单项选择题

Which of the following elements can be called the key element of a computer ______

A. printer
B. CPU
C. mouse

D. keyboard
<上一题 目录 下一题>
热门 试题

单项选择题
A. attachment B. packet C. datagram D. message

As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable(.exe)files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.
Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwouds and give the (10) access to your network.
单项选择题
Stack is quite simple. Many computer systems have stacks built into their circuitry. They also have machine-level instructions to operate the hardware stack. Stack is ______ in computer systems.
A. useless


B. not important
C. simple but important

D. too simple to be useful
相关试题
  • (15)是()
  • (14)是()
  • (30)是()
  • ______ operate by distributing...
  • (13)是()