一起答
单选

在信息资源管理的框架中,(41)既不是数据资源管理的核心,也不为MIS、DSS以及基于知识的系统提供基础数据。

  • A.数据库
  • B.业务
  • C.产品
  • D.事务处理系统(TPS)
参考答案
查看试卷详情
相关试题
  1. (82)

    • A.fabrication
    • B.falsification
    • C.stealing
    • D.rebuild
  2. (79)

    • A.decline
    • B.rejection
    • C.refusal
    • D.denial
  3. (81)

    • A.reason
    • B.assets
    • C.possession
    • D.component
  4. (80)

    • A.problems
    • B.flaws
    • C.defect
    • D.shortcoming
  5. (77)

    • A.search engine
    • B.search tools
    • C.database
    • D.computer
  6. In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.

     In security, an(71)is a form. of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or(72)of legitimate access to computing. A vulnerability is a weakness in the security system that might be exploited to cause loss or harm. A human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software(73). Finally, a control is a protective measure an action, a device, a procedure, or a technique - that reduces a vulnerability.  The major(74)of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and(75). The four threats all exploit vulnerabilities of the assets in computing systems.

    • A.betrayal
    • B.uncover
    • C.emerge
    • D.exposure
  7. (74)

    • A.relevant
    • B.irrelevant
    • C.complicated
    • D.complex
  8. (75)

    • A.concrete
    • B.special
    • C.specific
    • D.particular
  9. (76)

    • A.seeing
    • B.searching
    • C.browsing
    • D.looking for
  10. In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.It is more and more usual that users of Information Retrieval(IR)systems must face up to response of hundreds or thousands of(66)documents. A significant proportion of them are moreover(67)or redundant. This is a straight consequence of two well - known facts: the incessant growing of documental databases and the lack of ability of most users to define(68)information needs. In such a framework, further effective retrieval techniques are only part of the solution. Interfaces with alternative ways for organizing and(69)the results returned by a(70)would be of great utility assisting users to find relevant documents. Document clustering may play a central role as an effective technique for organizing query results.

    • A.replied
    • B.retrieved
    • C.received
    • D.relied