重要提示:请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
首页 > 汉语言文学> 外国文学史
网友您好,请在下方输入框内输入要搜索的题目:
搜题
拍照、语音搜题,请扫码下载APP
扫一扫 下载APP
题目内容 (请给出正确答案)
[主观题]

从供选择的答案中选出应填入下面一段英文中______内的正确答案。 Video RAM means in general all forms of

从供选择的答案中选出应填入下面一段英文中______内的正确答案。

Video RAM means in general all forms of RAM used to(1). image data for the video display monitor. Somewhat confusingly, the most common(2)of video RAM is called Video RAM (VRAM). All types of video RAM are special(3)of dynamic RAM (DRAM). Video RAM is really a buffer(4)the processor and the display monitor and is often called the frame buffer. When(5)are to be sent to the display, they are first read by the processor as data from some form of main storage RAM and then(6)to video RAM. From video RAM (the frame buffer), the data is converted by a RAM digital-to-analog converter (RAMDAC) into analog(7)that are sent to the display presentation mechanism such as a cathode ray tube (CRT). Usually, video RAM comes in a 1 or 2 megabyte package and is(8)on the video or graphics card in the computer. Most forms of video RAM are dual-ported. While the processor is writing a new image to video RAM, the display is reading from video to(9)its current display content. The dual-port design is the main(10)between main storage RAM and video RAM.

供选择的答案:

1.difference 2.located 3.images 4.store 5.between

6.type 7.written 8.refresh 9.arrangements 10.signals

答案
查看答案
更多“从供选择的答案中选出应填入下面一段英文中______内的正确答案。 Video RAM means in general all forms of”相关的问题

第1题

从供选择的答案中选出应填入下面一段英文中______内的正确答案。 In computers, encoding is the process o

从供选择的答案中选出应填入下面一段英文中______内的正确答案。

In computers, encoding is the process of putting a sequence of(1)characters (letters, numbers, punctuation, and certain symbols) into a specialized(2)format for efficient transmission or storage.(3)Decoding is the opposite process—the conversion of an encoded format back into the original(4)sequence of characters. Encoding and decoding are used in data communications, networking, and storage. The term is especially(5)applicable to radio (wireless) communications systems.

The terms encoding and decoding are often used in reference to the(6)processes of analog-to-digital conversion and digital-to-analog conversion. In this sense, these(7)terms can apply to any form of data, including text, images, audio, video,(8)multimedia, computer programs, or signals in sensors, telernetry, and control systems. Encoding should not be confused with encryption, a process in which data is deliberately altered so as to(9)concealits content. Encryption can be done without changing the particular(10)code that the content is in, and encoding can be done without deliberately concealing the content.

供选择的答案:

1.terms 2.Decoding 3.processes 4.format 5.code

6.multimedia 7.applicable 8.conceal 9.equence 10.characters

点击查看答案

第2题

选出应填入下面一段英语中______内的正确答案 The terms FIFO and LIFO refer to two techniques for (1

选出应填入下面一段英语中______内的正确答案

The terms FIFO and LIFO refer to two techniques for(1)with collection of items to which additions and(2)are to be made. The acronym FIFO(3)for first-in-first-out and LIFO represents last-in-first-out. Derived from business accounting and investing management(4), these techniques have found widespread application in computer science. For example, the LIFO technique has been used in the parsing techniques employed by compilers and in the(5)of data.

供选择的答案:

(1) producing (2) dealing (3) networking (4) searching

(5) deletions (6) locations (7) observations (8) notations

(9) stands (10) represents (11) finds (12) replaces

点击查看答案

第3题

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 (1) whether to go with a shared o

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

(1)whether to go with a shared or switched fast LAN technology once you start to max out your shared Ethernet of token-ring LAN is tough call. Users and analysts involved in(2)high-speed LANs have leamed the benefits of each. However there are trade-offs to each, and(3)which fast LAN technology to choose is critical for(4)network performance problems and(5)costly purchasing mistakes.

供选择的答案:

(1) avoiding (2) clipping (3) choosing (4) deciding

(5) dissolving (6) ensuring (7) evolving (8) implementing

(9) knowing (10) solving

点击查看答案

第4题

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 In object-oriented (1) , objects c

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

In object-oriented(1), objects can be viewed as reusable components, and once the programmer has developed a(2)of these components, he can(3)the amount of new coding required. But(4)a(2)is no simple task because the integrity of the original software design is critical. Reusability can be a mixed blessing for user, too, as a programmer has to be able to find the object he needs. But if(5)is your aim, reusability is worth the risk.

