Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standar

题目

Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc. 空白(1)处应选择()

  • A、architecture
  • B、protocol
  • C、procedure
  • D、structure

相似考题
更多“Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standar”相关问题
  • 第1题:

    Microsoft's COM is a software(73) that allows applications to be built from binary software components。

    A.structure

    B.protocol

    C.procedure

    D.architecture


    正确答案:D
    解析:微软提出的COM是一种软件体系结构,它可以根据二进制软组件构成应用软件。

  • 第2题:

    Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.

    A.network B.virus C.security D.architecture


    正确答案:C

  • 第3题:

    Cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers ( )through a real-time communication network such as the Internet.In science,cloud computing is a ( )for distributed computing over a network,and means the ( )to run a program or application on many connected computers at the same time.The architecture of a cloud is developed at three layers: infrastructure,platform,and application,The infrastructure layer is built with virtualized compute,storage,and network resources.The platform layer is for general-purpose and repeated usage of the collection of software resources.The application layer is formed with a collection of all needed software modules for SaaS applications.The infrastructure layer serves as the( )for building the platform layer of the cloud. In turn,the platform layer is a foundation for implementing the(请作答此空)layer for SaaS applications.

    A.resoruce
    B.service
    C.application
    D.software

    答案:C
    解析:
    云计算是用来描述各种计算概念的短语,包括大量计算机通过网络相互连接以实现分布计算,意思是同时在很多互联的计算机上运行程序或应用的能力。云的架构分为基础设施层、平台层和应用层三层。基础设施层由虚拟计算、存储和网络资源构成。平台层用于一组软件资源重复使用的通用目的。应用层由一组所需的软件模块构成,即软件即服务(SaaS)。基础设施层作为构建平台层的基础。相反,平台层是应用层的基础,为SaaS应用实现应用层。

  • 第4题:

    Software Engineering is best described as ( ).

    A. the practice of designing, building, and maintaining off-the-shelf software from prefabricated parts
    B. the practice of designing, building, and maintaining ad-hoc software without the use of formal methods
    C. the practice of designing, building, and maintaining reliable and cost-effective software using standard techniques
    D. the practice of designing, building, and maintaining fast and flexible software specifically for engineering applications



    答案:C
    解析:
    解析:翻译:对软件工程最恰当的描述是( )。A.从定制化软件到成本软件的设计、开发和维护B.非常规的专用软件的设计、开发和维护C.采用常规方法的可靠的、高性价比的软件的设计、开发和维护D.针对工程应用的快速敏捷性软件的设计、开发和维护

  • 第5题:

    You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange 2010 environment. The employees of TestKing.comuse Microsoft Outlook 2003 to connect to their Mailboxes. You have received instructions from the CIO tochange the network to Exchange Server 2010. However, the CIO wants you to propose a solution for Mailboxes access that will keep the support and software cost to a minimum as well as ensuring access tothe public folders. What should you do?()

    • A、This can be accomplished using Personal Archive and forms-based authentication.
    • B、This can be accomplished by upgrading all client computers to Outlook 2010 and use Autodiscover.
    • C、This can be accomplished using Outlook Anywhere and changin the Outlook RPC encryption settings.
    • D、This can be accomplished using using POP3 and IMAP4 access.

    正确答案:C

  • 第6题:

    If XYZ LTD needs to upgrade the Cisco IOS Software of a Cisco Router, Where is the best place to download the upgrade image file from?()

    • A、The best option is to download it from the Cisco TAC website
    • B、The best option is to download it from the Cisco.Com Software support site
    • C、The best option is to download it form the Cisco Advanced Services website
    • D、The best option is to download it from the TFTP site on Cisco.com

    正确答案:B

  • 第7题:

    Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE.COM defines a binary standard for function calling between components,a way for components to dynamically discover the interfaces implemented by other components,and a mechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft.OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them.Support for OLE is built into the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoC. 空白(1)处应选择()

    • A、architecture
    • B、protocol
    • C、procedure
    • D、structure

    正确答案:A

  • 第8题:

    You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()

    • A、Executable
    • B、Trojan
    • C、Virus
    • D、Worm

    正确答案:C,D

  • 第9题:

