VRML is a(1)for 3D multimedia and shared virtual worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structured graphics, and extra(2)(z and time) to the presentation of documents. The applications of VRML are(3),ranging from simple business graphics to entertaining WWW page graphics, manufacturing, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communities. X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwards(4)with VRML. Furthermore, it is componentized, profiled, and extensible, which makes it possible to use X3D in very different(5),from high-end visualizations to lightweight applications.空白(2)处应选择()
A. subject
B. object
C. dimensions
D. disconnection
查看答案
患儿,男,7岁。晚上突然喘憋,烦躁不安,不能平卧,既往该患儿曾两次患毛细支气管炎,查体:体温正常,呼气性呼吸困难,两肺可闻及大量哮鸣音。以下哪项治疗措施不应采用()
A. 舒喘灵雾化吸入
B. 鲁米那镇静
C. 肾上腺皮质激素
D. 氨茶碱静点
E. 给予抗生素
To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks.These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(6) .Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(7)activity. For many organizations, however,the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle's security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch (8) of service attacks or steal (9) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (10) and worms acquired from unprotected public networks. Hackers masquer-ading as internal users can take advantage of weak internal security to gain access to confidential information.空白处(7)应选择()
A. venomous
B. malicious
C. felonious
D. villainous
()描述了导致具有先后序的任务推迟的逻辑关系。
A. 滞后
B. 领先
C. 浮动
D. 缓慢
关于固定资产子系统的月末结账功能,下列说法正确的是()?
A. 本月不结账,可以以下月日期登录系统,处理下期数据。
B. 结账后发现有未处理的业务,只能在下月处理。
C. 结账后,不能再以本月日期登录系统。
D. 为保证数据的安全性,结账前一定要进行数据备份。