【正文】
B.data representation C.protocols D.data munication (68)A.same B.similar C.different D.dependent (69)A.multiuser B.client C.server D.fulluser (70)A.DNA B.SNA C.the OSI D.the ISO ●One of the functions of the _(71)_ is to store the applications progrms {or the various secondaries. The _(72)_ may have similar or dissimilar functions. The same control code received from two different secondaries may warrant two different actions on the part of the host puter. If the system so requires,the host puter must also provide _(73)_ for the centralized data and the software for database management. Data information is normally stored in auxiliary memories to which the puter has ready access. The_(74)_ peripherals connected to the host puter allow for human entry and intervention. As needs change, application programs may require additions, deletions, or changes. Data link problems also arise which are __(75)_ the range of the puter39。s programmed capabilities. In such cases, human entry is required to make the necessary changes to resolve the existing problems. (71)A.peripherals B.host puter C.the interface D.the client (72)A.set B.host C.secondaries D.record (73)A.storage B.data C.range D.link (74)A.peripherals B.database C.the interface D.clients (75)A.dose to B.during C.within D.beyond 參考答案: 本帖隱藏的內(nèi)容需要回復(fù)才可以瀏覽1.C2.C3.B4.A5.A6.B7.D8.B9.B10.A11.B12.D13.C14.B15.A16.C17.C18.A19.A20.D21.B22.C23.D24.B25.C26.A27.C28.B29.A30.D31.C32.B33.B34.C35.B36.C37.B38.C39.D40.A41.A42.C43.C44.C45.D46.B47.C48.A49.C50.B51.B52.D53.A54.B55.D56.A57.A58.B59.B60.C61.D62.C63.F64.B65.C66.A67.B68.C69.D70.D71.B72.C73.A74.A75.D8 / 8