    Which of the following is an advantage of hardware RAID over software RAID?()

    • A、Hardware RAID costs less than software RAID
    • B、Hardware RAID is built into the operating system’s software
    • C、Hardware RAID has better performance than software RAID
    • D、Hardware RAID requires no configuration and software RAID does

    正确答案:C

  • 第10题:

    Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()

    • A、Trigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual server
    • B、On CKT’s physical network interface, activate the Internet Connection Sharing (ICS)
    • C、Use Certkiller .com intranet IP addresses on all virtual servers on CKT.
    • D、Add and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.
    • E、None of the above

    正确答案:A,D

  • 第11题:

    问答题
    Questions 1 to 5 are based on the following passage.  Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed by Mozilla.  “It’s reflective of a trend that we’ve seen over the last year with more web users becoming frustrated with the Internet experience,” said Chris Hoffmann of the Mozilla Foundation, a non-profit group supported by Sun Microsystems, IBM and other companies, backing as an alternative to Microsoft.  Much of that frustration has centered on Microsoft, which has been heavily criticized for producing software vulnerable to hand virus writers. Microsoft has responded with a series of patches designed to plug vulnerabilities in its Windows operating system, Internet Explorer web browser and other software.  But computer owners are growing weary of continuously updating software to protect against new threats. One incident last month enabled hackers to gain access to web surfers’ computers by taking advantage of vulnerabilities in Microsoft’s browser.  Hackers could then install remote access Trojan programs that enabled them to control a victim’s computer. The hackers could also install software to capture a victim’s keystrokes to steal data such as bank account numbers and passwords.  Mr. Hoffmann hoped publicity stemming from Microsoft’s security woes(灾难) would translate into a market share increase for Mozilla’s software, which includes the new highly regarded Firefox Internet browser.  But Mozilla suffered a setback last week when it was forced to issue a software patch to counter a newly discovered vulnerability affecting its Internet browsers.  Still, Mr. Hoffmann said Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience. Security experts agree that has made it easier for hackers to exploit computers running on Microsoft software.  Others suggest Microsoft has been targeted by hackers and virus writers simply because more than 90 per cent of the world’s computers run on the software giant’s operating system.  Questions:  1.What is the meaning of the phrase “fed up with” (Para.1)?  2.It can be guessed that the word “plug” (Para.3) means ________________.  3.Why more web users have become frustrated?  4.What happened to Mozilla’s Internet browsers last week?  5.How would Microsoft be less vulnerable?

    正确答案:
    1.tired of be fed up with的含义是“厌倦的”。
    2.stop plug的原意是“塞住,堵住”,上文提到微软的Windows操作系统容易受到攻击,微软就设计了一系列补丁来防止Windows操作系统受攻击。由此可知plug的意思是stop。
    3.Because Microsoft software is increasingly threatened by hackers 文章开头提到Computer Users fed up with hacker attacks and other security threats,“很多的计算机使用者受到黑客的攻击”,第三段也谈到人们对微软的Windows操作系统感到很失望,因为微软的Windows操作系统容易受到黑客的攻击。
    4.They were affected by a newly discovered vulnerability 文章倒数第三段第一句话提到Mozilla suffered a setback…counter a newly discovered vulnerability...这段话所隐含的意思是由于微软操作系统非常容易受到病毒的攻击,使得Mozilla互联网浏览器的使用者受到了不少影响。
    5.If its browser hadn’t been integrated into Windows. 文章倒数第二段开头一句话指出Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience.即微软操作系统的安全受到威胁部分是因为微软的使用者为方便把Windows界面与网络浏览器连接在一起,这样就使得微软的操作系统更容易受到病毒的攻击,因而要使微软免于病毒的攻击就只能把浏览器与Windows界面分开。
    解析: 暂无解析

  • 第12题:

    单选题
    If XYZ LTD needs to upgrade the Cisco IOS Software of a Cisco Router, Where is the best place to download the upgrade image file from?()
    A

    The best option is to download it from the Cisco TAC website

    B

    The best option is to download it from the Cisco.Com Software support site

    C

    The best option is to download it form the Cisco Advanced Services website

    D

    The best option is to download it from the TFTP site on Cisco.com


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Software Engineering is best described as ( ).

