● Which of the following elements can be called the key element of a computer?(71)(71)A.printerB.CPUC.mouseD.keyboard

● Which of the following elements can be called the key element of a computer?(71)

(71)

A.printer

B.CPU

C.mouse

D.keyboard


相关考题:

●A highlevel language is an artificial language with which we can write various (71) .(71) A.filesB.instructionsC.textD.papers

● (71) means that a program written for one computer system can be compiled and run on another system with little or no modification.(71)A. PortabilityB. ReliabilityC. AvailabilityD. Reusability

● Which of the following statement related to PMO is not correct? (71)(71)A. The specific form, function, and structure of a PMO is dependent upon the needs of the organization that it supports.B. One of the key features of a PMO is managing shared resources across all projects administered by the PMO.C. The PMO focuses on the specified project objectives.D. The PMO optimizes the use of shared organizational resources across all projects.

● (71) controls the operation of the computer and performs it′s dataprocessing functions.(71)A. CPUB. DiskC. MemoryD. I/O

● The (71) serves as the computer's CPU.(71)A. semiconductorB. microprocessorC. cacheD. bus controller

● The Internet is the worlds largest computer (71) .(71)A.networkB.deviceC.displayD.disk

●Which is not a computer language? (71)(71) A. officeB. JavaC. C++D. C#

●(71) has many elements: text, audio sound,static graphics images, animations, and full-motion video.(71) A. MultimediaB. DatabaseC. FileD. Document

Which of the following elements can be called the key element of a computer?(71)A.printerB.CPUC.mouseD.keyboard

试题(71)Which of the following would require real-time processing?(71)(71)A.Playing a computer gameB.Executing a program that predicts the state of economyC.Printing labelsD.Listening the music

In a public-key cryptosystem,(71)encrypted with the public key can only be deciphered with the private key from the same(72). Conversely,(71)encrypted with the private key can be decrypted only with the public key. Users can make their public keys(73)available or place them at a key distribution center or others to access. However, the private key must be(74)safe. In public-key systems there's no(75)to find a safe channel for communicating a shared secret key.A.binarytextB.hypertextC.plaintextD.supertext

A(71)is a data type whose major attributes are determined by the roles governing the insertion and deletion of its elements. The only element that can be deleted or removed is the one that was inserted most(72). Such a structure is said to have a last-in/first-out(LIFO)behavior, or protocol.A.stackB.queuesC.pointerD.record

Computer systems consist of two very different types of elements: Hardware, which includes all the physical things that can be touched and(71)which tells the hardware how to do.A.Operating systemB.I/O devicesC.CoursewareD.Software

●The prototyping method is a dynamic design processes, which requires people who use prototyping method to have the following capability of (71).(71)A. proficient program expertiseB. immediately acquire requirementC. coordinate&organize eloquentlyD. handle tools smartly

The(71) program is generally translated to an object program, which is in a form. directly understandably by the computer。A.transferB.assembleC.sourceD.compile

( )is the key element for the whole society.A.Keyboard B.Information C.CPU D.Computer

Any computer, be it a large PC or a small embedded computer, is useless if it has no means to interact with the outside worlA.I/O communications for an embedded computer frequently happen over a bus called the (71).B.I/O busC.Memory BusD.Device busE.Intemal Bus

●The most important core component of computer system is (71) .(71)A.CD-ROMB.DRAMC.CPUD.CRT

● (71) refers to the parts of the computer that you can see and touch.(71)A. SoftwareB. HardwareC. HardshipD. Instruction

● (71) has many elements: text, audio sound, static graphics images, animations, and full-motion video.(71) A.MultimediaB. DatabaseC. FileD. Document

● A (71) is used to communicate with another computer over telephone lines.(71)A.keyboardB.modemC.mouseD.printer

Which of the following can be used to kill a running process?()A、Control PanelB、Computer ManagementC、Task ManagerD、Add/Remove Programs

A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()A、Cable testerB、MultimeterC、Loop back plugsD、Crossover cable

From which of the following locations can a technician map a drive?()A、System PropertiesB、Help and Support CenterC、Add Hardware WizardD、My Computer

Which of the following interfaces in Windows server can be used to add a new volume for storage?()A、 Computer ManagementB、 System PropertiesC、 Device ManagerD、 Disk ManagementE、 My Computer

单选题Which of the following datatypes are used in situations where you want an ordered set of data elements, where every element is the same datatype, and where you predefine the number of elements that appear in the set?()AREF BTABLE CCLOB DVARRAY

单选题Computer systems consist of two very different types of elements:Hardware,which includes all the physical things that can be touched and(),which tells thehardware how to do.ASoftwareBCoursewareCOperatingsystemDI/Odevices