网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

The program and the data are kept inside the computer in a place called______.

A.bus

B.cache

C.CPU

D.memory


参考答案

更多 “ The program and the data are kept inside the computer in a place called______.A.busB.cacheC.CPUD.memory ” 相关考题
考题 ● The program and the data are kept inside the computer in a place called (73) .A. bus B. cache C. CPU D. memory

考题 Data and program instructions are stored in () A、outputB、the processorC、storageD、program

考题 A(75) infected computer may lose its data.A.fileB.databaseC.VirusD.program

考题 ● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory

考题 ● A (75) infected computer may lose its data.(75)A. fileB. data baseC. virusD. program

考题 He kept chewing the inside his lip a lot, _____ into complete silence.A. freezeB. freezingC. frozenD. being frozen

考题 infected computer may lose its data.A.fileB.data baseC.virusD.program

考题 Digital computer is controlled by internally stored programs and(66) of using common storage for all or part of a program and also for all or part of the data necessary for the execution of the programs; executing user-written or user-designated programs; performing user-designated manipulation of digitally represented discrete data, including.(67) operations and logic operations; and executing programs that(68) themselves during their execution.Analog computer's operations are analogous to the(69) of another system and that accepts, processes, and produces analog data.(70) computer integrates analog computer components and digital computer components by interconnection of digital-to-analog converters and analog-to-digital converters.A.qualifiedB.competentC.capableD.able

考题 The program memory serves basically as a place(66)instructions, the coded pieces of data(67)direct the activities of the control processing unit(CPU). A group of(68)related in- structions stored in memory is referred to as a program. The CPU "read" each instruction from memory a logically(69)sequence and "use" it to initiate program action. If the program structure is coherent and(70), processing procedures produce intelligible and useful results.A.storedB.to storeC.to be storedD.storing

考题 Password is a secret series of(73) that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(74). The password helps ensure that(75) users do not access the computer. In addition, data files and programs may require a password.A.symbolB.signC.charactersD.characteristic

考题 which of the following actions will you not take before beginning installation or removal of anyNON-PNP hardware device inside the computer case?() A. Place all the hardware components in static proof bags.B. Remove all the jumpers from the motherboard.C. Switch off the main power and remove the power cordD. Use an anti-static wrist strap.E. Turn off the computer.F. Place the computer on the anti-static mat

考题 We know a computer is a machine that processes data(stored in main memory)into information, under control of a stored program. We also know that, internally, a computer is a binary machine; thus the data and the program instruictions must be stored in binary form. Characters are represented in(71). Numbers are stored as binary numbers, with each bit's positional value significant. A computer's main memory is divided into bytes, words or both(depending on the system), and each of these basic storage units is assigned an(72). Using this address, the processor can read or write selected bytes or words.The processor consists of a clock, an instruction control unit, an arithmetic and logic unit, and registers. Once a program is stored in main memory, the processor can begin to execute it. During(73), the instruction control unit fetches an instruction from main memory; during(74), the arithmetic and logic unit executes it. Precisely timed electronic pulses generated by the clock drive this basic(75)A.a binary codeB.wordsC.registersD.positional values

考题 Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.A.memoryB.controlC.monitorD.charge

考题 The CPU does not have to look(66)all of RAM to find the spot it needs. But RAM only(67)the data temporarily. As soon as you switch the computer(68), all that information disappears from the RAM. When you switch the computer on again, the RAM is(69), and ready(70)a new program and new data.A.onB.throughC.forD.down upon

考题 A computer virus is a computer program that is created to make and spread(71)of itself.A.programsB.virusC.copiesD.files

考题 program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.A.WormB.VirusC.DisasterD.Demon

考题 A computer program, orjust a program, is a sequence of (75) ,written to performa specified task with a computer.A.languagesB.instructionsC.programsD.functions

考题 A(74)translates a computer program written in a human-readable computer language into a form. that a computer can executablA.compilerB.linkerC.assemblerD.application

考题 Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?() A. Proper placement depends on the VLAN assignment.B. Place it outside the firewall.C. Place it inside the firewall to make design and management easier.D. Place it inside the firewall with multiple context modes connecting to all configured contexts.

考题 A ( ) translates a computer program written in a human-readable computer language into a form that a computer can execute.A.compiler B.linker C.assembler D.application

考题 A computer ( )is a program that maliciously causes unwanted behavior on a computer.A.software B.application C.virus D.process

考题 A______translates a computer program written in a human-readable computer language into a form that a computer can execute.A.compiler B.linker C.assembler D.application

考题 The document shall be kept in a secure place.A:stable B:safe C:steady D:solid

考题 which of the following actions will you not take before beginning installation or removal of anyNON-PNP hardware device inside the computer case?()A、Place all the hardware components in static proof bags.B、Remove all the jumpers from the motherboard.C、Switch off the main power and remove the power cordD、Use an anti-static wrist strap.E、Turn off the computer.F、Place the computer on the anti-static mat

考题 Which of the following is a distinguishing factor between data archiving and data backups?()A、Data archives are kept for disaster recovery purposes while data backups are kept for indefiniteperiods of time so that there is an information record.B、Data archives are kept for documentation purposes to easily recover data while data backupsare kept for immediate server recovery.C、Data archives are kept off-site for data warehousing purposes while data backups are keptlocally for immediate server recovery purposes.D、Data archives are kept for indefinite periods of time so there is a record while data backups arekept for disaster recovery purposes.

考题 You have two computers named Computer1 and Computer2. You migrate user state data from Computer1to Computer2. The migrated data contains several Microsoft Office Excel files. You need to ensure that youcan open the Excel files by using Excel on Computer2.  What should you do?()A、Install Office.B、Disable User Account Control (UAC).C、Modify the default program settings.D、Run Loadstate.exe /i:migapp.xml.

考题 单选题Which of the following is a distinguishing factor between data archiving and data backups?()A Data archives are kept for disaster recovery purposes while data backups are kept for indefiniteperiods of time so that there is an information record.B Data archives are kept for documentation purposes to easily recover data while data backupsare kept for immediate server recovery.C Data archives are kept off-site for data warehousing purposes while data backups are keptlocally for immediate server recovery purposes.D Data archives are kept for indefinite periods of time so there is a record while data backups arekept for disaster recovery purposes.