网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
The system is designed to be used in conjunction with a word processing program.

A:together
B:in succession
C:in alliance
D:in connection

参考答案

参考解析
解析:本句意思:本系统是为了与文字处理软件配合使用而设计的。 in conjunction with 与……一起,共同(或协力)。together with与……一起;in succession接连发生,不跟with搭配;in alliance with结盟;in connection with与……有关,与……相关。
更多 “The system is designed to be used in conjunction with a word processing program.A:together B:in succession C:in alliance D:in connection” 相关考题
考题 which descnption is NOT true?A.Personal computer has not the features of the larger system.B.Large systems offer higher processing speeds for user and return more data than PCs.C.Output devices take output results from the CPU in machine-coded form. and conven them into a form. that used by people.D.The input/output devices and auxiliary storage units of a computer system are called peripherals.

考题 ● The (71) has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries.(71)A. applicationB. information systemC. operating systemD. information processing

考题 ●An Embedded System is a (72)designed for specific control functions within a larger system.(72) A. computerB. programC.computer systemD.tool

考题 The bank has designed a system to prevent the() of credit cards.A、useB、loanC、misuseD、protection

考题 method is the use of a data processing system to represent selected behavioral(67)of a physical or abstract system. For example, the representation of air streams around airfoils at various velocities, temperatures, and air pressures with such a system.Emulation method is slightly different, it uses a data processing system to imitate another data processing system, so that the imitating system accepts the same data, executes the same programs, and achieves the same(68) as the imitated system. Emulation is usually achieved(69) hardware or firmware. In a network, for example, microcomputers might emulate terminals(70) communicate with mainframe.A.AssemblyB.SimultaneityC.FraudD.Simulation

考题 The program memory serves basically as a place(66)instructions, the coded pieces of data(67)direct the activities of the control processing unit(CPU). A group of(68)related in- structions stored in memory is referred to as a program. The CPU "read" each instruction from memory a logically(69)sequence and "use" it to initiate program action. If the program structure is coherent and(70), processing procedures produce intelligible and useful results.A.storedB.to storeC.to be storedD.storing

考题 The(71)has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries.A.applicationB.information systemC.operating systemD.information processing

考题 program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.A.WormB.VirusC.DisasterD.Demon

考题 Word processing software is used to creat edit,save and print (74)A.photosB.graphicsC.documentsD.spreadsheets

考题 Transverse frames are more widely spaced on a ship that is designed with the ______.A.Centerline system of framingB.Isometric system of framingC.Longitudinal system of framingD.Transverse system of framing

考题 What is the purpose of a network mask?()A、It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB、It is used to define which parts of the IP address are allocated to host addresses and network prefixesC、It is used to hide subnets from external networks by masking the subnets with NATD、It is used to differentiate a network as a classful network or a classless network

考题 A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()A、Safe ModeB、Automated System RecoveryC、Last Known Good ConfigurationD、System Restore

考题 Which of the following IBM solutions protect system operations from a hardware failure by automatically moving services from a failing system to another system?()A、eServer ClusterProven ProgramB、Parallel System Support ProgramC、Tivoli Disaster Recovery ManagerD、High Availability Cluster Multi-Processing

考题 When a system has both online transaction processing as well as large batch processing, which of the following common procedures will best help to improve system performance?()A、 Boost the priority of batch jobs.B、 Schedule batch runs to reduce contention with OLTP.C、 Schedule OS maintenance such that it includes frequent application of PTFs.D、 Perform incremental backups of transaction processing and full backups of batch processing.

考题 The System Administrator has set up shared processors on three partitions in the p5 590 system. The shared processors have been set to uncapped. The system administrator notices that the logical partition is acting like it is capped. What is the most probable cause?()A、The uncapped weight has been set to 0.B、The uncapped weight has been set to 128.C、The processing unit for that partition was set to .1 processing units. A full processor was assigned.D、The processing unit for that partition was set to 0.50 processing units. A full processor was assigned.

考题 Which of the following can be used in conjunction with a Flashback Versions Query to filter the results?()A、 A range of SCN valuesB、 A list of SCN valuesC、 A starting and ending timestampD、 Minimum and maximum sequence valuesE、 A list of sequence values

考题 单选题You run the English (US) edition of Windows 2000 professional on your computer. You are developing a product installation document that has text in both English and Spanish. The word processing program you are using is a Windows 16-bit character-based application. You start theword processing program and complete the English Portion of the document. You then install Spanish as a language group by using Regional Options in Control Panel. However, You cannot use Spanish to complete the Spanish portion of your document. What should you do?()A Change the language preference from English to Spanish within the word processing  Program.B Install the Spanish version of Windows 2000 Professional. Reconfigure your language  settings, and restart the word processing program.C Save and close the word processing program. Select Spanish by using the locate indicator on  the taskbar, and restart the word processing program.D Save and close the word program. Log off and log on to the computer. Restart the Word  processing program, and select Spanish by using the locale indicator on the taskbar. 

考题 单选题You run the English (US) edition of Windows 2000 Professional on your home computer. You are writing a letter that will include text in both English and German. The word processing program you are using is a Windows 16-bit character-based document. You then install German language support by using Regional Options in Control Panel. However, you are unable to use German in your document. You want to be able to complete the German portion of the document with the least amount of administrative effort. What should you do?()A Save the document and close the word processing program. Select German by using the locale indicator on the taskbar and restart the word processing program.B Save the document and close the word processing program. Log off and log on to the computer. Restart the word processing program and select German by using the locale indicator on the taskbar.C Install the German version of Windows 2000 Professional. Reinstall the word processing program.D Change the language preference from English to German within the word processing program.

考题 单选题A re-heater, as used in an air conditioning system, is designed to control the ()A chilled water temperatureB dew point temperatureC primary air temperatureD dry bulb temperature

考题 单选题A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()A Safe ModeB Automated System RecoveryC Last Known Good ConfigurationD System Restore

考题 多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.

考题 单选题When a system has both online transaction processing as well as large batch processing, which of the following common procedures will best help to improve system performance?()A  Boost the priority of batch jobs.B  Schedule batch runs to reduce contention with OLTP.C  Schedule OS maintenance such that it includes frequent application of PTFs.D  Perform incremental backups of transaction processing and full backups of batch processing.

考题 单选题A distress signal().A consists of 5 or more short blasts of the fog signal apparatusB consists of the raising and lowering of a large white flagC may be used individually or in conjunction with other distress signalsD is used to indicate doubt about another vessel's intentions

考题 单选题Turbocharging system may be designed to operate on either the () or the constant pressure exhaust system.A pulseB exhaustC fluctuatingD hunting

考题 单选题What is the purpose of a network mask?()A It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB It is used to define which parts of the IP address are allocated to host addresses and network prefixesC It is used to hide subnets from external networks by masking the subnets with NATD It is used to differentiate a network as a classful network or a classless network

考题 单选题Transverse frames are more widely spaced on a ship that is designed with the().A centerline system of framingB isometric system of framingC longitudinal system of framingD transverse system of framing

考题 单选题The System Administrator has set up shared processors on three partitions in the p5 590 system. The shared processors have been set to uncapped. The system administrator notices that the logical partition is acting like it is capped. What is the most probable cause?()A The uncapped weight has been set to 0.B The uncapped weight has been set to 128.C The processing unit for that partition was set to .1 processing units. A full processor was assigned.D The processing unit for that partition was set to 0.50 processing units. A full processor was assigned.