重要提示:请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
首页 > 汉语言文学> 外国文学史
网友您好,请在下方输入框内输入要搜索的题目:
搜题
拍照、语音搜题,请扫码下载APP
扫一扫 下载APP
题目内容 (请给出正确答案)
[主观题]

从供选择的答案中,选出最确切的解答。 DOM is a platform-and language (1) API that allows programs

从供选择的答案中,选出最确切的解答。

DOM is a platform-and language(1)API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incoporporated back into the presented(2). DOM is a(3)-based API to documents, which requires the whole document to be represented in(4)while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large(5)documents that do not fit into the memory available for processing.

答案
查看答案
更多“从供选择的答案中,选出最确切的解答。 DOM is a platform-and language (1) API that allows programs”相关的问题

第1题

从供选择的答案中,选出最确切的解答。 Originally introduced by Netscape Conununications, (1) are a

从供选择的答案中,选出最确切的解答。

Originally introduced by Netscape Conununications,(1)are a general mechanism which HTTP Server side applications, such as CGI(2), can be used to both store and retrieve information on the HTTP(3)side of the connection. Basically, Cookies can be used to compensate for the(4)nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities ofWWW-based(5)

点击查看答案

第2题

从供选择的答案中,选出最确切的解答。 (1) analysis emphasizes the drawing of pictorial system mode

从供选择的答案中,选出最确切的解答。

(1)analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems. Ultimately, the' system models become the(2)for designing and constructing an improved system.(3)is such a technique. The emphasis in this technique is process-centered. Systems analysts draw a series ofprocess models called(4).(5)is another such technique that integrates data and process concerns into constructs called objects.

点击查看答案

第3题

从供选择的答案中,选出应填入下面叙述中______内的最确切的解答。 Soon, more of the information we recel

从供选择的答案中,选出应填入下面叙述中______内的最确切的解答。

Soon, more of the information we recelve via the internet could come(1)in digital wrappers.

Wrappers are made up(2)software code that's targeted to do specific things with the data(3)within them, such as helping to define queries for search engines. They also keep(4)from(5)access to that code.

点击查看答案

第4题

从供选择的答案中,选出应填入下面叙述中______内的最确切的解答。 MIMD systems can be classified into

从供选择的答案中,选出应填入下面叙述中______内的最确切的解答。

MIMD systems can be classified into(1)oriented systems, high-availability systems and response-oriented systems. The goal of(1)oriented multiprocess is to obtain high(1)(2)minimal computing cost. The techniques employed by multiprocessor operating systems to achieve this goal take advantage of an inherent processing versus input/output balance in the workload to produce(3)and(4)loading ofsystem(5)

点击查看答案

第5题

从供选择的答案中,选出最确切的解答。 WebSQL is a SQL-like (1) language for extracting information

从供选择的答案中,选出最确切的解答。

WebSQL is a SQL-like(1)language for extracting information from the web. Its capabilities for performing navigation of web(2)make it a useful tool for automating several web-related tasks that require the systematic processing of either all the links in a(3), all the pages that can be reached from a given URL through(4)that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common(5)Interface.

点击查看答案

第6题

从供选择的答案中,选出应填入下面叙述中______内的最确切的解答。 Basically,a firewall is a (1) proc

从供选择的答案中,选出应填入下面叙述中______内的最确切的解答。

Basically,a firewall is a(1)process or a set ofintegrated processes that runs on a router or(2)to control the flow of networked application traffic(3)through it.Typically, firewalls are placed on the entry point to a(4)network such as the Internet. They could be considered traffic cops. The firewall's(5)is to ensure that all communication between an organization's network and the Internet conform to the organization's security policies.

点击查看答案

第7题

从供选择的答案中,选出最确切的解答。 Virtualization is an approach to IT that pools and shares (1)

从供选择的答案中,选出最确切的解答。

Virtualization is an approach to IT that pools and shares(1)so that utilization is optimized and supplies automatically meet demand. Traditional IT environments are often silos, where both technology and human(2)are aligned around an application or business function. With a virtualized(3), people, processes, and technology are focused on meeting service levels,(4)is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexible. We offer a broad spectrum of virtualization(5)that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources.

点击查看答案

第8题

从供选择的答案中,选出最确切的解答。 Most computer systems are (1) to two different groups of att

从供选择的答案中,选出最确切的解答。

Most computer systems are(1)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(2)to an outsider attack by preventing(3)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(4)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(5)by tools referred to as Intrusion Detection Systems.

点击查看答案

第9题

从供选择的答案中,选出最确切的解答。 A typical (1) language contains an applicative sub-language

从供选择的答案中,选出最确切的解答。

A typical(1)language contains an applicative sub-language which approximates the mathematical abstractions of "timeless" functions applied to "spaceless" values, where the actual operation sequences and use of storage space during expression evaluation are organized behind the(2). In this setting, values are data structures of low volume, typically afew computer words or less, which means that an illusion of "spacelessness" can be realized by having(3)results during expression evolution stored at the discretion of the language implementation, and effecting parameter(4)and(5)operations through value copying.

点击查看答案

第10题

从供选择的答案中,选出最确切的解答。 MIDI enables people to use (1) computers and electronic musi

从供选择的答案中,选出最确切的解答。

MIDI enables people to use(1)computers and electronic musical instruments. There are actually three components to MIDI, the communications"(2)",the Hardware Interface and a distribution(3)called "Standard MIDI Files".In the context of the WWW, the most interesting component is the(4)Format. In principle,MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol(5)are stored in MIDI fles, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use of MIDI today.

点击查看答案
下载APP
关注公众号
TOP
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案 购买前请仔细阅读《购买须知》
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《服务协议》《购买须知》
立即支付 系统将自动为您注册账号
已付款,但不能查看答案,请点这里登录即可>>>
请使用微信扫码支付(元)

订单号:

遇到问题请联系在线客服

请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示:请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
请用微信扫码测试
优题宝