重要提示:请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
首页 > 汉语言文学> 外国文学史
网友您好,请在下方输入框内输入要搜索的题目:
搜题
拍照、语音搜题,请扫码下载APP
扫一扫 下载APP
题目内容 (请给出正确答案)
[主观题]

选出应填入下面一段英语中______内的正确答案。 Since the time of John von Neumann, the basic conceptua

选出应填入下面一段英语中______内的正确答案。

Since the time of John von Neumann, the basic conceptual model used to think about computers and programs has(1)unchanged, in(2)of many advances in both hardware and software technology. In the(3)that von Neumann proposed, the basic instruction cycle is for the processor to fetch the instruction pointed at by the program counter,(4)the program counter, and then execute the instruction. Because instructions are executed strictly sequentially, there is little inherent parallelism, and(5)opportunity to employ large numbers of processors to gain speed.

供选择的答案:

(1) small (2) big (3) add (4) little (5) model

(6) remained (7) style (8) increase (9) stead (10) spite

(11) already (12) period (13) formula (14) decrease (15) not

答案
查看答案
更多“选出应填入下面一段英语中______内的正确答案。 Since the time of John von Neumann, the basic conceptua”相关的问题

第1题

选出应填入下面一段英语中______内的正确答案。 In a public-key cryptosystem, (1) encrypted with th

选出应填入下面一段英语中______内的正确答案。

In a public-key cryptosystem,(1)encrypted with the public key can only be deciphered with the private key from the same(2). Conversely,(1)encrypted with the private key can be decrypted only with the public key. Users can make their public keys(3)available or place them at a key distribution center or others to access. However, the private key must be(4)safe. In public-key systems there's no(5)to find a safe channel for communicating a shared secret key.

点击查看答案

第2题

选出应填入下面一段英语中______内的正确答案 The terms FIFO and LIFO refer to two techniques for (1

选出应填入下面一段英语中______内的正确答案

The terms FIFO and LIFO refer to two techniques for(1)with collection of items to which additions and(2)are to be made. The acronym FIFO(3)for first-in-first-out and LIFO represents last-in-first-out. Derived from business accounting and investing management(4), these techniques have found widespread application in computer science. For example, the LIFO technique has been used in the parsing techniques employed by compilers and in the(5)of data.

供选择的答案:

(1) producing (2) dealing (3) networking (4) searching

(5) deletions (6) locations (7) observations (8) notations

(9) stands (10) represents (11) finds (12) replaces

点击查看答案

第3题

选出应填入下面一段英语中______内的正确答案。 VRML is a (1) for 3D multimedia and shared virtual

选出应填入下面一段英语中______内的正确答案。

VRML is a(1)for 3D multimedia and shared virtual worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structured graphics, and extra(2)(z and time) to the presentation of documents. The applications of VRML are(3), ranging from simple business graphics to entertaining WWW page graphics, manufacturing, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communities.

X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwards(4)with VRML. Furthermore, it is componentized, profiled, and extensible, which makes it possible to use X3D in very different(5), from high-end visualizations to lightweight applications.

点击查看答案

第4题

选出应填入下面一段英语中______内的正确答案。 With hundreds of rrullions of electronic (1) taking

选出应填入下面一段英语中______内的正确答案。

With hundreds of rrullions of electronic(1)taking place daily, businesses and organizations have a strong incentive to protect the(2)of the data exchanged in this manner, and to positively ensure the(3)of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(4)that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in(5)and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.

点击查看答案

第5题

选出应填入下面一段英语中______内的正确答案。 Most IP layer-based proxy mechanisms, such as network a

选出应填入下面一段英语中______内的正确答案。

Most IP layer-based proxy mechanisms, such as network address translation (NAT), only support unidirectional proxy, from the internal network to external network (the Internet). The proxy establishes the communication channel by(1)IP addresses. The IP addresses must be(2). These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. IP layer-based proxy mechanisms need additional software(3)for each application that uses.(4)channels. SOCKS identifies communication targets through domain names, overcoming the restriction of using private IP addresses. SOCKS can use domain names to establish communication between separate LANs,with(5)IP addresses.

点击查看答案

第6题

选出应填入下面一段英语中______内的正确答案。 Prior to the UML, there was no clear leading (1) la

选出应填入下面一段英语中______内的正确答案。

Prior to the UML, there was no clear leading(1)language. Users had to choose. from among many similar modeling languages with minor differences in overall(2)power. Most of the modeling languages shared a set of commonly accepted concepts that are expressed slightly differently in various languages. This lack of(3)discouraged new users from entering the OO market and from doing OO modeling, without greatly expanding the power of modeling. Users longed for the industry to it adopt one, or a very few, broadly supported modeling languages suitable for(4)usage.

