首页
试卷库
试题库
当前位置:
X题卡
>
所有题目
>
题目详情
数据库理论的研究主要集中于( )、( )等。
查看本题答案
包含此试题的试卷
中级数据库系统工程师《填空》真题及答案
点击查看
你可能感兴趣的试题
下面所列各项哪些属于数据库技术的研究领域Ⅰ.数据库管理系统软件的研制Ⅱ.数据库设计Ⅲ.数据库理论Ⅳ.
Ⅰ和Ⅱ
Ⅰ和Ⅲ
Ⅰ、Ⅱ和Ⅲ
全都是
下面所列各项哪些属于数据库技术的研究领域 Ⅰ.数据库管理系统软件的研制 Ⅱ.数据库设计 Ⅲ.数据库
Ⅰ和Ⅱ
Ⅰ和Ⅲ
Ⅰ、Ⅱ 和Ⅲ
全部
下面列出的条目中数据库技术的研究领域包括Ⅰ.DBMS软件的研制Ⅱ.数据库及其应用系统的设计Ⅲ.数据库
仅Ⅰ和Ⅲ
仅Ⅱ和Ⅲ
仅Ⅰ和Ⅱ
全部
对数据库技术的研究不包括
数据库管理系统软件的研究
数据库运行平台的研究
数据库设计技术和方法的研究
数据库理论的研究
数据库技术的研究领域主要存在几个方面Ⅰ.数据库管理系统软件的研制Ⅱ.数据库设计Ⅲ.数据库理论
Ⅰ和Ⅱ
Ⅰ和Ⅲ
Ⅲ
都是
数据库技术的研究领域主要存在几个方面Ⅰ.数据库管理系统软件的研制Ⅱ.数据库设计Ⅲ.数据库理论
Ⅰ和Ⅱ
Ⅰ和Ⅲ
只有Ⅲ
都是
下面所列各项哪些属于数据库技术的研究领域 Ⅰ.数据库管理系统软件的研制Ⅱ.数据库设计 Ⅲ.数据库
Ⅰ和Ⅱ
Ⅰ和Ⅲ
Ⅰ、Ⅱ和Ⅲ
全部
下面有关对象—关系数据库管理系统的叙述中不正确的是
支持一核心的面向对象数据模型
支持传统数据库系统所有的数据库特征
继承了第二代数据库系统已有的技术
对它的研究主要集中在实现技术方面而非基本原理方面
目前广东省税务部门到社保部门的社保数据传送流程主要包括
数据从大集中数据库直接到社保数据库
数据从大集中数据库到省地税中间库
数据从省地税中间库到市地税共享数据库
社保局读取市地税共享数据库的数据
下面不属于数据库技术的研究领域的是A数据库的独立性B数据库设计C数据库管理系统软件的研制D数据库理论
下面列出的条目中是数据库技术的研究领域Ⅰ.DBMS软件的研制Ⅱ.数据库及其应用系统的设计Ⅲ.数据库理
仅Ⅰ和Ⅲ
仅Ⅱ和Ⅲ
仅Ⅰ和Ⅱ
全部
数据库技术的研究领域概括地讲可以包括数据库管理系统软件的研制数据库理论和______
下面所列各项哪些属于数据库技术的研究领域Ⅰ.数据库管理系统软件的研制Ⅱ.数据库设计Ⅲ.数据库理论Ⅳ.
Ⅰ和Ⅱ
Ⅰ和Ⅲ
Ⅰ、Ⅱ和Ⅲ
全都是
下面所列各项哪些属于数据库技术的研究领域Ⅰ.数据库管理系统软件的研制Ⅱ.数据库设计Ⅲ.数据库理论Ⅳ.
Ⅰ和Ⅱ
Ⅰ和Ⅲ
Ⅰ、Ⅱ和Ⅲ
全部
下面所列各项哪些属于数据库技术的研究领域Ⅰ.数据库管理系统软件的研制Ⅱ.数据库设计Ⅲ.数据库理论Ⅳ.
