注意:此页面搜索的是所有试题
郑州工业应用技术学院计算机专业英语
( ) The largest category of computer criminals is .
A.hackers
B.programmers
C.employees
D.employers
( ) People who gain unauthorized access to a computer system for malicious purposes are called A.crackers B.hackers C.programmers D.operators
( ) All data transmitted over the Internet _______ small units of information called packets. A.is used for B.is added by C.is divided by D.is divided into
( ) A (an) _______ is a destructive program which fills a computer system with self-replicating information, clogging(堵塞) the system so that its operations are slowed or stoppe A.worm B.time bomb C.Trojan horse D.logic bomb
( ) There will be‖________,‖ so you won’t have to wait for your PC to come to life. A.fast-on B.quick-on C.instant-on D.add-on
operating system
requirements analysis
network security
data structure
decision support system
relational database
software crisis
computer virus
email attachment
central processing unit ( CPU )
( ) People who gain unauthorized access to a computer system for malicious purposes are called A.crackers B.hackers C.programmers D.operators
( ) All data transmitted over the Internet _______ small units of information called packets. A.is used for B.is added by C.is divided by D.is divided into
( ) A (an) _______ is a destructive program which fills a computer system with self-replicating information, clogging(堵塞) the system so that its operations are slowed or stoppe A.worm B.time bomb C.Trojan horse D.logic bomb
( ) There will be‖________,‖ so you won’t have to wait for your PC to come to life. A.fast-on B.quick-on C.instant-on D.add-on
operating system
requirements analysis
network security
data structure
decision support system
relational database
software crisis
computer virus
email attachment
central processing unit ( CPU )