controls the operation of the computer and performs it's data processing functions.A.CPUB.Hard diskC.MemoryD.Database system

controls the operation of the computer and performs it's data processing functions.

A.CPU

B.Hard disk

C.Memory

D.Database system


相关考题:

There are two character strings:s and t.s="My favor is computer",t=substr(s,9,5).Then the result after operation isA.S="My favor is computer"; t="compu";B.S="My favor is computer"; t="is co";C.S="My favor"; t="is co";D.S="My favor"; t="is computer";

● (71) controls the operation of the computer and performs it′s dataprocessing functions.(71)A. CPUB. DiskC. MemoryD. I/O

controls the operation of the computer and performs its data processing functions.A.CPUB.DiskC.MemoryD.I/O

This booklet () the committee’s functions.A. definesB. sets upC. goesD. gets知识点: Newassignment1

Morrris, an attorney, performs 5 hours of legal work for Andy. Morrris 's normal billing rate is $120 per hour. Andy, a software consultant, gives Morrris a new computer for his office in payment of the bill. The computer's adjusted basis was $500 and its fair market value is $550. Morrris ' basis in the computer is ().A.$0B.$500C.$550D.$600E.$1,150

Which statement is true about a running session that belongs to the online transaction processing (OLTP) group?() A. It permanently switches to the low_group consumer group if the session exceeds 10,000 I/O requests or 2,500 MB of data transfer.B. It performs the first 10000 I/O requests or 2,500 MB of data transfer in the LOW-GROUP consumer group, and then switches to the original group.C. It switches to the LOW_GROUP consumer group if the session exceeds 10000 I/O requests or 2500 MB of data transfer and returns to the original group after the operation.D. It switches to the LOW_GROUP consumer group if the session exceeds 10000 I/O requests or 2500MB of data transfer for queries, but not for data manipulation language (DML) operations.

Calculator is(66) for performing arithmetic operations, but that requires human intervention to alter its stored program, if any, and to initiate each operation or sequence of operations. A calculator performs some of the functions of a computer, but usually operates only with frequent human intervention.Microcomputer's processing unit consists of one or more microprocessors, and includes storage and input-output(67). Personal computer primarily intended for(68) use by an individual.(69) computer can be hand-carried for use in more than one location. Minicomputer is functionally intermediate between a microcomputer and a mainframe. And supercomputer has the highest processing speeds available at a given time for(70) scientific and engineering problems.A.suitableB.well-formedC.applicableD.usable

A router receives a packet from a neighbor with an MPLS shim header value of 0.What does the router do with this packet?() A. It performs a label pop operation and an IP lookup.B. It performs a label swap operation and an IP lookup.C. It sends an error message toward the egress router.D. It sends an error message toward the ingress router.

Cloud computing is a type of Internetbased computing that provides shared computer processing resources and data to computers and other devices on demand. Advocates claim that cloud computing allows companies to avoid upfront infrastructure costs. Cloud computing now has few service form, but it is not including()AIaaSB.PaaSC.SaaSD.DaaS

Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.A.memoryB.controlC.monitorD.charge

You install a custom application on a computer that runs Microsoft Windows XP. The application stores each user’s data in the %programfiles%\app1\data folder on the computer. You install the custom application on a computer that runs Windows Vista.On the Windows Vista computer, you back up the %programfiles%\app1\data folder and notice that the backup contains no data.You need to back up the application’s user data on the Windows Vista computer.What should you do?()A.AB.BC.CD.D

Whenever new information is entered, it must be stored somewhere in the computer's(70). RAM only(71)the data temporarily. That is, all information stored in the RAM will disappear if you switch the computer off.A.processorB.keyboardC.printerD.memory

program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.A.WormB.VirusC.DisasterD.Demon

Program(73)describes program's objectives, desired output, input data required, processing requirement, and documentation.A.specificationB.flowchartC.structureD.address

