registers

题目

registers

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

【An overall cellular network contains a number of different elements from the base transceiver station (BTS) itself with its antenna back through a base station controller (BSC), and a mobile switching centre (MSC) to the location registers (HLR and VLR) and the link to the public switched telephone network (PSTN). Of the units within the cellular network, the BTS provides the direct communication with the mobile phones. There may be a small number of base stations then linked to a base station controller. This unit acts as a small centre to route calls to the required base station, and it also makes some decisions about which of the base station is best suited to a particular call. The links between the BTS and the BSC may use either land lines of even microwave links. Often the BTS antenna towers also support a small microwave dish antenna used for the link to the BSC. The BSC is often co-located with a BTS. The BSC interfaces with the mobile switching centre. This makes more widespread choices about the routing of calls and interfaces to the land line based PSTN as well as the HLR and VLR.】 From the paragraph above, in a cellular network, the (98) can provide direct communication with a mobile phone, the (99) acts as a small centre to route calls to the required base station, and it also makes some decisions about which of the base station is best suited to a particular call.(100) can be used to link the BSC with related BTS。

A. BSC B. BTS C. MSC D. VLR A. BSC B. BTS C. MSC D. HLR A. Land lines B. Microwave links C. Microwave dish antenna D. Land lines or microwave links


正确答案:B,C,D

第2题:

, the brains of a computer, it contains the ALU, the clock, many registers, the bus interface, and circuitry that makes these pans work together.

A.I/O device

B.CPU

C.Memory

D.Operating system


正确答案:B

第3题:

●Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine receiving an (66) from a friend who asks you to open it.This is what happens with Melissa and several other similar email (67) .Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book,previous emails, web pages (68) .

As administrators seek to block dangerous email attachments through the recognition of well-known (69) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (70) access to your network.

(66) A.attachment

B.packet

C.datagram

D.message

(67) A.virtual

B.virus

C.worms

D.bacteria

(68) A.memory

B.caches

C.ports

D.registers

(69) A.names

B.cookies

C.software

D.extensions

(70) A.cracker

B.user

C.customer

D.client


正确答案:A,B,D,C,A
【解析】梅丽莎病毒和爱虫病毒都是利用同事或朋友之间的信任。假设收到一封来自朋友的附近,并让你打开看看,这就是梅丽落以及其他类似的邮件病毒贯用的方式。不断地前进,这些"蠕虫"会将自己寄给那些从牺牲者的邮件薄里或上一封邮件或网页登陆得来的邮箱地址。
当管理员致力于阻危险邮件通过知名软件的识别时,那些病毒制造者又在利用其他途径来回避这种保护,可执行文件被重新命名为批处理文件或dos文件加上一系列扩展名,将仍旧成功地感染终端使用者,黑客们经常会努力发一些看起来像动画电影的附件来进入网络,这些附件可以一边展现极具吸引力的动画制作技术、一边暗地里执行一些命令来获取你的密码,并安装一个炸弹进入你的网络。

第4题:

We know a computer is a machine that processes data(stored in main memory)into information, under control of a stored program. We also know that, internally, a computer is a binary machine; thus the data and the program instruictions must be stored in binary form. Characters are represented in(71). Numbers are stored as binary numbers, with each bit's positional value significant. A computer's main memory is divided into bytes, words or both(depending on the system), and each of these basic storage units is assigned an(72). Using this address, the processor can read or write selected bytes or words.

The processor consists of a clock, an instruction control unit, an arithmetic and logic unit, and registers. Once a program is stored in main memory, the processor can begin to execute it. During(73), the instruction control unit fetches an instruction from main memory; during(74), the arithmetic and logic unit executes it. Precisely timed electronic pulses generated by the clock drive this basic(75)

A.a binary code

B.words

C.registers

D.positional values


正确答案:A

第5题:

What are two benefits of installing Grid Infrastructure software for a stand-alone server before installing and creating an Oracle database?()

A. Effectively implements role separation

B. Enables you to take advantage of Oracle Managed Files.

C. Automatically registers the database with Oracle Restart.

D. Helps you to easily upgrade the database from a prior release.

E. Enables the Installation of Grid Infrastructure files on block or raw devices.


参考答案:C, E

第6题:

(c) Assuming that Joanne registers for value added tax (VAT) with effect from 1 April 2006:

(i) Calculate her income tax (IT) and capital gains tax (CGT) payable for the year of assessment 2005/06.