供选择的答案:

(1) complexity (2) creating (3)indisposing (4) library (5) maximize

(6) miniIruze (7) reading(8) procedure (9) productivity (10) programming

(11) security (12) using

点击查看答案

第5题

从供选择的答案中选出应填入下列英文语句中______内的正确答案。 The obvious advantage of a Graphical Us

从供选择的答案中选出应填入下列英文语句中______内的正确答案。

The obvious advantage of a Graphical User Interface (GUI) is to organize the computer to make(1)fromahuman(2), rather than to force users to adapt to the(3)of computers and software. GUI is converging to the point where a(4)person can walk up to a computer, experiment briefly with the mouse and the(5)objects on screen, and gain some understanding ofhow to accomplish basic tasks.

供选择的答案:

(1)iconic (2) converge (3) sense (4) use

(5) perspective (6) capable (7) peculiarities (8) imaging

点击查看答案

第6题

从供选择的答案中选出应填入下列英文语句中______内的正确答案。 The C programming language has (1)

从供选择的答案中选出应填入下列英文语句中______内的正确答案。

The C programming language has(1)one ofthe most(2)programming languages, and it has been implemented on most personal computers and multiuser systems, especially those designed for research and development. It evolved from the version described in Kernighan and Ritche's work (called "K&R C" after the authors) into(3)variants, including the standard ANSI C,which(4)many type-checking features and includes a standard library. Of the two main(5), K&R C is probably the most commonly used on multiuser computers, with ANSI C close behind. In the personal computing world, ANSI C is far more common.

供选择的答案:

(1) much (2) variants (3) complex (4) incorporates (5) several

(6) become (7) popular (8) editions (9) come (10) users

点击查看答案

第7题

选出应填入下面一段英语中______内的正确答案。 In a public-key cryptosystem, (1) encrypted with th

选出应填入下面一段英语中______内的正确答案。

In a public-key cryptosystem,(1)encrypted with the public key can only be deciphered with the private key from the same(2). Conversely,(1)encrypted with the private key can be decrypted only with the public key. Users can make their public keys(3)available or place them at a key distribution center or others to access. However, the private key must be(4)safe. In public-key systems there's no(5)to find a safe channel for communicating a shared secret key.

点击查看答案

第8题

选出应填入下面一段英语中______内的正确答案。 VRML is a (1) for 3D multimedia and shared virtual

选出应填入下面一段英语中______内的正确答案。

VRML is a(1)for 3D multimedia and shared virtual worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structured graphics, and extra(2)(z and time) to the presentation of documents. The applications of VRML are(3), ranging from simple business graphics to entertaining WWW page graphics, manufacturing, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communities.

X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwards(4)with VRML. Furthermore, it is componentized, profiled, and extensible, which makes it possible to use X3D in very different(5), from high-end visualizations to lightweight applications.

点击查看答案

第9题

选出应填入下面一段英语中______内的正确答案。 With hundreds of rrullions of electronic (1) taking

选出应填入下面一段英语中______内的正确答案。

With hundreds of rrullions of electronic(1)taking place daily, businesses and organizations have a strong incentive to protect the(2)of the data exchanged in this manner, and to positively ensure the(3)of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(4)that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in(5)and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.

点击查看答案

第10题

选出应填入下面一段英语中______内的正确答案。 Most IP layer-based proxy mechanisms, such as network a

选出应填入下面一段英语中______内的正确答案。

Most IP layer-based proxy mechanisms, such as network address translation (NAT), only support unidirectional proxy, from the internal network to external network (the Internet). The proxy establishes the communication channel by(1)IP addresses. The IP addresses must be(2). These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. IP layer-based proxy mechanisms need additional software(3)for each application that uses.(4)channels. SOCKS identifies communication targets through domain names, overcoming the restriction of using private IP addresses. SOCKS can use domain names to establish communication between separate LANs,with(5)IP addresses.

点击查看答案

第11题

选出应填入下面一段英语中______内的正确答案。 Prior to the UML, there was no clear leading (1) la

选出应填入下面一段英语中______内的正确答案。

Prior to the UML, there was no clear leading(1)language. Users had to choose. from among many similar modeling languages with minor differences in overall(2)power. Most of the modeling languages shared a set of commonly accepted concepts that are expressed slightly differently in various languages. This lack of(3)discouraged new users from entering the OO market and from doing OO modeling, without greatly expanding the power of modeling. Users longed for the industry to it adopt one, or a very few, broadly supported modeling languages suitable for(4)usage.

Some vendors were discouraged from entering the OO modeling area because of the need to support many similar, but slightly different, modeling languages. In particular, the supply of add-on tools has been depressed because small vendors cannot afford to support many different formats from many different(5)modeling tools. It is important to the entire OO industry to encourage broadly based tools and vendors, as well as niche products that cater to the needs of specialized groups.

点击查看答案
下载APP
关注公众号
TOP
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案 购买前请仔细阅读《购买须知》
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《服务协议》《购买须知》
立即支付 系统将自动为您注册账号
已付款,但不能查看答案,请点这里登录即可>>>
请使用微信扫码支付(元)

订单号:

遇到问题请联系在线客服

请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示:请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
请用微信扫码测试
优题宝