重要提示:请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
首页 > 汉语言文学> 外国文学史
网友您好,请在下方输入框内输入要搜索的题目:
搜题
拍照、语音搜题,请扫码下载APP
扫一扫 下载APP
题目内容 (请给出正确答案)
[主观题]

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 When most people refer to multimedia,

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

When most people refer to multimedia, they generally mean the combination of two or more continuous media, usually with some user(1). In practice, the two media are normally audio and video, this is,(2)plus moving(3).

It should be obvious by now that transmitting multimedia material in uncompressed form is completely out of the(4). The only hope is that massive compression is possible. Fortunately, a large body of research over the past few decades has led to many compression techniques and algorithms that make multimedia transmission(5)

答案
查看答案
更多“从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 When most people refer to multimedia,”相关的问题

第1题

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 Applications put computers to practic

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

Applications put computers to practical business(1), but below the(2)it's the heart of an operating system-the kernel-that provides the technical wizardry to juggle multiple program,connect to networks and store(3)

A traditional kernel provides all the functions for applications.The kemel(4)memory, I/O devices and parcels out processor time.

The kernel also supports securityand fault(5), which is the ability to recover automatically when parts of the system fail.

点击查看答案

第2题

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 Software quality assurance is now an

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

Software quality assurance is now an(1)sub-discipline of software engineering. As Buckly and Oston point out,(2)software quality assurance is likely to lead to an ultimate(3)of software costs. However, the major hurdle in the path of software management in this area is the lack of(4)software standards. The development of accepted and generally applicable standards should be one ofthe principal goals of(5)in software engineering.

点击查看答案

第3题

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 Mobile computers—which (1) laptop

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

Mobile computers—which(1)laptops, notebooks, subnotebooks and handhelds—(2)so ubiquitous in such a short time, no surprise to hear who say:"It will define the leading edge(3)the next five years or so."The most remarkable(4)mobile computers is the amount of data storage and memory packed(5)their tiny boxes. These devices not only handle windows easily but also run storage-hungry programs.

点击查看答案

第4题

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。 (1) whether to go with a shared o

从下面提供的答案中选出应填入下列英文语句中______内的正确答案。

(1)whether to go with a shared or switched fast LAN technology once you start to max out your shared Ethernet of token-ring LAN is tough call. Users and analysts involved in(2)high-speed LANs have leamed the benefits of each. However there are trade-offs to each, and(3)which fast LAN technology to choose is critical for(4)network performance problems and(5)costly purchasing mistakes.

供选择的答案:

(1) avoiding (2) clipping (3) choosing (4) deciding

(5) dissolving (6) ensuring (7) evolving (8) implementing

(9) knowing (10) solving

点击查看答案

第5题

从供选择的答案中选出应填入下面一段英文中______内的正确答案。 In computers, encoding is the process o

从供选择的答案中选出应填入下面一段英文中______内的正确答案。

In computers, encoding is the process of putting a sequence of(1)characters (letters, numbers, punctuation, and certain symbols) into a specialized(2)format for efficient transmission or storage.(3)Decoding is the opposite process—the conversion of an encoded format back into the original(4)sequence of characters. Encoding and decoding are used in data communications, networking, and storage. The term is especially(5)applicable to radio (wireless) communications systems.

The terms encoding and decoding are often used in reference to the(6)processes of analog-to-digital conversion and digital-to-analog conversion. In this sense, these(7)terms can apply to any form of data, including text, images, audio, video,(8)multimedia, computer programs, or signals in sensors, telernetry, and control systems. Encoding should not be confused with encryption, a process in which data is deliberately altered so as to(9)concealits content. Encryption can be done without changing the particular(10)code that the content is in, and encoding can be done without deliberately concealing the content.

供选择的答案:

1.terms 2.Decoding 3.processes 4.format 5.code

6.multimedia 7.applicable 8.conceal 9.equence 10.characters

点击查看答案

第6题

选出应填入下面一段英语中______内的正确答案。 In a public-key cryptosystem, (1) encrypted with th

选出应填入下面一段英语中______内的正确答案。

In a public-key cryptosystem,(1)encrypted with the public key can only be deciphered with the private key from the same(2). Conversely,(1)encrypted with the private key can be decrypted only with the public key. Users can make their public keys(3)available or place them at a key distribution center or others to access. However, the private key must be(4)safe. In public-key systems there's no(5)to find a safe channel for communicating a shared secret key.

点击查看答案

第7题

选出应填入下面一段英语中______内的正确答案 The terms FIFO and LIFO refer to two techniques for (1

选出应填入下面一段英语中______内的正确答案

The terms FIFO and LIFO refer to two techniques for(1)with collection of items to which additions and(2)are to be made. The acronym FIFO(3)for first-in-first-out and LIFO represents last-in-first-out. Derived from business accounting and investing management(4), these techniques have found widespread application in computer science. For example, the LIFO technique has been used in the parsing techniques employed by compilers and in the(5)of data.

供选择的答案:

(1) producing (2) dealing (3) networking (4) searching

(5) deletions (6) locations (7) observations (8) notations

(9) stands (10) represents (11) finds (12) replaces

点击查看答案

第8题

选出应填入下面一段英语中______内的正确答案。 VRML is a (1) for 3D multimedia and shared virtual

选出应填入下面一段英语中______内的正确答案。

VRML is a(1)for 3D multimedia and shared virtual worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structured graphics, and extra(2)(z and time) to the presentation of documents. The applications of VRML are(3), ranging from simple business graphics to entertaining WWW page graphics, manufacturing, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communities.

X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwards(4)with VRML. Furthermore, it is componentized, profiled, and extensible, which makes it possible to use X3D in very different(5), from high-end visualizations to lightweight applications.

点击查看答案

第9题

选出应填入下面一段英语中______内的正确答案。 Most IP layer-based proxy mechanisms, such as network a

选出应填入下面一段英语中______内的正确答案。

Most IP layer-based proxy mechanisms, such as network address translation (NAT), only support unidirectional proxy, from the internal network to external network (the Internet). The proxy establishes the communication channel by(1)IP addresses. The IP addresses must be(2). These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. IP layer-based proxy mechanisms need additional software(3)for each application that uses.(4)channels. SOCKS identifies communication targets through domain names, overcoming the restriction of using private IP addresses. SOCKS can use domain names to establish communication between separate LANs,with(5)IP addresses.

点击查看答案

第10题

选出应填入下面一段英语中______内的正确答案。 When the system upon which a transport entity is runnin

选出应填入下面一段英语中______内的正确答案。

When the system upon which a transport entity is running fails and subsequently restarts, the(1)information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.

The still active side of a half-open connections can close the connection using a(2)timer. This timer measures the time transport machine will continue to await an(3)of a transmitted segment after the segment has been retransmitted the maximum number of times. When the timer(4)the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user.

In the event that a transport entity fails and quickly restart, half-open connections can be terminated more quickly by the use of the RST segment. The failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the(5)number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination.

点击查看答案

第11题

加密工具PGP用的是杂合加密算法,从下面列表中选出一正确答案。()

A.RSA和对称加密算法

B.Diffie-Hellman和传统加密算法

C.Elgamal和传统加密算法

D.RSA和Elgamal

点击查看答案
下载APP
关注公众号
TOP
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案 购买前请仔细阅读《购买须知》
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《服务协议》《购买须知》
立即支付 系统将自动为您注册账号
已付款,但不能查看答案,请点这里登录即可>>>
请使用微信扫码支付(元)

订单号:

遇到问题请联系在线客服

请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示:请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
请用微信扫码测试
优题宝