一起答
单选

(35)对系统程序员是透明的。

  • A.系列机各档不同的数据通路宽度、Cache存储器
  • B.系列机各档不同的数据通路宽度、虚拟存储器
  • C.程序状态字、指令缓冲寄存器
  • D.虚拟存储器、Cache存储器
参考答案
查看试卷详情
相关试题
  1. (45)

    • A.searched
    • B.checked
    • C.tested
    • D.detected
  2. (43)

    • A.visit
    • B.access
    • C.I/O
    • D.read/write
  3. (44)

    • A.power
    • B.rights
    • C.authorized
    • D.common
  4. (42)

    • A.reliable
    • B.secure
    • C.indestructible
    • D.steady
  5. Most computer systems are(71)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(72)to an outsider attack by preventing(73)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(74)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(75)by tools referred to as Intrusion Detection Systems.

    • A.vulnerable
    • B.week
    • C.sensitively
    • D.helpless
  6. (39)

    • A.off
    • B.offer
    • C.office
    • D.officer
  7. (40)

    • A.abort
    • B.about
    • C.above
    • D.Around
  8. (37)

    • A.ciphertext
    • B.hypertext
    • C.paintext
    • D.supertext
  9. (38)

    • A.browser
    • B.repeater
    • C.router
    • D.server
  10. Because Web servers are platform. and application(66), they can send or request data from legacy or external applications including databases. All replies, once converted into(67)mark - up language, can then be transmitted to a(68). Used in this way, Intranets can(69)lower desktop support costs, easy links with legacy applications and databases and,(70)all, ease of use.

    • A.coupled
    • B.dependent
    • C.independent
    • D.related