题目详情
当前位置:首页 > 计算机考试 > 中级软件设计师
题目详情:
发布时间:2024-07-15 19:55:05

[单项选择]

Inside the computer, the operation system (of another software module called a data communication (71) )must decide which program will get control next. Each program remember, is associated (72) . a particular front -end port. If a program’s data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own (73) signal to the front -end devices next port is polled. Note that the (74) computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system (75) to respond.

(74)处填()。
A. great
B. huge
C. mainframe
D. large

更多"Inside the computer, the operation "的相关试题:

[单项选择]

Inside the computer, the operation system (of another software module called a data communication (71) )must decide which program will get control next. Each program remember, is associated (72) . a particular front -end port. If a program’s data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own (73) signal to the front -end devices next port is polled. Note that the (74) computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system (75) to respond.

(71)处填()。
A. memory
B. control
C. monitor
D. charge
[单项选择]Computer operating system software has become increasingly standardized. But when a large business with multiple, linked computer systems uses identical operating system software on all of its computers, a computer vandal who gains access to one computer automatically has access to the data on all the computers. Using a program known as a "virus," the vandal can then destroy much of the data on all the computers. If such a business introduced minor variations into its operating system software, unauthorized access to all the computers at the same time could be virtually eliminated. Furthermore, variations in operating system software can be created without any loss of computer compatibility to the business. Therefore, it is advisable for businesses to implement such variations.
Which one of the following, if true, supports the conclusion in the passage
A. Standardization of computer operating system software has increased computer compatibility among different businesses.
B. Correcting any damage resulting from an invasion by a computer virus program is more expensive than preventing the damage.
C. It is not costly for a business to maintain incompatible computer operating systems.
D. There are other kinds of destructive computer programs that do not depend on intercomputer links.
E. (E) Not all businesses need to share data among their internal computer systems.
[单项选择]Steven thirds that his computer system
A. is just as fast as the latest systems.
B. is much faster than Elizabeth’s present system.
C. is completely different to the newest systems.
[单项选择]

Passage Two Clifford Stoll ran a computer system in Berkeley, California. As a system administrator, he kept a close eye on the records. One day, Stoll found something strange in the payment record. There was a 75 cents mistake. One of the thousands of users had used the system for 75 cents worth of time and not paid for it. It might sound like very little money to worry about. But that 75 cents was the first clue Stoll had to a much bigger problem--that a hacker had broken into Stoll’ s computer system. Who was it Stoll spent the next year trying to find out. During that time the hacker used the system in Berkeley as a starting point to break into military computer systems all over the United States. Stoll had to keep track of the hacker’s activities on the computer without the hacker’ s knowing someone was watching him. Stoll even made up huge files of false information so the hacker would have lots to read. When the hacker spent long time reading, the
A. student
B. hacker
C. manager
D. professor

[单项选择]
A new computer system has been designed to stop ships sinking. The greatest danger{{U}} (21) {{/U}}a holed vessel is that flooding of its compartments will make the ship unstable enough to capsize. It is estimated that nearly half the ships{{U}} (22) {{/U}}during the second world war capsized because of the loss of{{U}} (23) {{/U}}.
Pacer systems of Burlington, Massachusetts, has now{{U}} (24) {{/U}}a system devised by a{{U}} (25) {{/U}}US Navy officer, Stephen Drabouski, which effectively thought out alternative strategies for the ship. The{{U}} (26) {{/U}}is programmed with every possible eventuality of flood damage.{{U}} (27) {{/U}}the actual damage is keyed into the computer the operator is told by the computer{{U}} (28) {{/U}}the implications are and what can be done to destabilize the vessel.
Trials on the "America
A. after
B. before
C. provided
D. now that

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

截图扫码使用小程序[完全免费查看答案]
请不要关闭本页面,支付完成后请点击【支付完成】按钮
  • 支付完成
  • 取消支付
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码