




版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領
文檔簡介
1、(1 A large main memory can be used forstoring a,b,c .a. datab. operating systemc. applicationsd. interface(2 Early computer solved c,d problems.a. controlb. business applicationsc. engineeringd. mathematical(3 The system manager used by a fast processor cana,b,c .a. reset a systemb. monitor processo
2、rs core temperaturec. monito r processors supply voltagesd. connect a network(4 We can say a bus is simply a,c,d .a. a group of wiresb. a wirec. a 8-bit busd. a 16-bit bus(5 A computer system user generally more cares for b,c,d .a. physical size of the computerb. storage sizec. speed of computationd
3、. efficiency of the computer(6 According to the physical size of computers we can classify thecomputers into a,b,c,d .a. microcomputerb. minicomputerc. mainframed. supercomputer(7 The basic hardware components of any computerinclude a,b,c,d .a. CPUb. main memoryc. input devicesd. output devices(8 Th
4、e following devices are belong to the mass storages a,b,d .a. DVDb. CD-ROMc. moused. disk(1 Cache is a,c,d .a. fastb. slowc. relatively smalld. high cost(2 Information stored in semiconductor RAMis b,c .a. permanentb. nonpermanentc. volatiled. non volatile(3 We use paged virtual memory to a,b,c,d.a.
5、 extend the size of memoryb. increase bandwidth of the diskc. reduce latency of the diskd. store large program and data set(4We read data on the disk by a,d .(5 The three desiderata of memory system are b,c .a.independentb. exclusivec.closely approximated todayd. Less approximated tomorrow(6 The pro
6、cessor performance would be high as wereference instructions and data from b,d.a. hard diskb. cachec. floppy diskd. memory(7 Page frame is used in a .a. real memoryb. virtual memoryc. diskd. cache(8 In order to increase our computers performancewe need to a,b,c ,a. have a L2 cacheb. buy a L2 cachec.
7、 have a much larger main memoryd. buy a L1 cache(1 RISC is b,c,d .a. abbreviation of complex instruction set computerb. abbreviation of reduced instruction set computerc. guided to be built from studying the executionbehavior of high-level language programsd. used for many computer manufacturersnowa
8、days(2 To enhance performance of a computer system weshould a,b,d .a. improve the pattern of referencing operandb. optimize the simple movement of datac. use IF and LOOP instructions as many aspossibled. optimize the basic sequence control mechanism(5 Register storage has b,d .a. a large capacityb.
9、a small capacityc. the slower speedd. the faster speed(6 Instruction format in RISC has a,c,d .a. one kindb. many kindsc. a few kindsd. one or a few kinds(7 CISC machine instructions compared with RISCmachine are a,d .a. more complicatedb. more simplec. more faster to be executedd. more slower to be
10、 executed(8 Functions of the compiler used in RISCare b,c,d .a. to compile a high level language programb. to optimize register usagec. to maximize register usaged. to allocate registers to those variables that willbeused the most in a given time period(9 One machine cycle in RISC has c .a. two mach
11、ine instructionsb. three machineinstructionsc. one machine instructiond. four machineinstructions(10 The register file is a,c,d .a. physically smallb. physically largec. one the same chip as the CPUd. addressed by much shorter addressesOperating systems and middleware b,c,da. have less in commonb. b
12、oth can support other softwarec. have much in commond. both can support application programs2. An operating system provides the services in itsAPI by a,c,da. using the features of the hardwareb. offering database accessibilityc. using disk drives abilityd. offering fixed-length blocks of data4. Midd
13、leware lies in b,c,da. the top of the layering vertical stackb. the middle of the layering vertical stackc. the top of an operating systemd. the middle of interactions between differentapplication programs5. The following products of software are belong tomiddleware a,b,ca. IBMs Web Sphere MQb. Java
14、 2 Platformc. J2EEd. Oracle6. A mechanism for translating Internet hostnamesinto IP addresses is a,c,da. typically outside of operating system kernelb. typically inside of operating system kernelc. equipped into the general-purpose operatingsystemd. as a middleware by authors definition7. With middl
15、eware we can b,c,da. run programs on a centralized computersystem onlyb. keep computations largely isolated fromundesirable interactionsc. run programs on different computer systemd. allow computations to communicate with oneanother8. Middleware has mechanisms to supportcontrolled interaction throug