    A.the practice of designing, building, and maintaining off-the-shelf software from prefabricated parts

    B.the practice of designing, building, and maintaining ad-hoc software without the use of formal methods

    C.the practice of designing, building, and maintaining reliable and cost-effective software using standard techniques

    D.the practice of designing, building, and maintaining fast and flexible software specifically for engineering applications


    正确答案:C

  • 第14题:

    Microsoffs COM is a software(66)that allows applications to be built from binary software components. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(67)standard developed by Microsoft. OLE makes it possible to create(68)with one application and link or embed them in a second application. Embedded objects retain their original format and(69)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(70)compound document standard developed mainly by Apple and IBM is called OpenDoc.

    A.architecture

    B.protocol

    C.procedure

    D.structure


    正确答案:A
    解析:微软提出的COM是一种软件体系结构,它可以根据二进制软组件构成应用软件。 COM定义了组件之间进行功能调用的二进制标准,这是使得一个组件能够动态地发现其他组件实现的接口的一种方法,也是标识组件及其接口的特殊机制。OLE是由微软开发的组合文档标准。OLE可以生成与一种应用有关的文档,并且把它链接或嵌入到另外一个应用中。被嵌入的对象保持了原来的格式,而且可以与生成它们的应用链接起来。对OLE的支持已经内置在Windows和MacOS操作系统中。主要由 Apple和IBM开发的竞争性组合文档标准叫做OpenDoc。

  • 第15题:

    TCP/IP ( )layer protocols provide services to the application(请作答此空)running on a computer. The application layer does not define the application itself, but rather it defines( )that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an( )between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP( )layer consists of two main protocol options--the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).

    A.hardware]
    B.software]
    C.packet
    D.equipment

    答案:B
    解析:
    TCP/IP传输层协议为运行在计算机上的应用软件提供服务。应用层没有定义应用本身,而是定义了应用需要的服务,例如采用HTTP可以传输文件。简而言之,应用层提供了运行在计算机上的软件与网络之间的接口。TCP/IP应用层包括了很多的协议,HTTP仅是其中之一。TCP/IP传输层主要由两个可选的协议组成——传输控制协议(TCP)和用户数据报协议(UDP)。

  • 第16题:

    Cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers ( )through a real-time communication network such as the Internet. In science, cloud computing is a ( )for distributed computing over a network, and means the ( )to run a program or application on many connected computers at the same time.The architecture of a cloud is developed at three layers: infrastructure, platform, and application. The infrastucture layer is built with virtualized computestorageand network resources. The platform lay-er is for general-purpose and repeated usage of the collection of software resources. The application layer is formed with a collection of all needed software modules for SaaS applications. The infrastucture layer serves as the ( )for building the platform layer of the cloud. In turn, the platform layer is foundation for implementing the (请作答此空)layer for SaaS application

    A.resource
    B.service
    C.application
    D.software

    答案:C
    解析:
    云计算是一个用来描述各种计算概念的一个短语,计算概念涉及大量计算机通过实时通信的网络,如Internet,(11)在一起。在科学研究中,云计算是分布式网络计算的(12),意味着有(13)同时在多台互连的计算机上运行一个程序或应用。云的结构分为3层:基础设施、平台和应用。基础实施层由虚拟计算机存储和网络资源构成;平台层是具有通用性和复用性的软件资源的集合;应用层是云上针对SaaS应用的所有应用软件的集合。基础设施层时建立平台层的(14)基础;相应地,平台层是执行应用层SaaS(15)的基础。A. 资源 B. 服务 C. 应用 D. 软件

  • 第17题:

    Which statement about Software Maintenance Upgrade is true?()

    • A、CRS-1 SMU can be applied to a different platform, and vice versa
    • B、SMU is an executable code for running a process or libraries that are shared between the different processes
    • C、SMUs for each release are individually downloadable from Cisco.com and come in the form of a tar ball
    • D、SMUs provide software fixes for critical network down and qualification blocking issues Therefore,every software defect has a corresponding SMU
    • E、SMUs are release-specific. If an issue affects multiple platforms or releases,an SMU is built separately for each release and each platform