Some vendors were discouraged from entering the OO modeling area because of the need to support many similar, but slightly different, modeling languages. In particular, the supply of add-on tools has been depressed because small vendors cannot afford to support many different formats from many different(5)modeling tools. It is important to the entire OO industry to encourage broadly based tools and vendors, as well as niche products that cater to the needs of specialized groups.

点击查看答案

第7题

选出应填入下面一段英语中______内的正确答案。 When the system upon which a transport entity is runnin

选出应填入下面一段英语中______内的正确答案。

When the system upon which a transport entity is running fails and subsequently restarts, the(1)information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.

The still active side of a half-open connections can close the connection using a(2)timer. This timer measures the time transport machine will continue to await an(3)of a transmitted segment after the segment has been retransmitted the maximum number of times. When the timer(4)the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user.

In the event that a transport entity fails and quickly restart, half-open connections can be terminated more quickly by the use of the RST segment. The failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the(5)number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination.

点击查看答案

第8题

从供选择的答案中选出应填入下面一段英文中______内的正确答案。 In computers, encoding is the process o

从供选择的答案中选出应填入下面一段英文中______内的正确答案。

In computers, encoding is the process of putting a sequence of(1)characters (letters, numbers, punctuation, and certain symbols) into a specialized(2)format for efficient transmission or storage.(3)Decoding is the opposite process—the conversion of an encoded format back into the original(4)sequence of characters. Encoding and decoding are used in data communications, networking, and storage. The term is especially(5)applicable to radio (wireless) communications systems.

The terms encoding and decoding are often used in reference to the(6)processes of analog-to-digital conversion and digital-to-analog conversion. In this sense, these(7)terms can apply to any form of data, including text, images, audio, video,(8)multimedia, computer programs, or signals in sensors, telernetry, and control systems. Encoding should not be confused with encryption, a process in which data is deliberately altered so as to(9)concealits content. Encryption can be done without changing the particular(10)code that the content is in, and encoding can be done without deliberately concealing the content.

供选择的答案:

1.terms 2.Decoding 3.processes 4.format 5.code

6.multimedia 7.applicable 8.conceal 9.equence 10.characters

点击查看答案

第9题

从供选择的答案中选出应填入下面一段英文中______内的正确答案。 Video RAM means in general all forms of

从供选择的答案中选出应填入下面一段英文中______内的正确答案。

Video RAM means in general all forms of RAM used to(1). image data for the video display monitor. Somewhat confusingly, the most common(2)of video RAM is called Video RAM (VRAM). All types of video RAM are special(3)of dynamic RAM (DRAM). Video RAM is really a buffer(4)the processor and the display monitor and is often called the frame buffer. When(5)are to be sent to the display, they are first read by the processor as data from some form of main storage RAM and then(6)to video RAM. From video RAM (the frame buffer), the data is converted by a RAM digital-to-analog converter (RAMDAC) into analog(7)that are sent to the display presentation mechanism such as a cathode ray tube (CRT). Usually, video RAM comes in a 1 or 2 megabyte package and is(8)on the video or graphics card in the computer. Most forms of video RAM are dual-ported. While the processor is writing a new image to video RAM, the display is reading from video to(9)its current display content. The dual-port design is the main(10)between main storage RAM and video RAM.

供选择的答案:

1.difference 2.located 3.images 4.store 5.between

6.type 7.written 8.refresh 9.arrangements 10.signals

点击查看答案

第10题

从供选择的答案中,选出应填入下面叙述中______内的最确切的解答。 Soon, more of the information we recel

从供选择的答案中,选出应填入下面叙述中______内的最确切的解答。

Soon, more of the information we recelve via the internet could come(1)in digital wrappers.

Wrappers are made up(2)software code that's targeted to do specific things with the data(3)within them, such as helping to define queries for search engines. They also keep(4)from(5)access to that code.

点击查看答案

第11题

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 Mobile computers—which (1) laptop

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

Mobile computers—which(1)laptops, notebooks, subnotebooks and handhelds—(2)so ubiquitous in such a short time, no surprise to hear who say:"It will define the leading edge(3)the next five years or so."The most remarkable(4)mobile computers is the amount of data storage and memory packed(5)their tiny boxes. These devices not only handle windows easily but also run storage-hungry programs.

点击查看答案
下载APP
关注公众号
TOP
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案 购买前请仔细阅读《购买须知》
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《服务协议》《购买须知》
立即支付 系统将自动为您注册账号
已付款,但不能查看答案,请点这里登录即可>>>
请使用微信扫码支付(元)

订单号:

遇到问题请联系在线客服

请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示:请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
请用微信扫码测试
优题宝