The(71)is a combination of keys that allows the user to activate a program function without clicking a series of menus options.(71)A.shortcut-keyB.quick-keyC.fast-keyD.rapid-key

题目

The(71)is a combination of keys that allows the user to activate a program function without clicking a series of menus options.

(71)A.shortcut-key

B.quick-key

C.fast-key

D.rapid-key


相似考题
更多“The(71)is a combination of keys that allows the user to activate a program function withou ”相关问题
  • 第1题:

    An application software is any program(68)to perform. a specific function directly for the user or, in some cases, for another application program.

    A.design

    B.designing

    C.designed

    D.praticed


    正确答案:C
    解析:应用软件是直接为用户设计的具有专门功能的软件,或在某些情况下,为另一种应用程序设计的软件。

  • 第2题:

    is nonprogram text embedded in a program to explain its form. and function to human readers.

    A.Command

    B.Compile

    C.Comment

    D.Statement


    正确答案:C
    解析:注释是嵌入到程序中的非程序文本,用来向阅读程序的人解释程序的结构和功能。

  • 第3题:

    Which of the following BEST describes the function of hyperthreading support within a CPU?()

    A. Allows the core to create a separate space to process threads

    B. Allows the processor to handle multiple threads per core

    C. Allows the core to shift to a higher clock speed based on thread count

    D. Allows the processor to reject certain threads to increase performance


    参考答案:B

  • 第4题:

    A user invoking a user-defined function requires which DB2 privilege?()

    A.CALL

    B.USAGE

    C.EXECUTE

    D.REFERENCES


    参考答案:C

  • 第5题:

    In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).

    An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.

    In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.

    A.cooperates

    B.coordinates

    C.connects

    D.mediates


    正确答案:C

  • 第6题:

    One function of the program is that it allows the owner to ______ at a distance.

    A. change some access details for switching on the laptop

    B. turn on the laptop by using the original password

    C. operate the laptop by means of an alternative password

    D. erase the information kept in the stolen laptop


    正确答案:A

  • 第7题:

    What is the function of L2TP?()

    • A、It allows L2F tunnels across the network.
    • B、It allows GRE tunnels across the network.
    • C、It allows PPTP tunnels across the network.
    • D、It allows PPP to be tunneled across a network

    正确答案:D

  • 第8题:

    下列哪项属于WIFI安全机制()。

    • A、EAP
    • B、RADIUS
    • C、Per-Session Per User Key
    • D、Dynamic Keys

    正确答案:A,B,C,D

  • 第9题:

    A user invoking a user-defined function requires which DB2 privilege?()

    • A、CALL
    • B、USAGE
    • C、EXECUTE
    • D、REFERENCES

    正确答案:C

  • 第10题:

    多选题
    HSRP has been configured between two Company devices.  Which of the following describe  reasons for deploying HSRP? ()
    A

    HSRP provides redundancy and fault tolerance

    B

    HSRP allows one router to automatically assume the function of the second router if the second  router fails

    C

    HSRP allows one router to automatically assume the function of the second router if the second  router starts

    D

    HSRP provides redundancy and load balancing


    正确答案: C,B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true regarding working with dates?()
    A

    The default internal storage of dates is in the numeric format

    B

    The default internal storage of dates is in the character format

    C

    The RR date format automatically calculates the century from the SYSDATE function and does not allow the user to enter the century

    D

    The RR date format automatically calculates the century from the SYSDATE function but allows the user to enter the century if required


    正确答案: C,D
    解析: 暂无解析

  • 第12题:

    多选题
    TestKing.com has a SQL Server 2005 computer. You have been assigned the task of retrieving information about a user who is currently logged in. You need to create a function that returns scalar information about the activity time for a particular user. What are two possible ways to achieve this goal?()
    A

    Create a function that returns a list of values that represent the login times for the given user.

    B

    Create a function that returns a list of values that represent the people who have logged more hours than the current user has logged.

    C

    Create a function that returns a numeric value that represents the number of hours that a user has logged for the current day.

