首页
试卷库
试题库
当前位置:
X题卡
>
所有题目
>
题目详情
若每一条指令都可以分解为取指、分析和执行3步。已知取指时间t取指=5△t,分析时间t分析=2△t,执行时间t执行=5△t。如果按顺序方式从头到尾执行完500条指令需要 (25) △t。如果按照[执行]...
查看本题答案
包含此试题的试卷
高级系统分析师《单选集》真题及答案
点击查看
你可能感兴趣的试题
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4△t分析时间t分析=3△t执行
504
507
508
510
若每一条指令都可以分解为取指分析和执行三步己知取指时间t取指=4△t分析时间t分析=3△t执行时间t
1190
1195
1200
1205
假设每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4△t分析时间t分析=3△t执
1190
1195
1200
1205
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4△t分析时间t分析=3△t执行
504
507
508
510
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4Δt分析时间t分析=3Δt执行时间t
1190
1195
1200
1205
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4△t分析时间t分析=3△t执行
1190
1195
1200
1205
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4△t分析时间t分析=3△t执行
1190
1195
1200
1205
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4△t分析时间t分析=3△t执行
1190
1195
1200
1205
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4△t分析时间t分析=3△t执行
504
507
508
510
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4△t分析时间t分析=3△t执行
1190
1195
1200
1205
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4△t分析时间t分析=3△t执行
504
507
508
510
若每一条指令都可以分解为取指分析和执行3步已知取指时间t取指=5△t分析时间t分析=2△t执行时间t
5590
5595
6000
6007
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4Δt分析时间t分析=3Δt执行时间t
504
507
508
510
若每一条指令都可以分解为取指分析和执行3步已知取指时间t取指=4△t分析时间t分析=3△t执行
1190
1195
1200
1205
若每一条指令都可以分解为取指分析和执行三步已知取指时间t求指=4△t分析时间t分析=3△t执行时间t
504
507
508
510
若每一条指令都可以分解为取指分析和执行三步己知取指时间t取指=4△t分析时间t分析=3△t执行时间t
504
507
508
510
若每一条指令都可以分解为取指分析和执行三步已知取指时间t求指=4△t分析时间t分析=3△t执行时间t
1190
1195
1200
1205
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4△t分析时间t分析=3△t执行
1190
1195
1200
1205
若每一条指令都可以分解为取指分析和执行三步已知取指时间t取指=4△t分析时间t分析=3△t执行
504
507
508
510
若每一条指令都可以分解为取指分析和执行3步已知取指时间t取指=4△t分析时间t分析=3△t执行
504
507
508
510
热门试题
更多
Whenthesystemuponwhichatransportentityisrunningfailsandsubsequentlyrestartsthe136informationofallactiveconnectionsislost.Theaffectedconnectionsbecomehalf-openasthesidethatdidnotfaildoesnotyetrealizetheproblem.Thestillactivesideofahalf-openconnectionscanclosetheconnectionusinga137timer.Thistimermeasuresthetimethetransportmachinewillcontinuetoawaitan138ofatransmittedsegmentafterthesegmenthasbeenretransmittedthemaximumnumberoftimes.Whenthetimer139thetransportentityassumesthateithertheothertransportentityortheinterveningnetworkhasfailed.AsaresultthetimerclosestheconnectionandsignalsanabnormalclosetotheTSuser.Intheeventthatatransportentityfailsandquicklyrestartshalf-openconnectionscanbeterminatedmorequicklybytheuseoftheRSTsegmentthefailedsidereturnsanRSTitoeverysegmentithatitreceiveswhentheRSTireachestheothersideitmustbecheckedforvaliditybasedonthe140numberiastheRSTcouldbeinresponsetoanoldsegmentiftheresetisvalidthetransportentityperformsanabnormaltermination.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
OneofthedifficultiesinbuildinganSQL-likequerylanguagefortheWebistheabsenceofadatabase131forthishugeheterogeneousrepositoryofinformation.HoweverifweareinterestedinHTMLdocumentsonlywecanconstructavirtualschemafromtheimplicitstructureofthesefiles.Thusatthehighestlevelof132everysuchdocumentisidentifiedbyitsUniformResourceLocatorURLanda133andatext.AlsoWebseversprovidesomeadditionalinformationsuchasthetypelengthandthelastmodificationdateofadocument.SofordataminingpurposeswecanconsiderthesetofallHTMLdocumentsasarelation:DocumenturlrifletexttypelengthmodifWhereallthe134arecharacterstrings.Inthisframeworkanindividualdocumentisidentifiedwitha135inthisrelation.OfcourseifsomeoptionalinformationismissingfromtheHTMLdocumenttheassociatefieldswillbeleftblankbutthisisnotuncommoninanydatabase.