16、h a,b,c,da. communicationb. namingc. persistent storaged. coordination1. Before you turn the power on with a newcomputer, you should make sure a,b,c,d.a. the computer is already out of the boxb. appropriate cables are correctly connectedc. the computer system has been set upd. appropriate software h
17、ave been installed2. An asleep state is a,c,d .a. a low power standby modeb. indicated by the indicator light putting outc. used for saving energyd. used to lessen wear-and tear on the computer4. During the boot procedure we can see a,b,conthe screen.a. amount of memoryb. the number of attached devi
18、cesc. the operating system being usedd. beeps and whirling noises5. A user interface we said here is a,b,d .a. an interaction between an operating system anda userb. an interaction between an applicationprogram and a userc. an interface between a computer and itsperipheral deviced. a text-based user
19、 interface or GUI6. Today Microsofts ope rating system Windows hasa variety of versions, they are a,b,c,d.a. Windows 2007b. Windows 2003c. Windows XPd. Windows vista7. The Windows desktop contains common elements,such as .a. desktop iconsb. taskbarc. Start buttond. task button9. With the window of t
20、he GUI we can use.a. menusb. dialog boxesc. iconsd. documents10. Main menu category in some Microsoftprograms .a. is a menu bar at the top of many windowsb. can display a pull-down menusc. cant display a drop-down menusd. can display personalized menus1. Upgrading a computer system means .a. buying
21、new hardwareb. buying new softwarec. extending the life of your current systemd. keeping your computer in present situation2. To formulate an upgrade strategy, you shouldconsider .a. the PC adheres to a well-supported standardb. you anticipate all your future needsc. there is room for additional exp
22、ansion cardsd. there is room for memory3. Some common hardware upgrades nclude.a. adding more RAMb. installingADSLc. adding an image scannerd. installing a color printer4. The ways to seriously upgrade an Intel 80486-based PC include .a. installing the most modern softwareb. replacing the motherboar
23、dc. replacing other items inside the system unitd. just purchasing a new PC5. Relationship between version and release in asoftware is .a. version has major numberb. release has minor numberc. version typically increase its number inincrements of 1d. release typically increase its number inincrement
24、s of 0.1 or 0.016. Compatible mode of the software products canbe categorized into .a. upwardb. downwardc. crossd. aboveall1. A Wide Area Network can.a. cover a wide geographical areab. link two or more LANsc. link two LANs onlyd. be created by individual users2. According to the flow of information
25、 on atransmission facility we can categorize WANinto network.a. circuit switchedb. packet switchedc. local aread. Lease d. line3. In packet switched networks data send in.a. byteb. piecesc. framed. packet4. The most important items contained in a packetshould be.a. data to be transmittedb. header of
26、 the packetc. tail of the packetd. date5. The popular approaches we used in the packetswitched network are .a. circuit switchingb. datagramc. virtual circuitd. real circuit6. In the datagram mode when datagrams arrive attheir destination, the datagrams .a. may be out of orderb. must be in orderc. sh
27、ould be reorderedd. may lose7. In the virtual circuit mode all packets sent by auser at a time belong to .a. a messageb. a sessionc. different messagesd. different sessions8. Main characteristics of the leased line networksare .a. the line is private for the userb. the user has himself inter-exchang
28、ec. very short response timed. the user computer is always physicallyconnected to the line8. Main characteristics of the leased line networksare .a. the line is private for the userb. the user has himself inter-exchangec. very short response timed. the user computer is always physicallyconnected to
29、the line9. A typical frame relay network has .a. seven componentsb. five componentsc. six componentsd. five major physical components and one"virtual" components10. Router has the following name .a. ARPANETb. IMP (Interface Message Processorc. gatewayd. IS (Intermediate System11. In Fig.4-
30、6 a router creates a logical pathbetween networks, these networksinclude .a. FDDIb. Token Busc. Token Ringd. Ethernet12. Encapsulation is used here for data deliveringon .a. the circuit switchingb. the physical pathc. the analog circuitd. the logical path1. Connecting to the Internet usually include
31、s thefollowing decisions type of .a. deviceb. connectionc. userd. Internet serviceprovider2. Which device can be used to access theInternet ? .a. PCb.DVDc. notebook computerd. Internetappliance3. Following device belongs to the one of dial-upconnection .a.HFCb. modemc. dedicate line devicedd. ADSL4.