( )is a massive volume of structured and unstructured data so large it's difficult to process using traditional database or software technique. A. DatA.Processing system B. Big DatA. C.Date warehouse D.DBMS

Program( )describes program's objectives,desired output,input data required,processing requirement,and documentation.A.specificationB.flowchartC.structureD.address

Most operating systems have a standard set of ( ) to handle the processing of all input and output instructions.A.SPREADSHEET B.CONTROL INSTRUCTIONS C.I/O OPERATION D.DATA TABLE

Most operating systems have a standard set of ( ) to handle the processing of all input and output instructions. A.spreadsheet B.control instructions C. I/O operation D.datA.table

A router receives a packet from a neighbor with an MPLS shim header value of 0.What does the router do with this packet?()A、It performs a label pop operation and an IP lookup.B、It performs a label swap operation and an IP lookup.C、It sends an error message toward the egress router.D、It sends an error message toward the ingress router.

During a cluster synchronization, an administrator inadvertently performs al ctrl ’C’ causing the synchronization to fail. After restarting the resynchronization, the administrator notices a message stating that a previous dare operation has been detected.  What is the best way to resolve this problem?()  A、 Perform a ’Recover from HACMP Script Failure’.B、 Perform a ’Release Lock Set By Dynamic Reconfiguration’.C、 Perform a graceful stop an start of all cluster processing.D、 Perform a ’Restore HACMP Configuration Database from Active Configuration’.

Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()A、 Default B、 SAFE C、 EXTERNAL_ACCESS D、 UNSAFE

单选题A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()ABackup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.BUninstall the payroll software to ensure confidentiality.CHave the director remove sensitive data before the computer will be repaired.DPerform needed repairs while avoiding sensitive data.

多选题What are two functions of a custom mapping module?()Arecords the token assertionBmaps a STSUUSER input to a SAML tokenClooks up attributes in an external data sourceDmaps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 protocolEmaps a GUI XML attributes into UI controls that are used by the IBM Tivoli Federated Identity Manager Console to collect the input data

单选题Application developers in TestKing.com create an assembly that contains a CLR function.This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set. Which permission set should you use?()ADefaultBSAFECEXTERNAL ACCESSDUNSAFE

单选题You are a help desk technician for your company, which is in the process of deploying Windows XP Professional to all client computers. You upgrade Pierre’s Windows 98 portable computer to Windows XP Professional. After the upgrade, Pierre reports that some of his older software applications no longer work properly. Also, one of the hardware devices on his computer is not currently supported by Windows XP Professional. Pierre requests that you reinstall Windows 98 and all of his applications so that he can use his computer normally. You need to restore Pierre’s computer to its pre-upgraded state while retaining all of the applications,documents, and personal data on the computer. You want to accomplish this task in the minimum amount of time. What should you do?()ACopy Pierre’s documents and personal data to a shared folder on the network.BReinstall Windows 98 and Pierre’s applications. CCopy the documents and personal data to the My Documents folder on Pierre’s computer.DOn Pierre’s computer, run Setup.exe from a Windows 98 installation CD. EOn Pierre’s computer, use the Add or Remove Programs Wizard to remove the Windows XP Professional Installation item. FOn Pierre’s computer, use a third-party disk-imaging software utility to apply a disk image that contains Windows 98 and Pierre’s applications.

单选题In which situation would you use the Oracle Shared Server configuration?()Awhen performing export and import using Oracle Data PumpBwhen performing backup and recovery operations using Oracle Recovery ManagerCwhen performing batch processing and bulk loading operation in a data warehouse environment Din an online transaction processing (OLTP) system where large number of client sessions are idle most of the time

单选题A router receives a packet from a neighbor with an MPLS shim header value of 0.What does the router do with this packet?()AIt performs a label pop operation and an IP lookup.BIt performs a label swap operation and an IP lookup.CIt sends an error message toward the egress router.DIt sends an error message toward the ingress router.