题目内容

In(1)software, one question of near-universal interest is how rapidly Windows NT, which began shipping last summer, will be(2)in the marketplace and for what uses. For the most part, observers are(3)the operating system's long term prospects, but expect it to remain on(4)rather than desktops during 1994, saying that it won't become a mainstream product until(5)PCs typically have 16 to 24 MB of RAM, which is unlikely to happen next year.
供选择的答案
(1) applications (2) accepted (3) clients (4) enthusiastic (5) servers
(6) desktop (7) systems (8) replaced

查看答案
更多问题

(1)whether to go with a shared or switched fast LAN technology once you start to max out your shared Ethernet of token-ring LAN is tough call. Users and analysts involved in(2)high-speed LANs have leamed the benefits of each. However there are trade-offs to each, and(3)which fast LAN technology to choose is critical for(4)network performance problems and(5)costly purchasing mistakes.
供选择的答案:
(1) avoiding (2) clipping (3) choosing (4) deciding
(5) dissolving (6) ensuring (7) evolving (8) implementing
(9) knowing (10) solving

The most accurate and most boring way to(1)Java is that it is a new computer programming language developed by Sun Microsystems that creates(2)independent programs that can be distributed and run remotely. To run Java programs,a computer must have a Java interpreter. Currently(3)Java programs are small "applets" that are(3)as part of web pages.
When you use a Java(4)browser to view a Web page that includes a Java applet, the browser loads the applet onto your computer through your modem or network. Then the Java interpreter runs the applet, which could include animation or sound, on your computer rather than transmitting the code bit by bit over Internet. Afew thousand bytes of Java code can turn into a powerful program on your computer.
So an applet could include(5)with Java interpreter.

Most computer systems are(1)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(2)to an outsider attack by preventing(3)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(4)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(5)by tools referred to as Intrusion Detection Systems.

Programming Languages
Ten years ago the proliferation of programming languages caused many people to foresee the development of a computer-age Babel where, in total ignorance of every other language, each programmer would learn only his own chosen language. That unhappy situation has not occurred for several reasons. First, effective efforts have been made to standardize particular languages such as Fortran and Cobol. It should be pointed out that pragmatic rather than scientific considerations motivated this standardization movement. However, the second reason that Babel has been averted is that computer scientists have begun to apply the scientific method to organize the classification, comparison, and appreciation ofvarious programming languages.
Due to the efforts of McCarthy (1962), Landin (1964), Strachey (1966), Wegner (1968), and others who provided insight into operational models of computation, we can now evaluate programming languages in terms of an unifying view of computation structures. Semantics and the expressive power resulting from modularity can now be studied in terms of the data structures and the accessing paths to them established during the execution of the control statements of the language.
Integrated Software
Convenience and saved time, work, and effort are the promises ofintegrated software. The antithesis of stand-alone packages, integrated software delivers a collection of applications based upon a common user interface and sharable data.
In its most common form, the integrated product includes a word processor,a spreadsheet, and some form of database. Many packages add telecommunications, presentation graphics, and outline modules. Comprehensive products throw in desktop accessories such as calculators, calendars, DOS shells, and other utilities.
Even when stand-alone products are from the same vendor, it can be frustrating trying to move information between applications or simply trying to remember which key to press to call up the menu, That is why integrated packages appeal to many users, particularly novices. Using an integrated product saves you the headache of trying to move data in a Brand X word processor to a Brand Y spreadsheet. And because the integrated package is a single product from a single vendor, training, support, and upgrades also are made simpler. [试题解析]

答案查题题库