Ⅰ和Ⅱ
Ⅰ和Ⅲ
Ⅰ、Ⅱ和Ⅲ
全部
数据库技术的研究领域主要存在几个方面Ⅰ.数据库管理系统软件的研制Ⅱ.数据库设计Ⅲ.数据库理论
Ⅰ和Ⅱ
Ⅰ和Ⅲ
Ⅲ
都是
数据库技术的研究领域主要包括 Ⅰ.数据库管理系统 Ⅱ.操作系统 Ⅲ.数据库理论 Ⅳ.数据库设计
仅Ⅰ和Ⅱ
仅Ⅰ、Ⅱ和Ⅲ
仅Ⅰ、Ⅲ和Ⅳ
都是
下面所列各项________属于数据库技术的研究领域Ⅰ.数据库管理系统软件的研制Ⅱ.数据库设计Ⅲ.数
Ⅰ和Ⅱ
Ⅰ和Ⅲ
Ⅰ、Ⅱ和Ⅲ
全部
下面所列各项________属于数据库技术的研究领域Ⅰ.数据库管理系统软件的研制Ⅱ.数据库设计Ⅲ.数
Ⅰ和Ⅱ
Ⅰ和Ⅲ
Ⅰ、Ⅱ和Ⅲ
全部
数据库技术的研究领域主要存在几个方面Ⅰ.数据库管理系统软件的研制Ⅱ.数据库设计Ⅲ.数据库理论
Ⅰ和Ⅱ
Ⅰ和Ⅲ
只有Ⅲ
都是
热门试题
更多
WebSQLisaSQL-like26languageforextractinginformationfromtheweb.Itscapabilitiesforperformingnavigationofweb27makeitausefultoolforautomatingseveralweb-relatedtasksthatrequirethesystematicprocessingofeitherailthelinksina28allthepagesthatcanbereachedfromagivenURLthrough29thatmatcha’patternoracombinationofboth.WebSQLalsoprovidestransparentaccesstoindexserversthatcanbequeriedviatheCommon30Interface. 26是
Mostcomputersystemsare165totwodifferentgroupsofattacks:Insiderattacksandoutsiderattacks.Asystemthatisknowntobe166toanoutsiderattackbypreventing167fromoutsidecanstillbevulnerabletotheinsiderattacksaccomplishedbyabusiveusageof168users.Detectingsuchabusiveusageaswellasattacksbyoutsidesnotonlyprovidesinformationondamageassessmentbutalsohelpstopreventfutureattacks.Theseattacksareusually169bytoolsreferredtoasIntrusionDetectionSystems. 169处是
Therelationaldatabasemodelrequiresthedatabe110throughprogramsthatdon’trelyonthepositionofthedatainthedatabase.Thisisindirect111totheotherdatabasemodewheretheprogramhastofollowaseriesofpointerstothedataitseeks.Aprogram112arelationaldatabasesimplyasksforthedataitseeks;theDBMSperformsthenecessarysearchesand113theinformation.The114onhowthesearchisdonearespecifictotheDBMSandvaryfromproducttoproduct. 114是
31analysisemphasizesthedrawingofpictorialsystemmodelstodocumentandvalidatebothexistingand/orproposedsystems.Ultimatelythesystemmodelsbecomethe32fordesigningandconstructinganimprovedsystem.33issuchatechnique.Theemphasisinthistechniqueisprocess-centered.Systemsanalystsdrawaseriesofprocessmodelscalled34.35isanothersuchtechniquethatintegratesdataandprocessconcernsintoconstructscalledobjects. 35是
Networkmanagershavelong140practicalvoice-over-IPVOIPsolutions.VOIP141easenetworkmanagementanddecreasescostsbyconvergingacompany’stelephonyanddatainfrastructuresintoonenetwork.AndaVOIPsolutionimplementedatacompany’shead-quarterswithfar-reachingbranchofficescan142tremendousamountsof143inlongdistancephonebillsprovidedthatsolutiondeliversPOTS-likevoice144overtheInternet. 143是
31analysisemphasizesthedrawingofpictorialsystemmodelstodocumentandvalidatebothexistingand/orproposedsystems.Ultimatelythesystemmodelsbecomethe32fordesigningandconstructinganimprovedsystem.33issuchatechnique.Theemphasisinthistechniqueisprocess-centered.Systemsanalystsdrawaseriesofprocessmodelscalled34.35isanothersuchtechniquethatintegratesdataandprocessconcernsintoconstructscalledobjects. 33是
Inobject-oriented51objectscanbeviewedasreusablecomponentsandoncetheprogrammerhasdevelopeda52ofthesecomponentshecan53theamountofnewcodingrequired.But52a54isnosimpletaskbecausetheintegrityoftheOriginalsoftwaredesigniscritical.Reusabilitycanbeamixedblessingforusertooasaprogrammerhastobeabletofindtheobjectheneeds.Butif55isyouraimreusabilityisworththerisk. 52是
