-
Videodisc and laser technology provide the ability to_________
-
According to BusinessWeek, the attacks reported in the first half of 2003 nearly match previous year's total number .
-
Microsoft Office Professional 2000 include__________.
-
A mechanism for translating Internet hostnames into IP addresses is__________
-
The aspect of that,New capabilities can be added to the software without major changes to the underlying architecture is called Extensibility .
-
which is the threat to computer security in the following choices ?
-
A ________ is a set of rules that controls the interaction of different devices in a network or internetwork.
-
Corel Painter offers both conventional and unconventional materials and tools for artists
-
____________, such as those supplied for OLE DB and ODBC, allow you to use data libraries designed for earlier data access technologies.
-
The dataflow diagram is a graphical chart that depicts the flow of data among internal process, external entities, and data stores
-
Which one is not a computer languages?
-
Some common applications related to electronic commerce are the following:
-
You can come with me to the museum this afternoon ( ) you don’t mind walking for half an hour.
-
Confidentiality of the message is not enough in a secure communication; ( ) is also needed. The receiver needs to be sure of the sender’s identity.
-
Middleware lies in__________
-
In the e-mail a user needs a message transfer agent
-
In modern computer it is increasingly common to integrate some peripherals into the motherboard itself
-
which is the threat to computer security in the following choices ?
-
A DVD holds even less information than a CD.
-
Computers cannot work without the instructions sets.
-
A motherboard provides physical sockets and slots as some peripheral interfaces
-
Enforcing security is one of the major tasks of the DBA.
-
In the case of a(n) _________, a program is translated into executable form and executed one statment at a time rather than being translated completely before execution.
-
Most wide area networks, such as the PSTN, not use a mesh (sometimes referred to as a network) topology.
-
A large main memory can be used for __________storing
-
Operating systems are not unique to their manufacturers.
-
According to Intel,there are ( )stages in the evlolution of e( )Business.
-
Any computer which is connected to the Internet can communicate with any other Internet computer thanks to the rules of IP.
-
The TCP/IP Internet protocol suite is formed from five standards
-
Your computer uses two types of memory: primary memory and secondary memory
本网站数据均来自互联网 --2018