网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

The(71)is a combination of keys that allows the user to activate a program function without clicking a series of menus options.

(71)A.shortcut-key

B.quick-key

C.fast-key

D.rapid-key


参考答案

更多 “ The(71)is a combination of keys that allows the user to activate a program function without clicking a series of menus options.(71)A.shortcut-keyB.quick-keyC.fast-keyD.rapid-key ” 相关考题
考题 ●In C program,all variables must be (70) before use,usually at the beginning of the function before any (71) statements.(70) A.statedB.writedC.illustratedD.declared(71) A.operateB.activeC.executableD.processing

考题 ● Accelerated analysis approaches emphasize the construction of (71) to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology, (72) reads the program code and automatically generates the equivalent system model, and the code can be obtained from (73) . All system analysis approaches require some form. of (74) whichincludes those techniques to be used to identify or extract system problems and solution requirements from user community. (75) is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities.(71)A. object modelsB. prototypesC. use casesD. components(72)A. eXtreme programmingB. model drivenC. reverse engineeringD. agile method(73)A. existing database and application programB. application program and user interfaceC. existing database and user interfaceD. existing database, application program and user interface(74)A. requirement discoveryB. business process redesignC. cause-and-effect analysisD. total quality management(75)A. Continuous process improvementB. Joint requirements planningC. Fact-findingD. Structured engineering

考题 The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).A.hubB.centerC.coreD.nucleus

考题 Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.A.obviousB.secretC.importantD.easy

考题 An application software is any program(68)to perform. a specific function directly for the user or, in some cases, for another application program.A.designB.designingC.designedD.praticed

考题 In C program, all variables must be(70)before use, usually at the beginning of the function before any(71)statements.A.statedB.writedC.illustratedD.declared

考题 is nonprogram text embedded in a program to explain its form. and function to human readers.A.CommandB.CompileC.CommentD.Statement

考题 What is the function of L2TP?() A.It allows L2F tunnels across the network.B.It allows GRE tunnels across the network.C.It allows PPTP tunnels across the network.D.It allows PPP to be tunneled across a network

考题 Which of the following BEST describes the function of hyperthreading support within a CPU?() A. Allows the core to create a separate space to process threadsB. Allows the processor to handle multiple threads per coreC. Allows the core to shift to a higher clock speed based on thread countD. Allows the processor to reject certain threads to increase performance

考题 Password is a secret series of(69)that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(70). The password helps ensure that(71)users do not access the computer. In addition, data files and programs may require a password.A.symbolB.signC.charactersD.characteristic

考题 A user invoking a user-defined function requires which DB2 privilege?() A.CALLB.USAGEC.EXECUTED.REFERENCES

考题 The(71) program is generally translated to an object program, which is in a form. directly understandably by the computer。A.transferB.assembleC.sourceD.compile

考题 In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.A.cooperatesB.coordinatesC.connectsD.mediates

考题 (75)A.Program analysisB.Function requirementC.Application analysisD.Physical model

考题 One function of the program is that it allows the owner to ______ at a distance.A. change some access details for switching on the laptopB. turn on the laptop by using the original passwordC. operate the laptop by means of an alternative passwordD. erase the information kept in the stolen laptop

考题 The objective of (71) is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is (72). Most information systems require data to be stored and retrieved, whether a small file, such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records. The second function is the (73), the processing required to access data, which often means database queries in Structured Query Language. The third function is the (请作答此空), which is the logic documented in the DFDs, use cases, and functional requirements. The fourth function is the presentation logic, the display of information to the user and the acceptance of the user's commands. The three primary hardware components of a system are (75). A. system requirements B. system architecture C.application logic D.application program

考题 What is the function of L2TP?()A、It allows L2F tunnels across the network.B、It allows GRE tunnels across the network.C、It allows PPTP tunnels across the network.D、It allows PPP to be tunneled across a network

考题 将适当的词语填入括号内:activate program()A、激活程序B、检查程序C、新程序D、更新程序

考题 下列哪项属于WIFI安全机制()。A、EAPB、RADIUSC、Per-Session Per User KeyD、Dynamic Keys

考题 在轨迹视图中有5种动画编辑模式分别是:()、()、()、Position Renges和()。A、Edit Keys,Edit Time,Edit Ranges,Function CaseB、Edit Key,Edit Time,Edit Ranges,Function CuresC、Edit Keys,Edit Time,Edit Ran,Function CuresD、Edit Keys,Edit Time,Edi Ranges,Function Cures

考题 A user invoking a user-defined function requires which DB2 privilege?()A、CALLB、USAGEC、EXECUTED、REFERENCES

考题 单选题Which of the following allows a program or port through a software firewall?()A ExceptionB Pass-throughC Port-forwardingD Punch-through

考题 多选题HSRP has been configured between two Company devices.  Which of the following describe  reasons for deploying HSRP? ()AHSRP provides redundancy and fault toleranceBHSRP allows one router to automatically assume the function of the second router if the second  router failsCHSRP allows one router to automatically assume the function of the second router if the second  router startsDHSRP provides redundancy and load balancing

考题 单选题What is the function of L2TP?()A It allows L2F tunnels across the network.B It allows GRE tunnels across the network.C It allows PPTP tunnels across the network.D It allows PPP to be tunneled across a network

考题 多选题Which two statements are true regarding working with dates?()AThe default internal storage of dates is in the numeric formatBThe default internal storage of dates is in the character formatCThe RR date format automatically calculates the century from the SYSDATE function and does not allow the user to enter the centuryDThe RR date format automatically calculates the century from the SYSDATE function but allows the user to enter the century if required

考题 单选题When using keyboard shortcuts, which keystroke combination allows users to erase a single word to the left of the cursor?()A Ctrl + aB Ctrl + eC Ctrl + uD Ctrl + w

考题 多选题TestKing.com has a SQL Server 2005 computer. You have been assigned the task of retrieving information about a user who is currently logged in. You need to create a function that returns scalar information about the activity time for a particular user. What are two possible ways to achieve this goal?()ACreate a function that returns a list of values that represent the login times for the given user.BCreate a function that returns a list of values that represent the people who have logged more hours than the current user has logged.CCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current day.DCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current month.