网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
● Which of the following elements can be called the key element of a computer?(71)
(71)
A.printer
B.CPU
C.mouse
D.keyboard
参考答案
更多 “ ● Which of the following elements can be called the key element of a computer?(71)(71)A.printerB.CPUC.mouseD.keyboard ” 相关考题
考题
●A highlevel language is an artificial language with which we can write various (71) .(71) A.filesB.instructionsC.textD.papers
考题
● (71) means that a program written for one computer system can be compiled and run on another system with little or no modification.(71)A. PortabilityB. ReliabilityC. AvailabilityD. Reusability
考题
● Which of the following statement related to PMO is not correct? (71)(71)A. The specific form, function, and structure of a PMO is dependent upon the needs of the organization that it supports.B. One of the key features of a PMO is managing shared resources across all projects administered by the PMO.C. The PMO focuses on the specified project objectives.D. The PMO optimizes the use of shared organizational resources across all projects.
考题
● (71) controls the operation of the computer and performs it′s dataprocessing functions.(71)A. CPUB. DiskC. MemoryD. I/O
考题
● The (71) serves as the computer's CPU.(71)A. semiconductorB. microprocessorC. cacheD. bus controller
考题
●(71) has many elements: text, audio sound,static graphics images, animations, and full-motion video.(71) A. MultimediaB. DatabaseC. FileD. Document
考题
Which of the following elements can be called the key element of a computer?(71)A.printerB.CPUC.mouseD.keyboard
考题
试题(71)Which of the following would require real-time processing?(71)(71)A.Playing a computer gameB.Executing a program that predicts the state of economyC.Printing labelsD.Listening the music
考题
In a public-key cryptosystem,(71)encrypted with the public key can only be deciphered with the private key from the same(72). Conversely,(71)encrypted with the private key can be decrypted only with the public key. Users can make their public keys(73)available or place them at a key distribution center or others to access. However, the private key must be(74)safe. In public-key systems there's no(75)to find a safe channel for communicating a shared secret key.A.binarytextB.hypertextC.plaintextD.supertext
考题
A(71)is a data type whose major attributes are determined by the roles governing the insertion and deletion of its elements. The only element that can be deleted or removed is the one that was inserted most(72). Such a structure is said to have a last-in/first-out(LIFO)behavior, or protocol.A.stackB.queuesC.pointerD.record
考题
Computer systems consist of two very different types of elements: Hardware, which includes all the physical things that can be touched and(71)which tells the hardware how to do.A.Operating systemB.I/O devicesC.CoursewareD.Software
考题
●The prototyping method is a dynamic design processes, which requires people who use prototyping method to have the following capability of (71).(71)A. proficient program expertiseB. immediately acquire requirementC. coordinate&organize eloquentlyD. handle tools smartly
考题
The(71) program is generally translated to an object program, which is in a form. directly understandably by the computer。A.transferB.assembleC.sourceD.compile
考题
Any computer, be it a large PC or a small embedded computer, is useless if it has no means to interact with the outside worlA.I/O communications for an embedded computer frequently happen over a bus called the (71).B.I/O busC.Memory BusD.Device busE.Intemal Bus
考题
● (71) refers to the parts of the computer that you can see and touch.(71)A. SoftwareB. HardwareC. HardshipD. Instruction
考题
● (71) has many elements: text, audio sound, static graphics images, animations, and full-motion video.(71) A.MultimediaB. DatabaseC. FileD. Document
考题
● A (71) is used to communicate with another computer over telephone lines.(71)A.keyboardB.modemC.mouseD.printer
考题
Which of the following can be used to kill a running process?()A、Control PanelB、Computer ManagementC、Task ManagerD、Add/Remove Programs
考题
A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()A、Cable testerB、MultimeterC、Loop back plugsD、Crossover cable
考题
From which of the following locations can a technician map a drive?()A、System PropertiesB、Help and Support CenterC、Add Hardware WizardD、My Computer
考题
Which of the following interfaces in Windows server can be used to add a new volume for storage?()A、 Computer ManagementB、 System PropertiesC、 Device ManagerD、 Disk ManagementE、 My Computer
考题
单选题Which of the following datatypes are used in situations where you want an ordered set of data elements, where every element is the same datatype, and where you predefine the number of elements that appear in the set?()A
REF B
TABLE C
CLOB D
VARRAY
考题
单选题Computer systems consist of two very different types of elements:Hardware,which includes all the physical things that can be touched and(),which tells thehardware how to do.A
SoftwareB
CoursewareC
OperatingsystemD
I/Odevices
热门标签
最新试卷