单选

●下面列出的条目中,哪些是数据库技术的主要特点 (23) 。

Ⅰ.数据的结构化

Ⅱ.数据的冗余度小

Ⅲ.较高的数据独立性

Ⅳ.程序的标准化

(23)

  • A.Ⅰ、Ⅱ和Ⅲ    &n
  • bsp;  B.Ⅰ和Ⅱ    
  • C.Ⅰ、Ⅱ和Ⅳ    
  • D.都是
参考答案
您可能感兴趣的试题

●TCP service is obt

  • ained
  • by having both the sender and the re
  • ceiver create an
  • d points,which are called (75) .    (75) A.Network address
  • B.supenet address
  • C.socket
  • D.IP address

● (74) is

  • a contiguous,num
  • bered set of variables of a given base type,whi
  • ch can be use
  • d and passed to functions as a unit.    (74) A.Record
  • B.Array
  • C.Parameter
  • D.File

●In C l

  • anguage,the usual expression statements are&n
  • bsp;(73) or fun
  • ction calls.    (73) A.I/Os
  • B.operations
  • C.assignments    
  • D.evaluations

  • An instruction is made up of operations that&n
  • bsp;(68) the fun
  • ction to be performe
  • d and operands that represent the data to be operated on.For example,if an instruction is to perform. the operation of  (69) two numbers,it must know  (70) the two numbers are.The processor′s job is to  (71) in
  • B.skip
  • C.smoke
  • D.specify    (69) A.add
  • B.added
  • C.adding
  • D.additional    (70) A.when

● (67) is

  • a sequence of letters and digits,the first character must
  • be a letter.    (67) A.An identifier
  • B.A string    
  • C.An array    
  • D.A program

The CPU is composed of two components,which are () .

  • A.asthmatics logic unit and controller  
  • B.arithmetic logic unit and memory  
  • C.memory and controller  
  • D.controller and storage

●依法受到保护的计算机软件作品必须符合下述条件 (65) 。

(65)

  • A.可被感知
  • B.逻辑合理
  • C.独立创作
  • D.A、B和C

●网络安全的基本目标是实现信息的 (62) 。

(62)

  • A.完整性、机密性、可用性、合法性    &n
  • bsp;  B.保密性、完整性、有效性、防病毒保护    
  • C.保密性、完整性、合法性、防病毒保护    
  • D.机密性、可用性、实用性、有效性
¥

订单号:

遇到问题请联系在线客服

订单号:

遇到问题请联系在线客服