题目内容

MIDI enables people to use (61) computers and electronic musical instruments. There are actually three components to M1DI, the communications " (62) ", the Hardware Interface and a distribution (63) called "Standard MIDI Files". In the context of the WWW, the most interesting component is the (64) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (65) are stored in MID! files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use of MIDI today. (65)是()

A. messages
B. packets
C. frame
D. information

查看答案
更多问题

抗炎作用最强的药物是

A. 氢化可的松
B. 强的松
C. 地塞米松
D. 去炎松
E. 氟氢可的松

It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question. (101) is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more (102) . A diagram graphically represents things, and the relationships between these things. These (103) can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (104) are used to capture the physical organization of the things in your system, i. e. , how one object relates to another. (105) focus on the behavior of elements in a system. For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements. (103)是()

Activity diagrams
B. Use-case diagrams
C. Structural diagrams
D. Behavioral diagrams

(31) data effectively is crucial for success in today’s competitive environment. Managers must know how to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration uses a base document that contains copies of other objects. (34) integration uses a base document that contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in "plain" English, without the computer syntax. (33)是()

A. Simulated
B. Duplicated
C. Dynamic
D. Static

Most computer systems are (16) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (17) to an outsider attack by preventing.(18) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (19) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (20) by tools referred to as Intrusion Detection Systems. (17)是()

A. reliable
B. secure
C. indestructible
D. steady

答案查题题库