网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

● Which of the following elements can be called the key element of a computer?(71)

(71)

A.printer

B.CPU

C.mouse

D.keyboard


参考答案

更多 “ ● Which of the following elements can be called the key element of a computer?(71)(71)A.printerB.CPUC.mouseD.keyboard ” 相关考题
考题 ●A highlevel language is an artificial language with which we can write various (71) .(71) A.filesB.instructionsC.textD.papers

考题 ● (71) means that a program written for one computer system can be compiled and run on another system with little or no modification.(71)A. PortabilityB. ReliabilityC. AvailabilityD. Reusability

考题 ● Which of the following statement related to PMO is not correct? (71)(71)A. The specific form, function, and structure of a PMO is dependent upon the needs of the organization that it supports.B. One of the key features of a PMO is managing shared resources across all projects administered by the PMO.C. The PMO focuses on the specified project objectives.D. The PMO optimizes the use of shared organizational resources across all projects.

考题 ● (71) controls the operation of the computer and performs it′s dataprocessing functions.(71)A. CPUB. DiskC. MemoryD. I/O

考题 ● The (71) serves as the computer's CPU.(71)A. semiconductorB. microprocessorC. cacheD. bus controller

考题 ● The Internet is the worlds largest computer (71) .(71)A.networkB.deviceC.displayD.disk

考题 ●Which is not a computer language? (71)(71) A. officeB. JavaC. C++D. C#

考题 ●(71) has many elements: text, audio sound,static graphics images, animations, and full-motion video.(71) A. MultimediaB. DatabaseC. FileD. Document

考题 Which of the following elements can be called the key element of a computer?(71)A.printerB.CPUC.mouseD.keyboard

考题 试题(71)Which of the following would require real-time processing?(71)(71)A.Playing a computer gameB.Executing a program that predicts the state of economyC.Printing labelsD.Listening the music

考题 In a public-key cryptosystem,(71)encrypted with the public key can only be deciphered with the private key from the same(72). Conversely,(71)encrypted with the private key can be decrypted only with the public key. Users can make their public keys(73)available or place them at a key distribution center or others to access. However, the private key must be(74)safe. In public-key systems there's no(75)to find a safe channel for communicating a shared secret key.A.binarytextB.hypertextC.plaintextD.supertext

考题 A(71)is a data type whose major attributes are determined by the roles governing the insertion and deletion of its elements. The only element that can be deleted or removed is the one that was inserted most(72). Such a structure is said to have a last-in/first-out(LIFO)behavior, or protocol.A.stackB.queuesC.pointerD.record

考题 Computer systems consist of two very different types of elements: Hardware, which includes all the physical things that can be touched and(71)which tells the hardware how to do.A.Operating systemB.I/O devicesC.CoursewareD.Software

考题 ●The prototyping method is a dynamic design processes, which requires people who use prototyping method to have the following capability of (71).(71)A. proficient program expertiseB. immediately acquire requirementC. coordinate&organize eloquentlyD. handle tools smartly

考题 The(71) program is generally translated to an object program, which is in a form. directly understandably by the computer。A.transferB.assembleC.sourceD.compile

考题 ( )is the key element for the whole society.A.Keyboard B.Information C.CPU D.Computer

考题 Any computer, be it a large PC or a small embedded computer, is useless if it has no means to interact with the outside worlA.I/O communications for an embedded computer frequently happen over a bus called the (71).B.I/O busC.Memory BusD.Device busE.Intemal Bus

考题 ●The most important core component of computer system is (71) .(71)A.CD-ROMB.DRAMC.CPUD.CRT

考题 ● (71) refers to the parts of the computer that you can see and touch.(71)A. SoftwareB. HardwareC. HardshipD. Instruction

考题 ● (71) has many elements: text, audio sound, static graphics images, animations, and full-motion video.(71) A.MultimediaB. DatabaseC. FileD. Document

考题 ● A (71) is used to communicate with another computer over telephone lines.(71)A.keyboardB.modemC.mouseD.printer

考题 Which of the following can be used to kill a running process?()A、Control PanelB、Computer ManagementC、Task ManagerD、Add/Remove Programs

考题 A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()A、Cable testerB、MultimeterC、Loop back plugsD、Crossover cable

考题 From which of the following locations can a technician map a drive?()A、System PropertiesB、Help and Support CenterC、Add Hardware WizardD、My Computer

考题 Which of the following interfaces in Windows server can be used to add a new volume for storage?()A、 Computer ManagementB、 System PropertiesC、 Device ManagerD、 Disk ManagementE、 My Computer

考题 单选题Which of the following datatypes are used in situations where you want an ordered set of data elements, where every element is the same datatype, and where you predefine the number of elements that appear in the set?()A REF B TABLE C CLOB D VARRAY

考题 单选题Computer systems consist of two very different types of elements:Hardware,which includes all the physical things that can be touched and(),which tells thehardware how to do.A SoftwareB CoursewareC OperatingsystemD I/Odevices