● Which of the following elements can be called the key element of a computer?(71)(71)A.printerB.CPUC.mouseD.keyboard
● Which of the following elements can be called the key element of a computer?(71)
(71)
A.printer
B.CPU
C.mouse
D.keyboard
相关考题:
●A highlevel language is an artificial language with which we can write various (71) .(71) A.filesB.instructionsC.textD.papers
● (71) means that a program written for one computer system can be compiled and run on another system with little or no modification.(71)A. PortabilityB. ReliabilityC. AvailabilityD. Reusability
● Which of the following statement related to PMO is not correct? (71)(71)A. The specific form, function, and structure of a PMO is dependent upon the needs of the organization that it supports.B. One of the key features of a PMO is managing shared resources across all projects administered by the PMO.C. The PMO focuses on the specified project objectives.D. The PMO optimizes the use of shared organizational resources across all projects.
● (71) controls the operation of the computer and performs it′s dataprocessing functions.(71)A. CPUB. DiskC. MemoryD. I/O
● The (71) serves as the computer's CPU.(71)A. semiconductorB. microprocessorC. cacheD. bus controller
●(71) has many elements: text, audio sound,static graphics images, animations, and full-motion video.(71) A. MultimediaB. DatabaseC. FileD. Document
Which of the following elements can be called the key element of a computer?(71)A.printerB.CPUC.mouseD.keyboard
试题(71)Which of the following would require real-time processing?(71)(71)A.Playing a computer gameB.Executing a program that predicts the state of economyC.Printing labelsD.Listening the music
In a public-key cryptosystem,(71)encrypted with the public key can only be deciphered with the private key from the same(72). Conversely,(71)encrypted with the private key can be decrypted only with the public key. Users can make their public keys(73)available or place them at a key distribution center or others to access. However, the private key must be(74)safe. In public-key systems there's no(75)to find a safe channel for communicating a shared secret key.A.binarytextB.hypertextC.plaintextD.supertext
A(71)is a data type whose major attributes are determined by the roles governing the insertion and deletion of its elements. The only element that can be deleted or removed is the one that was inserted most(72). Such a structure is said to have a last-in/first-out(LIFO)behavior, or protocol.A.stackB.queuesC.pointerD.record
Computer systems consist of two very different types of elements: Hardware, which includes all the physical things that can be touched and(71)which tells the hardware how to do.A.Operating systemB.I/O devicesC.CoursewareD.Software
●The prototyping method is a dynamic design processes, which requires people who use prototyping method to have the following capability of (71).(71)A. proficient program expertiseB. immediately acquire requirementC. coordinate&organize eloquentlyD. handle tools smartly
The(71) program is generally translated to an object program, which is in a form. directly understandably by the computer。A.transferB.assembleC.sourceD.compile
Any computer, be it a large PC or a small embedded computer, is useless if it has no means to interact with the outside worlA.I/O communications for an embedded computer frequently happen over a bus called the (71).B.I/O busC.Memory BusD.Device busE.Intemal Bus
● (71) refers to the parts of the computer that you can see and touch.(71)A. SoftwareB. HardwareC. HardshipD. Instruction
● (71) has many elements: text, audio sound, static graphics images, animations, and full-motion video.(71) A.MultimediaB. DatabaseC. FileD. Document
● A (71) is used to communicate with another computer over telephone lines.(71)A.keyboardB.modemC.mouseD.printer
Which of the following can be used to kill a running process?()A、Control PanelB、Computer ManagementC、Task ManagerD、Add/Remove Programs
A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()A、Cable testerB、MultimeterC、Loop back plugsD、Crossover cable
From which of the following locations can a technician map a drive?()A、System PropertiesB、Help and Support CenterC、Add Hardware WizardD、My Computer
Which of the following interfaces in Windows server can be used to add a new volume for storage?()A、 Computer ManagementB、 System PropertiesC、 Device ManagerD、 Disk ManagementE、 My Computer
单选题Which of the following datatypes are used in situations where you want an ordered set of data elements, where every element is the same datatype, and where you predefine the number of elements that appear in the set?()AREF BTABLE CCLOB DVARRAY
单选题Computer systems consist of two very different types of elements:Hardware,which includes all the physical things that can be touched and(),which tells thehardware how to do.ASoftwareBCoursewareCOperatingsystemDI/Odevices