( )algorithm specifies the way to arrange data in a particular order.A.SearchB.RandomC.SortingD.Merge

( )algorithm specifies the way to arrange data in a particular order.

A.Search
B.Random
C.Sorting
D.Merge

参考解析

解析:本题考查计算机专业英语知识()按特定顺序排列数据的方式A 搜索B 随机C 排序D 合并

相关考题:

● One feature of (74) is that it is possible to arrange for a singlemessage to be sent to a large number of other users simultaneously.(74)A. FaxB. IP telephoneC. Data ProcessingD. E-mail

●The principle for a stack memory to store data is (72) .(72) A.FIFOB.randomC.FILOD.other way

The X.25 standard specifies three layers of functionality.Which layers of the OSI model correspond to the X.25 layers?A.the Physical, Network, and Session LayersB.the Physical, Data Link, and Network LayersC.the Physical, Data Link, and Transport LayersD.the Physical, Session, and Presentation layers

M.Jackson suggested the data structure oriented software design method.Which of the following structure can be introduced by using input data structure?A.algorithm structureB.procedure structureC.code structureD.program structure

Is a programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster.The model is a specialization of the split-apply-combine strategy for data analysis().A.HDFSB.ChukwaC.MapReduceD.HBase

The principle for a stack memory to store data isA.FIFOB.FILOC.randomD.other way

Which two statements describe the operation of the CSMA/CD access method, which is in use on the Ezonexam network? (Choose two)A. After a collision, the station that detected the collision has first priority to resend the lost data.B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.C. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.D. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.

Referring to the exhibit, what is the purpose of the targets section of the configuration?() A. It defines which devices will be sending traps.B. It specifies where to send traps.C. It defines the IP addresses of management systems that can access the device.D. It specifies which devices can be polled for SNMP data.

What is the purpose of the magic number in an LCP negotiation?() A.It is used to detect loops.B.It is an interface identifier.C.It selects a compression algorithm.D.It specifies the transmission media.

DBMS will "manage "the stored data items and assemble the needed items from the(74) database in response to the queries of those who aren't programmers.A.extentionB.the sameC.commonD. particular

●In computer science ,a data (72) is a way of storing data in acomputer so that it can be used efficiently.(72)A.recordB.fileC.structureD.pool

The word “packages” (Line 3, Paragraph 2) means_____.[A] parcels carried in travelling [B] a comprehensive set of activities[C] something presented in a particular way [D] charity actions

● (72) is the process ofarranging a group of data elements into some desired order.(72)A. FileB.RecordC.SortingD.Database

Designing the data storage architecture is an important activity in system design. There are two main types of data storage formats: files and databases. Files are electronic of data that have been optimized to perform a particular transaction. There are several types of files that differ in the way they are used to support an application. ( ) store core information that is important to the business and , more specifically , to the application , such as order information or customer mailing information. ( ) contain static values , such as a list of valid codes or the names of cities . Typically, the list is used for validation. A database is a collection of groupings of information that are related to each other in some way. There are many different types of databases that exist on the market today. ( ) is given to those databases which are based on older , sometimes outdated technology that is seldom used to develop new applications . ( ) are collections of records that are related to each other through pointers In relational database , (请作答此空) can be used in ensuring that values linking the tables together through the primary and foreign keys are valid and correctly synchronized.A. identifying relationshipsB. normalizationC. referential integrityD. store procedure

What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router

Some xSeries servers support 4-way memory interleaving and some support 2-way interleaving.  In both types of interleaving, the data is accessed 256 bits at a time.  How is this 256-bit data access achieved with 2-way interleaving?()A、The DIMMs used for 2-way interleaving are double the width of DIMM used in 4-way interleaving.B、The DIMMs used for 2-way interleaving are 64-bit wide and data bits are accessed both on the rising edge and falling edge of the clock cycle.C、The DIMMs used for 2-way interleaving are 32-bit wide and data bits are accessed both on the rising edge and falling edge of the clock cycle.D、The DIMMs used for 2-way interleaving are double the width and data bits are accessed both on the rising edge and falling edge of the clock cycle.

