首页/ 题库 / [单选题]●The principle for a的答案

●The principle for a stack memory to store data is (72) .

单选题
2022-06-23 23:22
A、FIFO
B、random
C、FILO
D、other way
查看答案

正确答案
C

试题解析
【解析】堆栈存取数据的原则是先进后出。

标签:
感兴趣题目
The purpose of(66)is to enlarge the(67), the set of addresses a program can utilize. For example, it might contain twice as many addresses as main memory. A program using all of it, therefore, would not be able to fit in main memory all at once. Nevertheless, the computer could execute such a program by Copying into main memory those portions of the program needed at any given point during execution.To facilitate copying(66)into real memory, the operating system divides it into pages, each of which contains a fixed number of addresses. Each page is stored on a disk until ii is needed. When the page is needed, the operating system copies it from disk to main memory, translating the(68)into real addresses. The process of translating virtual addresses into real addresses is called(69). The copying of virtual pages from disk to main memory is known as(70)or swapping.
Which Coherence caching pattern matches the sequence of events ?()  1. Data is requested from cache  2. The requested data does not exist in the cache (cache miss)  3. The Coherence cache store is used to red data from the back-end persistent data source, and placed in ther cache  4. Data requested from the cache is returned to the caller
You are the network administrator for The sales department stores data on a server that runs Windows Server 2003. The backup schedule for the server includes a normal backup on Sundays and incremental backups on every other day of the week. The sales department data includes a report that is created by an automated process. The report is included in the standard backup schedule for the server. The automated process runs on Wednesdays and Sundays. The process overwrites the previous version of the report. You need to be able to restore the report if the standard backup is unavailable. You need to create an additional backup for the report. The backup for the report cannot interfere with other backup jobs. What should you do?()
The accounting manager wants you to create a form that when queried will display a calculated total of year-to-date actual expenditures for the fund code entered. The value needed to generate this summary data are stored in multiple tables. How would you define the data source for this data block without having the DBA create a database object? ()
●A (73) is a named memory block. By using its name, we can refer to the data stored in the memory block.
The principle for a stack memory to store data is
Computer (72 )is used to temporarily store data.
●The principle for a stack memory to store data is (72) .
Sales details are being stored on a daily basis in the SALES_2007 table. A large amount of data is added to the table daily. To save disk space, you issued the following command: ALTER TABLE sales_2007 COMPRESS FOR ALL OPERATIONS; What would be the outcome of this command?()
You are developing a data contract for a Windows Communication Foundation (WCF) service. The data in the data contract must participate in round trips. Strict schema validity is not required. You need to ensure that the contract is forward-compatible and allows new data members to be added to it. Which interface should you implement in the data contract class?()
Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
相关题目

The dataflow diagram is a graphical chart that depicts the flow of data among internal process, external entities, and data stores.

The ability to switch between different applications stored in memory is called .

A mnemonic is a ________ to help the memory
The company is starting a new advertising campaign to new customers to its stores

You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. 
You use the ClickOnce deployment methodology to distribute the application.  
You need to store application-specific data along with read/write permissions without requiring elevated permissions for the application. 
Where should you store the application data?()

●An instruction is made up of operations that (68) the function to be performed and operands that represent the data to be operated on.For example,if an instruction is to perform. the operation of (69) two numbers,it must know (70) the two numbers are.The processor′s job is to (71) instructions and operands from memory and to perform. each operation.Having done that,it signals memory to send it (72) instruction.smileskipsmokespecify(69)
The "main storage" normally means that part of internal storage into which instructions and other data must be loaded for subsequent execution or processing. In large computing systems, the term "main storage" is(71) to "memory". "Buffer" mainly indicates a special-purpose storage or storage area allowing, through(72) storage, the data transfer between two functional units having different transfer characteristics. A buffer storage is used between non-synchronized devices or where one is(73) and the other is parallel or between those having different trans far rates. "(74) (memory)" is also a special-purpose buffer storage, smaller and faster than main storage, used to hold a copy of instructions and data obtained from main storage and likely to be needed next by the processor. "Register" is commonly composed of a part of internal storage having a specified storage(75) and usually intended for a specific purpose.
An application needs to store a 5 MB JPEG image in a DB2 table. Which data type should be specified for the column that will be used for storing the image?()
● Stack is quite simple. Many computer systems have stacks built into their circuitry. They also have machine-level instructions to operate the hardware stack. Stack is (73)in computer systems.(73)
Stack is quite simple. Many computer systems have stacks built into their circuitry. They also have machine-level instructions to operate the hardware stack. Stack is(73)in computer systems.
You create a Web site that is for members only. The Web site allows members to create lists of users that have access to information about member profiles. The name of the list is stored in the listName variable. The user name of the user to whom access is given is stored in the username variable. You need to enable members to manage their lists of users. Which code segment should you use? ()
On a(71) memory system, the logical memory space available to the program is totally independent of the physical memory space.
On a(75)memory system,the logical memory space available to the program is totally independent of the physical memory space.
On a virtual memory system, the logical memory space available to the program is totally(14) of the physical memory space.
An application architecture specifies the technologies to be used to implement one or more information systems. It serves as an outline for detailed design, construction, and implementation. Given the models and details, include( ), we can distribute data and processes to create a general design of application architecture. The design will normally be constrained by architecture standards, project objectives, and ( ). The first physical DFD to be drawn is the( ). The next step is to distribute data stores to different processors. Data( ) are two types of distributed data which most RDBMSs support. There are many distribution options used in data distribution. In the case of ( )we should record each table as a data store on the physical DFD and connect each to the appropriate server.
Primary memory is stored on chips located(66). In addition, computers usually use disks as second memory, for example,(67)disks located inside the computer.
On a(72) memory system, the logical memory space available to the program is totally independent of the physical memory space.
A is the documentary attestation for the delivery of stores and spare parts()
A (An) __ is the documentary attestation for the delivery of stores and spare parts.
A(n)() is the documentary attestation for the delivery of stores and spare parts.
广告位招租WX:84302438

免费的网站请分享给朋友吧