Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet

题目

Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.

A.memory

B.control

C.monitor

D.charge


相似考题
更多“Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet ”相关问题
  • 第1题:

    ●Traditional structured analysis techniques focus upon the flow of(71)within a system Object-oriented analysis emphasizes the building of real-world models It examines requirements from the perspective of the classes and objects found in the vocabulary of the(72)domain

    Traditional system design method emphasizes the proper and effective structure of a complex systemObject-oriented design method encompasses the process of object-oriented decomposition and a(73)for depicting both logical and physical as well as static and dynamic models of the system under design

    Object-oriented programming is a method of implementation in which programs are organized as cooperative collections of objects, each of which represents an(74)of some class, and whose classes are all members of a hierarchy of classes united via(75)relationships

    (71)A.control B.program C.data D.reference

    (72)A.problem B.solution C.data D.program

    (73)A.mark B.picture C.symbol D.notation

    (74)A.instance B.example C.existence D.implementation

    (75)A.control B.inheritance C.inference D.connection


    正确答案:C,A,D,A,B
    【解析】(参考译文)传统的结构化分析技术关注系统内部数据的流动。面向对象分析方法强调建立现实世界的模型。面向对象分析方法从问题域中的类与对对象的角度考查需求。
    传统的系统设计方法强调正确有效的分析复杂系统的结构。面向对象的设计方法强调面向对象的结构过程,强调描述所设计系统中的逻辑的、物理的、静态的、动态的模型。
    面向对象的程序设计是一种系统实施方法,在这种方法中,程序是通过互相合作的对象集合组织起来的,其中每个对象都是有某些类的一个实例,而这些类又都是通过继承关系构建起来的类等级体系的成员。

  • 第2题:

    ● The program and the data are kept inside the computer in a place called

    (73) .

    (73)

    A. bus

    B. cache

    C. CPU

    D. memory


    正确答案:D

    试题(73)参考译文
    在计算机中存放程序和数据的地方称为内存。
    参考答案
    (73)D

  • 第3题:

    ● A (75) infected computer may lose its data.

    (75)

    A. file

    B. data base

    C. virus

    D. program


    正确答案:C

  • 第4题:

    A transport layer protocol has several responsibilities. One is to create a process-to-process (program-to-program) communication; TCP uses port (71) to accomplish this. Another responsibility of a transport layer protocol is to create a (72) and error-control mechanism at the transport level. TCP uses a sliding (73) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (74) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (75) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.

    (71)

    A.numbers

    B.connections

    C.diagrams

    D.resources


    正确答案:A

  • 第5题:

    The (1) program means a program written in a high-level language. It is generally translated to an (2) program, which is in a form. directly understandably by the computer.

    The translation is usually done by a program called (3).

    A.assemble

    B.web

    C.C

    D.source


    正确答案:D

  • 第6题:

    The relational database model requires the data be(71)through programs that don't rely on the position of the data in the database. This is in direct(72)to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program(73)a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and(74)the information. The(75)on how the search is done are specific to the DBMS and vary from product to product.

    A.accessed

    B.moved

    C.read

    D.wrote


    正确答案:A

  • 第7题:

    The program and the data are kept inside the computer in a place called______.

    A.bus

    B.cache

    C.CPU

    D.memory


    正确答案:D
    解析:在计算机中存放程序和数据的地方称为内存。

  • 第8题:

    program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.

    A.Worm

    B.Virus

    C.Disaster

    D.Demon


    正确答案:B

  • 第9题:

    ( ), also called end-user program, includes database programs, spreadsheets, word processors etc.

    A. Application software
    B. Utility software
    C. System software
    D. Compiler software

    答案:A
    解析:
    翻译:应用软件也称为最终用户程序,包括数据库程序、电子表格、文字处理器等。

  • 第10题:

    A( )infected computer may lose its datA.

    A.file
    B.data base
    C.virus
    D.program

    答案:C
    解析:
    感染病毒的计算机可能使数据丢失。

  • 第11题:

    A transport layer protocol has several responsibilities, One is to create a process-to-process (program-to-program) communication; TCP uses port (1) to accomplish this. Another responsibility of a transport layer protocol is to create a (2) and error-control mechanism at the transport level. TCP uses a sliding (3) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (4) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (5) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver. 空白(2)处应选择()

    • A、procedure
    • B、function
    • C、route
    • D、flow

    正确答案:D

  • 第12题:

    单选题
    Just as the value of a telephone network increases with each new phone _____ to the system, so does the value of a computer system increase with each program that turns out.
    A

    adding

    B

    to have added

    C

    to add

    D

    added


    正确答案: C
    解析:
    句意:正如电话网络中每加入一部电话,这个网络的价值就会增加,计算机系统中每添加一个程序,这个系统的价值也会增加。本题使用just as…so的句型,意为“正如…也”。由于已经有了谓语动词increases,所以add只能用其非谓语形式,又因被修饰的名词phone与动词add之间是动宾关系,所以应用add的过去分词,表示被动的含义。

  • 第13题:

    A(75) infected computer may lose its data.

