Microsoft's COM is a software architecture that allows applications to be built from binary software components. COM is the underlying(71)that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(72)standard developed by Microsoft. OLE makes it possible to create(73)with one application and link or embed them in a second application. Embedded objects retain their original format and(74)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(75)compound document standard developed mainly by Apple and IBM is called OpenDoc.A.architectureB.structureC.procedureD.protocol

Microsoft's COM is a software architecture that allows applications to be built from binary software components. COM is the underlying(71)that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.

OLE is a compound(72)standard developed by Microsoft. OLE makes it possible to create(73)with one application and link or embed them in a second application. Embedded objects retain their original format and(74)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(75)compound document standard developed mainly by Apple and IBM is called OpenDoc.

A.architecture

B.structure

C.procedure

D.protocol


相关考题:

●At a basic level, cloud computing is simply a means of delivering IT resources as (71).Almost all IT resources can be delivered as a cloud service: applications, compute power, storage capacity, networking,programming tools,even communication services and collaboration (72)。Cloud computing began as large-scale Internet service providers such as Google,Amazon,and others built out their infrastructure. An architecture emerged: massively scaled, (73) distributed system resources,abstracted as virtual IT services and managed as continuously configured, pooled resources. In this architecture, the data is mostly resident on (74)“somewhere on the Intemet”and the application runs on both the "cloud servers”and the user's browser.Both clouds and grids are built to scale horizontally very efficiently. Both are built towithstand failures of (75) elements or nodes. Both are charged on a per-use basis. But while grids typically process batch jobs, with a defined start and end point, cloud services can be continuous. What's more, clouds expand the types ofresources available —— file storage, databases, and Web services —— and extend the applicability to Web and enterprise applications.(71) A. hardwareB. computersC. servicesD. software(72) A.computersB.disksC.machinesD.tools(73 ) A. horizontallyB. verticallyC. inclinedD. decreasingly(74) A. clientsB. middlewareC. serversD. hard disks(75) A.entireB.individualC.generalD.separate

Microsoft's COM is a software(146)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(147)standard developed by Microsoft. OLE makes it possible to create(148)with one application and link or embed them in a second application. Embedded objects retain their original format and(149)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(150)compound document standard developed mainly by Apple and IBM is called OpenDoc.A.architectureB.protocolC.procedureD.structure

Today's response to the data access dilemma eschews the traditional archival approach in favor of emerging standards for what are described as the documents of the future: compound documents. Product users and developers hope the latest standards effort--such as OpenDoc and Microsoft Corp.'s Object Linking and Embedding(OLE) will(26)data accessibility.OpenDoc is a standards group(27)a common look and feel throughout documents, even though different applications are used.OLE technologies allow Microsoft to(28)its various software products. Microsoft creates, governs and distributes the OLE capability, which is what most(29)it from the open OpenDoc approach. Thus, users can assemble(30)of varying application to create compound documents. With OLE users can, for example, embed an Excel chart in a Microsoft word report.A.getB.makeC.ensureD.take

NET is both a business strategy from Microsoft and its(6)of(7)support for what are known as Web services, the ability to use the Web rather than your own computer for various services. Microsoft's goal is to provide individual and business users with a(8)interoperable and Web-enabled interface for applications and computing devices and to make computing activities increasingly Web browser-oriented. The NET(9)includes servers; building-block services, such as Web-based data storage; and device software. It also includes Passport, Microsoft's fill-in-the-form-only-once identity(10)service.A.individualB.collectionC.setD.unit

Microsoft's COM is a software(71) that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(72) standard developed by Microsoft. OLE makes it possible to create(73) with one application and link or embed them in a second application. Embedded objects retain their original format and(74) to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(75) compound document standard developed mainly by Apple and IBM is called OpenDoc.A.structureB.procedureC.protocolD.architecture

At a basic level, cloud computing is simply a means of delivering IT resources as (71).Almost all IT resources can be delivered as a cloud service: applications, compute power, storage capacity, networking,programming tools,even communication services and collaboration (72)。Cloud computing began as large-scale Internet service providers such as Google,Amazon,and others built out their infrastructure. An architecture emerged: massively scaled, (73) distributed system resources,abstracted as virtual IT services and managed as continuously configured, pooled resources. In this architecture, the data is mostly resident on (74)“somewhere on the Intemet”and the application runs on both the cloud servers”and the user’s browser.Both clouds and grids are built to scale horizontally very efficiently. Both are built towithstand failures of (75) elements or nodes. Both are charged on a per-use basis. But while grids typically process batch jobs, with a defined start and end point, cloud services can be continuous. What’s more, clouds expand the types ofresources available —— file storage, databases, and Web services —— and extend the applicability to Web and enterprise applications.(71)A. hardwareB. computersC. servicesD. software

