ImageVerifierCode 换一换
格式:DOC , 页数:22 ,大小:91.50KB ,
资源ID:1335767      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1335767.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(【计算机类职业资格】数据库系统工程师-计算机专业英语(三)及答案解析.doc)为本站会员(hopesteam270)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

【计算机类职业资格】数据库系统工程师-计算机专业英语(三)及答案解析.doc

1、数据库系统工程师-计算机专业英语(三)及答案解析(总分:44.00,做题时间:90 分钟)In (85) software, one question of near-universal interest is how rapidly Windows NT, which began shipping last summer, will be (86) in the marketplace and for what uses. For the most part, observers are (87) about the operating systems long term prospects

2、 but expect it to remain on (88) rather than desktops during 1994, saying that it wont become a mainstream product until (89) PCs typically have 16 to 24 MB of RAM, which is unlikely to happen next year.(分数:5.00)(1).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. syst

3、ems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(2).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(3).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(4).A.

4、 applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(5).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.Object-oriented DBMS integrated a variety of (81) da

5、ta types-such as business procedures, graphics, pictures, voice and annotated text.Object orientation also makes a (82) to application development efficiency. It makes the data, functions, attributes, and relationships an integral part of the (83) . In this way, objects can be reused and replicated.

6、Some leading RDBMS vendors support the concept of integrating object management capabilities with their current line of relational products. That capability enable users to the development cycle, since integrity logic and business roles no longer need to be programmed (84) each application.(分数:4.00)

7、1).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.F.G.H.I.J.K.L.(2).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.

8、F.G.H.I.J.K.L.(3).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.F.G.H.I.J.K.L.(4).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1

9、00)A.B.C.D.E.F.G.H.I.J.K.L.A local-area network (LAN) is a communications network that (125) a variety of devices and provides a (126) for information exchange among those devices. The scope of the LAN is small typically a single building or a cluster (丛) of buildings. The LAN is usually owned by t

10、he same organization that owns the (127) devices. The internal data rate of LAN is at least several Mb/s.The basic of LAN communication is broadcasting. At each station, there is a transmitter/receiver that communicates over a (128) shared, By other stations. A transmission from any one station is (

11、129) to and received by all other stations.(分数:5.00)(1).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.(2).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I

12、 modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.(3).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.(4).A. adopted B. attachedC. selected D. unified(分数:1.00)A.B.C.D.(5).A. broadcast B. cabl

13、e C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (16) from a friend who asks you to open it. This is what happe

14、ns with Melissa and several other similar email (17) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (18) .As administrators seek to block dangerous email attachments through the recognition of well-known

15、19) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that look

16、s like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (20) access to your network.(分数:5.00)(1).A. attachment B. packet C. datagram D. message(分数:1.00)A.B.C.D.(2).A. virtual B. virus C. worms D. bacteria(

17、分数:1.00)A.B.C.D.(3).A. memory B. caches C. ports D. registers(分数:1.00)A.B.C.D.(4).A. names B. cookies C. software D. extensions(分数:1.00)A.B.C.D.(5).A. cracker B. user C. customer D. client(分数:1.00)A.B.C.D.The relational database model requires the data be (110) through programs that dont rely on the

18、 position of the data in the database. This is in direct (111) to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program (112) a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and (113) the inform

19、ation. The (114) on how the search is done are specific to the DBMS and vary from product to product.(分数:5.00)(1).A. accessed B. moved C. read D. wrote(分数:1.00)A.B.C.D.(2).A. conduct B. contract C. contrast D. construct(分数:1.00)A.B.C.D.(3).A. consulting B. containing C. querying D. queuing(分数:1.00)A

20、B.C.D.(4).A. erases B. provides C. proves D. values(分数:1.00)A.B.C.D.(5).A. details B. documents C. tails D. tenants(分数:1.00)A.B.C.D.Network managers have long (140) practical voice-over-IP (VOIP) solutions. VOIP (141) ease network management and decreases costs by converging a companys telephony an

21、d data infrastructures into one network. And a VOIP solution implemented at a companys head-quarters with far-reaching branch offices can (142) tremendous amounts of (143) in long distance phone bills, provided that solution delivers POTS-like voice (144) over the Internet.(分数:5.00)(1).A. await B. a

22、waited C. awaiting D. awaits(分数:1.00)A.B.C.D.(2).A. promise B. promised C. promises D. promising(分数:1.00)A.B.C.D.(3).A. get B. put C. save D. waste(分数:1.00)A.B.C.D.(4).A. cash B. money C. space D. time(分数:1.00)A.B.C.D.(5).A. frequency B. length C. quality D. quantity(分数:1.00)A.B.C.D.(31) analysis em

23、phasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems. Ultimately, the system models become the (32) for designing and constructing an improved system. (33) is such a technique. The emphasis in this technique is process-centered. Systems analy

24、sts draw a series of process models called (34) . (35) is another such technique that integrates data and process concerns into constructs called objects.(分数:5.00)(1).A. Prototyping B. Accelerated C. Model-driven D. Iterative(分数:1.00)A.B.C.D.(2).A. image B. picture C. layout D. blueprint(分数:1.00)A.B

25、C.D.(3).A. Structured analysis B. Information EngineeringC. Discovery Prototyping D. Object-Oriented analysis(分数:1.00)A.B.C.D.(4).A.PERT B. DFD C. ERD D. UML(分数:1.00)A.B.C.D.(5).A. Structured analysis B. Information EngineeringC. Discovery Prototyping D. Object-Oriented analysis(分数:1.00)A.B.C.D.Whi

26、le most recent attention in the AI field has been focused on expert system software, AI (66) has also seen dramatic advances. Activity in the past years was characterized by new low-cost, powerful Lisp machines, the introduction of AI workstations, Lisp compilers becoming available for all major pro

