● (73) manages the other components of a computer system.(73)A.BusB.Application systemC.Operating systemD.Disk

● (73) manages the other components of a computer system.

(73)A.Bus

B.Application system

C.Operating system

D.Disk


相关考题:

● Software maintenance is to do necessary modification,supplenemt,and completeness during software life circle.Among the following vary kinds of maintenance,which one has the maximum workload in a general way? (73) .(73) A.relevance maintenanceB.completeness maintenanceC.correctness naintenanceD.other kinds of maintenance

Integration(73)is the process of verifying that the components of a system work together as described in the program design and system design specifications.(73)A.tryingB.checkingC.testing.D.coding

Integration(73)is the process of verifying that the components of asystem work together as described in the program design and system design specifications.A.tryingB.checkingC.testingD.coding

Computer hardware engineers research, design, develop, and test computer hardware and supervise its manufacture and(73). Hardware refers to computer(74), circuit boards, computer systems, and related equipment such as keyboards, modems, and printers.A.fixingB.buildingC.settingD.installation

● Integration(73)is the process of verifying that the components of a system work together as described in the program design and system design specifications.(73)A. trying B. checking C. testing D. coding

● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory

● (73) is the first line of protect between your computer and the public Internet.(73)A. The Internet protocolB. The firewallC. The anti-virus softwareD. The intrusion-detection systems

The(72)has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries.A.applicationB.information systemC.operating systemD.iterative

Microsoft's COM is a software(71) that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(72) standard developed by Microsoft. OLE makes it possible to create(73) with one application and link or embed them in a second application. Embedded objects retain their original format and(74) to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(75) compound document standard developed mainly by Apple and IBM is called OpenDoc.A.structureB.procedureC.protocolD.architecture

● In requirements engineering,requirements elicitation is the practice of collecting the requirements of a system from users,customers and other stakeholder. In the following practices,__(73)__is rarely used in requirements elicitation.(73)A.brain storming B.interviewC.questionnaire D.Monte Carlo analysis

● Spyware and other forms of malware are the biggest online threat to your computer's (71) nowadays. These malicious (72)which get to your PC through freeware, shareware, commercial sites, deceptive pop-ups or in any other way, can record your surfing habits and sites you visit, share your personal information with their partners. Any personal (73), when inwrong hands, can leave you a victim of an "identity theft" by steeling your credit (74)details,birth records and other (75) information.

● Serialization delay and (71) delay are the two components of network delay that are improved by increasing bandwidth. Serialization delay, i.e. the amount of time it takes to put the (72) on the wire, and queuing delay (depth of the queue) are improved by increasing the (73) from a 128Kbps circuit to a T1. However, three other components of delay, routing/switching delay, distance delay, and protocol delay are components that can not be positively affected by an (74) in bandwidth. If the circuits are not over-utilized, then increasing the bandwidth to improve the (75) of the application will only result in an increased bandwidth with no positive effects on performance.

One of the basic rules of computer security is to change your(73)regularly.A.nameB.computerC.deviceD.password

Refer to the(73)manual for ribbon(ink tape)installation and exchange.A.monitorB.printerC.operating systemD.Disk

The most important program on any computer is (73) .A.Office 2000B.VirusC.softwareD.Operating System

Integration(73)is the process of verifying that the components of a system work togedler as described in the program design and system design speci6cations.A.tryingB.checklngC.testingD.coding

Without systems software, application software in a computer is(73)A.nouseB.usefulC.usenessD.useless

Microsoft's COM is a software(73) that allows applications to be built from binary software components。A.structureB.protocolC.procedureD.architecture

A(73)is used to communicate with another computer over telephone lines.A.keyboardB.modemC.mouseD.printer

The(72)is a system for linking hypertext documents Originally, each document was a page written in(73)with hyperlinks to other documents.Nowadays,XML is gradually starting to take over from(73).A.WebB.E-mailC.DNSD.FTP

Conventionally,a computer consists of at1.ast one processing element, typically a(73) and some form of memory.A.deviceB.CPUC.controllerD.network

● One of the basic rules of computer security is to change your(73) regularly.(73)A. nameB. computerC. passwordD. device

● The most important program on any computer is (73) .(73)A. Office 2000B. VirusC. softwareD. Operating System

● Stack is quite simple. Many computer systems have stacks built into their circuitry. They also have machine-level instructions to operate the hardware stack. Stack is (73)in computer systems.(73)A.uselessB.not importantC.simple but importantD.too simple to be useful

No discharge into the sea shall contain ______ in quantities or concentrations which are hazardous to the marine environment or chemicals or other substances introduced for the purpose of circumventing the conditions of discharge specified in MARPOL 73/78.A.chemicalsB.chemicals or other substancesC.substancesD.other substances

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( 1) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications. A system is defined as a collection of related components that ( 72) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it (73 ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( 74) From time to time, organizations need to (75 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.(1)应选( )。 A. informationB. software C. intelligenceD. Data

Which of the following is a management strategy of iDataPlex?()A、IBM Systems Director manages all components as single imageB、Rack Management Appliance manages the homogeneous imageC、HMC manages dissimilar componentsD、Tivoli Provisioning Manager (TPC) manages all components as single image