ImageVerifierCode 换一换
格式:DOC , 页数:13 ,大小:64KB ,
资源ID:1336014      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1336014.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(【计算机类职业资格】电子商务设计师-专业英语及答案解析.doc)为本站会员(刘芸)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

【计算机类职业资格】电子商务设计师-专业英语及答案解析.doc

1、电子商务设计师-专业英语及答案解析(总分:40.00,做题时间:90 分钟)一、单项选择题(总题数:8,分数:40.00)Originally introduced by Netscape Communications, (1) are a general mechanism which HTTP Server side applications, such as CGI (2) , can use to both store and retrieve information on the HTTP (2) side of the connection. Basically, Cookies

2、can be used to compensate for the (4) nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (5) .(分数:5.00)A.BrowsersB.CookiesC.ConnectionsD.ScriptsA.graphicsB.processesC.scriptsD.textsA.ClientB.EditorC.CreatorD.ServerA.fixedB.flex

3、ibleC.stableD.statelessA.programsB.applicationsC.frameworksD.constrainsMelissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon

4、running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (8) .As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such p

5、rotection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animat

6、ion, simultaneously runs commands in the background to steal your passwords and give the (10) access to your network.(分数:5.00)A.attachmentB.packetC.datagramD.messageA.virtualB.virusC.wormsD.bacteriaA.memoryB.cachesC.portsD.registersA.namesB.cookiesC.softwareD.extensionsA.crackerB.userC.customerD.cli

7、entNetworks can be interconnected by different devices. In the physical layer, networks can be connected by (11) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches, which operate at data link layer. They can accept (12) ,examine the

8、MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (13) network layer, the router may be able to translate between the packer formats. In the trans

9、port layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (14) . As an example, gateways between Internet e-mail and X.400 e-mail must (15) the e-mail message and change various header fields

10、.(分数:5.00)A.repeatersB.relaysC.packagesD.modemsA.framesB.packetsC.packagesD.cellsA.specialB.dependentC.similarD.dissimilarA.syntaxB.semanticsC.languageD.formatA.analyzeB.parseC.deleteD.createThe purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (1

11、6) of the technical requirements for the software product.During the requirements definition phase, the requirements definition team uses an iterative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must per

12、form and each _( 17) that it must meet. The starting point is usually a set of high level requirements from the (18) that describe the project or problem.In either case, the requirements definition team formulates an overall concept for the system and then defines (19) showing how the system will be

13、 operated publishes the system and operations concept document and conducts a system concept review (SCR).Following the SCR, the team derives (20) requirements for the system from the high level requirements and the system and operations concept. Using structured or object-oriented analysis, the tea

14、m specifies the software functions and algorithms needed to satisfy each detailed requirement.(分数:5.00)A.functionB.definitionC.specificationD.statementA.criterionB.standardC.modelD.systemA.producerB.customerC.programmerD.analyserA.rulesB.principlesC.scenariosD.scenesA.detailedB.outlinedC.totalD.comp

15、leteThe Rational Unified Process (RUP) is a software engineering process, which captures many of best practices in modern software development. The notions of (21) and scenarios have been proven to be an excellent way to capture function requirements. RUP can be described in two dimensions - time an

16、d content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive (22) which is concluded with a well-defined (23) and can be further broken down into (24) - a complete development loop resulting in a release of an executable product, a subse

17、t of the final product under development, which grows incrementally to become the final system. The content structure refers to the disciplines, which group (25) logically by nature.(分数:5.00)A.artifactsB.use-casesC.actorsD.workersA.orientationsB.viewsC.aspectsD.phasesA.milestoneB.end-markC.measureD.

18、criteriaA.roundsB.loopsC.iterationsD.circularitiesA.functionsB.workflowsC.actionsD.activitiesMost computer systems are (26) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (27) to an outsider attack by preventing (28) from outside can still be v

19、ulnerable to the insider attacks accomplished by abusive usage of (29) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (30) by tools referred to as Intrusion Det

20、ection Systems.(分数:5.00)A.vulnerableB.weekC.sensitivelyD.helplessA.reliableB.secureC.indestructibleD.steadyA.visitB.accessC.I/OD.read/writeA.powerB.rightsC.authorizedD.commonA.searchedB.checkedC.testedD.detectedSoon, more of the information we receive via the Internet could come (31) in digital wrap

21、pers.Wrappers are made up (32) software code thats targeted to do specific things with the data (33) within them, such as helping to define queries for search engines. They also keep (34) from (35) access to that code.(分数:5.00)A.packageB.packagedC.packagesD.packagingA.ofB.offC.onD.outA.closeB.closed