Microsoft's COM is a software(73) that allows applications to be built from binary software components。A.structureB.protocolC.procedureD.architecture

Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.A.network B.virus C.security D.architecture

Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.A.network B.virus C.security D.architecture

Microsoffs COM is a software(66)that allows applications to be built from binary software components. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(67)standard developed by Microsoft. OLE makes it possible to create(68)with one application and link or embed them in a second application. Embedded objects retain their original format and(69)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(70)compound document standard developed mainly by Apple and IBM is called OpenDoc.A.architectureB.protocolC.procedureD.structure

Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.A.networkB.vimsC.securityD.architecture

Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.A. networkB. vimsC. securityD. architecture

Cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers ( )through a real-time communication network such as the Internet.In science,cloud computing is a ( )for distributed computing over a network,and means the ( )to run a program or application on many connected computers at the same time.The architecture of a cloud is developed at three layers: infrastructure,platform,and application,The infrastructure layer is built with virtualized compute,storage,and network resources.The platform layer is for general-purpose and repeated usage of the collection of software resources.The application layer is formed with a collection of all needed software modules for SaaS applications.The infrastructure layer serves as the(请作答此空)for building the platform layer of the cloud. In turn,the platform layer is a foundation for implementing the( )layer for SaaS applications.A.networkB.foundationC.softwareD.hardware

Cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers ( )through a real-time communication network such as the Internet.In science,cloud computing is a ( )for distributed computing over a network,and means the ( )to run a program or application on many connected computers at the same time.The architecture of a cloud is developed at three layers: infrastructure,platform,and application,The infrastructure layer is built with virtualized compute,storage,and network resources.The platform layer is for general-purpose and repeated usage of the collection of software resources.The application layer is formed with a collection of all needed software modules for SaaS applications.The infrastructure layer serves as the( )for building the platform layer of the cloud. In turn,the platform layer is a foundation for implementing the(请作答此空)layer for SaaS applications.A.resoruceB.serviceC.applicationD.software

Computer______focuses on protecting information,hardware,and software from unauthorized use and damage.A.networkB.virusC.securityD.architecture

At a basic level, cloud computing is simply a means of delivering IT resources as( ). Almost all IT resources can be delivered as a cloud service: applications, compute power, storage capacity, networking, programming tools, even communication services and collaboration( ). Cloud computing began as large-scale Internet service providers such as Google, Amazon, and others built out their infrastructure. An architecture emerged: massively scaled,( )distributed system resources, abstracted as virtual IT services and managed as continuously configured, pooled resources. In this architecture, the data is mostly resident on( )"somewhere on the Internet" and the application runs on both the "cloud servers" and the user's browser. Both clouds and grids are built to scale horizontally very efficiently. Both are built to with stand failures of(请作答此空)elements or nodes. Both are charged on a per-use basis. But while grids typically process batch jobs, with a defined start and end point, cloud services can be continuous. What's more, clouds expand the types of resources available——file storage, databases, and Web services——and extend the applicability to Web and enterprise applications.A.entireB.individualC.generalD.separate

At a basic level, cloud computing is simply a means of delivering IT resources as(请作答此空). Almost all IT resources can be delivered as a cloud service: applications, compute power, storage capacity, networking, programming tools, even communication services and collaboration( ). Cloud computing began as large-scale Internet service providers such as Google, Amazon, and others built out their infrastructure. An architecture emerged: massively scaled,( )distributed system resources, abstracted as virtual IT services and managed as continuously configured, pooled resources. In this architecture, the data is mostly resident on( )"somewhere on the Internet" and the application runs on both the "cloud servers" and the user's browser. Both clouds and grids are built to scale horizontally very efficiently. Both are built to with stand failures of( )elements or nodes. Both are charged on a per-use basis. But while grids typically process batch jobs, with a defined start and end point, cloud services can be continuous. What's more, clouds expand the types of resources available——file storage, databases, and Web services——and extend the applicability to Web and enterprise applications.A.hardwareB.computersC.servicesD.software

The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the () into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. (请作答此空 ) specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. () are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. client-based architecture操作要求B. server-based architecture速度要求C. network architecture存取控制要求D. client-server architecture定制要求

If XYZ LTD needs to upgrade the Cisco IOS Software of a Cisco Router, Where is the best place to download the upgrade image file from?()A、The best option is to download it from the Cisco TAC websiteB、The best option is to download it from the Cisco.Com Software support siteC、The best option is to download it form the Cisco Advanced Services websiteD、The best option is to download it from the TFTP site on Cisco.com

Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc.空白(3)处应选择()A、tableB、eventcC、objectsD、function

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing the use of Non-Uniform Memory Architecture (NUMA).Which of the following is TRUE with regards to Non-Uniform Memory Architecture (NUMA)?()A、It is a computer architecture used in multiprocessor systems.B、It is a computer architecture used in single processor systems.C、It allows a processor to access local memory faster than it can access remote memory.D、It allows a processor to access remote memory faster than it can access local memory.

