WebSQL is a SQL-like (71) language for extracting information from the web. Its
capabilities for performing navigation of web (72) make it a useful tool for automating
several web-related tasks that require the systematic processing of either all the links in a
(73) , all the pages that can be reached from a given URL through (74) that match a
pattern, or a combination of both. WebSQL also provides transparent access to index servers that
can be queried via the Common (75) Interface.
(71)A. query B. transaction C. communication D. programming
(72)A. browsers B. servers C. hypertexts D. clients
(73)A. hypertext B. page C. protocol D. operation
(74)A. paths B. chips C. tools D. directories
(75)A. Router B. Device C. Computer D. Gateway
第1题:
A.openDatabase
B.createDatabase
C.excuteSql
D.setDatabase
第2题:
Soon, more of the information we receive via the Internet could come(71)in digital wrappers.
Wrappers are made up(72)software code that's targeted to do specific things with the data(73)within them, such as helping to define queries for search engines. They also keep(74)from(75)access to that code.
A.package
B.packaged
C.packages
D.packaging
第3题:
XML is a(71)language for documents containing(72)information.
Structured information contains both content(words, pictures, etc.)and some indication of what role that content plays(for example, content in a section heading has a different meaning from content in a footnote, which means something different than content in a figure caption or content in a database table, etc.). Almost all documents have some structure.
A markup language is a(73)to(74)structures in a document. The XML specification defines a standard way to add markup to(75).
A.make-up
B.madeup
C.markup
D.makeup
第4题:
● Spyware and other forms of malware are the biggest online threat to your computer's (71) nowadays. These malicious (72)which get to your PC through freeware, shareware, commercial sites, deceptive pop-ups or in any other way, can record your surfing habits and sites you visit, share your personal information with their partners. Any personal (73), when inwrong hands, can leave you a victim of an "identity theft" by steeling your credit (74)details,birth records and other (75) information.
第5题:
In information theory, "information" is regarded as knowledge which reduces or removes(71) about the occurrence of a specific event from a given set of possible events. The concept "event" is to be understood as used in the theory of probability. For instance, an event may be the occurrence of a(72) character or word in a given message or in a given position of a message.In communication theory, channel is defined as that part of a communication system that connects the message source with the message sink. An encoder may be inserted between the message source and the input to the channel, and a(73) between the output of the channel and the message sink. Generally, these two units are not considered as being parts of the channel. In certain cases, however, they may be considered as pans of the message source and message sink,(74) In information theory(75) to Shannon, the channel can be characterized by the set of conditional probabilities of occurrence of all the messages received at the message sink when a given message emanates from the message source.
A.uncertainty
B.unreliability
C.randomness
D.inconsistency
第6题:
●Information (71) involves all the operations of an office.
(71)A. record
B. processing
C. input
D. output