    正确答案:E

  • 第18题:

    Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE.COM defines a binary standard for function calling between components,a way for components to dynamically discover the interfaces implemented by other components,and a mechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft.OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them.Support for OLE is built into the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoC. 空白(4)处应选择()

    • A、characteristics
    • B、address
    • C、page
    • D、links

    正确答案:D

  • 第19题:

    对URL:http://www.teach.com/software/test.htm的描述哪个不正确?()

    • A、software是主机的二级机器名
    • B、使用http协议
    • C、主机是www.teach.com
    • D、运行的是test.htm文件

    正确答案:A

  • 第20题:

    Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc. 空白(3)处应选择()

    • A、table
    • B、eventc
    • C、objects
    • D、function

    正确答案:C

  • 第21题:

    Cer-tech .com has an Active Directory domain installed on a server that runs Windows Server 2008.Another server named S3 also runs Windows Server 2008. All client machines have Windows Vista. Cer-tech .com has instructed you to install the Terminal Services role, Terminal Services Gateway role andTerminal Services Web Access role service on S3. To protect the network, you want to ensure that all client machines have firewall, antivirus software and anti-spyware software installed. Which actions shouldyou perform to achieve this task?()

    • A、Configure Windows Authorization Access domain local security group and add Terminal Services clientcomputers
    • B、Configure Terminal Services client computers to access the Terminal Services health policy.
    • C、Set the Request clients to sent a health option statement in the Terminal Services client access policy
    • D、Install and configure Network Access Protection (NAP) on the server in the domain

    正确答案:C,D

  • 第22题:

    You are a network administrator for Alpine Ski House. The network consists of a single Active Directory domain named alpineskihouse.com.Your company acquires a company named Adventure Works. The Adventure Works network consists of a single Active Directory domain named adventure-works.com. A server named Server32 is a network-management application server in the adventure-works.com domain. Server32 accesses all of the desktop client computers to perform automated software upgrades and hardware inventory. The network-management software on Server32 references desktop computers by unqualified host names, which are resolved to clientname.adventure-works.com by using a DNS server. You join Server32 to your domain to become server32.alpineskihouse.com. The Server32 IP address is 10.10.10.90.You are gradually migrating all adventure-works.com desktop client computers to your domain to become clientname.alpineskihouse.com. You do not have access to the adventure-works.com DNS server. When Server32 attempts to apply an update to the client computers, the network-management software returns many alerts that say that desktop computers cannot be found.   You want to allow the network-management software on Server32 to resolve unqualified client computer host names in adventure-works.com or alpineskihouse.com, and you want to use the minimum amount of administrative effort. What should you do?()

    • A、On the DNS server for alpineskihouse.com, add a zone for adventure-works.com. Create a host (A) record for server32.adventure-works.com that points to 10.10.10.90.
    • B、On Server32, in System Properties, type adventure-works.com in the Primary DNS suffix of this computer field in the DNS Suffix and Netbios Computer Name setting.
    • C、On Server32, configure a Hosts file that contains the name and IP address of every network computer.
    • D、On Server32, in Advanced TCP/IP Settings, add adventure-works.com and alpineskihouse.com to the Append these DNS suffixes (in order) setting.

    正确答案:D

  • 第23题:

    单选题
    You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange 2010 environment. The employees of TestKing.comuse Microsoft Outlook 2003 to connect to their Mailboxes. You have received instructions from the CIO tochange the network to Exchange Server 2010. However, the CIO wants you to propose a solution for Mailboxes access that will keep the support and software cost to a minimum as well as ensuring access tothe public folders. What should you do?()
    A

    This can be accomplished using Personal Archive and forms-based authentication.

    B

    This can be accomplished by upgrading all client computers to Outlook 2010 and use Autodiscover.

    C

    This can be accomplished using Outlook Anywhere and changin the Outlook RPC encryption settings.

    D

    This can be accomplished using using POP3 and IMAP4 access.


    正确答案: D
    解析: 暂无解析