网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
( ):a fault in a machine, especially in a computer system or program

A. Debug
B. Bug
C. Fault
D. Default

参考答案

参考解析
解析:程序错误:机器中的故障,尤指计算机系统或程序中的故障。
更多 “( ):a fault in a machine, especially in a computer system or program A. Debug B. Bug C. Fault D. Default ” 相关考题
考题 ● (71) means that a program written for one computer system can be compiled and run on another system with little or no modification.(71)A. PortabilityB. ReliabilityC. AvailabilityD. Reusability

考题 which descnption is NOT true?A.Personal computer has not the features of the larger system.B.Large systems offer higher processing speeds for user and return more data than PCs.C.Output devices take output results from the CPU in machine-coded form. and conven them into a form. that used by people.D.The input/output devices and auxiliary storage units of a computer system are called peripherals.

考题 A(n) ______ is a destructive program that fills a computer system with self-replicating information,clogging the system so that its operations are slowed or stopped.A.wormB.macroC.CIHD.Trojan

考题 The Turing machine is an abstract(71)of computer execution and storage introduced in 1936 by Alan Turing to give a mathematically precise definition of(72). or 'mechanical procedure'. As such it is still widely used in theoretical computer science, especially in(73)theory and the theory of computation. The thesis that states that Turing machines indeed capture the informal notion of effective or mechanical method in logic and mathematics is known as Turing's thesis.Every Turing machine computes a certain(74)partial function over the strings over its alphabet. In that sense it behaves like a computer with a fixed program. However, as Alan luring already described, we can encode the action table of every Turing machine in a string. Thus we might try to construct a Turing machine that expects on its tape a string describing an action table followed by a string describing the input tape, and then computes the tape that the encoded Turing machine would have computed. As Turing showed, such a luring machine is indeed possible and since it is able to simulate any other Turing machine it is called a(75)Turing machine.A universal Turing machine is Turing complete. It can calculate any recursive function, decide any recursive language, and accept any recursively enumerable language. According to the Church-Turing thesis, the problems solvable by a universal Turing machine are exactly those problems solvable by an algorithm or an effective method of computation, for any reasonable definition of those terms.A.implementB.patternC.toolD.model

考题 ______means that a program written for one computer system can be compiled and run on another system with little or no modification.A.PortabilityB.ReliabilityC.AvailabilityD.ReusabilityA.B.C.D.

考题 A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?() A. Perform an antivirus program scanB. Boot the machine into Safe ModeC. Remove the machine from the networkD. Check for system security patches

考题 The most important program on any computer is (73) .A.Office 2000B.VirusC.softwareD.Operating System

考题 We know a computer is a machine that processes data(stored in main memory)into information, under control of a stored program. We also know that, internally, a computer is a binary machine; thus the data and the program instruictions must be stored in binary form. Characters are represented in(71). Numbers are stored as binary numbers, with each bit's positional value significant. A computer's main memory is divided into bytes, words or both(depending on the system), and each of these basic storage units is assigned an(72). Using this address, the processor can read or write selected bytes or words.The processor consists of a clock, an instruction control unit, an arithmetic and logic unit, and registers. Once a program is stored in main memory, the processor can begin to execute it. During(73), the instruction control unit fetches an instruction from main memory; during(74), the arithmetic and logic unit executes it. Precisely timed electronic pulses generated by the clock drive this basic(75)A.a binary codeB.wordsC.registersD.positional values

考题 Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.A.memoryB.controlC.monitorD.charge

考题 You want to upgrade a Windows NT Server 4.0 computer to Windows 2000 Server. The system partition uses the FAT file system.You start the Setup program by starting the computer from the Windows 2000 Server CD-ROM.However, you receive the following error message, "You chose to install Windows 2000 on a partition that contains another operating system. Installing Windows 2000 on this partition might cause the operating system to function improperly".You are unable to perform. the upgrade. What should you do to resolve the problem?A.Convert the system partition to NTFS.B.Disable Advanced Configuration and Power Interface (ACPI) support for the computer.C.Restart the computer, and then run Winnt32.exe from the Windows NT Server 4.0 environment.D.Remove the Windows 2000 Server CD-ROM and restart the computer by using the setup floppy disks.

考题 Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers. You purchase a new computer. You install Microsoft Windows Vista on the new computer. You need to migrate the following content from the old computer to the new computer:All system and program settingsAll users settingsOnly the content in the C:\Appdata folderWhich tool should you use?()A.AB.BC.CD.D

考题 In software engineering the design phase is divided into( )。A.system design and detailed designB.computer design and program designC.system design and hardware designD.computer design and detailed design

考题 program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.A.WormB.VirusC.DisasterD.Demon

考题 A computer program, orjust a program, is a sequence of (75) ,written to performa specified task with a computer.A.languagesB.instructionsC.programsD.functions

考题 ● The most important program on any computer is (73) .(73)A. Office 2000B. VirusC. softwareD. Operating System

考题 ( )is a subset of artificial intelligence in the field of computer science that often uses statistical techniques to give computers the abillity to mlGarnr,(i.e.,progressively improve performance on a specific task)with data.Without being explitiy?programmed.A.Machine learning B.Program language learning C.Natural language learning D.Statistical?learning

考题 A computer ( )is a program that maliciously causes unwanted behavior on a computer.A.software B.application C.virus D.process

考题 In software engineering the design phase is divided into ( ). A.system design and detailed design B.computer design and program design C.system design and hardware design D.computer design and detailed design

考题 A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A、system /vB、winnt /sC、sfc /scannowD、chkdsk /f

考题 对于安装在windows操作系统的CTI平台服务器(假设安装路径是C:///Program Files/HuaWei,且合设了WAS),如果IP地址变更,以下哪些配置文件需要修改()。A、C:///Program Files/HuaWei/was/apache-tomcat/conf/was.xmlB、C:///Program Files/HuaWei/ICDCfgSvr/ICD3Cnfg.datC、C:///Windows/System32/icdcomm.cfgD、注册表:计算机/HKEY_LOCAL_MACHINE/SOFTWARE/HUAWEI/CCSE、注册表:计算机/HKEY_LOCAL_MACHINE/SOFTWARE/HUAWEI/CTI

考题 A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()A、Application logB、File Replication logC、System logD、Security log

考题 Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN.  What should you do?()A、Use the Mobile PC program.B、Use the Ease of Access program.C、Use the System and Maintenance program.D、Use the Network and Sharing Center program.

考题 Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers.  You purchase a new computer. You install Microsoft Windows Vista on the new computer.  You need to migrate the following content from the old computer to the new computer: All system and program settings  All users settings  Only the content in the C:///Appdata folder  Which tool should you use? ()A、File and Settings Transfer wizardB、Application Compatibility toolkitC、Windows Automated Installation toolkitD、Microsoft Windows Easy Transfer wizard

考题 单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A system /vB winnt /sC sfc /scannowD chkdsk /f

考题 单选题A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()A Perform an antivirus program scanB Boot the machine into Safe ModeC Remove the machine from the networkD Check for system security patches

考题 单选题A user reports that their machine seems to be running slower than usual. The user states that the computer has become progressively worse as more applications are installed. Which of the following is the FIRST step the technician should take?()A Run the CHKDSK utilityB Run the disk defragmenter utilityC Increase the capacity on the system volumeD Convert to a dynamic drive on the system

考题 单选题Just as the value of a telephone network increases with each new phone _____ to the system, so does the value of a computer system increase with each program that turns out.A addingB to have addedC to addD added