    A.file

    B.database

    C.Virus

    D.program


    正确答案:C
    解析:感染病毒的计算机可能会丢失数据。

  • 第14题:

    ● A transport layer protocol has several responsibilities. One is to create a process-to-process (program-to-program) communication; TCP uses port (71) to accomplish this. Another responsibility of a transport layer protocol is to create a (72) and error-control mechanism at the transport level. TCP uses a sliding (73) protocol to achieve flow control. It uses the acknowledgment packet, time-out, and retransmission to achieve (74) control. The transport layer is also responsible for providing a connection mechanism for the application program. The application program sends (75) of data to the transport layer. It is the responsibility of the transport layer at the sending station to make a connection with the receiver.

    (71)

    A. numbers

    B. connections

    C. diagrams

    D. resources

    (72)

    A. procedure

    B. function

    C. route

    D. flow

    (73)

    A. path

    B. window

    C. frame

    D. diagram

    (74)

    A. packet

    B. time

    C. error

    D. phase

    (75)

    A. ports

    B. streams

    C. packets

    D. cells


    正确答案:A,D,B,C,B

  • 第15题:

    Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.

    Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.

    A.obvious

    B.secret

    C.important

    D.easy


    正确答案:B

  • 第16题:

    The program memory serves basically as a place(66)instructions, the coded pieces of data(67)direct the activities of the control processing unit(CPU). A group of(68)related in- structions stored in memory is referred to as a program. The CPU "read" each instruction from memory a logically(69)sequence and "use" it to initiate program action. If the program structure is coherent and(70), processing procedures produce intelligible and useful results.

    A.stored

    B.to store

    C.to be stored

    D.storing


    正确答案:B

  • 第17题:

    Password is a secret series of(69)that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(70). The password helps ensure that(71)users do not access the computer. In addition, data files and programs may require a password.

    A.symbol

    B.sign

    C.characters

    D.characteristic


    正确答案:D
    解析:本题意思为“密码是一组字符串…”,characteristic此处译为“字符串”。

  • 第18题:

    We know a computer is a machine that processes data(stored in main memory)into information, under control of a stored program. We also know that, internally, a computer is a binary machine; thus the data and the program instruictions must be stored in binary form. Characters are represented in(71). Numbers are stored as binary numbers, with each bit's positional value significant. A computer's main memory is divided into bytes, words or both(depending on the system), and each of these basic storage units is assigned an(72). Using this address, the processor can read or write selected bytes or words.

    The processor consists of a clock, an instruction control unit, an arithmetic and logic unit, and registers. Once a program is stored in main memory, the processor can begin to execute it. During(73), the instruction control unit fetches an instruction from main memory; during(74), the arithmetic and logic unit executes it. Precisely timed electronic pulses generated by the clock drive this basic(75)

    A.a binary code

    B.words

    C.registers

    D.positional values


    正确答案:A

  • 第19题:

    The(71) program is generally translated to an object program, which is in a form. directly understandably by the computer。

    A.transfer

    B.assemble

    C.source

    D.compile


    正确答案:C
    解析:源程序通常要翻译成目标程序,这才是计算机直接可理解的形式。

  • 第20题:

    ● (72) software, also called end-user program, includes database programs, word processors, spreadsheets etc.

    (72)

    A. Application

    B. System

    C. Compiler

    D. Utility


    正确答案:A

  • 第21题:

    Program( )describes program's objectives,desired output,input data required,processing requirement,and documentation.

    A.specification
    B.flowchart
    C.structure
    D.address

    答案:A
    解析:

  • 第22题:

    The objective of (71) is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is (72). Most information systems require data to be stored and retrieved, whether a small file, such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records. The second function is the (73), the processing required to access data, which often means database queries in Structured Query Language. The third function is the (请作答此空), which is the logic documented in the DFDs, use cases, and functional requirements. The fourth function is the presentation logic, the display of information to the user and the acceptance of the user's commands. The three primary hardware components of a system are (75).


    A. system requirements
    B. system architecture
    C.application logic
    D.application program

    答案:C
    解析:
    架构设计的目标是确定应用软件的哪些部分将被分配到何种硬件。识别出正在开发系统的主要软件构件并分配到系统将要运行的硬件构件。所有软件系统可分为四项基本功能。首项是数据存储。大多数信息系统需要数据进行存储并检索,无论是一个小文件,比如一个字处理器产生的一个备忘录,还是一个大型数据库,比如存储一个企业会计记录的数据库。第二项功能是数据访问逻辑,处理过程需要访问数据,这通常是指用SQL进行数据库查询。第三项功能是应用程序逻辑,这些逻辑通过数据流图,用例和功能需求来记录。第四项功能是表示逻辑,给用户显示信息并接收用户命令。一个系统的三类主要硬件构件是客户机、服务器和网络。

  • 第23题:

    You run a Windows Defender scan on your computer.  You notice a valid program listed in Quarantined Items.  You need to use this program on your computer.  What should you do?()

    • A、Reinstall the application to another location.
    • B、Restore the program from the Quarantined Items list.
    • C、Remove the program from the Quarantined Items list.
    • D、Repair the program from the Programs option in Control Panel.

    正确答案:B