[单选题]

MIMD systems can be classified into(71)oriented systems,highavailability systems and responseoriented systems.The goal of(71).orlented multiprocessing is to obtain high(71)(72)minimal computing cost.The techniques employed by multiprocessor operating systems to achieve this goal take advantage of an inherent processing versus input/output balance in the workload to produce(73)and(74)loading of system(75).(71)A.though B.through C.throughout D.throughput(72)A.at B.of C.on D.to(73)A.balance B.balanced C.balances D.balancing(74)A.uniform B.unique C.unit D.united(75)A.resource B.resources C.source D.sources

参考答案与解析:

相关试题

This passage can be classified as_______

[单选题]This passage can be classified as________.A. an advertisementB. a book reviewC. a feature storyD. A news report

  • 查看答案
  • Interview questions can be classified in

    [单选题]Interview questions can be classified into some major types by different focus, so they could be ________.A.future situation-relatedB.work experience-relatedC.subject knowledge-relatedD.past behavior-related

  • 查看答案
  • Communication networks can be classified

    [单选题]C.ommunication networks can be classified in terms of their physical arrangement or(73)Three common(73)are the star, bus, and ring.A.structuresB.topologiesC.protocolsD.frames

  • 查看答案
  • Most computer systems are (71) to two d

    [单选题]Most computer systems are (71) to two different groups of attacks:Insider attacks and outsider attacks. A system that is known to be (72) to an outsider attack by preventing (73) from outside can still be vulnerable to the insider attacks accomplishe

  • 查看答案
  • Most computer systems are (71) to two di

    [单选题]Most computer systems are (71) to two different groups of attacks:insider attacks and outsider attacks.A system that is known to be (72) to an outsider attack by preventing(73) from outside can still be vulnerable to the insider attacks accomplished

  • 查看答案
  • Most computer systems are(71)to two diff

    [单选题]Most computer systems are(71)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(72)to an outsider attack by preventing(73)from outside can still be vulnerable to the insider attacks accomplished by

  • 查看答案
  • Users also need (71) systems to help th

    [单选题]Users also need (71) systems to help them explore the web and discover interesting data sources and interfaces that support different query and search paradigms.(71) A.negativeB.adaptiveC.passiveD.adaption

  • 查看答案
  • Users also need(71)systems to help them

    [单选题]Users also need(71)systems to help them explore the web and discover interesting data sources and interfaces that support different query and search paradigms.A.negativeB.adaptiveC.passiveD.adaption

  • 查看答案
  • Communication networks can be classified in terms of their physical arrangement or ( ). Three common

    [单选题]Communication networks can be classified in terms of their physical arrange

  • 查看答案
  • English consonants can be classified into stops, fricative, nasals ect.,in terms of ( )

    [单选题]English consonants can be classified into stops, fricative, nasals ect.,in

  • 查看答案
  • MIMD systems can be classified into(71)