Each program module is compiled separately and the resulting.(71)files are linked ether to make an executable application。A.assemblerB.libraryC.objectD.source
Each program module is compiled separately and the resulting.(71)files are linked ether to make an executable application。
A.assembler
B.library
C.object
D.source
相关考题:
● A transport layer protocol has several responsibilities. One is to create a process-to-process (program-to-program) communication; TCP uses port (71) to accomplish this. Another responsibility of a transport layer protocol is to create a (72) and error-control mechanism at the transport level. TCP uses a sliding (73) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (74) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (75) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.(71)A. numbersB. connectionsC. diagramsD. resources(72)A. procedureB. functionC. routeD. flow(73)A. pathB. windowC. frameD. diagram(74)A. packetB. timeC. errorD. phase(75)A. portsB. streamsC. packetsD. cells
A transport layer protocol has several responsibilities. One is to create a process-to-process (program-to-program) communication; TCP uses port (71) to accomplish this. Another responsibility of a transport layer protocol is to create a (72) and error-control mechanism at the transport level. TCP uses a sliding (73) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (74) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (75) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.(71)A.numbersB.connectionsC.diagramsD.resources
A computer virus is a computer program that is created to make and spread(71)of itself.A.programsB.virusC.copiesD.files
●A management domain typically contains a large amount of management information. Each individual item of( 71)information is an instance of a managed object type. The definition of a related set of managed (72) types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB( 73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domain(71) A.rotationB.switchC.managementD.transmission(72) A.pathB.objectC.routeD.packet(73) A.connectionB.windowC.moduleD.destination(74) A.packetsB.searchesC.statesD.instances(75) A.deviceB.stateC.typeD.packet
The United States Department of Agriculture and the food industry( )sales statistics and keep accurate records.This information tells us what people are eating and their changes in attitudes and tastes.A.gatherB.accumulateC.compileD.compare
A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple () of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domainA.packetsB.searchesC.statesD.instances
A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object () within a management domainA.device B.state C.type D.packet
A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed ()types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB (73) defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domainA.path B.object C.route D.packet
A management domain typically contains a large amount of management information. Each individual item of(71) information is an instance of a managed object type. The definition of a related set of managed (72)types is contained in a Management Information Base (MIB)module. Many such MIB modules are defined. For each managed object type it describes, a MIB () defines not only the semantics and syntax of that managed object type, but also the method of identifying an individual instance so that multiple (74) of the same managed object type can be distinguished. Typically, there are many instances of each managed object (75) within a management domainA.connectionB.windowC.module D.destination
In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71)between sending the notification and notification arriving at the source,thousands of additional(72)may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.packetsB.cellsC.messageD.files