ActivityBasedCostingABCisan126techniquethatallowsanorganizationtodeterminetheactual127associatedwitheachproductandserviceproducedbytheorganizationwithoutregardtotheorganizationalstructure.ThischapterexplainssomeoftheusesandbenefitsofActivityBasedCosting.WeuseIDEFO128modelinginconjunctionwithABCtoenablemoreeffectivebusiness129designdecisions.InordertoachievethemajorgoalsofbusinessprocessimprovementprocesssimplificationandimprovementFAAmanagersneedtofullyunderstandthecosttimeandqualityofactivitiesperformedbyemployeesormachinesthroughoutanentireorganization.ABCmethodsenable130tocostoutmeasurementstobusinesssimplificationandprocessimprovement.
ActivityBasedCostingABCisan126techniquethatallowsanorganizationtodeterminetheactual127associatedwitheachproductandserviceproducedbytheorganizationwithoutregardtotheorganizationalstructure.ThischapterexplainssomeoftheusesandbenefitsofActivityBasedCosting.WeuseIDEFO128modelinginconjunctionwithABCtoenablemoreeffectivebusiness129designdecisions.InordertoachievethemajorgoalsofbusinessprocessimprovementprocesssimplificationandimprovementFAAmanagersneedtofullyunderstandthecosttimeandqualityofactivitiesperformedbyemployeesormachinesthroughoutanentireorganization.ABCmethodsenable130tocostoutmeasurementstobusinesssimplificationandprocessimprovement.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
某公司为便于员工在家里访问公司的一些数据允许员工通过Internet访问公司的FTP服务器如图2-2所示为了能够方便地实现这一目标决定在客户机与FTP服务器之间采用1协议在传输层对数据进行加密该协议是一个保证计算机通信安全的协议客户机与服务器之间协商相互认可的密码发生在2[*]
Duringthepastyearsintelligenttechnologyhasevolved116threegenerations.ThefirstwascharacterizedbytoolssuchasprologandOPS.prologisasimplebackward-chainingenvironmentandOPSisasimpleforward-chainingenvironment.Thisledtothesecondgenerationofknowledge-engineeringenvironments.Itsgoalwastomodelprototypeandconstruct117systems.Allthreegenerationswereorientedtowardgeneric118andrepresentedgeneralizedimplementationenvironmentsfortheconstructionofexpertsystems.knowledgebasesandAIapplications.Someofthesolution-orientedproductsarealsoseamlesslyintegratedwithgenericknowledge-engineeringenvironmentspermittingenduserstoadd119rulesandobjectsaswellaspredefinedknowledge-basedlogictoaddressproblemsinmanufacturingsimulation.Marketplaceorientationisrapidly120towardsolution-orientedintelligentproductenvironments.thefourthgenerationrepresentsanewlineofthinkingand’develop-meritbycommercialfu-ms.willreducethecostriskanddevelopmenttimeassociatedwithproblemsolving.
某业务员需要在出差期间能够访问公司局域网中的数据与局域网中的其他机器进行通信并且保障通信的机密性但是为了安全公司禁止Internet上的机器随意访问公司局域网虚拟专用网使用______协议可以解决这一需求
OneofthedifficultiesinbuildinganSQL-likequerylanguagefortheWebistheabsenceofadatabase131forthishugeheterogeneousrepositoryofinformation.HoweverifweareinterestedinHTMLdocumentsonlywecanconstructavirtualschemafromtheimplicitstructureofthesefiles.Thusatthehighestlevelof132everysuchdocumentisidentifiedbyitsUniformResourceLocatorURLanda133andatext.AlsoWebseversprovidesomeadditionalinformationsuchasthetypelengthandthelastmodificationdateofadocument.SofordataminingpurposeswecanconsiderthesetofallHTMLdocumentsasarelation:DocumenturlrifletexttypelengthmodifWhereallthe134arecharacterstrings.Inthisframeworkanindividualdocumentisidentifiedwitha135inthisrelation.OfcourseifsomeoptionalinformationismissingfromtheHTMLdocumenttheassociatefieldswillbeleftblankbutthisisnotuncommoninanydatabase.
