-
Confidentiality of the message is not enough in a secure communication; ________ is also needed. The receiver needs to be sure of the sender’s identity.
-
A virus is a ( ) .
-
The software that controls the interaction between the input and output hardware is called BIOS,which stands of __________
-
A hardware or software malfunction can cause a system to ________.
-
Information Systems has a number of different areas of work:
-
To enhance performance of a computer system we should__________
-
Whereas the decimal system is based on 10, the ( ) system is based on 2. There are only two digits in the latter system, 0 and 1.
-
In SQL,______causes an object (a table, for example) to be created within the database.
-
what does " neural network " mean?
-
The Windows 2000 product line includes__________.
-
DTE is ( ).
-
a relational database is just only a collection of relations.
-
A LAN (Local area data networks) is a group of computers and the network devices connected together usually within the different buildings.
-
Floppy disks are the smallest type of storage, holding only 2.44MB.
-
The equipment ______.
-
The ____ turns the object file into an executable program.
-
With .NET, Microsoft is opening up a channel both to ________ in other programming languages and to non-.NET ________. (developers; components)
-
The network architecture is a layer-based.
-
The history of programming languages can be traced back almost to the invention of the ( )computer in th 1940s.
-
Database connection ( ) allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database.
-
Apple produced the first computer with a GUI
-
According to the text,the author mentions three of the most commonly used types of printer.They are ____________________.
-
Functions of the compiler used in RISC are __________
-
Computer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes:
-
A ____ is a device that enables the computer to handle sounds.
-
( )that ,I could do it much better.
-
A working GIS contains five key componets.They are ( ).
-
primary memory which is stored on chips located ________.
-
Similar to viruses, you can also find malicious code in ( ).
-
A general purpose computer has four main sections: ( ).
本网站数据均来自互联网 --2018