27、fessional and engineering workstations, and the personal computer emerging as a (67) . tool for expert system development. The next few years will see this technology evolves further.Because the (68) of an AI computer represents a sizable investment, companies should carefully (69) all options that

28、are available as well as have a good idea of what the next generation of systems will offer in order to (70) the optimum system. This publication provides the information necessary to gain this understanding.(分数:5.00)(1).A. choice B. read C. important D. softwareE. hardware F. significant G. emergen

29、ce H. surveyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(2).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surveyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(3).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surv

30、eyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(4).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surveyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(5).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surveyI. purch

31、ase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.A typical (160) language contains an applicative sub-language which approximates the mathematical abstractions of “timeless“ functions applied to “spaceless“ values, where the actual operation sequences and use of storage space during expression evaluation a

32、re organized behind the (161) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (162) results during expression evaluation stored at the discretion of the language implementatio

33、n, and effecting parameter (163) and (164) operations through value copying.(分数:5.00)(1).A. imperative B. mandatory C. compulsory D. voluntary(分数:1.00)A.B.C.D.(2).A. foreground B. background C. screen D. scenes(分数:1.00)A.B.C.D.(3).A. middle B. intermediate C. previous D. final(分数:1.00)A.B.C.D.(4).A.

34、 transverse B. transportation C. transmission D. translation(分数:1.00)A.B.C.D.(5).A. assignment B. design C. value D. dispatch(分数:1.00)A.B.C.D.数据库系统工程师-计算机专业英语(三)答案解析(总分:44.00,做题时间:90 分钟)In (85) software, one question of near-universal interest is how rapidly Windows NT, which began shipping last sum

35、mer, will be (86) in the marketplace and for what uses. For the most part, observers are (87) about the operating systems long term prospects, but expect it to remain on (88) rather than desktops during 1994, saying that it wont become a mainstream product until (89) PCs typically have 16 to 24 MB o

36、f RAM, which is unlikely to happen next year.(分数:5.00)(1).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G. H.解析:(2).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.

37、 C.D.E.F.G.H.解析:(3).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D. E.F.G.H.解析:(4).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E. F.G.H.解析:(5).A. applications B.

38、 accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F. G.H.解析:解析 在系统软件中,最近被广泛关心的一个问题是,去年夏天开始出售的 Windows NT将会以多快的速度被市场接受,以及它将起什么作用。大部分观察员对该操作系统的长远前景表示出热情,但预料在 1994年间它仍将用在服务器而非台式机领域。他们说,在典型的台式机具有 16MB至 24MB内存之前,它不会成为主流产品,而这件事明年是不大可能发生的。Object-oriented DBM

39、S integrated a variety of (81) data types-such as business procedures, graphics, pictures, voice and annotated text.Object orientation also makes a (82) to application development efficiency. It makes the data, functions, attributes, and relationships an integral part of the (83) . In this way, obje

40、cts can be reused and replicated.Some leading RDBMS vendors support the concept of integrating object management capabilities with their current line of relational products. That capability enable users to the development cycle, since integrity logic and business roles no longer need to be programme

41、d (84) each application.(分数:4.00)(1).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A. B.C.D.E.F.G.H.I.J.K. L.解析:(2).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K.

42、 real-world L. into(分数:1.00)A.B.C.D. E.F.G.H.I.J.K.L.解析:(3).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.F.G. H.I.J.K.L.解析:(4).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI

43、 extent J. shorten K. real-world L. into(分数:1.00)A.B. C.D.E.F.G.H.I.J.K.L. 解析:解析 面向对象的数据库管理系统集成了现实世界的多种数据类型,如业务过程、图形、图片、语音和注释文本等。面向对象对应用开发效率也有贡献。它使数据、函数、属性和关系成为对象的完整的部分。这样,对象就可以被重用和复制。某些领先的关系数据库管理系统的供应商支持将对象管理能力与他们目前经营的关系型产品线相结合的概念。这种能力可以使用户缩短开发周期,因为完整的逻辑和事务规则不再需要编写到每个应用编程中。A local-area network (LA

44、N) is a communications network that (125) a variety of devices and provides a (126) for information exchange among those devices. The scope of the LAN is small typically a single building or a cluster (丛) of buildings. The LAN is usually owned by the same organization that owns the (127) devices. Th

45、e internal data rate of LAN is at least several Mb/s.The basic of LAN communication is broadcasting. At each station, there is a transmitter/receiver that communicates over a (128) shared, By other stations. A transmission from any one station is (129) to and received by all other stations.(分数:5.00)

46、1).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D. E.F.G.H.I.J.解析:(2).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.

47、F.G. H.I.J.解析:(3).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B. C.D.E.F.G.H.I.J.解析:(4).A. adopted B. attachedC. selected D. unified(分数:1.00)A.B.C.D.解析:(5).A. broadcast B. cable C. controlD. interconnects E. inter

48、net F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A. B.C.D.E.F.G.H.I.J.解析:解析 局域网是将许多设备互连在一起并提供一种在这些设备间交换信息的方法的通信网络。局域网范围小,通常只在一个建筑物或一群建筑物范围内。一个局域网通常为拥有互联设备的同一个组织所拥有。局域网的内部传输率至少为数 Mb/s。局域网的基本通信方式为广播方式。每个站都有一个转发/接收器,通过一个与其他站共享的媒介来通信。从任何一个站发送的消息都被广播到所有的站并被这些站接收。Melissa and LoveLet

49、ter made use of the trust that exists between friends or colleagues. Imagine receiving an (16) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (17) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (18) .As administrators seek to block dangerous email attachments through the recognition of well-known (19) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat a

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1