Atypical160languagecontainsanapplicativesub-languagewhichapproximatesthemathematicalabstractionsof"timeless"functionsappliedto"spaceless"valueswheretheactualoperationsequencesanduseofstoragespaceduringexpressionevaluationareorganizedbehindthe161.Inthissettingvaluesaredatastructuresoflowvolumetypicallyafewcomputerwordsorlesswhichmeansthatanillusionofspacelessnesscanberealizedbyhaving162resultsduringexpressionevaluationstoredatthediscretionofthelanguageimplementationandeffectingparameter163and164operationsthroughvaluecopying. 162是
Networkmanagershavelong140practicalvoice-over-IPVOIPsolutions.VOIP141easenetworkmanagementanddecreasescostsbyconvergingacompany’stelephonyanddatainfrastructuresintoonenetwork.AndaVOIPsolutionimplementedatacompany’shead-quarterswithfar-reachingbranchofficescan142tremendousamountsof143inlongdistancephonebillsprovidedthatsolutiondeliversPOTS-likevoice144overtheInternet. 141是
Atypical160languagecontainsanapplicativesub-languagewhichapproximatesthemathematicalabstractionsof"timeless"functionsappliedto"spaceless"valueswheretheactualoperationsequencesanduseofstoragespaceduringexpressionevaluationareorganizedbehindthe161.Inthissettingvaluesaredatastructuresoflowvolumetypicallyafewcomputerwordsorlesswhichmeansthatanillusionofspacelessnesscanberealizedbyhaving162resultsduringexpressionevaluationstoredatthediscretionofthelanguageimplementationandeffectingparameter163and164operationsthroughvaluecopying. 164是
31analysisemphasizesthedrawingofpictorialsystemmodelstodocumentandvalidatebothexistingand/orproposedsystems.Ultimatelythesystemmodelsbecomethe32fordesigningandconstructinganimprovedsystem.33issuchatechnique.Theemphasisinthistechniqueisprocess-centered.Systemsanalystsdrawaseriesofprocessmodelscalled34.35isanothersuchtechniquethatintegratesdataandprocessconcernsintoconstructscalledobjects. 31是
Inobject-oriented51objectscanbeviewedasreusablecomponentsandoncetheprogrammerhasdevelopeda52ofthesecomponentshecan53theamountofnewcodingrequired.But52a54isnosimpletaskbecausetheintegrityoftheOriginalsoftwaredesigniscritical.Reusabilitycanbeamixedblessingforusertooasaprogrammerhastobeabletofindtheobjectheneeds.Butif55isyouraimreusabilityisworththerisk. 54是
WebSQLisaSQL-like26languageforextractinginformationfromtheweb.Itscapabilitiesforperformingnavigationofweb27makeitausefultoolforautomatingseveralweb-relatedtasksthatrequirethesystematicprocessingofeitherailthelinksina28allthepagesthatcanbereachedfromagivenURLthrough29thatmatcha’patternoracombinationofboth.WebSQLalsoprovidestransparentaccesstoindexserversthatcanbequeriedviatheCommon30Interface. 28是
Therelationaldatabasemodelrequiresthedatabe110throughprogramsthatdon’trelyonthepositionofthedatainthedatabase.Thisisindirect111totheotherdatabasemodewheretheprogramhastofollowaseriesofpointerstothedataitseeks.Aprogram112arelationaldatabasesimplyasksforthedataitseeks;theDBMSperformsthenecessarysearchesand113theinformation.The114onhowthesearchisdonearespecifictotheDBMSandvaryfromproducttoproduct. 112是
