The advanced knowledge of the computer, kneeling, and continuing to ask questions

Updated on educate 2024-08-14
9 answers
  1. Anonymous users2024-02-16

    I think it's interesting that you're interested in computers. According to your situation, you can set a plan for yourself to learn computer knowledge, and you said that you went home again to prepare for the college entrance examination, and I think it is better to have a bachelor's degree than a junior college. You can choose to apply for a computer major in even a very general secondary university, so that you can have the opportunity to learn systematic computer knowledge.

    Learning computers can't be rushed, you want to write your own software, that's good, provided you must be proficient in a programming language, put it in VB to write typing input method, this is not a one-person job, but a team work, you can try to write some simple programs first. It is also the work of the team to put it in the search engine, and its principle is the application of a series of knowledge such as computer networks, including search technology, computer crawler technology, etc., you can learn about it. The computer is just a tool, and being able to meet one's daily needs is the biggest gain, and there are no more than ten people in the world who can figure out the entire mechanism of the computer.

    We only know part of it.

  2. Anonymous users2024-02-15

    Ordinary people don't need to know advanced computer knowledge, as long as they can use it.

  3. Anonymous users2024-02-14

    Haven't you seen it yet? This dude is a two-stroke.

  4. Anonymous users2024-02-13

    1.An identifier is a sequence of alphanumeric underscores that begin with a letter or underscore. An identifier can be used to represent the name of a constant, variable, program, function, type, file, or procedure.

    Free Pascal allows identifiers to be valid up to 255 characters in length and is case-equivalent.

    In order to handle some useful information, preprocessing defines a number of preprocessing identifiers, and although the preprocessing identifiers vary from one compiler to another, they all handle the following four types:

    file The name of the file being compiled line The line number of the file being compiled date The date string at the time of compilation, the time string at the time of compilation.

    So choose B2Pick B

    The source of the compilation is still to be compiled.

    3.It is an abbreviation for the World Wide Web, which was invented 10 years ago by the British scientist Berners Lee so chose D

  5. Anonymous users2024-02-12

    1Contactless IC cards rely on their own batteries for power.

    2 PCs.

    3mb4 eight binary bits.

    5 symbols are not written well, yes or or with or with If I understand correctly, it should be a b=10000000

    The 6y7 root directory can only be used to store folders, not files.

    820g9 artificially prepared special programs.

    11n12y

    13 second.

  6. Anonymous users2024-02-11

    Not necessarily every year, except for the last one, which is programming to fill in the blanks, the others are multiple-choice questions.

  7. Anonymous users2024-02-10

    Be honest and friendly in communication, and do not insult and defraud others.

    It is necessary to enhance the awareness of self-protection and not to date netizens at will.

    It is necessary to maintain network security and not disrupt network order.

    It should be good for physical and mental health, and not indulge in virtual time and space.

    2. A set of computer instructions or programs that are compiled or inserted into a computer program that destroys computer functions or destroys data, affects the use of the computer and can be self-reproduced are called computer viruses.

    3. Destructive, hidden, latent and infectious.

    4. The program installation time is much longer than usual; The screen appears blurred or partially garbled; When I double-click on the file, nothing happens; It often crashes suddenly and then starts automatically;

  8. Anonymous users2024-02-09

    The confidentiality of the copy in the computer security attribute refers to (bai).

    a.The identity of the user should be kept confidential during the operation of the computerThe DAO host number should be kept secret during computer operation.

    c.In the network, the domain name address of the server is kept secret.

    d.Make sure that the information is not exposed to unauthorized entities.

    The answer to this question is d.

    The security attributes of a computer include: confidentiality, integrity, non-repudiation, and availability. Confidentiality means "ensuring that information is not disclosed to unauthorized entities".

  9. Anonymous users2024-02-08

    The necessary conditions for deadlocks to occur are: mutex conditions, hold and wait conditions, non-deprivation conditions, and loop wait conditions. As long as one of the above 4 necessary conditions is not satisfied, the deadlock can be solved.

    In this problem, r is a critical resource, in order for 6 concurrent processes to access r mutually exclusive without deadlock, the number of r must be enough to meet at least one process can run, considering the extreme case, all 6 concurrent processes have 4 r, as long as there is one more r, one of them can be scheduled to execute, so that the deadlock mutex condition is broken. So for 25 pcs.

Related questions
11 answers2024-08-14

I am engaged in software testing, I went to the outside school for training before I got on the job, and now I have been working for 2 years, in general, it can be summarized as: high technology, low threshold. As for those who are just starting out, you first need to master some knowledge, such as: >>>More

8 answers2024-08-14

Do you want to know about computer hardware, software, whether it is about the configuration of buying a computer, or about computer networking, whether it is about Internet security, or whether it is the basic knowledge of computers、、、

3 answers2024-08-14

1. The birth and development of computers and their characteristics 2. The application of computers in modern society 3. The basic components of computers and their interconnections 4. The working principle of computers 5. The representation of numbers in computers 6. Basic knowledge of computer networks and security 7. Computer software knowledge 8. The operation and basic use of Windows 9X 9. Relevant settings for sending and receiving e-mails (outlook) 10. The main components that constitute the computer motherboard 11. ASCII code 12. Processors and Memories 13, a new direction in the development of computer technology—quantum computers 14, binary and. >>>More

5 answers2024-08-14

360TimeProtect time protection tool.

Thanks to MJ0011 for delivery. >>>More

8 answers2024-08-14

The performance of the assembly machine is good, and the brand machine has good after-sales service. >>>More