更多“controls the operation of the computer and performs it's data processing functions.A. ”相关问题
  • 第1题:

    Morrris, an attorney, performs 5 hours of legal work for Andy. Morrris 's normal billing rate is $120 per hour. Andy, a software consultant, gives Morrris a new computer for his office in payment of the bill. The computer's adjusted basis was $500 and its fair market value is $550. Morrris ' basis in the computer is ().

    A.$0

    B.$500

    C.$550

    D.$600

    E.$1,150


    答案:B

  • 第2题:

    Calculator is(66) for performing arithmetic operations, but that requires human intervention to alter its stored program, if any, and to initiate each operation or sequence of operations. A calculator performs some of the functions of a computer, but usually operates only with frequent human intervention.Microcomputer's processing unit consists of one or more microprocessors, and includes storage and input-output(67). Personal computer primarily intended for(68) use by an individual.(69) computer can be hand-carried for use in more than one location. Minicomputer is functionally intermediate between a microcomputer and a mainframe. And supercomputer has the highest processing speeds available at a given time for(70) scientific and engineering problems.

    A.suitable

    B.well-formed

    C.applicable

    D.usable


    正确答案:A

  • 第3题:

    Cloud computing is a type of Internetbased computing that provides shared computer processing resources and data to computers and other devices on demand. Advocates claim that cloud computing allows companies to avoid upfront infrastructure costs. Cloud computing now has few service form, but it is not including()

    AIaaS

    B.PaaS

    C.SaaS

    D.DaaS


    正确答案:D

  • 第4题:

    You install a custom application on a computer that runs Microsoft Windows XP. The application stores each user’s data in the %programfiles%\app1\data folder on the computer. You install the custom application on a computer that runs Windows Vista.On the Windows Vista computer, you back up the %programfiles%\app1\data folder and notice that the backup contains no data.You need to back up the application’s user data on the Windows Vista computer.What should you do?()

    A.A

    B.B

    C.C

    D.D


    参考答案:D

  • 第5题:

    program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.

    A.Worm

    B.Virus

    C.Disaster

    D.Demon


    正确答案:B

  • 第6题:

    ( )is a massive volume of structured and unstructured data so large it's difficult to process using traditional database or software technique.


    A. DatA.Processing system
    B. Big DatA.
    C.Date warehouse
    D.DBMS

    答案:B
    解析:
    大数据是存储大量的结构化和非结构化数据,且用常规的数据库和软件技术难以处理。

  • 第7题:

    Most operating systems have a standard set of ( ) to handle the processing of all input and output instructions.

    A.SPREADSHEET
    B.CONTROL INSTRUCTIONS
    C.I/O OPERATION
    D.DATA TABLE

    答案:B
    解析:
    翻译:多数操作系统都有一套标准的(71)去处理所有输入和输出指令。

    A. 电子表格 B. 控制指令 C. 输入输出系统 D. 数据表

  • 第8题:

    A router receives a packet from a neighbor with an MPLS shim header value of 0.What does the router do with this packet?()

    • A、It performs a label pop operation and an IP lookup.
    • B、It performs a label swap operation and an IP lookup.
    • C、It sends an error message toward the egress router.
    • D、It sends an error message toward the ingress router.

    正确答案:A

  • 第9题:

     Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()

    • A、 Default 
    • B、 SAFE 
    • C、 EXTERNAL_ACCESS 
    • D、 UNSAFE

    正确答案:C

  • 第10题:

    多选题
    What are two functions of a custom mapping module?()
    A

    records the token assertion

    B

    maps a STSUUSER input to a SAML token

    C

    looks up attributes in an external data source

    D

    maps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 protocol

    E

    maps a GUI XML attributes into UI controls that are used by the IBM Tivoli Federated Identity Manager Console to collect the input data


    正确答案: E,A
    解析: 暂无解析

  • 第11题:

    单选题
    You are a help desk technician for your company, which is in the process of deploying Windows XP Professional to all client computers. You upgrade Pierre’s Windows 98 portable computer to Windows XP Professional. After the upgrade, Pierre reports that some of his older software applications no longer work properly. Also, one of the hardware devices on his computer is not currently supported by Windows XP Professional. Pierre requests that you reinstall Windows 98 and all of his applications so that he can use his computer normally. You need to restore Pierre’s computer to its pre-upgraded state while retaining all of the applications,documents, and personal data on the computer. You want to accomplish this task in the minimum amount of time. What should you do?()
    A

    Copy Pierre’s documents and personal data to a shared folder on the network.

    B

    Reinstall Windows 98 and Pierre’s applications. 