Whenmostpeoplerefertomultimediatheygenerallymeanthecombinationoftwoormorecontinuousmediausuallywithsomeuser115.Inpracticethetwomediaarenormallyaudioandvideothisis116plusmoving117. Itshouldbe’obviousbynowthattransmittingmultimediamaterialinuncompressedformiscompletelyoutof118.Theonlyhopeisthatmassivecompressionispossible.Fortunatelyalargebodyofresearchoverthepastfewdecadeshasledtomanycompressiontechniquesandalgorithmsthatmakemultimediatransmission119. 118是
Inrecentyearsoneofthemorepopulartopicsforpaneldiscussionsatcomputerconferencesandtrade61hasbeenthe"RISCversusCISC"debate. RISCprocessorsfeatureasmallnumberofinstructionsthateachexecutesin62machinecycle.CISCprocessorsusecomplexinstructionsthatcantakeseveralcyclestoexecute. TheRISCversusCISCdebatewon’tbedecidedbypaneldiscussion;itwillbewoninthemarketplace.Andthedecidingfactormayhavelittletodowith63ofinstructionsandregistersandmoretodowithparallelism. SincetheirconceptionRISCprocessorshavebeenevolvingtowardmicroparallelismincorporatingparallel-processingfeatures64theprocessorRISCprocessorsfeaturepipeliningwherebymanyinstructionscanbedecodedwhileoneinstructionexecutes.RISCprocessorshoweveraremovingtowardpipelinesforeachunitoftheprocessor. CISCprocessorsalsoemploypipelining.TheyhavemanyintegerinstructionsthatexecuteinonecyclebutthevaryingexecutiontimesofCISCinstructions65theeffectivenessofparallelism. 62处是
Inrecentyearsoneofthemorepopulartopicsforpaneldiscussionsatcomputerconferencesandtrade61hasbeenthe"RISCversusCISC"debate. RISCprocessorsfeatureasmallnumberofinstructionsthateachexecutesin62machinecycle.CISCprocessorsusecomplexinstructionsthatcantakeseveralcyclestoexecute. TheRISCversusCISCdebatewon’tbedecidedbypaneldiscussion;itwillbewoninthemarketplace.Andthedecidingfactormayhavelittletodowith63ofinstructionsandregistersandmoretodowithparallelism. SincetheirconceptionRISCprocessorshavebeenevolvingtowardmicroparallelismincorporatingparallel-processingfeatures64theprocessorRISCprocessorsfeaturepipeliningwherebymanyinstructionscanbedecodedwhileoneinstructionexecutes.RISCprocessorshoweveraremovingtowardpipelinesforeachunitoftheprocessor. CISCprocessorsalsoemploypipelining.TheyhavemanyintegerinstructionsthatexecuteinonecyclebutthevaryingexecutiontimesofCISCinstructions65theeffectivenessofparallelism. 64处是
Programmingisa46thathasvariousengineeringand47aspects.Althoughmostoftheseaspectsareinterrelatedeachofthemcoversanumberof48andgoalswinchareveryspecific.Theprogressbeingmadeinteaching49isreflectedbythefactthatmost50sciencecurriculacontainabroadspectrumofprogrammingcourseseachemphasizingadifferentaspectofprogramming. 49处是
