Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.
A.memory
B.control
C.monitor
D.charge
第1题:
●Traditional structured analysis techniques focus upon the flow of(71)within a system Object-oriented analysis emphasizes the building of real-world models It examines requirements from the perspective of the classes and objects found in the vocabulary of the(72)domain
Traditional system design method emphasizes the proper and effective structure of a complex systemObject-oriented design method encompasses the process of object-oriented decomposition and a(73)for depicting both logical and physical as well as static and dynamic models of the system under design
Object-oriented programming is a method of implementation in which programs are organized as cooperative collections of objects, each of which represents an(74)of some class, and whose classes are all members of a hierarchy of classes united via(75)relationships
(71)A.control B.program C.data D.reference
(72)A.problem B.solution C.data D.program
(73)A.mark B.picture C.symbol D.notation
(74)A.instance B.example C.existence D.implementation
(75)A.control B.inheritance C.inference D.connection
第2题:
● The program and the data are kept inside the computer in a place called
(73) .
(73)
A. bus
B. cache
C. CPU
D. memory
第3题:
● A (75) infected computer may lose its data.
(75)
A. file
B. data base
C. virus
D. program
第4题:
A transport layer protocol has several responsibilities. One is to create a process-to-process (program-to-program) communication; TCP uses port (71) to accomplish this. Another responsibility of a transport layer protocol is to create a (72) and error-control mechanism at the transport level. TCP uses a sliding (73) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (74) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (75) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.
(71)
A.numbers
B.connections
C.diagrams
D.resources
第5题:
The (1) program means a program written in a high-level language. It is generally translated to an (2) program, which is in a form. directly understandably by the computer.
The translation is usually done by a program called (3).
A.assemble
B.web
C.C
D.source
第6题:
The relational database model requires the data be(71)through programs that don't rely on the position of the data in the database. This is in direct(72)to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program(73)a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and(74)the information. The(75)on how the search is done are specific to the DBMS and vary from product to product.
A.accessed
B.moved
C.read
D.wrote
第7题:
The program and the data are kept inside the computer in a place called______.
A.bus
B.cache
C.CPU
D.memory
第8题:
program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.
A.Worm
B.Virus
C.Disaster
D.Demon
第9题:
第10题:
第11题:
A transport layer protocol has several responsibilities, One is to create a process-to-process (program-to-program) communication; TCP uses port (1) to accomplish this. Another responsibility of a transport layer protocol is to create a (2) and error-control mechanism at the transport level. TCP uses a sliding (3) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (4) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (5) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver. 空白(2)处应选择()
第12题:
adding
to have added
to add
added
第13题:
A(75) infected computer may lose its data.
A.file
B.database
C.Virus
D.program
第14题:
● A transport layer protocol has several responsibilities. One is to create a process-to-process (program-to-program) communication; TCP uses port (71) to accomplish this. Another responsibility of a transport layer protocol is to create a (72) and error-control mechanism at the transport level. TCP uses a sliding (73) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (74) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (75) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.
(71)
A. numbers
B. connections
C. diagrams
D. resources
(72)
A. procedure
B. function
C. route
D. flow
(73)
A. path
B. window
C. frame
D. diagram
(74)
A. packet
B. time
C. error
D. phase
(75)
A. ports
B. streams
C. packets
D. cells
第15题:
Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.
Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.
A.obvious
B.secret
C.important
D.easy
第16题:
The program memory serves basically as a place(66)instructions, the coded pieces of data(67)direct the activities of the control processing unit(CPU). A group of(68)related in- structions stored in memory is referred to as a program. The CPU "read" each instruction from memory a logically(69)sequence and "use" it to initiate program action. If the program structure is coherent and(70), processing procedures produce intelligible and useful results.
A.stored
B.to store
C.to be stored
D.storing
第17题:
Password is a secret series of(69)that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(70). The password helps ensure that(71)users do not access the computer. In addition, data files and programs may require a password.
A.symbol
B.sign
C.characters
D.characteristic
第18题:
We know a computer is a machine that processes data(stored in main memory)into information, under control of a stored program. We also know that, internally, a computer is a binary machine; thus the data and the program instruictions must be stored in binary form. Characters are represented in(71). Numbers are stored as binary numbers, with each bit's positional value significant. A computer's main memory is divided into bytes, words or both(depending on the system), and each of these basic storage units is assigned an(72). Using this address, the processor can read or write selected bytes or words.
The processor consists of a clock, an instruction control unit, an arithmetic and logic unit, and registers. Once a program is stored in main memory, the processor can begin to execute it. During(73), the instruction control unit fetches an instruction from main memory; during(74), the arithmetic and logic unit executes it. Precisely timed electronic pulses generated by the clock drive this basic(75)
A.a binary code
B.words
C.registers
D.positional values
第19题:
The(71) program is generally translated to an object program, which is in a form. directly understandably by the computer。
A.transfer
B.assemble
C.source
D.compile
第20题:
● (72) software, also called end-user program, includes database programs, word processors, spreadsheets etc.
(72)
A. Application
B. System
C. Compiler
D. Utility
第21题:
第22题:
第23题:
You run a Windows Defender scan on your computer. You notice a valid program listed in Quarantined Items. You need to use this program on your computer. What should you do?()