A real-time operating system.(RTOS)is an operating system intended to serve( )application process data as it comes in,typically without buffering delays.A key(请作答此空)of a RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application’s task;the variability is jitter.A hard real-time operating system has( )jitter than a soft real-time operating system.The chief design goal is not high throughput,but rather a guarantee of a soft or hard performance category.A RTOS has an advanced algorithm for scheduling.( )flexibility enables a wider,computer-system orchestration of process priorities,but a real-time OS is more frequently dedicated to a narrow set of applications.Key factors in a real-time OS are minimal( )latency and minimal thread switching latency.A.characteristicB.programmingC.structureD.computer

A real-time operating system.(RTOS)is an operating system intended to serve( )application process data as it comes in,typically without buffering delays.A key(请作答此空)of a RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application’s task;the variability is jitter.A hard real-time operating system has( )jitter than a soft real-time operating system.The chief design goal is not high throughput,but rather a guarantee of a soft or hard performance category.A RTOS has an advanced algorithm for scheduling.( )flexibility enables a wider,computer-system orchestration of process priorities,but a real-time OS is more frequently dedicated to a narrow set of applications.Key factors in a real-time OS are minimal( )latency and minimal thread switching latency.

A.characteristic
B.programming
C.structure
D.computer

参考解析

解析:

相关考题:

Windows is a GUI-based operating system.() 此题为判断题(对,错)。

从供选择的答案中选出应填入英语文句中()的正确的答案。Software products may be (A) into four basic types: application programs, programming language processors, operating systems, and system utilities.Application programs are programs that (B) useful tasks such as solving statistical problems, or keeping your company's books.Programming language processors are programs that (C) the use if a computer language in a computer system. They are tools for the development of application programs.Operating systems are programs that (D) the system resources and enable you to run application programs.System utilities are special programs that (E) the usefulness of or add capabilities to a computer.A~E: ① manage ② perform ③ support ④ reduce⑤ divided ⑥ enhance ⑦ implemented ⑧ introduce⑨ ranked ⑩ run

Only in this way ____ to make improvements in the operating system. A.you can hopeB.you did hopeC.can you hope

Which two statements about Oracle Direct Network File System (NFS) are true?() A. It bypasses the OS file system cache.B. A separate NFS interface is required for use across Linux, UNIX, and Windows platforms.C. It uses the operating system kernel NFS layer for user tasks and network communication modules.D. File systems need not be mounted by the kernel NFS system when being served through Direct NFS.E. Oracle Disk Manager can manage NFS on its own, without using the operating system kernel NFS driver.

For users, microkernel technology promises(90), compact and sophisticated operating systems that are typically(91)across a range of hardware platforms. These operating systems will be customizable to let users run multiple operating system and application "personalities" on top of a single microkernel(92).Microkernel based systems can provide this flexibility because the core operating system functions are(93)from the large number of utilities, features and extensions that are layered on top of them. As a result, updating and maintaining operating system is easier, since developers don't have to modify the(94)every time they must acid a new feature.A.slowB.fastC.quicklyD.speed

Which component of VPN technology ensures that data can be read only by its intended recipient?() A. data integrityB. encryptionC. key exchangeD. authentication

●A disk scheduling mechanism in an operating system causes the disk arm to sweepback and forth across the disk surface servicing all requests in its path. This is a () :()A. First Come First Serve B. Shortest Seek Tn-ne FirstC. Scan D. None of the above

● (73) manages the other components of a computer system.(73)A.BusB.Application systemC.Operating systemD.Disk

Together with the network layer,the transport layer is the heart of the protocol ( 请作答此空).The network layer provides end-to-end () delivery using datagrams or virtual circuits.The transport layer builds on the network layer to provide data transport from a process on a () machine to a process on a destination machine with a desired level of reliability that is independent of the physical () currently in use.It provides the abstractions that applications nedd to use the network..Without the () layer,the whole concept of layered protocols would make little sense.A.transportB.networkC.hierarchyD.service

(请作答此空)analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems.Ultimately,the system models become the( )for designing and constructing an improved system.( )is such a technique.The emphasis in this technique is process-centered.Systems analysts draw a series of process models called( )、( )is another such technique that integrates data and process concerns into constructs called objects.A.PrototypingB.AcceleratedC.Model-drivenD.Iterative

( )analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems.Ultimately,the system models become the( )for designing and constructing an improved system.( )is such a technique.The emphasis in this technique is process-centered.Systems analysts draw a series of process models called( )、(请作答此空)is another such technique that integrates data and process concerns into constructs called objects.A.Structured analysisB.Information EngineeringC.Discovery PrototypingD.Object-Oriented analysis

Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,( )reads the program code and automatically generates the equivalent system model, and the code can be obtained from (请作答此空). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. A. existing database and application programB. application program and user interfaceC. existing database and user interfaceD. existing database,application program and user interface

A server is having problems booting into the operating system. Which of the following can provide important information to begin to troubleshoot the cause?()A、System logsB、Firmware updatesC、POST messagesD、Application logs

Which is a license scope option when managing activations for an IBM System Storage DS8100using the IBM Disk Storage Feature Activation (DSFA) application?()A、Operating environmentB、Parallel access volumesC、Point-in-time copyD、Count Key Data

Which component of VPN technology ensures that data can be read only by its intended recipient?()A、data integrityB、encryptionC、key exchangeD、authentication

A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()A、 System logsB、 Firmware updatesC、 POST messagesD、 Application logs

A system administrator completed an upgrade of the maintenance level of their AIX system. Which of the following commands should be run to verify that the operating system is in a consistent state?()A、instfix -iB、lslpp -lC、lppchk -vD、oslevel -r

A customer asked a consultant to create the infrastructure for an application.  The application is designed to charge customers for conferencing services based on usage.  To determine if a Storage Area Network (SAN) is the best storage solution, which of the following questions is most appropriate?()A、Will the application require a database?B、Which operating system does the application require?C、Will the data need to be backed up in real time?D、Does the application share data among the servers?

Which statement is true regarding the Junos OS?()A、The Junos kernel is based on the Solaris operating system.B、The Junos kernel is based on the GNU Zebra operating system.C、The Junos kernel is completely original and not based on any other operating system.D、The Junos kernel is based on the FreeBSD UNIX operating system.

单选题A customer asked a consultant to create the infrastructure for an application.  The application is designed to charge customers for conferencing services based on usage.  To determine if a Storage Area Network (SAN) is the best storage solution, which of the following questions is most appropriate?()AWill the application require a database?BWhich operating system does the application require?CWill the data need to be backed up in real time?DDoes the application share data among the servers?

单选题A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()A System logsB Firmware updatesC POST messagesD Application logs

单选题Which statement is true regarding the Junos OS?()AThe Junos kernel is based on the Solaris operating system.BThe Junos kernel is based on the GNU Zebra operating system.CThe Junos kernel is completely original and not based on any other operating system.DThe Junos kernel is based on the FreeBSD UNIX operating system.

单选题You install the Web Server (IIS) role on a new server that runs Windows Server 2008.  You install a Microsoft .NET Framework 1.0 application on a Web site on the Web server. The company security policy states that all applications must run by using the minimum level of permission.  You need to configure the Web site application so that it has the permissions to execute without creating any other content and without accessing any operating system components. What should you do?()ASet the .NET Framework trust level to Full for the Web site.BSet the .NET Framework trust level to Low for the Web site.CSet the .NET Framework trust level to High for the Web site.DSet the .NET Framework trust level to Medium for the Web site.

单选题Which of the following BEST describes the initial process of setting up a new operating system from a CD-ROM? ()AFormat a partition, install device drivers, and install the operating system.BCreate a partition, format the partition, and install the operating system.CInstall the operating system, create a partition, and install device drivers.DInstall the operating system, install device drivers, and create a partition.

单选题You issue this SQL statement:  ALTER DATABASE RENAME FILE ’/ORADATA/u02/user_data01.dbf’ TO ’/ORADATA/u04/user_data01.dbf’;  What does this SQL statement do?()AIt updates the control file with the new location of the data file. BIt updates only the data dictionary with the new location of the data file. CIt changes the location of the user_data01.dbf file in the operating system. DIt changes the location of the user_data01.dbf file in the operating system and updates the control file with the new location of the data file.

多选题You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   When the application is running, it must not be able to access protected registry keys.   You need to ensure that the application meets the outlined requirement. What are two possible ways to achieve this goal?()AUse Microsoft Windows Mobile 5.0 Pocket PC Phone Edition operating system.BUse Microsoft Windows Mobile 2003 for Pocket PC operating system.CUse Microsoft Windows Mobile 5.0 for Smartphone operating system.DUse Microsoft Windows Mobile 2003 for Smartphone operating system.

多选题The current time zone for one of the user sessions is set to the database local time zone. For one application, the user session requires the time zone to be set to the local operating system time zone without affecting other user sessions. Which two solutions could the user implement to achieve this objective? ()Ause the ALTER SYSTEM command to change the time zoneBuse the ALTER SESSION command to change the time zoneCuse the ALTER DATABASE command to change the time zoneDset the value for the operating system variable ORA_SDTZ on the client machineEset the value for the operating system variable ORA_SDTZ on the database server machine