单选题使用ADSL接入Internet,用户端需要安装( )协议
单选题临界区是 (57) 。
单选题高速缓存Cache 与主存间采用全相联地址映像方式,高速缓存的容量为4MB,分为4 块,每块1MB,主存容量为256MB。若主存读写时间为30ns,高速缓存的读写时间为3ns,平均读写时间为3.27ns,则该高速缓存的命中率为 (3) %。若地址变换表如下所示,则主存地址为8888888H 时,高速缓存地址为 (4) H。
单选题在进行进度安排时,PERT图不能清晰地描述______,但可以给出哪些任务完成后才能开始另一些任务。某项目X包含任务A、B、……、J,其中PERT图如下所示(A=1表示任务A的持续时间是1天),则项目X的关键路径是______。
单选题已知3个类O、P和Q,其中,类O由类P的1个实例和类Q的1个或多个实例构成。能够正确表示类O、P和Q之间关系的UML类图是{{U}}(41){{/U}}。
单选题以下关于RUP特点的描述中,错误的是{{U}} (36) {{/U}}。
单选题
单选题编译程序分析源程序的阶段依次是______。 A.词法分析、语法分析、语义分析 B.语法分析、词法分析、语义分析 C.语义分析、语法分析、词法分析 D.语义分析、词法分析、语法分析
单选题 (71) data effectively is crucial for success in today's competitive environment. Managers must know how to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (72) in hardware and software. (73) integration uses a base document that contains copies of other objects. (74) integration uses a base document that contains the current or most recent version of the source document it contains. (75) provides an overview of the program written in" plain" English, without the computer syntax.
单选题在关系代数中,五种基本运算是______。 A.并、差、笛卡儿积、投影、选择 B.并、差、交、投影、选择 C.并、差、连接、投影、选择 D.连接、除法、笛卡儿积、投影、选择
单选题Remote administration types are an example of one kind of (71) malicious software, the Trojan horse, or more simply Trojan. The purpose of these programs isn't replication, (72) to penetrate and control. That masquerade as one thing when in fact they are something else, usually something destructive. There are a number of kinds of Trojans, including spybots, (73) report on the Web sites a computer user visits, and keybots or keyloggers, which record and report the user's keystrokes in order to discover passwords and other confidential information. RATS attempt to give a remote intruder administrative control of an infected computer. They work as (74) pairs. The server resides on the infected machine, while the client resides elsewhere, across the network, where it's available to a remote intruder. Using standard TCP/IP or UDP protocols, the client sends instructions to the server. The server does (75) it's told to do on the infected computer.
单选题一个具有767个节点的完全二叉树,其叶节点个数为______
单选题 168.37.192/25是______,地址172.17.17.255/23是______。
单选题
单选题对于如下所示的有向图,其邻接矩阵是一个( )的矩阵,采用邻接链表存储时顶点的表结点个数为2,顶点5的表结点个数为0,顶点2和3的表结点个数分別为( )
单选题在下列说法中,______是造成软件危机的主要原因。
①用户使用不当 ②软件本身特点 ③硬件不可靠
④对软件的错误认识 ⑤缺乏好的开发方法和手段 ⑥开发效率低
单选题软件能力成熟度模型(CMM)的第四级(已管理级)的核心是______。
单选题某二叉树的前序序列为ABDGHCEFI,中序序列为GDHBAECIF,则该二叉树的后序序列为______。
