若有以下说明和语句 int c[4)[5],(*p)[5]; p=c; 能够正

题型:单项选择题

问题:

若有以下说明和语句 int c[4)[5],(*p)[5]; p=c; 能够正确引用c数组元素的是

A.p+1

B.*(p+3)

C.*(P+1)+3

D.*(p[0]+2)

考点:计算机等级考试C语言二级C语言笔试53
题型:单项选择题

下列关于借贷记账法的表述中,错误的是()。

A.借贷记账法是一种复式记账法

B.借贷记账法遵循“有借必有贷,借贷必相等”的记账规则

C.借贷记账法以“资产=负债+所有者权益”为理论依据

D.借贷记账法下,借方表示增加,贷方表示减少

题型:单项选择题

如图所示是小明探究电流产生的热量与哪些因素有关的装置:

(1)在两个相同的烧瓶中装有质量______(相等/不等)的煤油;

(2)瓶中各放置一根电阻丝,且R>R,采取图中的连接方式是为了控制______相同;

(3)通电一段时间后,将会看到______(甲/乙)瓶中温度计的示数上升较大.

题型:单项选择题

— Which would you like,tea or coffee?

— Either _____ OK, but I prefer coffee _____ milk. [ ]

A. is, has

B. are, with

C. is, with

D. are, has

题型:单项选择题

企业要使自己在市场中占据有利地位并取得竞争优势,必须考虑与其相关的诸多外在因素,包括( )。

A.竞争者

B.政府

C.顾客

D.员工素质

E.资金供给者

题型:单项选择题

Melissa and LoveLetter made use of the trust that exists between friends orcolleagues.Imagine receiving an (71) from a friend who asks you to open it.This is whathappens with Melissa and several other similar email (72) .Upon running,such wormsusually proceed to send themselves out to email addresses from the victim’s address book,previous emails,web pages (73)

A.attachment B.packet C.datagram D.message

As administrators seek to block dangerous email attachments through the recognition ofwell—known (74) ,virus writers use other extensions to circumvent such protection.Executable(.exe)files are renamed to.bat and.cmd plus a whole list of other extensions and wilt still runand successfully infect target users.
Frequently,hackers try to penetrate networks by sending an attachment that
looks like a flash movie,which,while displaying some cute animation,simultaneouslyruns commands in the background to steal your passwords and give the (75) access to yournetwork.
供选择答案:

更多题库