一起答
单选

以下关于嵌入式系统的组成说法错误的是()。

  • A.在一片嵌入式处理器基础上添加电源电路、时钟电路和存储器电路,就构成了一个嵌入式核心控制模块,其中嵌入式操作系统和应用程序都可以固化在 RAM中
  • B.Cache位于主存和嵌入式微处理器内核之间,用于减小主存或辅助存储器对微处理器内核造成的存储器访问瓶颈,使处理速度更快,实时性更强
  • C.板级支持包(BSP)位于嵌入式系统硬件层和系统软件层之间,也称为硬件抽象层(HAL),它将系统上层软件与底层硬件分离开来,使系统的底层驱动程序与硬件无关
  • D.系统软件层位于嵌入式中间层和应用软件层之间,由RTOS;文件系统、GUI、网络系统及通用组件模块等组成。
参考答案
查看试卷详情
相关试题
  1. (74)

    • A.hypertext
    • B.computation
    • C.expectation
    • D.bookmark
  2. (75)

    • A.habits signature
    • B.site
    • C.tages
    • D.address
  3. (73)

    • A.victimized
    • B.personate
    • C.identity
    • D.control
  4. (72)

    • A.connecting
    • B.binding
    • C.looking
    • D.contenttagging
  5. Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to(71)Web sites without their knowledge or consent.  Pharming has been called "phishing without a lure."

    In phishing, the perpetrator sends out legitimate-(72)E-mails, appearing to come from some of the Web's most popular sites, in ah effort to obtain personal and financial information from individual recipients. But in pharming, larger numbers of computer users can be(73)because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form. of pharming attack, code sent in an E-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected(74)entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing(75).

    • A.few
    • B.fraudulent
    • C.normal
    • D.structured
  6. (70)

    • A.software
    • B.form
    • C.computer
    • D.silicon
  7. (69)

    • A.appliances
    • B.chips
    • C.tools
    • D.means
  8. (67)

    • A.operation
    • B.completeness
    • C.integrity
    • D.interchange
  9. (68)

    • A.identities
    • B.homogeneities
    • C.creations
    • D.operations
  10. With hundreds of millions of electronic(66)taking place daily, businesses and organizations have a strong incentive to protect the(67)of the data exchanged in this manner, and to positively ensure the(68)of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations,  and for deploying strong security mechanisms deeply and broadly throughout networked  infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(69)that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in(70)and integrating security provisions  at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.

    • A.devices
    • B.transactions
    • C.communications
    • D.businesses