首页
题目
TAGS
首页
/
题库
/
[单选题]Computer (72 )is use的答案
搜答案
Computer (72 )is used to temporarily store data.
单选题
2022-06-23 23:22
A、CPU
B、disk
C、memory
D、I/O
查看答案
正确答案
C
试题解析
标签:
感兴趣题目
A location where data can be temporarily Stored.
The principle for a stack memory to store data is
Computer()is used to temporarily store dat。
Computer (72 )is used to temporarily store data.
●The principle for a stack memory to store data is (72) .
The exchange with the store clerk (line 86) is used to represent ______.
●OS can use (72) memory to run processes that require more main memory than is actually available.(72)
● Since RAM is only active when the computer is on, your computer uses disto store information even when the computer is off. Which of the following itrue? (74)(74)
Since RAM is only active when the computer is on, your computer uses disk to store information even when the computer is off. Which of the following is true?(74).
Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
相关题目
()is not a physical wall, but a lot of virtual data to protect the computer network.
() is not a physical wall, but a lot of virtual data to protect the computer network.
()is not a physical wall but a flow virtual data to protect the computer network.
Your network contains a client computer named Computer1 that runs Windows 7. Computer1 is configured to use DirectAccess. You need to identify the URL of the network location server that Computer1 is configured to use. What should you do?()
The display screen is the most common (72) device used to show you what the computer is doing.
An application architecture specifies the technologies to be used to implement one or more information systems. It serves as an outline for detailed design, construction, and implementation. Given the models and details, include( ), we can distribute data and processes to create a general design of application architecture. The design will normally be constrained by architecture standards, project objectives, and ( ). The first physical DFD to be drawn is the( ). The next step is to distribute data stores to different processors. Data( ) are two types of distributed data which most RDBMSs support. There are many distribution options used in data distribution. In the case of ( )we should record each table as a data store on the physical DFD and connect each to the appropriate server.
● The personal computer or (72) is the smallest general-purpose computer.(72)
●A computer virus is a computer program that is created to make and spread (72) of itself.
●A computer virus is a computer program that is created to make and spread (72) of itself.
Since RAM is only active when the computer is on, your computer uses diskto store information even when the computer is off. Which of the following istrue? ( )
● A(75) is a device that enables data from one computer to travel to another computer by using telephone lines.
An output device is any computer component capable of(72)information to a user.
A (72) is a file that contains metadata—that is,data about data.
Input data from keyboard are stored in(72)for processing.
Which Coherence caching pattern matches the sequence of events ?() 1. Data is requested from cache 2. The requested data does not exist in the cache (cache miss) 3. The Coherence cache store is used to red data from the back-end persistent data source, and placed in ther cache 4. Data requested from the cache is returned to the caller
●A (73) is a named memory block. By using its name, we can refer to the data stored in the memory block.
Why is it important to prevent the abuse of computer data bands?
______: A location where data can be temporarily stored.
_____ :A location where data can be temporarily stored.
:A location where data can be temporarily Stored.
广告位招租WX:84302438
题库考试答案搜索网
免费的网站请分享给朋友吧