Microsoft's COM is a software(73) that allows applications to be built from binary software components。A.structureB.protocolC.procedureD.architecture
Microsoft's COM is a software(73) that allows applications to be built from binary software components。
A.structure
B.protocol
C.procedure
D.architecture
相关考题:
A Web (73) is one of many software applications that function as the interfacebetween a user and the Internet.(73)A. displayB. browserC. windowD. view
● A Web ___(73)___ is one of many software applications that function as the interfacebetween a user and the Internet.(73)A. display B. browser C. window D. view
______ is a set of specifications and software that allow small programs or software components to work together.A.ActiveXB.XMLC.HTMLD.DBMS
Microsoft's COM is a software(146)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(147)standard developed by Microsoft. OLE makes it possible to create(148)with one application and link or embed them in a second application. Embedded objects retain their original format and(149)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(150)compound document standard developed mainly by Apple and IBM is called OpenDoc.A.architectureB.protocolC.procedureD.structure
NET is both a business strategy from Microsoft and its(6)of(7)support for what are known as Web services, the ability to use the Web rather than your own computer for various services. Microsoft's goal is to provide individual and business users with a(8)interoperable and Web-enabled interface for applications and computing devices and to make computing activities increasingly Web browser-oriented. The NET(9)includes servers; building-block services, such as Web-based data storage; and device software. It also includes Passport, Microsoft's fill-in-the-form-only-once identity(10)service.A.individualB.collectionC.setD.unit
Software design is a(71)process .It requires a certain(72)of flair on the part of the designer. Design can not be learned from a book .It must be practiced and learnt by experience and study of existing systems .A well(73)software system is straightforward to implement and maintain ,easily(74)and reliable .Badly(73)software systems ,although they may work are(75)to be expensive to maintain ,difficult to test and unreliable.A.createB.createdC.creatingD.creative
For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the(71) of a software-intensive system. As the(72) standard modeling language, the UML facilitates communication and reduces confusion among project(73) . The recent standardization of UML 2.0 has further extended the language's scope and viability. Its inherent expressiveness allows users to(74) everything from enterprise information systems and distributed Web-based applications to real-time embedded systems.The UML is not limited to modeling software. In fact, it is expressive enough to model(75) systems, such as workflow in the legal system, the structure and behavior. of a patient healthcare system, software engineering in aircraft combat systems, and the design of hardware.To understand the UML, you need to form. a conceptual model of the language, and this requires learning three major elements: the UML's basic building blocks, the rules that dictate how those building blocks may be put together, and some common mechanisms that apply throughout the UML.A.classesB.componentsC.sequencesD.artifacts
Microsoft's COM is a software(71) that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(72) standard developed by Microsoft. OLE makes it possible to create(73) with one application and link or embed them in a second application. Embedded objects retain their original format and(74) to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(75) compound document standard developed mainly by Apple and IBM is called OpenDoc.A.structureB.procedureC.protocolD.architecture
A Web (73) is one of many software applications that function as the interface between a user and the InternetA.displayB.browserC.windowD.view
NET is both a business strategy from Microsoft and its(71)of(72)support for what are known as Web services, the ability to use the Web rather than your own computer for various services. Microsoft's goal is to provide individual and business users with a(73)interoperable and Web-enabled interface for applications and computing devices and to make computing activities increasingly Web browser-oriented. The .NET(74)includes servers; building-block services, such as Web-based data storage; and device software. It also includes Passport, Microsoft's fill-in-the-form-only-once identity(75)service.A.individualB.collectionC.setD.unit
Software Engineering is best described as ( ).A.the practice of designing, building, and maintaining off-the-shelf software from prefabricated partsB.the practice of designing, building, and maintaining ad-hoc software without the use of formal methodsC.the practice of designing, building, and maintaining reliable and cost-effective software using standard techniquesD.the practice of designing, building, and maintaining fast and flexible software specifically for engineering applications
Microsoffs COM is a software(66)that allows applications to be built from binary software components. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(67)standard developed by Microsoft. OLE makes it possible to create(68)with one application and link or embed them in a second application. Embedded objects retain their original format and(69)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(70)compound document standard developed mainly by Apple and IBM is called OpenDoc.A.architectureB.protocolC.procedureD.structure
● For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the (71)of a software-intensive system. As the (72)standard modeling language, the UML facilitates communication and reduces confusion among project (73)The recent standardization of UML 2.0 has further extended the language's scope and viability. Its inherent expressiveness allows users to(74)everything from enterprise information systems and distributed Web-based applications to real-time embedded systems. The UML is not limited to modeling software. In fact, it is expressive enough to model (75) systems,such as workflow in the legal system, the structure and behavior. of a patient healthcare system, software engineering in aircraft combat systems, and the design of hardware. To understand the UML, you need to form. a conceptual model of the language, and this requires learning three major elements: the UML's basic building blocks, the rules that dictate how those building blocks may be put together, and some common mechanisms that apply throughout the UML.(71)A. classesB. componentsC. sequencesD. artifacts(72)A. realB. legalC. de factoD. illegal(73)A. investorsB. developersC. designersD. stakeholders(74)A. modelB. codeC. testD. modify(75)A. non-hardwareB. non-softwareC. hardwareD. software
●Generally software can be divided into two types: (73) software and application software.(73)A. databaseB. systemC. operatingD. text
Software Engineering is best described as ( ). A. the practice of designing, building, and maintaining off-the-shelf software from prefabricated parts B. the practice of designing, building, and maintaining ad-hoc software without the use of formal methods C. the practice of designing, building, and maintaining reliable and cost-effective software using standard techniques D. the practice of designing, building, and maintaining fast and flexible software specifically for engineering applications