22、C.encloseD.enclosedA.insidersB.moneyC.outsidersD.warehouseA.gainB.gainedC.gainsD.gainingA typical (36) language contains an applicative sub-language which approximates the mathematical abstractions of “timeless“ functions applied to “spaceless“ values, where the actual operation sequences and use of

23、 storage space during expression evaluation are organized behind the (37) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (38) results during expression evaluation stored at t

24、he discretion of the language implementation, and effecting parameter (39) and (40) operations through value copying.(分数:5.00)A.imperativeB.mandatoryC.compulsoryD.voluntaryA.foregroundB.backgroundC.screenD.scenesA.middleB.intermediateC.previousD.finalA.transverseB.transportationC.transmissionD.trans

25、lationA.assignmentB.designC.valueD.dispatch电子商务设计师-专业英语答案解析(总分:40.00,做题时间:90 分钟)一、单项选择题(总题数:8,分数:40.00)Originally introduced by Netscape Communications, (1) are a general mechanism which HTTP Server side applications, such as CGI (2) , can use to both store and retrieve information on the HTTP (2) s

26、ide of the connection. Basically, Cookies can be used to compensate for the (4) nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (5) .(分数:5.00)A.BrowsersB.Cookies C.ConnectionsD.Scripts解析:A.graphicsB.processesC.scripts D.text

27、s解析:A.Client B.EditorC.CreatorD.Server解析:A.fixedB.flexibleC.stableD.stateless 解析:A.programsB.applications C.frameworksD.constrains解析:本题涉及的是 Cookies相关知识,参考译文如下。网景公司最初推出的 Cookies是 HTTP服务器侧的应用,如 CGI脚本,用来保存和检索连接上它的 HTTP客户端信息的一种通用机制。基本上,Cookies 可以被用来弥补 HTTP协议的无状态特性。这个简单的、持续的、客户端的状态极大地扩展了基于 WWW的应用的能力。Meli

28、ssa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon running, such worms usually proceed to send themselves out to email address

29、es from the victims address book, previous emails, web pages (8) .As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whol

30、e list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords

31、 and give the (10) access to your network.(分数:5.00)A.attachment B.packetC.datagramD.message解析:A.virtualB.virusC.worms D.bacteria解析:A.memoryB.caches C.portsD.registers解析:A.namesB.cookiesC.softwareD.extensions 解析:A.cracker B.userC.customerD.client解析:本题涉及蠕虫病毒的相关知识,参考译文如下。Melissa和 LoveLetter利用朋友或同事之间存在的

32、信任,想象一下从朋友那里收到一个附件并要求你打开它,这是 Melissa和一些其他电子邮件蠕虫病毒经常发生的事情。一旦运行,这种蠕虫病毒通常将自己发送到被感染者的地址簿、先前的电子邮件、网页缓存保存的邮件地址中。由于管理员一般通过识别众所周知的扩展名来搜索和阻止危险的电子邮件附件,所以病毒作者使用其他扩展名来绕过这种保护。可执行文件(.exe)被重新命名为“bat”和“cmd”加上其他扩展名的整个列表,它仍将运行并成功地感染目标用户。通常情况下,黑客通过发送看起来像 Flash影片的附件来渗入网络,这些影片在展示一些可爱的动画的同时在后台运行命令窃取你的密码使黑客访问你的网络。Networks

33、 can be interconnected by different devices. In the physical layer, networks can be connected by (11) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches, which operate at data link layer. They can accept (12) ,examine the MAC address

34、, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (13) network layer, the router may be able to translate between the packer formats. In the transport layer

35、we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (14) . As an example, gateways between Internet e-mail and X.400 e-mail must (15) the e-mail message and change various header fields.(分数:5.00)A

36、.repeaters B.relaysC.packagesD.modems解析:A.frames B.packetsC.packagesD.cells解析:A.specialB.dependentC.similarD.dissimilar 解析:A.syntaxB.semantics C.languageD.format解析:A.analyzeB.parse C.deleteD.create解析:涉及是网络的相关知识,参考译文如下。网络可以用不同的设备互联,在物理层用中继器或集线器互联,这些设备只是在相同的网络之间传送比特串;在上面的数据链路层可以使用网桥或交换机,这些设备接收数据帧,检查 M

37、AC地址,并可以实现少量的协议转换,把数据帧转发到不同的网络中;在网络层我们使用路由器连接两个网络,如果两个网络的网络层不同,路由器能够转换分组格式;在传输层我们使用传输网关,它可以在两个传输连接之间建立接口;最后在应用层应用网关实现消息语法之间的翻译。例如,在 Internet邮件和 X.400邮件之间的网关可以对邮件报文进行语义分析,并修改报文的各个报头字段。The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (16) of th