    C

    Copy the documents and personal data to the My Documents folder on Pierre’s computer.

    D

    On Pierre’s computer, run Setup.exe from a Windows 98 installation CD. 

    E

    On Pierre’s computer, use the Add or Remove Programs Wizard to remove the Windows XP Professional Installation item. 

    F

    On Pierre’s computer, use a third-party disk-imaging software utility to apply a disk image that contains Windows 98 and Pierre’s applications.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    A router receives a packet from a neighbor with an MPLS shim header value of 0.What does the router do with this packet?()
    A

    It performs a label pop operation and an IP lookup.

    B

    It performs a label swap operation and an IP lookup.

    C

    It sends an error message toward the egress router.

    D

    It sends an error message toward the ingress router.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which statement is true about a running session that belongs to the online transaction processing (OLTP) group?()

    A. It permanently switches to the low_group consumer group if the session exceeds 10,000 I/O requests or 2,500 MB of data transfer.

    B. It performs the first 10000 I/O requests or 2,500 MB of data transfer in the LOW-GROUP consumer group, and then switches to the original group.

    C. It switches to the LOW_GROUP consumer group if the session exceeds 10000 I/O requests or 2500 MB of data transfer and returns to the original group after the operation.

    D. It switches to the LOW_GROUP consumer group if the session exceeds 10000 I/O requests or 2500MB of data transfer for queries, but not for data manipulation language (DML) operations.


    参考答案:D

  • 第14题:

    A router receives a packet from a neighbor with an MPLS shim header value of 0.What does the router do with this packet?()

    A. It performs a label pop operation and an IP lookup.

    B. It performs a label swap operation and an IP lookup.

    C. It sends an error message toward the egress router.

    D. It sends an error message toward the ingress router.


    参考答案:A

  • 第15题:

    Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.

    A.memory

    B.control

    C.monitor

    D.charge


    正确答案:C

  • 第16题:

    Whenever new information is entered, it must be stored somewhere in the computer's(70). RAM only(71)the data temporarily. That is, all information stored in the RAM will disappear if you switch the computer off.

    A.processor

    B.keyboard

    C.printer

    D.memory


    正确答案:D
    解析:译文:新数据输入电子计算机时,一定存放于计算机存储器中。

  • 第17题:

    Program(73)describes program's objectives, desired output, input data required, processing requirement, and documentation.

    A.specification
    B.flowchart
    C.structure
    D.address

    答案:C
    解析:
    程序规格说明书描述了程序的目标、预期的输出、所需的输入数据、处理的要求和文档。

  • 第18题:

    Program( )describes program's objectives,desired output,input data required,processing requirement,and documentation.

    A.specification
    B.flowchart
    C.structure
    D.address

    答案:A
    解析:

  • 第19题:

    Most operating systems have a standard set of ( ) to handle the processing of all input and output instructions.

    A.spreadsheet
    B.control instructions
    C. I/O operation
    D.datA.table

    答案:B
    解析:
    翻译:

    大多数操作系统都有一套标准的(71)处理所有的输入和输出指令。

    A. 电子表格 B. 控制指令

    C. I/O操作 D. 数据表

  • 第20题:

    During a cluster synchronization, an administrator inadvertently performs al ctrl ’C’ causing the synchronization to fail. After restarting the resynchronization, the administrator notices a message stating that a previous dare operation has been detected.  What is the best way to resolve this problem?()  

    • A、 Perform a ’Recover from HACMP Script Failure’.
    • B、 Perform a ’Release Lock Set By Dynamic Reconfiguration’.
    • C、 Perform a graceful stop an& start of all cluster processing.
    • D、 Perform a ’Restore HACMP Configuration Database from Active Configuration’.

    正确答案:B

  • 第21题:

    单选题
    A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()
    A

    Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.

    B

    Uninstall the payroll software to ensure confidentiality.

    C

    Have the director remove sensitive data before the computer will be repaired.

    D

    Perform needed repairs while avoiding sensitive data.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Application developers in TestKing.com create an assembly that contains a CLR function.This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set. Which permission set should you use?()
    A

    Default

    B

    SAFE

    C

    EXTERNAL ACCESS

    D

    UNSAFE


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    In which situation would you use the Oracle Shared Server configuration?()
    A

    when performing export and import using Oracle Data Pump

    B

    when performing backup and recovery operations using Oracle Recovery Manager

    C

    when performing batch processing and bulk loading operation in a data warehouse environment 

    D

    in an online transaction processing (OLTP) system where large number of client sessions are idle most of the time


    正确答案: D
    解析: 暂无解析