单选题Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc.空白(2)处应选择()AtextBgraphicCdocumentDdatabase

单选题
Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc. 空白(2)处应选择()
A

text

B

graphic

C

document

D

database


参考解析

解析: 暂无解析

相关考题:

For neady ten years,the Unified Modeling Language(UML)has been the industry standardfor visualizing,specifying,constructing,and documenting the【S1】of a software-intensivesystem.As the【S2】standard modeling language,the UML facilitates communication andreduces confusion among project【S3】.The recent standardization of UML 2.0 has furtherextended the language’s scope and viability.Its inherent expressiveness allows users to【S4】everything from enterprise information systems and distributed Web·-based applications to real-timeembedded systems.The UML is not limited to modeling software.In fact,it is expressive enough to model【S5】systems,such as workflow in the legal system,the structure and behavior. of a patienthealthcare system,software engineering in aircraft combat systems,and the design of hardware.To understand the UML,you need to form. a conceptual model of the language,and this re—quires learning three major elements:the UML's basic building blocks,the rules that dictate howthose building blocks may be put together,and some common mechanisms that apply throughout theUML.【S1】A.classesB.componentsC.sequencesD.artifacts

Microsoft's COM is a software(146)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(147)standard developed by Microsoft. OLE makes it possible to create(148)with one application and link or embed them in a second application. Embedded objects retain their original format and(149)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(150)compound document standard developed mainly by Apple and IBM is called OpenDoc.A.architectureB.protocolC.procedureD.structure

以下URL中写法正确的是______。A.http://WWW.microsoft.com\index\htmlB.http://WWW.microsoft.com/index/htmlC.http://WWW.microsoft.com\index.htmlD.http://WWW.microsoft.com/index.html

Today's response to the data access dilemma eschews the traditional archival approach in favor of emerging standards for what are described as the documents of the future: compound documents. Product users and developers hope the latest standards effort--such as OpenDoc and Microsoft Corp.'s Object Linking and Embedding(OLE) will(26)data accessibility.OpenDoc is a standards group(27)a common look and feel throughout documents, even though different applications are used.OLE technologies allow Microsoft to(28)its various software products. Microsoft creates, governs and distributes the OLE capability, which is what most(29)it from the open OpenDoc approach. Thus, users can assemble(30)of varying application to create compound documents. With OLE users can, for example, embed an Excel chart in a Microsoft word report.A.getB.makeC.ensureD.take

NET is both a business strategy from Microsoft and its(6)of(7)support for what are known as Web services, the ability to use the Web rather than your own computer for various services. Microsoft's goal is to provide individual and business users with a(8)interoperable and Web-enabled interface for applications and computing devices and to make computing activities increasingly Web browser-oriented. The NET(9)includes servers; building-block services, such as Web-based data storage; and device software. It also includes Passport, Microsoft's fill-in-the-form-only-once identity(10)service.A.individualB.collectionC.setD.unit

Microsoft's COM is a software(73) that allows applications to be built from binary software components。A.structureB.protocolC.procedureD.architecture

Your computer runs Microsoft Windows XP Professional. The computer also runs 20 third- party applications. You plan to upgrade your computer to Microsoft Windows Vista. The functionality of the existing applications must be maintained even after you upgrade your computer. You need to ascertain whether the hardware and software on the Windows XP Professional computer will support the upgrade.What should you do?()A.AB.BC.CD.D

Microsoffs COM is a software(66)that allows applications to be built from binary software components. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(67)standard developed by Microsoft. OLE makes it possible to create(68)with one application and link or embed them in a second application. Embedded objects retain their original format and(69)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(70)compound document standard developed mainly by Apple and IBM is called OpenDoc.A.architectureB.protocolC.procedureD.structure

下列URL的表示方法中,正确的是( )。A.http://www.microsoft.com/index.htmlB.http:\\www. microsoft.com/index.htmlC.http://www.microsoft.com\index.htmlD.http//www.microsoft.com/index.html

统一资源定位器(URL)的表示方法正确的是______。A.http://www.Microsoft.com/index.htm1B.http//www.Microsoft.com/index.htm1C.http://www.Microsoft.com\index.htm1D.http:\www.Microsoft.com/index.htm1

You need to recommend a solution for deploying App1. The solution must support the company’s  planned changes.   What should you include in the recommendation?()A、Group Policy Software InstallationB、Microsoft Application Virtualization (App-V)C、Microsoft Enterprise Desktop Virtualization (MED-V)D、Microsoft System Center Configuration Manager

以下URL中写法正确的是()A、http://WWW.microsoft.com/index.htmlB、http//WWW.microsoft.com/index.htmlC、http://WWW.microsoft.com/index.htmlD、http//WWW.microsoft.com/index.html

Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc.空白(3)处应选择()A、tableB、eventcC、objectsD、function

Which three applications or protocols are accelerated by AppFlow?() (Choose three.)A、UNIX NFS protocolB、Web-based e-mailC、Secure Sockets LayerD、Microsoft's Common Internet File SystemE、Microsoft's Messaging Application Programming Interface

All servers on your companys network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7.  Which technology should you recommend?()A、Windows Virtual PCB、Microsoft Application Virtualization (App-V)C、Microsoft Virtual Desktop Infrastructure (VDI)D、Microsoft Enterprise Desktop Virtualization (MED-V)

All client computers in your environment run Windows 7. You virtualize applications by using Microsoft Application Virtuali zation (App - V). You need to reset the FileSystem cache on a client computer. What should you do?()A、Use the AppVCacheSize tool to set the maximum cache size to 0.B、Use the AppVCacheSize tool to set the minimum free disk space threshold to 0.C、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ State registry key to 0.D、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ FileSize registry key to 0.

