registers
第1题:
【An overall cellular network contains a number of different elements from the base transceiver station (BTS) itself with its antenna back through a base station controller (BSC), and a mobile switching centre (MSC) to the location registers (HLR and VLR) and the link to the public switched telephone network (PSTN). Of the units within the cellular network, the BTS provides the direct communication with the mobile phones. There may be a small number of base stations then linked to a base station controller. This unit acts as a small centre to route calls to the required base station, and it also makes some decisions about which of the base station is best suited to a particular call. The links between the BTS and the BSC may use either land lines of even microwave links. Often the BTS antenna towers also support a small microwave dish antenna used for the link to the BSC. The BSC is often co-located with a BTS. The BSC interfaces with the mobile switching centre. This makes more widespread choices about the routing of calls and interfaces to the land line based PSTN as well as the HLR and VLR.】 From the paragraph above, in a cellular network, the (98) can provide direct communication with a mobile phone, the (99) acts as a small centre to route calls to the required base station, and it also makes some decisions about which of the base station is best suited to a particular call.(100) can be used to link the BSC with related BTS。
A. BSC B. BTS C. MSC D. VLR A. BSC B. BTS C. MSC D. HLR A. Land lines B. Microwave links C. Microwave dish antenna D. Land lines or microwave links
第2题:
, the brains of a computer, it contains the ALU, the clock, many registers, the bus interface, and circuitry that makes these pans work together.
A.I/O device
B.CPU
C.Memory
D.Operating system
第3题:
●Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine receiving an (66) from a friend who asks you to open it.This is what happens with Melissa and several other similar email (67) .Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book,previous emails, web pages (68) .
As administrators seek to block dangerous email attachments through the recognition of well-known (69) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (70) access to your network.
(66) A.attachment
B.packet
C.datagram
D.message
(67) A.virtual
B.virus
C.worms
D.bacteria
(68) A.memory
B.caches
C.ports
D.registers
(69) A.names
B.cookies
C.software
D.extensions
(70) A.cracker
B.user
C.customer
D.client
第4题:
We know a computer is a machine that processes data(stored in main memory)into information, under control of a stored program. We also know that, internally, a computer is a binary machine; thus the data and the program instruictions must be stored in binary form. Characters are represented in(71). Numbers are stored as binary numbers, with each bit's positional value significant. A computer's main memory is divided into bytes, words or both(depending on the system), and each of these basic storage units is assigned an(72). Using this address, the processor can read or write selected bytes or words.
The processor consists of a clock, an instruction control unit, an arithmetic and logic unit, and registers. Once a program is stored in main memory, the processor can begin to execute it. During(73), the instruction control unit fetches an instruction from main memory; during(74), the arithmetic and logic unit executes it. Precisely timed electronic pulses generated by the clock drive this basic(75)
A.a binary code
B.words
C.registers
D.positional values
第5题:
A. Effectively implements role separation
B. Enables you to take advantage of Oracle Managed Files.
C. Automatically registers the database with Oracle Restart.
D. Helps you to easily upgrade the database from a prior release.
E. Enables the Installation of Grid Infrastructure files on block or raw devices.
第6题:
(c) Assuming that Joanne registers for value added tax (VAT) with effect from 1 April 2006:
(i) Calculate her income tax (IT) and capital gains tax (CGT) payable for the year of assessment 2005/06.
You are not required to calculate any national insurance liabilities in this sub-part. (6 marks)
第7题:
A typical peripheral device has ______ which the processor uses to select the device's internal registers.
A.data
B.a control
C.a signal
D.an address
第8题:
Crashed Cars to Text Message for Help
There is no good place to have a car crash -- but some places are worse than others. In a foreign country, for instance,【51】 to explain via cellphone that you are upside down in a ditch (沟渠) when you cannot speak the local language can fatally (~) delay the arrival of the emergency services.
But an answer may be at hand. Researchers funded by the European Commission are beginning tests of a system called E-merge that【52】senses when a ear has crashed and sends a text message, telling emergency services in the local language that the accident has taken place.
The system was【53】 by ERTICO, a transport research organization based in Brussels. Belgium. Cars are fitted with a eellphone-sized device attached【54】 the underside of the dashboard (仪表板) which is activated by the same sensor that triggers the airbag in a crash. The device【55】 a cellphone circuit, a GPS positioning unit and a microphone and loudspeaker.
It registers the severity of the crash by【56】 the deceleration data from the airbag's sensor. Using GPS information, it works out which country the Car is in, and from this it determines【57】 which language to compose an alert message detailing precise location of the accident.
The device then automatically makes a call to the local emergency services【58】. If the car's occupants are conscious, they can communicate with the operator【59】 the speaker and microphone.
E-merge also transmits the vehicles make, model, color and license number, and its heading' when it crashed, which in rum indicates on which side of a multi-lane highway it ended up.
This【60】 the emergency services find the vehicle as soon as they arrive on the scene. "We can waste a large【61】time searching for an incident, "says Jim Hammond, a(an)【62】in vehicle technology at the Association of Chief Police Officers in the UK. Tests will begin soon with police car fleets in the UK. Trials have already started in Germany, Sweden, Spain, the Netherlands and Italy.
In-car systems that summon (召集) the emergency services after a crash have【63】been fitted in some premium cars". ERTICO says that【64】EU states "are willing to fund the necessary infrastructure (基础结构), E--merge could be working by 2008.
A study by French car maker Renault" concluded that the system could save up to 6000 of the 40,000 lives lost each year on Europe's roads, and prevent a similar number of serious injuries.
The Renault study estimates that fitting E-merge to every car in Europe would eventually save around 150 billion per【65】in terms of reduced costs to health services and insurance companies, and fewer lost working days.
(51)
A.try
B.tried
C.trying
D.having tried
第9题:
In recent years, one of the more popular topics for panel discussions at computer conferences and trade(61)has been the "RISC versus CISC" debate.RISC processors feature a small number of instructions that each executes in(62)machine cycle. CISC processors use complex instructions that can take several cycles to execute.The RISC versus CISC debate won't be decided by panel discussion; it will be won in the marketplace. And the deciding factor may have little to do with(63)of instructions and registers and more to do with parallelism.Since their conception, RISC processors have been evolving toward micro parallelism, incorporating parallel-processing features(64)the processor, RISC processors feature pipelining, whereby many instructions can be decoded while one instruction executes. RISC processors, however, are moving toward pipelines for each unit of the processor.CISC processors also employ pipelining. They have many integer instructions that execute in one cycle, but the varying execution times of CISC instructions(65)the effectiveness of parallelism.
A.shows
B.two
C.numbers
D.between
E.limit
第10题:
A typical peripheral device has an address which the processor uses to select the device's internal(74).
A.data
B.controls
C.signals
D.registers