●The operating system provides an easy-to-use (73) to users.(73)A. interfaceB. hardwareC. deviceD. disk

●The operating system provides an easy-to-use (73) to users.

(73)A. interface

B. hardware

C. device

D. disk


相关考题:

●A disk scheduling mechanism in an operating system causes the disk arm to sweepbackand forth across the disk Surface servicing all requests in its path.This is a (73) .(73) A.First Come First ServeB.Shortest Seek Time FirstC.ScanD.None of the above

●Most computer systems are (71) to two different groups of attacks:Insider attacks and outsider attacks. A system that is known to be (72) to an outsider attack by preventing (73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (75) by tools referred to as Intrusion Detection Systems.(71) A.vulnerableB.weekC.sensitivelyD.helpless(72) A.reliableB.secureC.indestructibleD.steady(73) A.visitB.accessC.I/OD.read/write(74) A.powerB.rightsC.authorizedD.common(75) A.searchedB.checkedC.testedD.detected

● CMOS SETUP utility allows you to change your system (73) by selecting a variety of options.(73)A. devicesB. softwareC. configurationD. size

The user must interact with the(73) in order to accomplish task.A.printerB.memoryC.CPUD.operating system

●An operating system is (74) .(74) A. the highest layer of softwareB. the lowest layer of softwareC. the highest layer of hardwareD. the lowest layer of hardware

Integration(73)is the process of verifying that the components of a system work together as described in the program design and system design specifications.(73)A.tryingB.checkingC.testing.D.coding

● (73) provides a data path between the CPU and external devices.(73)A. KeyboardB. I/O portC. DiskD. Printer

● The (72) is a collection of modules serving as interface between hardware and software to provide a software platform.(72)A. computerB. processorC. application softwareD. operating system

● A well-designed system should be(73).①easily understood②reliable③straightforward to implement④straightforward to maintain(73)A.①②B.①③④C.②③④D.①②③④

● Integration(73)is the process of verifying that the components of a system work together as described in the program design and system design specifications.(73)A. trying B. checking C. testing D. coding

● An embedded operating system is the(71) program that manages all the other programs in an embedded device after initial load of programs by a(an) (72). It normally guarantees a certain capability within a specified(73) size and (74) constraint as well as with application programs. It also normally has small foot print including initial boot loader, OS kernel, required device drivers, (75) for the user data and so forth. It has very-likely structure of a normal operating system however mainly differentiated by some factors such as type of pre-installed device, functional limits, taking designed job only.(71)A. hardware B. business C. software D. external(72)A. driver B. application C. kernel D. boot loader(73)A. data B. storage C. bus D. CPU(74)A. time B. format C. controller D. packet(75)A. JAFFS B. format C. file systems D. protocol

______ is permanently stored in the computer and provides a link between the hardware and other programs that run on the PC.A.InterfaceB.Operating systemC.InternetD.Applicaion software

User programs interact with the kernel through a set of standard(71). They request services to be provided by the kernel. Such services would include accessing a file: open close, read, write, link, or execute a file; starting or(72)accounting records; changing ownership of a file or(73); changing to a new directory; creating,(74), or killing a process; enabling access to hardware devices; and setting limits on system resources. Unix is a multi -user, multi -tasking operating system. You can have many users logged into a system simultaneously, each running many programs. It's the kernel's job to keep each process and user separate and to regulate access to(75), including cpu, memory, disk and other L/O devices.A.system commandsB.system transferC.system callsD.system rings

The(72)is a collection of modules serving as interface between hardware and software to provide a software platform.A.computerB.processorC.application softwareD.operating system

Most computer systems are(71)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(72)to an outsider attack by preventing(73)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(74)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(75)by tools referred to as Intrusion Detection Systems.A.vulnerableB.weekC.sensitivelyD.helpless

Acts as an interface between computer hardware and users()。A.Operating systemB.Application softwareC.USBD.MODEM

The most important program on any computer is (73) .A.Office 2000B.VirusC.softwareD.Operating System

A disk scheduling mechanism in an operating system causes the disk arm to sweepbackand forth across the disk Surface servicing all requests in its path. This is a(73).A.First Come First ServeB.Shortest Seek Time FirstC.ScanD.None of the above

()is the basic software that allows the user to interface with the computer. A.DisplayB.ApplicationC.ScreenD.Operating System

● (73) manages the other components of a computer system.(73)A.BusB.Application systemC.Operating systemD.Disk

● The most important program on any computer is (73) .(73)A. Office 2000B. VirusC. softwareD. Operating System

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements evolve from broad statements of overall (71)from the system to detailed statements of the business capabilities that a system should support to detailed technical statements of the way in which the capabilities will be implemented in the new system. (72)focus on describing how to create the software product that will be produced from the project Nonfunctional requirements are primarily used in the design phase when decisions are made about the user interface, the hardware and software, and the system's underlying architecture. The system's physical and technical environments would be considered (73). The speed, capacity, and reliability of the system belong to (74).(75)describes that who has authorized access to the system under what circumstances.(73)应选?A.A functional requirementB.A technical requirementC.an operational requirementD.A.service requirement

Companycom is implementing a pair of Virtual IO Servers to service four LPARs. If each operating system image requires 15GB of disk space, what is the minimum amount of SCSI resource necessary?()A、Two SCSI paths and two 73GB SCSI disksB、Two SCSI paths and two 36GB SCSI disksC、Four SCSI paths and four 73GB SCSI disksD、Two dual port SCSI RAID adapters with two 73GB SCSI disks

Which of the following is a software layer that interacts between the virtualized operating system and the physical hardware?()A、 System Resource ManagerB、 Server BIOSC、 Guest Operating SystemD、 Hypervisor

Which of the following can deploy system plans generated by the IBM System Planning Tool (SPT)?()A、 The Hardware Management Console (HMC) and Integrated Virtualization Manager (IVM).B、 The Hardware Management Console (HMC) and Advanced System Manager Interface (ASMI).C、 Integrated Virtualization Manager (IVM) and Advanced System Manager Interface (ASMI).D、 Integrated Virtualization Manager (IVM) and BladeCenter Advanced Management Module (AMM).

单选题Which of the following is a software layer that interacts between the virtualized operating system and the physical hardware?()A System Resource ManagerB Server BIOSC Guest Operating SystemD Hypervisor

单选题Which of the following can deploy system plans generated by the IBM System Planning Tool (SPT)?()A The Hardware Management Console (HMC) and Integrated Virtualization Manager (IVM).B The Hardware Management Console (HMC) and Advanced System Manager Interface (ASMI).C Integrated Virtualization Manager (IVM) and Advanced System Manager Interface (ASMI).D Integrated Virtualization Manager (IVM) and BladeCenter Advanced Management Module (AMM).