首页/ 题库 / [单选题]● The program and th的答案

● The program and the data are kept inside the computer in a place called (73) .

单选题
2022-07-12 02:44
A、bus
B、cache
C、CPU
D、memory
查看答案

正确答案
D

试题解析

标签:
感兴趣题目
The man noticed the decay and lifelessness of the city, and these are facts that are detailed in his diary.
()measured at midship section and taken from inside the ship’s shell on one side to inside the ship’s side shell on the other side.
The cylinder liner forming the cylinder wall and the inside of the water jacket is called a()
The crankcase of many diesel engines are kept under a slight vacuum by the ().
The date and time kept in the radiotelephone log shall commence at().
● The program and the data are kept inside the computer in a place called(73) .(73)
● The program and the data are kept inside the computer in a place called (73) .
()contains the wheelhouse with the control station,the chartroom where charts,pilot books and publications are kept,and the radio room.
Data mining is an(66)research field in database and artificial intelligence. In this paper, the data mining techniques are introduced broadly including its producing background, its application and its classification. The principal techniques used in the data mining are surveyed also, which include rule induction, decision(67), artificial(68)network, genetic algorithm, fuzzy technique, rough set and visualization technique. Association rule mining, classification rule mining, outlier mining and clustering method are discussed in detail. The research achievements in association rule, the shortcomings of association rule measure standards and its(69), the evaluation methods of classification rules are presented. Existing outlier mining approaches are introduced which include outlier mining approach based on statistics, distance-based outlier mining approach, data detection method for deviation, rule-based outlier mining approach and multi-strategy method. Finally, the applications of data mining to science research, financial investment, market, insurance, manufacturing industry and communication network management are introduced. The application(70)of data mining are described.
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()
The cooling of the piston is carried out by circulating () across the underside of the crown and inside the ring belt or through specially shaped passages.
The data station usually means a(71)unit that provides data for transmission, that accepts transmitted data, and that performs all functions necessary for communication with another functional unit. Data stations may be divided into two kinds, the primary stations and the secondary stations, (72)control functions.In(73)data link control, the primary station is the data station that supports the primary control functions of the data link, generates commands to be transmitted, and interprets received responses. Specific responsibilities assigned to the primary station include initialization of control signal interchange, organization of data flow and actions regarding error control and error recovery functions. The secondary station executes data link control functions as (74)by the primary station, interprets received commands and (75) responses to be transmitted.
相关题目

The gunman stood ____________ the theatre and shoot at the audience inside.

The software used to control the computer and run programs.( )
The gunman stood ____________ the theatre and shot at the audience inside.
Coast Pilots and navigational charts are kept corrected and up-to-date by using the().
()the moveable plate and floating ring inside the pump is very difficult.
are those programs that help find the information you are trying to locate on the WWW.
is permanently stored in the computer and provides a link between the hardware and other programs that run on the PC.
● (73)testing is the responsibility ofthe programmer, who knows exactly what is going on inside the program.(73)
Both the temperature and the pressure of the refrigerant are increased in the ().
● Data items are added or deleted from the list only at the top of the (72) .(72)
●The Programming languages are designed to (73) the communication between human and computers.
●The Programming languages are designed to (73) the communication between human and computers.
The Programming languages are designed to(74)the communication between human and computers.
A journal kept by the officer of the watch in which day to day happenings are recorded regarding the deck department is the().
The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).
An application architecture specifies the technologies to be used to implement one or more information systems. It serves as an outline for detailed design, construction, and implementation. Given the models and details, include( ), we can distribute data and processes to create a general design of application architecture. The design will normally be constrained by architecture standards, project objectives, and ( ). The first physical DFD to be drawn is the( ). The next step is to distribute data stores to different processors. Data( ) are two types of distributed data which most RDBMSs support. There are many distribution options used in data distribution. In the case of ( )we should record each table as a data store on the physical DFD and connect each to the appropriate server.
● Software (75) focuses on three attributes of the program: software architecture, data structure, and procedural detail.(75)
3. The apples are _______the tree, and the birds(鸟) are ______ the tree.
The modern ()and ()are the descendants of the Gaels of the Celtic tribes.
Programmers test a program by running it to ensure that the(74)are correct and that the program produces the desired outcome. If errors do occur, the programmer must make the appropriate change and recheck the program until it produces the correct results. This(75)is called testing and debugging.
广告位招租WX:84302438

免费的网站请分享给朋友吧