Whenmostpeoplerefertomultimediatheygenerallymeanthecombinationoftwoormorecontinuousmediausuallywithsomeuser115.Inpracticethetwomediaarenormallyaudioandvideothisis116plusmoving117. Itshouldbe’obviousbynowthattransmittingmultimediamaterialinuncompressedformiscompletelyoutof118.Theonlyhopeisthatmassivecompressionispossible.Fortunatelyalargebodyofresearchoverthepastfewdecadeshasledtomanycompressiontechniquesandalgorithmsthatmakemultimediatransmission119. 116是
WhilemostrecentattentionintheAIfieldhasbeenfocusedonexpertsystemsoftwareAI66hasalsoseendramaticadvances.Activityinthepastyearswascharacterizedbynewlow-costpowerfulLispmachinestheintroductionofAIworkstationsLispcompilersbecomingavailableforallmajorprofessionalandengineeringworkstationsandthepersonalcomputeremergingasa67.toolforexpertsystemdevelopment.Thenextfewyearswillseethistechnologyevolvesfurther. Becausethe68ofanAIcomputerrepresentsasizableinvestmentcompaniesshouldcarefully69alloptionsthatareavailableaswellashaveagoodideaofwhatthenextgenerationofsystemswillofferinorderto70theoptimumsystem.Thispublicationprovidestheinformationnecessarytogainthisunderstanding. 69是
Forusersmicrokerneltechnologypromises90compactandsophisticatedoperatingsystemsthataretypically91acrossarangeofhardwareplatforms.Theseoperatingsystemswillbecustomizabletoletusersrunmultipleoperatingsystemandapplication"personalities"ontopofasinglemicrokernel92. Microkernelbasedsystemscanprovidethisflexibilitybecausethecoreoperatingsystemfunctionsare93fromthelargenumberofutilitiesfeaturesandextensionsthatarelayeredontopofthem.Asaresultupdatingandmaintainingoperatingsystemiseasiersincedevelopersdon’thavetomodifythe94everytimetheymustacidanewfeature. 92是
Mostcomputersystemsare165totwodifferentgroupsofattacks:Insiderattacksandoutsiderattacks.Asystemthatisknowntobe166toanoutsiderattackbypreventing167fromoutsidecanstillbevulnerabletotheinsiderattacksaccomplishedbyabusiveusageof168users.Detectingsuchabusiveusageaswellasattacksbyoutsidesnotonlyprovidesinformationondamageassessmentbutalsohelpstopreventfutureattacks.Theseattacksareusually169bytoolsreferredtoasIntrusionDetectionSystems. 165处是
Programmingisa46thathasvariousengineeringand47aspects.Althoughmostoftheseaspectsareinterrelatedeachofthemcoversanumberof48andgoalswinchareveryspecific.Theprogressbeingmadeinteaching49isreflectedbythefactthatmost50sciencecurriculacontainabroadspectrumofprogrammingcourseseachemphasizingadifferentaspectofprogramming. 47处是
Atypical160languagecontainsanapplicativesub-languagewhichapproximatesthemathematicalabstractionsof"timeless"functionsappliedto"spaceless"valueswheretheactualoperationsequencesanduseofstoragespaceduringexpressionevaluationareorganizedbehindthe161.Inthissettingvaluesaredatastructuresoflowvolumetypicallyafewcomputerwordsorlesswhichmeansthatanillusionofspacelessnesscanberealizedbyhaving162resultsduringexpressionevaluationstoredatthediscretionofthelanguageimplementationandeffectingparameter163and164operationsthroughvaluecopying. 160是
