An operating system also has to be able to service peripheral( ),such as timers,motors,sensors,communicationdevices,disks,etc.All of those can request the attention of the OS(请作答此空),i.e.at the time that they want to use the OS,theOS has to make sure it's ready to service the requests.Such a request for attention is called an interrupt.There are twokinds of interrupts:Hardware interrupts and Software interrupts.The result of an inteiTup:is also a triggering of theprocessor,so that it jumps to a( )address.Examples of cases where software interrupts appear are perhaps a divide by zero,a memory segmentation fault,etc.So this kind of interrupt is not caused by a hardware event but by a specificmachine language operation code.Many systems have more than one hardware interrupt line,and the hardwaremanufacturer typically assembles all these interrupt lines in an interrupt( ).An Interrupt( )is a piece of hardware that shields the OS from the electronic details of the interrupt lines,so that interrupts can be queued and none of themgets lost.A.synchronouslyB.asynchronouslyC.simultaneouslyD.directly

An operating system also has to be able to service peripheral( ),such as timers,motors,sensors,communicationdevices,disks,etc.All of those can request the attention of the OS(请作答此空),i.e.at the time that they want to use the OS,theOS has to make sure it's ready to service the requests.Such a request for attention is called an interrupt.There are twokinds of interrupts:Hardware interrupts and Software interrupts.The result of an inteiTup:is also a triggering of theprocessor,so that it jumps to a( )address.Examples of cases where software interrupts appear are perhaps a divide by zero,a memory segmentation fault,etc.So this kind of interrupt is not caused by a hardware event but by a specificmachine language operation code.Many systems have more than one hardware interrupt line,and the hardwaremanufacturer typically assembles all these interrupt lines in an interrupt( ).An Interrupt( )is a piece of hardware that shields the OS from the electronic details of the interrupt lines,so that interrupts can be queued and none of themgets lost.

A.synchronously
B.asynchronously
C.simultaneously
D.directly

参考解析

解析:

相关考题:

It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET

In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming,entering, or using. Permission to access a resource is called authorization(授权).An access control mechanism( )between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls; routers, files,and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is ( ) to access the system at all.Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to( ) access. An auditing function monitors and keeps a record of user accesses to system resources.In practice, a number of(请作答此空)may cooperatively share the access control function. All Operating systems have at least a rudimentary(基本的).and in many cases a quite robust, access control component. Add-on security packages can add to the ( )access control capabilities of the OS. Particular applications .or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services .A.componentsB.usersC.mechanismsD.algorithms

An operating system also has to be able to service peripheral( ),such as timers,motors,sensors,communicationdevices,disks,etc.All of those can request the attention of the OS( ),i.e.at the time that they want to use the OS,theOS has to make sure it's ready to service the requests.Such a request for attention is called an interrupt.There are twokinds of interrupts:Hardware interrupts and Software interrupts.The result of an inteiTup:is also a triggering of theprocessor,so that it jumps to a( )address.Examples of cases where software interrupts appear are perhaps a divide by zero,a memory segmentation fault,etc.So this kind of interrupt is not caused by a hardware event but by a specificmachine language operation code.Many systems have more than one hardware interrupt line,and the hardwaremanufacturer typically assembles all these interrupt lines in an interrupt(请作答此空).An Interrupt( )is a piece of hardware that shields the OS from the electronic details of the interrupt lines,so that interrupts can be queued and none of themgets lost.A.vectorB.arrayC.queueD.ist

A real-time operating system.(RTOS)is an operating system intended to serve( )application process data as it comes in,typically without buffering delays.A key(请作答此空)of a RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application’s task;the variability is jitter.A hard real-time operating system has( )jitter than a soft real-time operating system.The chief design goal is not high throughput,but rather a guarantee of a soft or hard performance category.A RTOS has an advanced algorithm for scheduling.( )flexibility enables a wider,computer-system orchestration of process priorities,but a real-time OS is more frequently dedicated to a narrow set of applications.Key factors in a real-time OS are minimal( )latency and minimal thread switching latency.A.characteristicB.programmingC.structureD.computer

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.A system is defined as a collection of related components that (请作答此空) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )From time to time, organizations need to ( )their information systems, in, responseto new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.A.interactB.workC.connectD.change

CSMA, although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency. If the medium is busy, the station will wait for a random amount of time. When two frames collide, the medium remains ( ) for the duration of transmission of both damaged frames. The use of random delays reduces the probability of( ). For( )frames, compared to propagation time, the amount of wasted capacity can be considerable. This waste can be reduced if a station continues to listen to the medium while( ).The maximum utilization depends on the length of the frame and on the(请作答此空) time; the longer the frames or the shorter the propagation time,the higher the utilization.A.propagationB.transmissionC.collidingD.listening

