单选

以下关于嵌入式系统的软件设计的叙述中,说法错误的是(65)。

  • A.把应用程序转换成可以在目标机上运行的二进制代码通常需要经过编译、链接和定址等三个步骤
  • B.编译过程生成的文件就是可以在嵌入式平台上执行的二进制文件
  • C.编译过程产生的所有目标文件被链接成一个目标文件
  • D.定址过程会把物理存储器地址指定给目标文件的每个相对偏移处
参考答案
您可能感兴趣的试题

(74)

  • A.hypertext
  • B.computation
  • C.expectation
  • D.bookmark

(75)

  • A.habits signature
  • B.site
  • C.tages
  • D.address

(73)

  • A.victimized
  • B.personate
  • C.identity
  • D.control

(72)

  • A.connecting
  • B.binding
  • C.looking
  • D.contenttagging

Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to(71)Web sites without their knowledge or consent.  Pharming has been called "phishing without a lure."

In phishing, the perpetrator sends out legitimate-(72)E-mails, appearing to come from some of the Web's most popular sites, in ah effort to obtain personal and financial information from individual recipients. But in pharming, larger numbers of computer users can be(73)because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form. of pharming attack, code sent in an E-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected(74)entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing(75).

  • A.few
  • B.fraudulent
  • C.normal
  • D.structured

(70)

  • A.software
  • B.form
  • C.computer
  • D.silicon

(69)

  • A.appliances
  • B.chips
  • C.tools
  • D.means

(67)

  • A.operation
  • B.completeness
  • C.integrity
  • D.interchange

(68)

  • A.identities
  • B.homogeneities
  • C.creations
  • D.operations
¥

订单号:

遇到问题请联系在线客服

订单号:

遇到问题请联系在线客服