysis emphasizes the building of real-world models It examines requirements from the perspective of the classes and objects found in the vocabulary of the(72)domainTraditional system design method emphasizes the proper and effective structure of a complex systemObject-oriented design method encompasses the process of object-oriented decomposition and a(73)for depicting both logical and physical as well as static and dynamic models of the system under designObject-oriented programming is a method of implementation in which programs are organized as cooperative collections of objects, each of which represents an(74)of some class, and whose classes are all members of a hierarchy of classes united via(75)relationships(71)A.control B.program C.data D.reference(72)A.problem B.solution C.data D.program(73)A.mark B.picture C.symbol D.notation(74)A.instance B.example C.existence D.implementation(75)A.control B.inheritance C.inference D.connection
● Every valid character in a computer that uses even (71) must always have an even number of1bits.(71)A. parity B. check C. test D. compare● The maximum number of data that can be expressed by 8 bits is (72) .(72)A. 64 B. 128 C. 255 D. 256● Integration (73) is the process of verifying that the components of a system work together as described in the program design and system design specifications.(73)A. trying B. checking C. testing D. coding● GIF files are limited to a maximum of 8 bits/pixel, it simply means that no more than 256 colors are allowed in (74) .(74)A. an image B. a file C. a window D. a page● Computer (75) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.(75)A. storage B. device C. network D. processor
● A transport layer protocol has several responsibilities. One is to create a process-to-process (program-to-program) communication; TCP uses port (71) to accomplish this. Another responsibility of a transport layer protocol is to create a (72) and error-control mechanism at the transport level. TCP uses a sliding (73) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (74) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (75) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.(71)A. numbersB. connectionsC. diagramsD. resources(72)A. procedureB. functionC. routeD. flow(73)A. pathB. windowC. frameD. diagram(74)A. packetB. timeC. errorD. phase(75)A. portsB. streamsC. packetsD. cells
A transport layer protocol has several responsibilities. One is to create a process-to-process (program-to-program) communication; TCP uses port (71) to accomplish this. Another responsibility of a transport layer protocol is to create a (72) and error-control mechanism at the transport level. TCP uses a sliding (73) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (74) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (75) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.(71)A.numbersB.connectionsC.diagramsD.resources
The approach we propose is a system-oriented methodology for knowledge acquisition. This orientation emphasizes ongoing documentation throughout each cycle and technique applied. Program-wide documentation is suggested, both for the purpose of internal(71)and for later verification and(72)efforts: The documentation system we propose includes a central "knowledge acquisition(73)"which is(74)to reflect knowledge acquisition plans, session nodes, and domain expert participation. Specifically,(75)within the database system include knowledge acquisition forms, which document plans for, and notes from, knowledge acquisition session, domain expert file, and rule content forms.A.interchangeB.interfaceC.communicationD.message
Password is a secret series of(73) that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(74). The password helps ensure that(75) users do not access the computer. In addition, data files and programs may require a password.A.symbolB.signC.charactersD.characteristic
For many years, the principle goal of computer(73)was to write short pieces of code that would execute quickly. The(74)needed to be small, because memory was expensive, and it needed to be fast, because processing power was also expensive.A.usersB.programmersC.thatD.program
●One ofthe main resposibilities ofICMP is to report (71). Although technology has produced increasingly reliable transmission media, errors still exist and must be handled. IP is an (72) protocol. This means that error checking and error control are not a concem ofIP.ICMP was designed, in part, to compensate for this shortcoming. Howerver, ICMP does not _(73) errors, it simply reports them. Error correction is left to the higher-level potocols. Error messages are always sent to the original__(74) because the only information available in the datagram about the route is the source and destination lP addresses. ICMP uses the source IP address to send the error massage to the source ofthe(75) .(71)A, numbersB. functionsC. stringsD. errors(72)A. reliableB. unreliableC. availableD. unavailable(73)A. correctB. conductC. produceD. connect(74)A. userB. destinationC. sourceD. program(75)A. datagramB. frameC. serviceD. protocol
Program(73)describes program's objectives, desired output, input data required, processing requirement, and documentation.A.specificationB.flowchartC.structureD.address
月末结转已销A产品成本73,500元,企业应作如下账务处理:A.借:主营业务成本 73,500 贷:库存商品——A产品 73,500B.借:主营业务成本 73,500 贷:原材料——A产品 73,500C.借:库存商品——A产品 73,500 贷:生产成本——A产品 73,500D.借:生产成本--A产品 73,500 贷:库存商品--A产品 73,500E.借:其他业务成本 73,500 贷:原材料——A产品 73,500F.借:主营业务成本 73,500 贷:本年利润 73,500G.借:生产成本--A产品 73,500 贷:制造费用 73,500