ActivityBasedCostingABCisan126techniquethatallowsanorganizationtodeterminetheactual127associatedwitheachproductandserviceproducedbytheorganizationwithoutregardtotheorganizationalstructure.ThischapterexplainssomeoftheusesandbenefitsofActivityBasedCosting.WeuseIDEFO128modelinginconjunctionwithABCtoenablemoreeffectivebusiness129designdecisions.InordertoachievethemajorgoalsofbusinessprocessimprovementprocesssimplificationandimprovementFAAmanagersneedtofullyunderstandthecosttimeandqualityofactivitiesperformedbyemployeesormachinesthroughoutanentireorganization.ABCmethodsenable130tocostoutmeasurementstobusinesssimplificationandprocessimprovement.
Whenthesystemuponwhichatransportentityisrunningfailsandsubsequentlyrestartsthe136informationofallactiveconnectionsislost.Theaffectedconnectionsbecomehalf-openasthesidethatdidnotfaildoesnotyetrealizetheproblem.Thestillactivesideofahalf-openconnectionscanclosetheconnectionusinga137timer.Thistimermeasuresthetimethetransportmachinewillcontinuetoawaitan138ofatransmittedsegmentafterthesegmenthasbeenretransmittedthemaximumnumberoftimes.Whenthetimer139thetransportentityassumesthateithertheothertransportentityortheinterveningnetworkhasfailed.AsaresultthetimerclosestheconnectionandsignalsanabnormalclosetotheTSuser.Intheeventthatatransportentityfailsandquicklyrestartshalf-openconnectionscanbeterminatedmorequicklybytheuseoftheRSTsegmentthefailedsidereturnsanRSTitoeverysegmentithatitreceiveswhentheRSTireachestheothersideitmustbecheckedforvaliditybasedonthe140numberiastheRSTcouldbeinresponsetoanoldsegmentiftheresetisvalidthetransportentityperformsanabnormaltermination.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
Onestudyconductedbyapsychologist121ofinterviewingworkersbeforeandaftertheinstallationofarobot.Therobotwasusedtocontrolamatchingprocessofstampingandassemblingmetalparts.Priortoinstallationmuchoftheworkdonebyskilledmachinists.Afterinstallationtherobotdidtheworkbuttheworkerscontrolledtherobotthroughtherobotthroughacontrolpanel.Theresultsofthestudyindicatedthattheworkerspraisedtherobot122eliminatingthephysicallaborandfatigue123themanualoperationbutcomplainedofmoreandcontinuedstress.Priortoinstallationoftherobottherewastimefortalkingorshortperiodsofrelaxationbetweenjobs.Nowhoweverbecauseofthespeedoftherobottherewasaneedforconstantscanningandmonitoringoftheoperation124performedbytherobothastheinstallationoftherobotcreatedabetterworkenvironmentHasthechangefromphysicallabortomentalstressresultedinanimproved125oflifeMuchadditionalresearchisnecessary.
Microsoft’sCOMisasoftware146thatallowsapplicationstobebuiltfrombinarysoftwarecomponents.COMistheunderlyingarchitecturethatformsthefoundationforhigher-levelsoftwareserviceslikethoseprovidedbyOLE.COMdefinesabinarystandardforfunctioncallingbetweencomponentsawayforcomponentstodynamicallydiscovertheinterfacesimplementedbyothercomponentsandamechanismtoidentifycomponentsandtheirinterfacesuniquely.OLEisacompound147standarddevelopedbyMicrosoft.OLEmakesitpossibletocreate148withoneapplicationandlinkorembedtheminasecondapplication.Embeddedobjectsretaintheiroriginalformatand149totheapplicationthatcreatedthem.SupportforOLEisbuiltintotheWindowsandMacOSOperatingSystems.A150compounddocumentstandarddevelopedmainlybyAppleandIBMiscalledOpenDoc.