All servers on your company’s network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7.   Which technology should you recommend?()A、Windows Virtual PCB、Microsoft Application Virtualization (App-V)C、Microsoft Virtual Desktop Infrastructure (VDI)D、Microsoft Enterprise Desktop Virtualization (MED-V)

多选题Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()ATrigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual serverBOn CKT’s physical network interface, activate the Internet Connection Sharing (ICS)CUse Certkiller .com intranet IP addresses on all virtual servers on CKT.DAdd and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.ENone of the above

单选题访问ftp.microsoft.com服务器下的office目录时,其地址的正确写法是()。Aftp.microsoft.com/officeBftp.microsoft.com//officeCftp://ftp.microsoft.com/officeDftp:/ftp.microsoft.com/office

单选题Your computer runs Microsoft Windows XP Professional. The computer also runs 20 third-party applications. You plan to upgrade your computer to Microsoft Windows Vista.  The functionality of the existing 20 applications must be maintained even after you upgrade your computer.  You need to ascertain whether the hardware and software on the Windows XP Professional computer will support the upgrade.  What should you do?()ARun the mbsacli.exe command.BRun the winnt32.exe /checkupgradeonly command.CRun the Microsoft Windows Vista Upgrade Advisor application.DCompare the Microsoft Windows XP Professional system hardware against the Microsoft Windows Vista Hardware Compatibility List (HCL).

单选题Microsoft’s newly developed software has a new feature ______ user to include graphics in a presentation.AdemonstratingBconcerningCpreventingDallowing

单选题You have an Exchange Server 2010 organization named contoso.com.You have a Client Access server named cas1.contoso.com that is accessible on the Internet.You access cas1.contoso.com on the Internet by using the following domain names:  (1)mail.contoso.com  (2)autodiscover.contoso.com  You need to ensure that mobile devices can use Auto discover on the Internet.What should you do?()ASet the external URL for Microsoft-Server-ActiveSync to $NULL.BSet the external URL for Microsoft-Server-ActiveSync to https:// cas1.contoso.com/Microsoft Server ActiveSync .CSet the external URL for Microsoft-Server-ActiveSync to https://mail.contoso.com /Microsoft- Server- ActiveSync.DSet the external URL for Microsoft-Server-ActiveSync to http://autodiscover.contoso.com /Microsoft- Server- ActiveSync.

单选题As the administrator of your company’s network you are asked to upgrade several Windows NT 4.0 computers to Windows 2000 Professional.  All user settings and application settings must be preserved. Most applications currently running are compatible with Windows 2000 and all the Windows NT 4.0 computers meet the minimum hardware requirements. After you upgrade several computers to Windows 2000 Professional, you find that some applications did not upgrade properly.   What utilities and/or applications should be disabled (or removed) before upgrading?()ACustom printer third-party software.BAPM and Anti-virus softwareCAll Non-Microsoft ProductsDAll 32-bit applicationsEThird-party video drivers

单选题Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc.空白(1)处应选择()AarchitectureBprotocolCprocedureDstructure

问答题Questions 1 to 5 are based on the following passage.  Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed by Mozilla.  “It’s reflective of a trend that we’ve seen over the last year with more web users becoming frustrated with the Internet experience,” said Chris Hoffmann of the Mozilla Foundation, a non-profit group supported by Sun Microsystems, IBM and other companies, backing as an alternative to Microsoft.  Much of that frustration has centered on Microsoft, which has been heavily criticized for producing software vulnerable to hand virus writers. Microsoft has responded with a series of patches designed to plug vulnerabilities in its Windows operating system, Internet Explorer web browser and other software.  But computer owners are growing weary of continuously updating software to protect against new threats. One incident last month enabled hackers to gain access to web surfers’ computers by taking advantage of vulnerabilities in Microsoft’s browser.  Hackers could then install remote access Trojan programs that enabled them to control a victim’s computer. The hackers could also install software to capture a victim’s keystrokes to steal data such as bank account numbers and passwords.  Mr. Hoffmann hoped publicity stemming from Microsoft’s security woes(灾难) would translate into a market share increase for Mozilla’s software, which includes the new highly regarded Firefox Internet browser.  But Mozilla suffered a setback last week when it was forced to issue a software patch to counter a newly discovered vulnerability affecting its Internet browsers.  Still, Mr. Hoffmann said Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience. Security experts agree that has made it easier for hackers to exploit computers running on Microsoft software.  Others suggest Microsoft has been targeted by hackers and virus writers simply because more than 90 per cent of the world’s computers run on the software giant’s operating system.  Questions:  1.What is the meaning of the phrase “fed up with” (Para.1)?  2.It can be guessed that the word “plug” (Para.3) means ________________.  3.Why more web users have become frustrated?  4.What happened to Mozilla’s Internet browsers last week?  5.How would Microsoft be less vulnerable?