一起答
单选

黑木崖研究所的软件设计师梅超疯委托另一软件设计师月芙蓉开发一套人脸识别系统,并向其提供了本单位一台IBM笔记本电脑。月芙蓉按照梅超疯的设计思想完成了该软件系统的开发,并获得了40万元(RMB)的报酬。事先两人签订书面合同,合同写明软件著作权由两人共享。那么依据《计算机软件保护条例》,该软件的著作权由(70)享有。

  • A.梅超疯
  • B.月芙蓉和梅超疯
  • C.梅超疯的单位
  • D.梅超疯及其单位
参考答案
查看试卷详情
相关试题
  1. (78)

    • A.that
    • B.what
    • C.which
    • D.those
  2. (75)

    • A.and
    • B.however
    • C.but
    • D.therefore
  3. (77)

    • A.W/S
    • B.S/C
    • C.B/S
    • D.C/S
  4. (76)

    • A.that
    • B.which
    • C.where
    • D.whit which
  5.   Remote administration types are an example of one kind of(71)malicious software, the Trojan horse, or more simply Trojan. The purpose of these programs isn't replication,(72)to penetrate and control. That masquerade as one thing when in fact they are something else, usually something destructive. There are a number of kinds of Trojans, including spybots, (73) report on the Web sites a computer user visits, and keybots or keyloggers, which record and report the user's keystrokes in order to discover passwords and other confidential information.

     RATS attempt to give a remote intruder administrative control of an infected computer. They work as(74)pairs. The server resides on the infected machine, while the client resides elsewhere, across the network, where it's available to a remote intruder. Using standard TCP/IP or UDP protocols, the client sends instructions to the server. The server does(75) it's told to do on the infected computer.

    • A.nonviral
    • B.unviral
    • C.inviral
    • D.abviral
  6. (73)

    • A.20
    • B.10
    • C.24
    • D.25
  7. (72)

    • A.20
    • B.10
    • C.24
    • D.12
  8. (70)

    • A.减少寄存器
    • B.增加寻址方式
    • C.限制访问内存
    • D.增加通道
  9. 现需要一个32M×8规格的存储器,现只有规格为1M×8的存储器芯片,则需要(49)个这样的存储器芯片。存储芯片的地址长度需要(50)位,主存储器的地址长度需要(51)位。

    • A.16
    • B.18
    • C.32
    • D.8
  10. (69)

    • A.尽可能多用原有
    • B.增加
    • C.软件固化
    • D.不用