共找到 540 与Computer 相关的结果,耗时1 ms
TCP/IP(71)layer protocols provide services to the application(72)running on a computer. The application layer does not define the application itself,
Most computer systems are (71) to two different groups of attacks:insider attacks and outsider attacks.A system that is known to be (72) to an outsid
infected computer may lose its data.A.fileB.data baseC.virusD.program
Which of the following elements can be called the key element of a computer?(71)A.printerB.CPUC.mouseD.keyboard
A.platformB.frameworkC.operationD.computer
Rapid advances in computer and communication technologies have resulted in the(71) merger of these two fields. The lines have bluned among computing,
以下关于CISC(Complex lnstruction Set Computer,复杂指令集计算机)和RISC (Reduced Instruction Set Computer,精简指令集计算机)的叙述中,错误的是______。A.在CISC中,其复杂指令都采用硬布线逻辑来执行B.采用CISC
●Which is not a computer language? (71)(71) A. officeB. JavaC. C++D. C#
● Which of the following elements can be called the key element of a computer?(71)(71)A.printerB.CPUC.mouseD.keyboard
●Most computer systems are (71) to two different groups of attacks:Insider attacks and outsider attacks. A system that is known to be (72) to an outs
热门搜索: