ImageVerifierCode 换一换
格式:DOC , 页数:10 ,大小:54.50KB ,
资源ID:1329137      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1329137.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(【计算机类职业资格】信息处理技术员-计算机专业英语及答案解析.doc)为本站会员(eventdump275)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

【计算机类职业资格】信息处理技术员-计算机专业英语及答案解析.doc

1、信息处理技术员-计算机专业英语及答案解析(总分:30.00,做题时间:90 分钟)Structured programming practices (1) rise to Pascal, in which constructs were introduced to make programs more readable and better (2) . (3) provided a combination of assembly language and high-level structure to create a general-purpose language that could b

2、e used from system to application programming. Next came object orientation, which is (4) of a methodology and design philosophy than a language issue. This is (5) by the addition of so-called OO extensions to current languages, such as application.(分数:5.00)A.givingB.givenC.gaveD.givesA.structureB.s

3、tructuredC.constructsD.structuresA.logicB.functionC.flexibleD.applicationA.moreB.littleC.a matterD.importantA.evidenceB.evidencedC.evidencesD.evidencingNET is both a business strategy from Microsoft and its (6) of (7) support for what are known as Web services, the ability to use the Web rather than

4、 your own computer for various services. Microsofts goal is to provide individual and business users with a (8) interoperable and Web-enabled interface for applications and computing devices and to make computing activities increasingly Web browser-oriented. The NET (9) includes servers; building-bl

5、ock services, such as Web-based data storage; and device software. It also includes Passport, Microsofts fill-in-the-form-only-once identity (10) service.(分数:5.00)A.individualB.collectionC.setD.unitA.applicationB.applicationsC.organizingD.programmingA.seamB.seamingC.seamlessD.seamlesslyA.planeB.plat

6、eC.platformD.plantA.verificationB.validC.validateD.validation1.There are many page replacement algorithms in the page management.Most frequently used algorithm is (11) (分数:1.00)A.PPTB.OPTC.LRUD.FIFO2.Every host and router on the Internet has an IP address, which encodes its (12) .(分数:1.00)A.host num

7、berB.network numberC.host number and socketD.host number and network number3.When you choose a command name that is followed by “.“ on menu, a (13) box appears in which you provide more information.(分数:1.00)A.textB.dialogC.listD.check4.In C language, it is convenient to use a (14) to exit from a loo

8、p.(分数:1.00)A.breakB.endC.stopD.quit5. (15) is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.(分数:1.00)A.RouterB.Network CardC.FirewallD.Protocol6.In a certain cache system, the modified cache block is written to main memory only whe

9、n the block is replaced. All of the following are used to describe this policy EXCEPT (16) .(分数:1.00)A.store-inB.copy-backC.write-backD.write-through7.The methods used in Asynchronous Transfer Mode (ATM) are switch technology and (17) is used to describe this mode.(分数:1.00)A.cell exchangeB.message e

10、xchangeC.information exchangeD.packet exchange8.In advanced PC bus or local bus, (18) has the fastest data throughput.(分数:1.00)A.EISAB.MCAC.PCID.ISA9. (19) is encoded with Differential Manchester in the diagram below.(分数:1.00)A.10110011100B.I1001100011C.00111001101D.1100011001010. (20) is NOT a conc

11、ept of White Box Testing.(分数:1.00)A.You should execute all logical decisions on their tree and false sides.B.You should execute all independent paths within a module at least once.C.You should execute all loops at their boundary conditions.D.You should execute all interfaces at their boundary condit

12、ions.11.TCP service is obtained by having both the sender and the receiver create and points, which are called (21) 。(分数:1.00)A.Network addressB.supenet addressC.socketD.IP address12.Most frequently used algorithm for page replacement is (22) .(分数:1.00)A.LRUB.FIFOC.OPTD.PPT13.Enhancing a software pr

13、oduct may consume (23) percent of the total life-cycle effort.(分数:1.00)A.80B.30C.50D.4214.The basic function of the file system is accessing files by names. The function can be realized by (24) .(分数:1.00)A.directory-managingB.boosting the speed of the file-accessingC.file-protectingD.improving the u

14、tilization of storage15.Which one of the following expressions is equivalent to X BETWEEN 15 AND 25? (25) .(分数:1.00)A.X15 AND X25B.X=15 AND X=25C.X25 AND X15D.X=15 AND X=2516.The central processing unit(CPU), sometimes referred to as the processor, interprets (解释) and carries out the basic (26) that

15、 operate a computer.(分数:1.00)A.databaseB.filesC.blockD.instructions17.Output is data that has been processed into useful form called (27) . That is a computer processes input into output.(分数:1.00)A.dataB.informationC.interfaceD.system18.Consumption of the total life-cycle effort in software maintena

16、nce is (28) that in software development.(分数:1.00)A.less thanB.larger thanC.equal or less thanD.equal or larger than19.What refers to the protocols used to determine who goes next on a multi-access channel? (29) (分数:1.00)A.MAC(medium access control)B.ARP(address resolution protocol)C.NAT(network add

