● The computer you are using is protected usually by (75) .(75)A. passwordB. keyC. mouseD. USB

题目

● The computer you are using is protected usually by (75) .

(75)

A. password

B. key

C. mouse

D. USB


相似考题
参考答案和解析
正确答案:A

试题(75)参考译文
    您所用的计算机通常用口令来保护。
参考答案
    (75)A
更多“● The computer you are using is protected usually by (75) . (75)A. password B. key C. mou ”相关问题
  • 第1题:

    ● A (75) system placed between the company network and the outside world may limit outside access to the internal network.

    (75)

    A. firewall

    B. modem

    C. gateway

    D. key


    正确答案:A

  • 第2题:

    ● Computer(75) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.

    (75)A. storage B. device C. network D. processor


    正确答案:C

  • 第3题:

    A(75)system placed between the company network and the outside world may limit outside access to the internal network.

    A.firewall

    B.modem

    C.gateway

    D.key


    正确答案:A

  • 第4题:

    Computer(75)is a complex consisting of two or moreconnected computing units, it is used for the purpose of data communication and resource sharing.

    A.storage

    B.device

    C.network

    D.processor


    正确答案:C
    解析:计算机网络是由两个或两个以上计算装置组成的复合体,旨在用于数据通信和资源共享。

  • 第5题:

    ●Computers will become more advanced and they will also become easier to use.

    Improved speed recognition will make the operation of a computer easier. Virtual reality(虚拟现实), the technology of (71) with a computer using all of the human senses, will also contribute to better human and computer (72). Other, exotic (奇异的) models of computation are being developed, including biological computing that uses living organisms, molecular computing that uses molecules with particular (73), and computing that uses DNA, the basic unit of heredity(遗传), to store data and carry out operations. These are examples of possible future computational platforms that, so far, are limited in abilities or are strictly (74) . Scientists investigate them because of the physical limitations of miniaturizing circuits embedded in silicon. There are also (75) related to heat generated by even the tiniest of transistors.

    (71) A.interact

    B.interacting

    C.communicate

    D.using

    ( 72) A .interfaces

    B.behavior

    C.similarities

    D.comparison

    (73) A.software

    B.properties

    C.programs

    D.hardware

    ( 74) A.empirical

    B.real

    C. practical

    D. theoretical

    ( 75) A. developments

    B.advantages

    C. limitations

    D. improvements


    正确答案:B,A,B,D,C

  • 第6题:

    Password is a secret series of(73) that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(74). The password helps ensure that(75) users do not access the computer. In addition, data files and programs may require a password.

    A.symbol

    B.sign

    C.characters

    D.characteristic


    正确答案:D