当前位置:初级网络管理员题库>计算机软件基础知识题库

问题:

[单选] ()的任务是将来源不同的编译单元装配成一个可执行程序。

A . 编译程序
B . 解释程序
C . 链接程序
D . 装入程序

With hundreds of millions of electronic (11)taking place daily, businesses and organizations have a strong incentive to protect the. (12) of the data exchanged in this manner, and to positively ensure the (13) of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations,and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(14) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (15) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.空白处(12)应选择() A.operation。 completeness。 integrity。 interchange。 调用递归过程或函数时,处理参数及返回地址需要用一种称为()的数据结构。 队列。 栈。 多维数组。 顺序表。 With hundreds of millions of electronic (11)taking place daily, businesses and organizations have a strong incentive to protect the. (12) of the data exchanged in this manner, and to positively ensure the (13) of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations,and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(14) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (15) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.空白处(11)应选择() A.devices。 transactions。 communications。 businesses。 To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks.These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(6) .Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(7)activity. For many organizations, however,the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle's security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch (8) of service attacks or steal (9) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (10) and worms acquired from unprotected public networks. Hackers masquer-ading as internal users can take advantage of weak internal security to gain access to confidential information.空白处(9)应选择() A.reserved。 confidential。 complete。 mysterious。 在Windows的"资源管理器"窗口中,单击需要选定的第一个文件,按下()键,再单击需要选定的最后一个文件,能够一次选定连续的多个文件。 Ctrl。 Tab。 Alt。 Shift。 ()的任务是将来源不同的编译单元装配成一个可执行程序。
参考答案:

  参考解析

编译程序是指把用高级程序设计语言书写的源程序,翻译成等价的计算机汇编语言或机器语言的目标程序的翻译程序。编译程序的基本功能是把源程序翻译成目标程序。
解释程序是指按照源程序的指令或语句的动态执行顺序,逐条或逐句翻译并立即执行的翻译程序。解释程序的特点是把源程序直接翻译成加工输入数据,产生所求的动作,而不是产生目标语言形式的目标程序。
源程序经过编译后,可得到一个目标模块,链接程序的功能是将这组目标模块,以及它们所需要的库函数,装配成一个完整的转入模块,即装配成一个可执行程序。
装入程序将装入模块装入内存。

相关题目:

在线 客服