一起答
单选

CPU芯片的主要参数是(26)。

  • A.字长、主频
  • B.字长、主频、cache容量
  • C.字长、主频、外频、cache容量
  • D.字长、主频、外频、FSB、cache容量
参考答案
查看试卷详情
相关试题
  1. (82)

    • A.fabrication
    • B.falsification
    • C.stealing
    • D.rebuild
  2. (79)

    • A.decline
    • B.rejection
    • C.refusal
    • D.denial
  3. (81)

    • A.reason
    • B.assets
    • C.possession
    • D.component
  4. (80)

    • A.problems
    • B.flaws
    • C.defect
    • D.shortcoming
  5. (77)

    • A.search engine
    • B.search tools
    • C.database
    • D.computer
  6. In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.

     In security, an(71)is a form. of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or(72)of legitimate access to computing. A vulnerability is a weakness in the security system that might be exploited to cause loss or harm. A human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software(73). Finally, a control is a protective measure an action, a device, a procedure, or a technique - that reduces a vulnerability.  The major(74)of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and(75). The four threats all exploit vulnerabilities of the assets in computing systems.

    • A.betrayal
    • B.uncover
    • C.emerge
    • D.exposure
  7. (74)

    • A.relevant
    • B.irrelevant
    • C.complicated
    • D.complex
  8. (75)

    • A.concrete
    • B.special
    • C.specific
    • D.particular
  9. (76)

    • A.seeing
    • B.searching
    • C.browsing
    • D.looking for
  10. In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.It is more and more usual that users of Information Retrieval(IR)systems must face up to response of hundreds or thousands of(66)documents. A significant proportion of them are moreover(67)or redundant. This is a straight consequence of two well - known facts: the incessant growing of documental databases and the lack of ability of most users to define(68)information needs. In such a framework, further effective retrieval techniques are only part of the solution. Interfaces with alternative ways for organizing and(69)the results returned by a(70)would be of great utility assisting users to find relevant documents. Document clustering may play a central role as an effective technique for organizing query results.

    • A.replied
    • B.retrieved
    • C.received
    • D.relied