Which statement about Software Maintenance Upgrade is true?()A、CRS-1 SMU can be applied to a different platform, and vice versaB、SMU is an executable code for running a process or libraries that are shared between the different processesC、SMUs for each release are individually downloadable from Cisco.com and come in the form of a tar ballD、SMUs provide software fixes for critical network down and qualification blocking issues Therefore,every software defect has a corresponding SMUE、SMUs are release-specific. If an issue affects multiple platforms or releases,an SMU is built separately for each release and each platform
If XYZ LTD needs to upgrade the Cisco IOS Software of a Cisco Router, Where is the best place to download the upgrade image file from?()A、The best option is to download it from the Cisco TAC websiteB、The best option is to download it from the Cisco.Com Software support siteC、The best option is to download it form the Cisco Advanced Services websiteD、The best option is to download it from the TFTP site on Cisco.com
In the operate phase, providing and maintaining reliable, current information about the WLANsystem hardware, software, and applications pertinent to the system’s individual components andattributes is part of which service component?()A、Problem ManagementB、Configuration ManagementC、Incident ManagementD、Change Management
Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE.COM defines a binary standard for function calling between components,a way for components to dynamically discover the interfaces implemented by other components,and a mechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft.OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them.Support for OLE is built into the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoC.空白(4)处应选择()A、characteristicsB、addressC、pageD、links
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional, and all client computer objects are store din the Clients organizational unit (OU). Client computers receive critical security patches from servers at Microsoft. A server named Testking1 runs Software Update Services (SUS). You enable Testking1 to obtain and store security patches for distribution on the internal network. Now you need to ensure that all client computers receive future security patches from Testking1 only. You open the Group Policy object (GPO) for the Clients OU. Which setting should you configure?()A、Computer Configuration/Software Settings/Software InstallationB、User Configuration/Software Settings/Software InstallationC、Computer Configuration/Administrative Templates/Windows Components/Windows InstallerD、User Configuration/Administrative Templates/Windows Components/Windows InstallerE、Computer Configuration/Administrative Templates/Windows Components/Windows UpdateF、User Configuration/Administrative Templates/Windows Components/Windows Update
You are the Exchange administrator for the Xxx Corporation’s Exchange 2010 organization.All servers in the forest must have anti-virus software that contains a file level virus scanner.After you implement the antivirus software, several users report that they cannot access their mailbox.What should you do?()A、Restart the Microsoft Exchange Mail Submission serviceB、Run the ESEUTIL utility on the Exchange databasesC、Exclude *.edb and *.log files from the virus scannerD、Restart the Microsoft Exchange Transport serviceE、Restart the Microsoft Exchange Information Store service
In the operate phase, providing and maintaining reliable, current information about the wlan system hardware, software,and applications pertinent to the system’s individual components and attributes is part of which service component?()A、problem managementB、configuration managementC、incident managementD、change management
Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc.空白(3)处应选择()A、tableB、eventcC、objectsD、function
Which of the following is an advantage of hardware RAID over software RAID?()A、Hardware RAID costs less than software RAIDB、Hardware RAID is built into the operating system’s softwareC、Hardware RAID has better performance than software RAIDD、Hardware RAID requires no configuration and software RAID does
Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card. Certkiller .com requires every server in the company to access Internet. Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy. Which two actions should you perform to achieve this task()A、Trigger the Virtual DHCP server for the external virtual network and run ipconfig/renew command on each virtual serverB、On CKT’s physical network interface, activate the Internet Connection Sharing (ICS)C、Use Certkiller .com intranet IP addresses on all virtual servers on CKT.D、Add and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.E、None of the above
问答题Questions 1 to 5 are based on the following passage. Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed by Mozilla. “It’s reflective of a trend that we’ve seen over the last year with more web users becoming frustrated with the Internet experience,” said Chris Hoffmann of the Mozilla Foundation, a non-profit group supported by Sun Microsystems, IBM and other companies, backing as an alternative to Microsoft. Much of that frustration has centered on Microsoft, which has been heavily criticized for producing software vulnerable to hand virus writers. Microsoft has responded with a series of patches designed to plug vulnerabilities in its Windows operating system, Internet Explorer web browser and other software. But computer owners are growing weary of continuously updating software to protect against new threats. One incident last month enabled hackers to gain access to web surfers’ computers by taking advantage of vulnerabilities in Microsoft’s browser. Hackers could then install remote access Trojan programs that enabled them to control a victim’s computer. The hackers could also install software to capture a victim’s keystrokes to steal data such as bank account numbers and passwords. Mr. Hoffmann hoped publicity stemming from Microsoft’s security woes(灾难) would translate into a market share increase for Mozilla’s software, which includes the new highly regarded Firefox Internet browser. But Mozilla suffered a setback last week when it was forced to issue a software patch to counter a newly discovered vulnerability affecting its Internet browsers. Still, Mr. Hoffmann said Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience. Security experts agree that has made it easier for hackers to exploit computers running on Microsoft software. Others suggest Microsoft has been targeted by hackers and virus writers simply because more than 90 per cent of the world’s computers run on the software giant’s operating system. Questions: 1.What is the meaning of the phrase “fed up with” (Para.1)? 2.It can be guessed that the word “plug” (Para.3) means ________________. 3.Why more web users have become frustrated? 4.What happened to Mozilla’s Internet browsers last week? 5.How would Microsoft be less vulnerable?
单选题If XYZ LTD needs to upgrade the Cisco IOS Software of a Cisco Router, Where is the best place to download the upgrade image file from?()AThe best option is to download it from the Cisco TAC websiteBThe best option is to download it from the Cisco.Com Software support siteCThe best option is to download it form the Cisco Advanced Services websiteDThe best option is to download it from the TFTP site on Cisco.com