38、e technical requirements for the software product.During the requirements definition phase, the requirements definition team uses an iterative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and

39、 each _( 17) that it must meet. The starting point is usually a set of high level requirements from the (18) that describe the project or problem.In either case, the requirements definition team formulates an overall concept for the system and then defines (19) showing how the system will be operate

40、d publishes the system and operations concept document and conducts a system concept review (SCR).Following the SCR, the team derives (20) requirements for the system from the high level requirements and the system and operations concept. Using structured or object-oriented analysis, the team specif

41、ies the software functions and algorithms needed to satisfy each detailed requirement.(分数:5.00)A.functionB.definitionC.specification D.statement解析:A.criterion B.standardC.modelD.system解析:A.producerB.customer C.programmerD.analyser解析:A.rulesB.principlesC.scenarios D.scenes解析:A.detailed B.outlinedC.to

42、talD.complete解析:涉及软件工程的相关知识,参考译文如下。需求定义阶段的作用是为软件产品产生一个清晰、完整、一致并可测试的技术需求规格说明。在需求定义阶段,需求定义团队通过迭代过程把有关系统需求宽泛的陈述扩展为系统必须实现的各个功能的完整且详细的规格说明,以及系统应该满足的各种准则,这个过程的起点通常是由用户提供的描述项目或问题的一组高级需求。在任何情况下,需求定义团队应该阐明与系统有关的整体概念,并且设定一种能够显示系统如何运作的场景。发布有关系统和运行的概念文档,并进行系统概念的评审(SCR)。在 SCR之后,团队应该根据高级需求和系统运行概念导出详细的系统需求,通过结构化的或

43、面向对象的分析技术,团队可以规范系统功能说明满足每一细节需求的算法。The Rational Unified Process (RUP) is a software engineering process, which captures many of best practices in modern software development. The notions of (21) and scenarios have been proven to be an excellent way to capture function requirements. RUP can be describ

44、ed in two dimensions - time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive (22) which is concluded with a well-defined (23) and can be further broken down into (24) - a complete development loop resulting in a release of

45、an executable product, a subset of the final product under development, which grows incrementally to become the final system. The content structure refers to the disciplines, which group (25) logically by nature.(分数:5.00)A.artifactsB.use-cases C.actorsD.workers解析:A.orientationsB.viewsC.aspectsD.phas

46、es 解析:A.milestone B.end-markC.measureD.criteria解析:A.roundsB.loopsC.iterations D.circularities解析:A.functionsB.workflowsC.actionsD.activities 解析:参考译文如下。RUP (Rational Unified Process)是一种软件工程过程产品,它吸取了现代软件开发中许多成功的实践。事实证明,采用用例( use-cases)和剧情(scenarios)捕获目标系统的功能需求是一种较好的办法。可以采用二维模型来描述 RUP时间和内容。从时间维来看,软件生存周期

47、被划分为不同的周期(cycles)。每个周期又被划分为 4个连续的阶段( phase),每个阶段都包含一个妥善定义的里程碑(milestone),每个阶段还可以被进一步划分为若干轮迭代(iterations)。一次迭代是一次完整的开发过程,每次迭代结束时会发布一个可执行的产品,这个产品是正在开发的软件系统的一个子集,它会逐渐扩展为最终系统。内容结构指的是一些将活动( activities)组织在一起的、天然存在的规则。Most computer systems are (26) to two different groups of attacks: Insider attacks and ou

48、tsider attacks. A system that is known to be (27) to an outsider attack by preventing (28) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (29) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage asse

49、ssment, but also helps to prevent future attacks. These attacks are usually (30) by tools referred to as Intrusion Detection Systems.(分数:5.00)A.vulnerable B.weekC.sensitivelyD.helpless解析:A.reliableB.secure C.indestructibleD.steady解析:A.visitB.access C.I/OD.read/write解析:A.powerB.rightsC.authorized D.common解析:A.searchedB.checked C.testedD.detected解析:参考译文如下。大部分计算机系统都容易受到两种不同类型的攻击:来自内部的攻击和来自外部的攻击。系统可以通过禁止外部的访问保证免受外部攻击,但是仍然容易受到因用户权限滥用而引起的内部攻击。检测这样的权限滥用和来自外部的攻击,不仅提供了能评估损害的信息,而且也有助于防止以后再受到攻击。这些攻击通常用被称为入侵检测系统的工具检测出来。Soon, more of the information we receive via the Int

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1