CSMA, although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency. If the medium is busy, the station will wait for a random amount of time. When two frames collide, the medium remains (请作答此空) for the duration of transmission of both damaged frames. The use of random delays reduces the probability of( ). For( )frames, compared to propagation time, the amount of wasted capacity can be considerable. This waste can be reduced if a station continues to listen to the medium while( ).The maximum utilization depends on the length of the frame and on the( ) time; the longer the frames or the shorter the propagation time,the higher the utilization.A.convenient B.inconvenientC.usableD.unusable

Management information systems form a bedrock ofIT use in the public sector.They are therefore found in all sections ofthe public sector and in all countries..Of course,different people use the term"management information system"differently:The term should therefore not form the basis for arguments about__(请作答此空)__an MIS is and is not.So long as one and those with whom one works understand and agree on a definition,that is good enough.Similarly,when dealing with written material,one needs to be able to__( )__and communicate,not get locked into doctrinal debate,Many public service providers have developed management information systems to morutor and control the services that they provide.Both the US__( )__UK Social Security agencies have developed MIS to report on the welfare payments and services that they provide.The British public healthcare system has also been a major investor in MIS as it 1ries to control healthcare costs and simultaneously improve delivery standards.Individual schools can also__( )__use ofMIS.Hobmoor Junior and Infant School,a public school in Birmingham,UK,introduced a computerised attendance system to produce MIS reports that monitor pupil attendance.This improved the Principal’s ability to understand and control absence patterns,resulting in a 2.5 per cent__( )__in attendance rates.A.whatB.thatC.whichD.this

Management information systems form a bedrock ofIT use in the public sector.They are therefore found in all sections ofthe public sector and in all countries..Of course,different people use the term"management information system"differently:The term should therefore not form the basis for arguments about__( )__an MIS is and is not.So long as one and those with whom one works understand and agree on a definition,that is good enough.Similarly,when dealing with written material,one needs to be able to__( )__and communicate,not get locked into doctrinal debate,Many public service providers have developed management information systems to morutor and control the services that they provide.Both the US__( )__UK Social Security agencies have developed MIS to report on the welfare payments and services that they provide.The British public healthcare system has also been a major investor in MIS as it 1ries to control healthcare costs and simultaneously improve delivery standards.Individual schools can also__(请作答此空)__use ofMIS.Hobmoor Junior and Infant School,a public school in Birmingham,UK,introduced a computerised attendance system to produce MIS reports that monitor pupil attendance.This improved the Principal’s ability to understand and control absence patterns,resulting in a 2.5 per cent__( )__in attendance rates.A.makeB.getC.takeD.go

System analysis is traditionally done top-down using structured analysis based on( ).Object-oriented analysis focuses on creation of models.The three types of theanalysis model are( ).There are two substages of object-oriented analysis.( )focuses on real-world things whose semantics the application captures.The object constructedin the requirement analysis shows the(请作答此空)of the real-world system and organizes it intoworkable pieces.( )addresses the computer aspects of the application that are visible tousers.The objects are those which can be expected to vary from time to time quite rapidly.A.static structureB.system componentsC.data flowsD.program procedures

System analysis is traditionally done top-down using structured analysis based on( ).Object-oriented analysis focuses on creation of models.The three types of theanalysis model are( ).There are two substages of object-oriented analysis.( )focuses on real-world things whose semantics the application captures.The object constructedin the requirement analysis shows the( )of the real-world system and organizes it intoworkable pieces.(请作答此空)addresses the computer aspects of the application that are visible tousers.The objects are those which can be expected to vary from time to time quite rapidly.A.Program analysisB.Function requirementC.Application analysisD.Physical model

System analysis is traditionally done top-down using structured analysis based on( ).Object-oriented analysis focuses on creation of models.The three types of theanalysis model are(请作答此空).There are two substages of object-oriented analysis.( )focuses on real-world things whose semantics the application captures.The object constructedin the requirement analysis shows the( )of the real-world system and organizes it intoworkable pieces.( )addresses the computer aspects of the application that are visible tousers.The objects are those which can be expected to vary from time to time quite rapidly.A.function model,class model and state modelB.class model,interaction model and state modelC.class model,interaction model and sequence modelD.function model,interaction model and state model

During the systems planning phase. a systems analyst conducts a( )activity to study the systems request and recommend specific action. After obtaining an authonzation to proceed. the analyst interacts with(请作答此空) to gather facts about the problem of opportunity, project scope and constraints, project benefits, and estimated development time and costs. In many cases. thesystems request does not reveal the underying problem, but only a symptom. A popular technique for investigating causesand effects is called ( )The analyst has analyzed the problem or opportunity. defined the project scope and constraints, and performed ( )to evaluate project usability, costs, benefits, and time constraints. The end product of the activity is ( ) .The main content must include an estimate of time .staffing requrements, costs, benefits, and expected results for the next phase of the SDLCA.system usersB.system ownerC.managers anD.usersD.business analysts

