首页/ 题库 / [单选题]A( ) infected comput的答案

A( ) infected computer may lose its data.

单选题
2021-12-30 15:28
A、file
B、data base
C、virus
D、program
查看答案

正确答案
C

试题解析
感染病毒的计算机可能会丢失数据。

标签:
感兴趣题目
Any computer, be it a large PC or a small embedded computer, is useless if it has no means to interact with the outside worl
Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.
Password is a secret series of(73) that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(74). The password helps ensure that(75) users do not access the computer. In addition, data files and programs may require a password.

You install a custom application on a computer that runs Microsoft Windows XP. The application stores each user’s data in the %programfiles%\app1\data folder on the computer. You install the custom application on a computer that runs Windows Vista.
On the Windows Vista computer, you back up the %programfiles%\app1\data folder and notice that the backup contains no data.
You need to back up the application’s user data on the Windows Vista computer.
What should you do?()

In data communication, data link is those parts of two data terminal equipments that are controlled by a protocol along with the(71) data circuit, which together enable data(72). So-called protocol means, in short, a set of rules that determines the behavior. of functional units in achieving communication.Data circuit, however, consists of a pair of(73) transmission channels that provides a means of two-way data transmission. Between data switching exchanges, the data circuit may or may not include data circuit-terminating equipment (DCE), depending on the type of(74) used at the data switching exchange. Between a data station and a data switching exchange or data concentrator, the data circuit includes the DCE at the data station end, and may include equipment(75) to a DCE at the data switching exchange or dam concentrator location.
In a data warehouse environment, data is only valuable when it is organized and displayed as(75)
A small network may only connect two computers inside a home to share a single printer and Internet(69)
●A small network may only connect two computers inside a home to share a single printer and Internet (74) .
Why is it important to prevent the abuse of computer data bands?
● The program and the data are kept inside the computer in a place called(73) .(73)
● The program and the data are kept inside the computer in a place called (73) .
Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and (1) it into useful information information that can be used to increase revenue, (2) costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It (3) users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases.Although data mining is a (4) new term, the technology is not. Companies have used powerful computers to sift through volumes of supermarket scanner data and analyze market research reports for years. However, continuous innovations in computer processing power, disk storage, and statistical software are dramatically increasing the accuracy of analysis while driving (5) the cost.
相关题目
Free mail may be a good deal, ______ it has a hidden price.
program designed to destroy data on your computer which can travel to “infect ” other computers.( )
At home, viewers may have to learn to use TV monitor that functions more like a computer screen fronting for a hand disc full of all kinds of data
()is not a physical wall, but a lot of virtual data to protect the computer network.
A ______ infected computer may lose its data.
infected computer may lose its data.
A( ) infected computer may lose its data.
A (75) infected computer may lose its data.
A(75) infected computer may lose its data.
● A (75) infected computer may lose its data.(75)
Our company is a professional one,and you may rely()it.
A weather map is a synoptic data because it().
controls the operation of the computer and performs its data processing functions.
A computer can only do()you have instructed it to do.
() is not a physical wall, but a lot of virtual data to protect the computer network.
()is not a physical wall but a flow virtual data to protect the computer network.
() may be the first possible cause which makes the engine to lose power or slow down when it is running.
● The basic unit of measure in a computer system is the(72). It is the smallest unit in computing. There are some other measures in a computer, such as Kilobyte, Megabyte, Gigabyte and so on.(72)
The basic unit of measure in a computer system is the(72). It is the smallest unit in computing. There are some other measures in a computer, such as Kilobyte, Megabyte, Gigabyte and so on.
● A(75) is a device that enables data from one computer to travel to another computer by using telephone lines.
广告位招租WX:84302438

免费的网站请分享给朋友吧