Mobilecomputers-which71laptopsnotebookssubnotebooksandhandhelds-72soubiquitousinsuchashorttimenosurprisetohearwhosay:"Itwilldefinetheleadingedge73thenextfiveyearsorso."Themostremarkable74mobilecomputersistheamountofdatastorageandmemorypacked75theirtinyboxes.Thesedevicesnotonlyhandlewindowseasilybutalsorunstorage-hungryprograms. 71处是
Forusersmicrokerneltechnologypromises90compactandsophisticatedoperatingsystemsthataretypically91acrossarangeofhardwareplatforms.Theseoperatingsystemswillbecustomizabletoletusersrunmultipleoperatingsystemandapplication"personalities"ontopofasinglemicrokernel92. Microkernelbasedsystemscanprovidethisflexibilitybecausethecoreoperatingsystemfunctionsare93fromthelargenumberofutilitiesfeaturesandextensionsthatarelayeredontopofthem.Asaresultupdatingandmaintainingoperatingsystemiseasiersincedevelopersdon’thavetomodifythe94everytimetheymustacidanewfeature. 90是
WhilemostrecentattentionintheAIfieldhasbeenfocusedonexpertsystemsoftwareAI66hasalsoseendramaticadvances.Activityinthepastyearswascharacterizedbynewlow-costpowerfulLispmachinestheintroductionofAIworkstationsLispcompilersbecomingavailableforallmajorprofessionalandengineeringworkstationsandthepersonalcomputeremergingasa67.toolforexpertsystemdevelopment.Thenextfewyearswillseethistechnologyevolvesfurther. Becausethe68ofanAIcomputerrepresentsasizableinvestmentcompaniesshouldcarefully69alloptionsthatareavailableaswellashaveagoodideaofwhatthenextgenerationofsystemswillofferinorderto70theoptimumsystem.Thispublicationprovidestheinformationnecessarytogainthisunderstanding. 67是
Mostcomputersystemsare165totwodifferentgroupsofattacks:Insiderattacksandoutsiderattacks.Asystemthatisknowntobe166toanoutsiderattackbypreventing167fromoutsidecanstillbevulnerabletotheinsiderattacksaccomplishedbyabusiveusageof168users.Detectingsuchabusiveusageaswellasattacksbyoutsidesnotonlyprovidesinformationondamageassessmentbutalsohelpstopreventfutureattacks.Theseattacksareusually169bytoolsreferredtoasIntrusionDetectionSystems. 167处是
Forusersmicrokerneltechnologypromises90compactandsophisticatedoperatingsystemsthataretypically91acrossarangeofhardwareplatforms.Theseoperatingsystemswillbecustomizabletoletusersrunmultipleoperatingsystemandapplication"personalities"ontopofasinglemicrokernel92. Microkernelbasedsystemscanprovidethisflexibilitybecausethecoreoperatingsystemfunctionsare93fromthelargenumberofutilitiesfeaturesandextensionsthatarelayeredontopofthem.Asaresultupdatingandmaintainingoperatingsystemiseasiersincedevelopersdon’thavetomodifythe94everytimetheymustacidanewfeature. 94是
WebSQLisaSQL-like26languageforextractinginformationfromtheweb.Itscapabilitiesforperformingnavigationofweb27makeitausefultoolforautomatingseveralweb-relatedtasksthatrequirethesystematicprocessingofeitherailthelinksina28allthepagesthatcanbereachedfromagivenURLthrough29thatmatcha’patternoracombinationofboth.WebSQLalsoprovidestransparentaccesstoindexserversthatcanbequeriedviatheCommon30Interface. 30是
热门题库
更多
初级信息处理技术员
中级数据库系统工程师
中级多媒体应用设计师
高级系统分析师
高级网络规划设计师
高级系统架构师
中级信息系统监理师
初级通信工程师
中级通信工程师
通信新技术、新业务知识
无线通信专业技术
移动通信专业技术
有线传输专业技术
电话交换专业技术
电信网络专业技术
计算机通信专业技术