Whenthesystemuponwhichatransportentityisrunningfailsandsubsequentlyrestartsthe136informationofallactiveconnectionsislost.Theaffectedconnectionsbecomehalf-openasthesidethatdidnotfaildoesnotyetrealizetheproblem.Thestillactivesideofahalf-openconnectionscanclosetheconnectionusinga137timer.Thistimermeasuresthetimethetransportmachinewillcontinuetoawaitan138ofatransmittedsegmentafterthesegmenthasbeenretransmittedthemaximumnumberoftimes.Whenthetimer139thetransportentityassumesthateithertheothertransportentityortheinterveningnetworkhasfailed.AsaresultthetimerclosestheconnectionandsignalsanabnormalclosetotheTSuser.Intheeventthatatransportentityfailsandquicklyrestartshalf-openconnectionscanbeterminatedmorequicklybytheuseoftheRSTsegmentthefailedsidereturnsanRSTitoeverysegmentithatitreceiveswhentheRSTireachestheothersideitmustbecheckedforvaliditybasedonthe140numberiastheRSTcouldbeinresponsetoanoldsegmentiftheresetisvalidthetransportentityperformsanabnormaltermination.
Microsoft’sCOMisasoftware146thatallowsapplicationstobebuiltfrombinarysoftwarecomponents.COMistheunderlyingarchitecturethatformsthefoundationforhigher-levelsoftwareserviceslikethoseprovidedbyOLE.COMdefinesabinarystandardforfunctioncallingbetweencomponentsawayforcomponentstodynamicallydiscovertheinterfacesimplementedbyothercomponentsandamechanismtoidentifycomponentsandtheirinterfacesuniquely.OLEisacompound147standarddevelopedbyMicrosoft.OLEmakesitpossibletocreate148withoneapplicationandlinkorembedtheminasecondapplication.Embeddedobjectsretaintheiroriginalformatand149totheapplicationthatcreatedthem.SupportforOLEisbuiltintotheWindowsandMacOSOperatingSystems.A150compounddocumentstandarddevelopedmainlybyAppleandIBMiscalledOpenDoc.
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
Onestudyconductedbyapsychologist121ofinterviewingworkersbeforeandaftertheinstallationofarobot.Therobotwasusedtocontrolamatchingprocessofstampingandassemblingmetalparts.Priortoinstallationmuchoftheworkdonebyskilledmachinists.Afterinstallationtherobotdidtheworkbuttheworkerscontrolledtherobotthroughtherobotthroughacontrolpanel.Theresultsofthestudyindicatedthattheworkerspraisedtherobot122eliminatingthephysicallaborandfatigue123themanualoperationbutcomplainedofmoreandcontinuedstress.Priortoinstallationoftherobottherewastimefortalkingorshortperiodsofrelaxationbetweenjobs.Nowhoweverbecauseofthespeedoftherobottherewasaneedforconstantscanningandmonitoringoftheoperation124performedbytherobothastheinstallationoftherobotcreatedabetterworkenvironmentHasthechangefromphysicallabortomentalstressresultedinanimproved125oflifeMuchadditionalresearchisnecessary.
Microsoft’sCOMisasoftware146thatallowsapplicationstobebuiltfrombinarysoftwarecomponents.COMistheunderlyingarchitecturethatformsthefoundationforhigher-levelsoftwareserviceslikethoseprovidedbyOLE.COMdefinesabinarystandardforfunctioncallingbetweencomponentsawayforcomponentstodynamicallydiscovertheinterfacesimplementedbyothercomponentsandamechanismtoidentifycomponentsandtheirinterfacesuniquely.OLEisacompound147standarddevelopedbyMicrosoft.OLEmakesitpossibletocreate148withoneapplicationandlinkorembedtheminasecondapplication.Embeddedobjectsretaintheiroriginalformatand149totheapplicationthatcreatedthem.SupportforOLEisbuiltintotheWindowsandMacOSOperatingSystems.A150compounddocumentstandarddevelopedmainlybyAppleandIBMiscalledOpenDoc.
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
热门题库
更多
高级系统分析师
高级网络规划设计师
高级系统架构师
中级信息系统监理师
初级通信工程师
中级通信工程师
通信新技术、新业务知识
无线通信专业技术
移动通信专业技术
有线传输专业技术
电话交换专业技术
电信网络专业技术
计算机通信专业技术
通信电源专业技术
电信营销专业技术
网络优化考试