A customer is planning to migrate a financial application to a 12-way p5-570 system with 96GB of memory.  The application data is stored on an ESS Model 800 attached to a p670 server with AIX 5.2.  They will have a short outage window to perform the data migration.  What is the quickest way to move all the data stored on the attached ESS from the p670 to the new p5-570?()A、Use rsync to synchronize the data across servers.B、Use exportvg and importvg to move the data to the target system.C、Use NFS to copy the data from the source system to the target system.D、Backup the data from the source system and restore to the target system.

A customer with a single IBM System Storage DS8100 reports severe performance problems for some of their applications when a particular data warehousing application creates a heavy load.  What is the most cost effective way to resolve this issue()A、add additional disks to the DS8100B、add more cache to the DS8100C、move affected volumes to a different disk enclosureD、implement TPC for Disk to monitor performance

What is the purpose of the magic number in an LCP negotiation?()A、It is used to detect loops.B、It is an interface identifier.C、It selects a compression algorithm.D、It specifies the transmission media.

Name three attributes used to configure a multi-data source in Oracle WebLogic ()A、 Statement Cache TypeB、 Logging Last ResourceC、 Algorithm TypeD、 Failover Request if BusyE、 JNDI Name

You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Analysis Services (SSAS) database. The database contains a data mining structure that uses a SQL Server 2008 table as a data source. A table named OrderDetails contains detailed information on product sales. The OrderDetails table includes a column named Markup. You build a data mining model by using the Microsoft Decision Trees algorithm. You classify Markup as discretized content.  The algorithm produces a large number of branches for Markup and results in low confidence ratings on predictable columns. You need to verify whether the Markup values include inaccurate data. What should you do? ()A、 Modify the content type of Markup as Continuous.B、 Create a data mining dimension in the SSAS database from OrderDetails.C、 Create a data profile by using SQL Server 2008 Integration Services (SSIS).D、 Create a cube in SSAS. Use OrderDetails as a measure group. Recreate the data mining structure and mining model from the cube data.

单选题A researcher needs to regularly analyze large quantities of data.  They are interested in putting together a cluster of 16 UDB EEE partitions of four processors each for their data mining environment.  Each UDB partition needs to be approximately 15 rPerf.  Which of the following solutions would best fit their performance needs?()Ap655 4-way nodesBp655 8-way nodesCp5-570 4-way nodesDp5-570 8-way nodes

单选题What is the purpose of the magic number in an LCP negotiation?()AIt is used to detect loops.BIt is an interface identifier.CIt selects a compression algorithm.DIt specifies the transmission media.

单选题You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()AMicrosoft ClusteringBMicrosoft Decision TreeCMicrosoft Nave BayesDMicrosoft Association

单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Analysis Services (SSAS) database. The database contains a data mining structure that uses a SQL Server 2008 table as a data source. A table named OrderDetails contains detailed information on product sales. The OrderDetails table includes a column named Markup. You build a data mining model by using the Microsoft Decision Trees algorithm. You classify Markup as discretized content.  The algorithm produces a large number of branches for Markup and results in low confidence ratings on predictable columns. You need to verify whether the Markup values include inaccurate data. What should you do? ()A Modify the content type of Markup as Continuous.B Create a data mining dimension in the SSAS database from OrderDetails.C Create a data profile by using SQL Server 2008 Integration Services (SSIS).D Create a cube in SSAS. Use OrderDetails as a measure group. Recreate the data mining structure and mining model from the cube data.

单选题What is the objective of the aaa authentication login console-in local command?()AIt specifies the login authentication method list named console-in using the local user database on the routerBIt specifies the login authorization method list named console-in using the local RADIUS username-password data baseCIt specifies the login authentication list named console-in using the local username- password data base on the routerDIt specifies the login authorization method list named console-in using the local username- password data base on the router

单选题Referring to the exhibit, what is the purpose of the targets section of the configuration?()A It defines which devices will be sending traps.B It specifies where to send traps.C It defines the IP addresses of management systems that can access the device.D It specifies which devices can be polled for SNMP data.