You are not required to calculate any national insurance liabilities in this sub-part. (6 marks)


正确答案:

 

第7题:

A typical peripheral device has ______ which the processor uses to select the device's internal registers.

A.data

B.a control

C.a signal

D.an address


正确答案:D
解析:译文的含义是:典型的外设都具有一个(),处理器利用它来选择设备寄存器。选项A、B、C、D的含义分别是数据、控制、信号、地址。选项D符合题意,为所选。

第8题:

Crashed Cars to Text Message for Help

There is no good place to have a car crash -- but some places are worse than others. In a foreign country, for instance,【51】 to explain via cellphone that you are upside down in a ditch (沟渠) when you cannot speak the local language can fatally (~) delay the arrival of the emergency services.

But an answer may be at hand. Researchers funded by the European Commission are beginning tests of a system called E-merge that【52】senses when a ear has crashed and sends a text message, telling emergency services in the local language that the accident has taken place.

The system was【53】 by ERTICO, a transport research organization based in Brussels. Belgium. Cars are fitted with a eellphone-sized device attached【54】 the underside of the dashboard (仪表板) which is activated by the same sensor that triggers the airbag in a crash. The device【55】 a cellphone circuit, a GPS positioning unit and a microphone and loudspeaker.

It registers the severity of the crash by【56】 the deceleration data from the airbag's sensor. Using GPS information, it works out which country the Car is in, and from this it determines【57】 which language to compose an alert message detailing precise location of the accident.

The device then automatically makes a call to the local emergency services【58】. If the car's occupants are conscious, they can communicate with the operator【59】 the speaker and microphone.

E-merge also transmits the vehicles make, model, color and license number, and its heading' when it crashed, which in rum indicates on which side of a multi-lane highway it ended up.

This【60】 the emergency services find the vehicle as soon as they arrive on the scene. "We can waste a large【61】time searching for an incident, "says Jim Hammond, a(an)【62】in vehicle technology at the Association of Chief Police Officers in the UK. Tests will begin soon with police car fleets in the UK. Trials have already started in Germany, Sweden, Spain, the Netherlands and Italy.

In-car systems that summon (召集) the emergency services after a crash have【63】been fitted in some premium cars". ERTICO says that【64】EU states "are willing to fund the necessary infrastructure (基础结构), E--merge could be working by 2008.

A study by French car maker Renault" concluded that the system could save up to 6000 of the 40,000 lives lost each year on Europe's roads, and prevent a similar number of serious injuries.

The Renault study estimates that fitting E-merge to every car in Europe would eventually save around 150 billion per【65】in terms of reduced costs to health services and insurance companies, and fewer lost working days.

(51)

A.try

B.tried

C.trying

D.having tried


正确答案:C

第9题:

In recent years, one of the more popular topics for panel discussions at computer conferences and trade(61)has been the "RISC versus CISC" debate.RISC processors feature a small number of instructions that each executes in(62)machine cycle. CISC processors use complex instructions that can take several cycles to execute.The RISC versus CISC debate won't be decided by panel discussion; it will be won in the marketplace. And the deciding factor may have little to do with(63)of instructions and registers and more to do with parallelism.Since their conception, RISC processors have been evolving toward micro parallelism, incorporating parallel-processing features(64)the processor, RISC processors feature pipelining, whereby many instructions can be decoded while one instruction executes. RISC processors, however, are moving toward pipelines for each unit of the processor.CISC processors also employ pipelining. They have many integer instructions that execute in one cycle, but the varying execution times of CISC instructions(65)the effectiveness of parallelism.

A.shows

B.two

C.numbers

D.between

E.limit


正确答案:A

第10题:

A typical peripheral device has an address which the processor uses to select the device's internal(74).

A.data

B.controls

C.signals

D.registers


正确答案:D
解析:一个典型的外部设备拥有一个地址,处理器通过它选中设备内部寄存器。

更多相关问题