All servers on your company’s network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7.   Which technology should you recommend?()A、Windows Virtual PCB、Microsoft Application Virtualization (App-V)C、Microsoft Virtual Desktop Infrastructure (VDI)D、Microsoft Enterprise Desktop Virtualization (MED-V)

多选题Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()ATrigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual serverBOn CKT’s physical network interface, activate the Internet Connection Sharing (ICS)CUse Certkiller .com intranet IP addresses on all virtual servers on CKT.DAdd and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.ENone of the above

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.During the course of the business week you receive instruction from Company.com to install Microsoft Exchange Server 2010 using the installation media. What should you do?()AYou should consider having the adprep.exe //forestprep command run from the Microsoft Windows Server 2008 installation media.BYou should consider having the adprep.exe /domainprep command run from the Microsoft Windows Server 2008 installation media.CYou should consider having the setup /ps command run from the Microsoft Exchange Server 2010 installation media.DYou should consider having the setup /NewProvisionedServer command from the Microsoft Exchange Server 2010 installation media.

多选题You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing the use of Non-Uniform Memory Architecture (NUMA).Which of the following is TRUE with regards to Non-Uniform Memory Architecture (NUMA)?()AIt is a computer architecture used in multiprocessor systems.BIt is a computer architecture used in single processor systems.CIt allows a processor to access local memory faster than it can access remote memory.DIt allows a processor to access remote memory faster than it can access local memory.

单选题If XYZ LTD needs to upgrade the Cisco IOS Software of a Cisco Router, Where is the best place to download the upgrade image file from?()AThe best option is to download it from the Cisco TAC websiteBThe best option is to download it from the Cisco.Com Software support siteCThe best option is to download it form the Cisco Advanced Services websiteDThe best option is to download it from the TFTP site on Cisco.com

单选题Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE.COM defines a binary standard for function calling between components,a way for components to dynamically discover the interfaces implemented by other components,and a mechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft.OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them.Support for OLE is built into the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoC.空白(4)处应选择()AcharacteristicsBaddressCpageDlinks

问答题Questions 1 to 5 are based on the following passage.  Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed by Mozilla.  “It’s reflective of a trend that we’ve seen over the last year with more web users becoming frustrated with the Internet experience,” said Chris Hoffmann of the Mozilla Foundation, a non-profit group supported by Sun Microsystems, IBM and other companies, backing as an alternative to Microsoft.  Much of that frustration has centered on Microsoft, which has been heavily criticized for producing software vulnerable to hand virus writers. Microsoft has responded with a series of patches designed to plug vulnerabilities in its Windows operating system, Internet Explorer web browser and other software.  But computer owners are growing weary of continuously updating software to protect against new threats. One incident last month enabled hackers to gain access to web surfers’ computers by taking advantage of vulnerabilities in Microsoft’s browser.  Hackers could then install remote access Trojan programs that enabled them to control a victim’s computer. The hackers could also install software to capture a victim’s keystrokes to steal data such as bank account numbers and passwords.  Mr. Hoffmann hoped publicity stemming from Microsoft’s security woes(灾难) would translate into a market share increase for Mozilla’s software, which includes the new highly regarded Firefox Internet browser.  But Mozilla suffered a setback last week when it was forced to issue a software patch to counter a newly discovered vulnerability affecting its Internet browsers.  Still, Mr. Hoffmann said Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience. Security experts agree that has made it easier for hackers to exploit computers running on Microsoft software.  Others suggest Microsoft has been targeted by hackers and virus writers simply because more than 90 per cent of the world’s computers run on the software giant’s operating system.  Questions:  1.What is the meaning of the phrase “fed up with” (Para.1)?  2.It can be guessed that the word “plug” (Para.3) means ________________.  3.Why more web users have become frustrated?  4.What happened to Mozilla’s Internet browsers last week?  5.How would Microsoft be less vulnerable?