17、ress translation)D.CIDR(classless interdomain routing)20.Which one of the following describes the similarity between the stack and the queue? (30) (分数:1.00)A.logical characteristicsB.physical characteristicsC.operation methodD.element type信息处理技术员-计算机专业英语答案解析(总分:30.00,做题时间:90 分钟)Structured programmin

18、g practices (1) rise to Pascal, in which constructs were introduced to make programs more readable and better (2) . (3) provided a combination of assembly language and high-level structure to create a general-purpose language that could be used from system to application programming. Next came objec

19、t orientation, which is (4) of a methodology and design philosophy than a language issue. This is (5) by the addition of so-called OO extensions to current languages, such as application.(分数:5.00)A.givingB.givenC.gave D.gives解析:A.structureB.structured C.constructsD.structures解析:A.logicB.functionC.fl

20、exibleD.application 解析:A.more B.littleC.a matterD.important解析:A.evidenceB.evidenced C.evidencesD.evidencing解析:NET is both a business strategy from Microsoft and its (6) of (7) support for what are known as Web services, the ability to use the Web rather than your own computer for various services. M

21、icrosofts goal is to provide individual and business users with a (8) interoperable and Web-enabled interface for applications and computing devices and to make computing activities increasingly Web browser-oriented. The NET (9) includes servers; building-block services, such as Web-based data stora

22、ge; and device software. It also includes Passport, Microsofts fill-in-the-form-only-once identity (10) service.(分数:5.00)A.individualB.collection C.setD.unit解析:A.applicationB.applicationsC.organizingD.programming 解析:A.seamB.seamingC.seamlessD.seamlessly 解析:A.planeB.plateC.platform D.plant解析:A.verifi

23、cation B.validC.validateD.validation解析:1.There are many page replacement algorithms in the page management.Most frequently used algorithm is (11) (分数:1.00)A.PPTB.OPTC.LRU D.FIFO解析:2.Every host and router on the Internet has an IP address, which encodes its (12) .(分数:1.00)A.host numberB.network numbe

24、rC.host number and socketD.host number and network number 解析:3.When you choose a command name that is followed by “.“ on menu, a (13) box appears in which you provide more information.(分数:1.00)A.textB.dialog C.listD.check解析:4.In C language, it is convenient to use a (14) to exit from a loop.(分数:1.00

25、)A.break B.endC.stopD.quit解析:5. (15) is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.(分数:1.00)A.RouterB.Network CardC.Firewall D.Protocol解析:6.In a certain cache system, the modified cache block is written to main memory only when

26、the block is replaced. All of the following are used to describe this policy EXCEPT (16) .(分数:1.00)A.store-inB.copy-backC.write-backD.write-through 解析:7.The methods used in Asynchronous Transfer Mode (ATM) are switch technology and (17) is used to describe this mode.(分数:1.00)A.cell exchange B.messag

27、e exchangeC.information exchangeD.packet exchange解析:8.In advanced PC bus or local bus, (18) has the fastest data throughput.(分数:1.00)A.EISAB.MCAC.PCI D.ISA解析:9. (19) is encoded with Differential Manchester in the diagram below.(分数:1.00)A.10110011100B.I1001100011 C.00111001101D.11000110010解析:10. (20)

28、 is NOT a concept of White Box Testing.(分数:1.00)A.You should execute all logical decisions on their tree and false sides.B.You should execute all independent paths within a module at least once.C.You should execute all loops at their boundary conditions.D.You should execute all interfaces at their b

29、oundary conditions. 解析:11.TCP service is obtained by having both the sender and the receiver create and points, which are called (21) 。(分数:1.00)A.Network addressB.supenet addressC.socketD.IP address 解析:12.Most frequently used algorithm for page replacement is (22) .(分数:1.00)A.LRU B.FIFOC.OPTD.PPT解析:

30、13.Enhancing a software product may consume (23) percent of the total life-cycle effort.(分数:1.00)A.80B.30C.50D.42 解析:14.The basic function of the file system is accessing files by names. The function can be realized by (24) .(分数:1.00)A.directory-managing B.boosting the speed of the file-accessingC.f

31、ile-protectingD.improving the utilization of storage解析:15.Which one of the following expressions is equivalent to X BETWEEN 15 AND 25? (25) .(分数:1.00)A.X15 AND X25B.X=15 AND X=25C.X25 AND X15D.X=15 AND X=25 解析:16.The central processing unit(CPU), sometimes referred to as the processor, interprets (解

32、释) and carries out the basic (26) that operate a computer.(分数:1.00)A.databaseB.filesC.blockD.instructions 解析:17.Output is data that has been processed into useful form called (27) . That is a computer processes input into output.(分数:1.00)A.dataB.information C.interfaceD.system解析:18.Consumption of th

33、e total life-cycle effort in software maintenance is (28) that in software development.(分数:1.00)A.less thanB.larger than C.equal or less thanD.equal or larger than解析:19.What refers to the protocols used to determine who goes next on a multi-access channel? (29) (分数:1.00)A.MAC(medium access control) B.ARP(address resolution protocol)C.NAT(network address translation)D.CIDR(classless interdomain routing)解析:20.Which one of the following describes the similarity between the stack and the queue? (30) (分数:1.00)A.logical characteristics B.physical characteristicsC.operation methodD.element type解析:

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1