● (72) software, also called end-user program, includes database programs, word processors, spreadsheets etc.(72)A. ApplicationB. SystemC. CompilerD. Utility

● (72) software, also called end-user program, includes database programs, word processors, spreadsheets etc.

(72)

A. Application

B. System

C. Compiler

D. Utility


相关考题:

Program that can destroy another computer’s programs are called () . A、bugsB、bugsC、virusesD、games

, also called end-user program, includes database programs, spreadsheets, word rocessors etc.A.System softwareB.Utility softwareC.Application softwareD.Compiler software

software, also called end-user program, includes database programs, word processors, spreadsheets etc.A.ApplicationB.SystemC.CompilerD.Utility

从供选择的答案中选出应填入英语文句中()的正确的答案。Software products may be (A) into four basic types: application programs, programming language processors, operating systems, and system utilities.Application programs are programs that (B) useful tasks such as solving statistical problems, or keeping your company's books.Programming language processors are programs that (C) the use if a computer language in a computer system. They are tools for the development of application programs.Operating systems are programs that (D) the system resources and enable you to run application programs.System utilities are special programs that (E) the usefulness of or add capabilities to a computer.A~E: ① manage ② perform ③ support ④ reduce⑤ divided ⑥ enhance ⑦ implemented ⑧ introduce⑨ ranked ⑩ run

● An embedded operating system is the(71) program that manages all the other programs in an embedded device after initial load of programs by a(an) (72). It normally guarantees a certain capability within a specified(73) size and (74) constraint as well as with application programs. It also normally has small foot print including initial boot loader, OS kernel, required device drivers, (75) for the user data and so forth. It has very-likely structure of a normal operating system however mainly differentiated by some factors such as type of pre-installed device, functional limits, taking designed job only.(71)A. hardware B. business C. software D. external(72)A. driver B. application C. kernel D. boot loader(73)A. data B. storage C. bus D. CPU(74)A. time B. format C. controller D. packet(75)A. JAFFS B. format C. file systems D. protocol

______ is a set of specifications and software that allow small programs or software components to work together.A.ActiveXB.XMLC.HTMLD.DBMS

The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).A.hubB.centerC.coreD.nucleus

, also called end-user program, includes database programs, spreadsheets, word processors etc。A.Application softwareB.Utility softwareC.System softwareD.Compiler software

ActiveX is a set of specifications and software that allow small programs or software components to(72).A.work togetherB.work aloneC.simplifyD.reuse

Which correctly describes the tiers of the Oracle Workflow architecture?() A. Oracle Database tier and Application server tier onlyB. Oracle Database tier, Application server tier, and End-user client tier onlyC. Oracle Database tier, Application server tier, and Development client tier onlyD. Oracle Database tier, Application server tier, Development client tier, and End-user client tier

The relational database model requires the data be(110)through programs that don't rely on the position of the data in the database. This is in direct(111)to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program(112)a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and(113)the information. The(114)on how the search is done are specific to the DBMS and vary from product to product.A.accessedB.movedC.readD.wrote

Software products may be (1)into four basic types: application programs, programming language processors, operating systems, and system utilities.Application programs are programs that (2) useful tasks such as solving statistical problems, or keeping your company's books.Programming language processors are programs that (3) the use if a computer language in a computer system. They are tools for the development of application programs.Operation systems are programs that (4) the system resources and enable you to run application programs.System utilities are special programs that (5) the usefulness of or add capabilities to a computer.A.manageB.performC.supportD.reduceE.divided

An embedded operating system is the(71)program that manages all the other programs in an embedded device after initial load of programs by a(an)(72). It normally guarantees a capability within a specified(73)size and(74)constraint as well as with application programs. It also n0rmalty has small foot print including initial boot loader, OS kernel, required device drivers,(75)for the user data and so forth. It has very-likely structure of a normal operating system however mainly differentiated by some factors such as type of pre-installed device, functional limits, taking designed job only.A.hardwareB.businessC.softwareD.external