32、 Using a PC we can retrieve much contents fromthe Web, they are .a. Web pagesb. multimedia contentsc. video clipsd. music files5. Mobile Web is used for usually.a. notebook computersb. mobile phonesc. handheld computersd. pagers6. When we use a dial-up connection to access theInternet, we need .a. a
33、 TV cableb. a regulartelephone linec. a modemd. a temporary IPaddress7. ADSL works at a rate of .a. asymmetric transmissionb. symmetric transmissionc. asymmetric transmission with 9Mb/sdownstreamd. asymmetric transmission with 16K-64Kb/supstream8. We can find the following facilities in an HFCsystem
34、 .a. optical fiberb. coaxial cablec. cable modemd. head end9. With the dedicated connection to connect theInternet we should .a. use dial-up connectionb. keep a continual connectionc. use a static IP addressd. keep a temporary connection10. If some one wants to use mobile wirelessconnection, he or h
35、er should have.a. mobile deviceb. a fixed radioconnectionc. Web-enable cell phoned. a mobile transceiver(1 The true goal of ERP is .a. to integrate all departmentsb. to integrate all functionsc. to work across a companyd.d.to work on a single computer system(2 To do ERP right the ways shouldchange.a
36、. people do their jobsb. you do business with ERPc. you do business without ERPd. people do their jobs with ERP(3 ERP can serve the needs of people in.a. financeb. human resourcesc. warehoused. all above(4 Real transformational ERP efforts usuallyrun .a. five yearsb. three yearsc. two yearsd. one ye
37、ar(5 A business process should include .a. order fulfillmentb. shipping goodsc. billing for the orderd. understanding the customers credit rating(6 Companies that measure their products by flowrather than individual units arecompanies.a. utilityb. oilc. chemicald. mechanicalparts(7 With ERP, the cus
38、tomer servicerepresentatives .a. are just typistsb. are no longer just typistsc. should be business peopled. should not be business people(8 With the manufacturing companiescansave time, increase productivity and reduceheadcount.a. standardizing manufacturing processesb. using a single, integrated c
39、omputer systemc. using ERPd. in-basket mode1. Internet telephony system aresystems.a. synchronous distributedb. asynchronous distributedc. so called as IP telephonyd. synchronous centralized2. The operating platforms that are currentlysupported by the various Internet telephonysystem include .a. QoS
40、b. UNIXc. Windowsd. Mac3. With an Internet telephone system developed byusing Java applet users should .a. have a standard web browser with Java supportb. install the telephony system every time theywant to talkc. worry about the underlying workings of atelephony systemd. have a network connection4.
41、 The following components are the basic ones ofan Internet telephony system .a. host computerb. modemc. local area networkd. router5. The communication process that the callerstelephony system handled includes .a. acquiring the real-time voice datab. digitizing the analogue signalsc. compressing the
42、 digitized datad. decrypting the digitized data6. The communication process that the recipientstelephony system handled includes .a. encrypting the digitized datab. receiving incoming datac. decompressing incoming datad. playing back on the audio output device7. The major problems encountered in the
43、 currentInternet telephone are .a. the working model of the best-effort Internetb. transmitting delayc. transmitting delay jittersd. packet loss8. We can find the following voice recoverymethods .a. silence substitutionb. waveform substitutionc. sample interpolationd. embedded speech coding9. When w
44、e make a distance telephony call suchas from Beijing to Guangzhou with Internettelephony system, we should paycommunication fees that include .a. transcontinental telephone callsb. local telephone callsc. ISPs feesd. nominal standard Internet connectivitycharges10. The current Internet telephony sys
45、tems .a. are launched as stand-alone applicationsb. must be downloaded prior to operationc. must purchase a new version of thesoftware of the system for upgradingd. must be installed prior to operation1. The Web took a bold step forward, it .a. was spurred by little-known technologiesb. was spurred by well-known technologiesc. shattered the traditional usage model ofthe Webd. kept the traditional usage model of theWeb2. In order to devel
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 延期協(xié)議書范本
- 綠色檢查通道合作協(xié)議
- 四年級數(shù)學(四則混合運算帶括號)計算題專項練習與答案匯編
- 三年級數(shù)學(上)計算題專項練習附答案集錦
- 關于做好安全生產(chǎn)工作防范化解風險隱患的提案
- 安徽省長豐縣高中英語 Unit 16 Stories Lesson 1 Stories from History教學實錄 北師大版選修6
- 彈簧秤(教學設計)-2023-2024學年小學生科學課后服務拓展
- 修公墓合同范本模板
- 厚街酒店蔬菜配送合同范本
- 中英文委托加工合同范例
- 2025年湖南水利水電職業(yè)技術學院單招職業(yè)技能測試題庫參考答案
- (部編版2025新教材)道德與法治一年級下冊-第1課《有個新目標》課件
- T∕ACSC 01-2022 輔助生殖醫(yī)學中心建設標準(高清最新版)
- 中國對蝦養(yǎng)殖技術操作規(guī)范.docx
- 巡檢記錄表模板
- comsol學生操作手冊4函數(shù)定義用戶指南
- 出口退稅手冊核銷操作步驟
- 潘通色卡TCX棉布色彩電子版查詢部分
- 第三章社科信息檢索原理與技術PPT課件
- 《當代廣播電視概論》試題A卷及答案
- DELL-PS系列存儲安裝手冊
評論
0/150
提交評論