During the systems planning phase. a systems analyst conducts a( )activity to study the systems request and recommend specific action. After obtaining an authonzation to proceed. the analyst interacts with( ) to gather facts about the problem of opportunity, project scope and constraints, project benefits, and estimated development time and costs. In many cases. thesystems request does not reveal the underying problem, but only a symptom. A popular technique for investigating causesand effects is called ( )The analyst has analyzed the problem or opportunity. defined the project scope and constraints, and performed (请作答此空)to evaluate project usability, costs, benefits, and time constraints. The end product of the activity is ( ) .The main content must include an estimate of time .staffing requrements, costs, benefits, and expected results for the next phase of the SDLCA.feasibility analysisB.requirement analysisC.system proposalD.fact-finding

The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the ( 请作答此空) into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. () are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. functional requirements功能需求B. nonfunctional requirements非功能需求C. system constraint系统约束D. system operational environment系统运行环境

Accelerated analysis approaches emphasize the construction of(请作答此空)to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,( )reads the program code and automatically generates the equivalent system model, and the code can be obtained from ( ). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities.A. object modelsB. prototypesC. use casesD. components

Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,(请作答此空)reads the program code and automatically generates the equivalent system model, and the code can be obtained from ( ). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. A. eXtreme programmingB. model drivenC. reverse engineeringD. agile Method

The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the () into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. (请作答此空 ) are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. Safety requirements安全要求B. Security requirements安全要求C. Data management requirements数据管理要求D. System requirements 系统要求

The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the () into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. (请作答此空 ) specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. () are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. client-based architecture操作要求B. server-based architecture速度要求C. network architecture存取控制要求D. client-server architecture定制要求

System analysis is traditionally done top-down using structured analysis based on( ). Object-oriented analysis focuses on creation of models. The three types of theanalysis model are( ). There are two substages of object-oriented analysis.( ) focuses on real-world things whose semantics the application captures. The object constructedin the requirement analysis shows the( )of the real-world system and organizes it intoworkable pieces.(请作答此空)addresses the computer aspects of the application that are visible tousers. The objects are those which can be expected to vary from time to time quite rapidly. A. Program analysisB. Function requirementC. Application analysisD. Physical model

System analysis is traditionally done top-down using structured analysis based on( ). Object-oriented analysis focuses on creation of models. The three types of theanalysis model are( ). There are two substages of object-oriented analysis.( ) focuses on real-world things whose semantics the application captures. The object constructedin the requirement analysis shows the(请作答此空)of the real-world system and organizes it intoworkable pieces.( )addresses the computer aspects of the application that are visible tousers. The objects are those which can be expected to vary from time to time quite rapidly. A. static structureB. system componentsC. data flowsD. program procedures

The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the () into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. ( 请作答此空) focus on the nonfunctional requirements issues such as response time, capacity, and reliability. () are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. Environment requirements环境要求B. Maintainability requirements可维修性要求C. Performance requirements性能要求D. Virus control requirements病毒控制要求

“Those users boot up the new OS,they will recognize nothing”(in Para.2) is closest in meaning to ( ) A.those who use Windows are generally not good at using computers B.Apple’s OS is so different from Windows C.Windows is so good that other operating systems can hardly survive D.Windows has been enjoying a monopolistic position in operating system market

The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()A、The database user OPS$SKD will be able to administer the database.B、The authentication detail for the database user OPS$SKD is recorded in the password file.C、The local operating system user SKD will be able to access the database instance without specifying the username and password.D、The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

A customer plans to consolidate to high-end enterprise level servers using multiple partitions.  They are evaluating an IBM POWER5 solution for their server consolidation environment.  Which of the following best describes the value of the IBM solution as compared with the competition?()A、The POWER5 system has greater memory and processor granularity and can also run both Linux and AIX at the same time in different LPARs.B、The POWER5 system supports more partitions, processors, and memory than any competitor’s solution.C、The POWER5 system has the lowest partitioning overhead and can also run both Linux and AIX at the same time in different LPARs.D、The POWER5 system supports more partitions and has the lowest partitioning overhead.

Which command gracefully shuts down the Junos OS?()A、request system rebootB、request system logoutC、request system haltD、restart gracefully

单选题An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()AGather information from users.BReboot the server.CApply the latest service packs to the operating system.DPerform a root cause analysis

单选题The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()AThe database user OPS$SKD will be able to administer the database.BThe authentication detail for the database user OPS$SKD is recorded in the password file.CThe local operating system user SKD will be able to access the database instance without specifying the username and password.DThe database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.