The relational database model requires the data be(71)through programs that don't rely on the position of the data in the database. This is in direct(72)to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program(73)a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and(74)the information. The(75)on how the search is done are specific to the DBMS and vary from product to product.A.accessedB.movedC.readD.wrote

Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.A.memoryB.controlC.monitorD.charge

Software document is an important part of software and a basis of software development phase. It also influnces software's(72).A.ExpansibilityB.ReusabilityC.PortabilityD.Maintenance

( )products often feature games with learning embedded into them.A. Program B. Database C. Software D. Multimedia

The deliverable from this phase also includes the ( ) for the proposed system. A.hardware and software specification B.system performance specification C.formal requirements definition D.general problem statement

The objective of (71) is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is (72). Most information systems require data to be stored and retrieved, whether a small file, such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records. The second function is the (73), the processing required to access data, which often means database queries in Structured Query Language. The third function is the (请作答此空), which is the logic documented in the DFDs, use cases, and functional requirements. The fourth function is the presentation logic, the display of information to the user and the acceptance of the user's commands. The three primary hardware components of a system are (75). A. system requirements B. system architectureC.application logic D.application program

Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,( )reads the program code and automatically generates the equivalent system model, and the code can be obtained from (请作答此空). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. A. existing database and application programB. application program and user interfaceC. existing database and user interfaceD. existing database,application program and user interface

Which of these is a benefit of ESM?()A、 supports multiple MIBsB、 includes NetFlow, NBAR, and IP SLA software subsystemsC、 includes NetFlow, syslog, and IP SLA software subsystemsD、 includes a predefined framework for filtering and correlating messagesE、 supports two logging processes so output can be sent in standard and ESM format

Which is the correct way to connect to both the target database and the recovery catalog from the RMAN command line?() Assume that the target database is called ORCL and that the recovery catalog database is called RCAT. Also assume that the recovery-catalog owner is called RCAT_OWN. Assume the environment is configured for the ORCL database. A、 rman target=/ catalog=/@rcatB、 rman target=/ catalog=rcat_own/rcat_ownC、 rman target=/ catalog=rcat_own/rcat_own@RCATD、 rman target=sys/robert@orcl catalog=rcat_own/rcat_own@RCATE、 You cannot connect to the target database and the recovery catalog at the same time.

A database administrator wants to design a multi-partition database that can take advantage of both intra-partition parallelism and inter-partition parallelism. Which configuration will allow the use of these types of parallelism while using the least number of hardware components (servers, processors)? ()A、one server having at least two processors  B、two servers having one processor and one logical database partition  C、one server having four processors and two logical database partitions  D、two servers each having four processors and two logical database partitions

In which two environments would intra-partition parallelism be used? ()A、Single database partition, single processor  B、Single database partition, multiple processors  C、Multiple database partitions, single processor  D、Multiple database partitions, multiple processors

单选题A customer has 4 application and 2 database servers that will be installed in partitions on a Power 750. They are concerned that the database software vendor will charge based on every processor core in the server. Which action will reduce the potential vendor software costs?()ACreate capped partitions for the database servers.BCreate workload partitions for the database servers.CCreate a separate shared processor pool for the database servers.DCreate virtual processors equal to the entitlement for database servers.

单选题Which correctly describes the tiers of the Oracle Workflow architecture?()AOracle Database tier and Application server tier onlyBOracle Database tier, Application server tier, and End-user client tier onlyCOracle Database tier, Application server tier, and Development client tier onlyDOracle Database tier, Application server tier, Development client tier, and End-user client tier

问答题Training doesn’t just involve teaching someone how to write nifty software or even stick to company policies. It also focuses on softer skills like team-building, leadership and communication. Rather than train only in periods of flux or crisis, entrepreneurs should invest consistently in a structured program along the way. It may sound corny, but small firms that build what consultants like to call a “culture of learning” get more out of their training investments, because they don’t have to “reinvent the wheel” when restarting programs from scratch.