    D

    Create a function that returns a numeric value that represents the number of hours that a user has logged for the current month.


    正确答案: D,A
    解析: 暂无解析

  • 第13题:

    In C program, all variables must be(70)before use, usually at the beginning of the function before any(71)statements.

    A.stated

    B.writed

    C.illustrated

    D.declared


    正确答案:D
    解析:译文:在一段C程序中,所有变量在使用前必须声明,通常在函数的可执行语句之前声明。

  • 第14题:

    What is the function of L2TP?()

    A.It allows L2F tunnels across the network.

    B.It allows GRE tunnels across the network.

    C.It allows PPTP tunnels across the network.

    D.It allows PPP to be tunneled across a network


    参考答案:D

  • 第15题:

    Password is a secret series of(69)that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(70). The password helps ensure that(71)users do not access the computer. In addition, data files and programs may require a password.

    A.symbol

    B.sign

    C.characters

    D.characteristic


    正确答案:D
    解析:本题意思为“密码是一组字符串…”,characteristic此处译为“字符串”。

  • 第16题:

    The(71) program is generally translated to an object program, which is in a form. directly understandably by the computer。

    A.transfer

    B.assemble

    C.source

    D.compile


    正确答案:C
    解析:源程序通常要翻译成目标程序,这才是计算机直接可理解的形式。

  • 第17题:

    (75)

    A.Program analysis

    B.Function requirement

    C.Application analysis

    D.Physical model


    正确答案:C

  • 第18题:

    The objective of (71) is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is (72). Most information systems require data to be stored and retrieved, whether a small file, such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records. The second function is the (73), the processing required to access data, which often means database queries in Structured Query Language. The third function is the (请作答此空), which is the logic documented in the DFDs, use cases, and functional requirements. The fourth function is the presentation logic, the display of information to the user and the acceptance of the user's commands. The three primary hardware components of a system are (75).


    A. system requirements
    B. system architecture
    C.application logic
    D.application program

    答案:C
    解析:
    架构设计的目标是确定应用软件的哪些部分将被分配到何种硬件。识别出正在开发系统的主要软件构件并分配到系统将要运行的硬件构件。所有软件系统可分为四项基本功能。首项是数据存储。大多数信息系统需要数据进行存储并检索,无论是一个小文件,比如一个字处理器产生的一个备忘录,还是一个大型数据库,比如存储一个企业会计记录的数据库。第二项功能是数据访问逻辑,处理过程需要访问数据,这通常是指用SQL进行数据库查询。第三项功能是应用程序逻辑,这些逻辑通过数据流图,用例和功能需求来记录。第四项功能是表示逻辑,给用户显示信息并接收用户命令。一个系统的三类主要硬件构件是客户机、服务器和网络。

  • 第19题:

    将适当的词语填入括号内:activate program()

    • A、激活程序
    • B、检查程序
    • C、新程序
    • D、更新程序

    正确答案:A

  • 第20题:

    在轨迹视图中有5种动画编辑模式分别是:()、()、()、Position Renges和()。

    • A、Edit Keys,Edit Time,Edit Ranges,Function Case
    • B、Edit Key,Edit Time,Edit Ranges,Function Cures
    • C、Edit Keys,Edit Time,Edit Ran,Function Cures
    • D、Edit Keys,Edit Time,Edi Ranges,Function Cures

    正确答案:D

  • 第21题:

    单选题
    Which of the following allows a program or port through a software firewall?()
    A

    Exception

    B

    Pass-through

    C

    Port-forwarding

    D

    Punch-through


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    What is the function of L2TP?()
    A

    It allows L2F tunnels across the network.

    B

    It allows GRE tunnels across the network.

    C

    It allows PPTP tunnels across the network.

    D

    It allows PPP to be tunneled across a network


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    When using keyboard shortcuts, which keystroke combination allows users to erase a single word to the left of the cursor?()
    A

    Ctrl + a

    B

    Ctrl + e

    C

    Ctrl + u

    D

    Ctrl + w


    正确答案: A
    解析: 暂无解析