1、程序员-计算机英语及答案解析(总分:79.00,做题时间:90 分钟)1.Each instruction is processed (75) ,and several instructions are at varying stages of execution in the processor at any given time,this is called instruction pipelining(分数:1.00)A.exactlyB.sequencingC.sequentiallyD.intermittently2.The error messages given by a C c
2、ompiler show the message text,the most common (68) of the error,and a suggestion for fixing the error(分数:1.00)A.consequenceB.causeC.informationD.result3.Hash functions can generate a (1) bit string from an arbitrarily long piece of plain text.(分数:1.00)A.longB.shortC.variable-lengthD.fixed - length4.
3、In C language,the usual expression statements are assignments or (59) (分数:1.00)A.I/OsB.function callsC.operationsD.evaluations5.(分数:1.00)A.program written in low - level language is called “ (3) “A. compilerB.executableC.sourceD.assemble6.C+ is used with proper (66) design techniques(分数:1.00)A.class
4、-orientedB.object-basedC.face to objectD.object-orientedFor users, microkernel technology promises (11) , compact and sophisticated operating systems that are typically (12) across a range of hardware platforms.(分数:2.00)A.quicklyB.speedC.slowD.fastA.portableB.madeC.moveableD.use7.In C program,it is
5、convenient to use a break to exit from a (57) (分数:1.00)A.functionB.loopC.classD.structure8.In C language, (58) is a collection of one or more variables,possibly of different types, grouped together under a single name for convenient handling.(分数:1.00)A.a classB.a structureC.an arrayD.a function9.A c
6、lickable string or graphic that points to another Web page or document is called (18) 。(分数:1.00)A.LinkB.AnchorC.BrowserD.Hyperlink10.In C language,the increment and decrement operator can only be applied to (56) ,so an expression like x(a+b)-is illegal.(分数:1.00)A.integersB.StringsC.variablesD.pointe
7、rs11.People usually install (10) to fix known security holes.(分数:1.00)A.patchesB.compensationsC.complementsD.additions12.Which one of these statements about connecting to the Internet is true? (76) (分数:1.00)A.You must have a modem to connect to the InternetB.You must have a telephone line to connect
8、 to the InternetC.The Internet can be used to connect computers with different ISPD.The Internet can only be used to link computers with same operating system(21) put computers to practical business use, but below the surface it is the heart of an (22) - the kernel - that provides the technical wiza
9、rdry to juggle multiple programs, connect to networks and store (23) .A traditional kernel provides all the functions for applications. The kernel (24) memory, I/O devices and parcels out processor time.The kernel also supports (25) and fault tolerance, which is the ability to recover automatically
10、when parts of the system fail.(分数:5.00)A.DatabasesB.ApplicationsC.DriversD.GamesA.DBMSB.WindowsC.ApplicationD.operating systemA.textB.dataC.imageD.graphicsA.managesB.manageC.managedD.managingA.authenticationB.auto - correctionC.securityD.problem13.An identifier is a sequence of letters and digits,th
11、e first character must be (60) (分数:1.00)A.a letterB.a stringC.an arrayD.a interger14.ActiveX is a set of specifications and software that allow small programs or software components to (72) (分数:1.00)A.work togetherB.work aloneC.simplifyD.reuse15.Object-oriented DBMS integrated a variety of (16) data
12、 types -such as business procedures, graphics, pictures, voice and annotated text.(分数:1.00)A.objectB.theoreticalC.shortenD.real - world16.One use of networks is to let several computers (61) data such as file systems,printers,and tape drives(分数:1.00)A.copyB.communicateC.transferD.shareThe following
13、suggestions increase programs (69) and make them easier to Maintain:1Use a standard indention technique,blank lines,form feeds,and spaces2Insert plenty of (70) into your code(分数:2.00)A.reliabilityB.securityC.readabilityD.usabilityA.java codeB.C+ codeC.assemble codeD.comments17.A typical peripheral d
14、evice has an address which the processor uses to select the devices internal (74) (分数:1.00)A.dataB.controlsC.signalsD.registers18.One of the guidelines in writing the C code is as follows: write code that is as clear as (15) .(分数:1.00)A.readableB.reusableC.possibleD.semantic19.When the result of an
15、operation becomes larger than the limits of the representation, (79) occurs(分数:1.00)A.overexposureB.overdraftC.overflowD.overdose20.EJB technology enables rapid and simplified development of distributed, (19) ,secure and portable applications based on Java technology.(分数:1.00)A.stand-aloneB.integrat
16、ionC.transactionalD.internationalSoftware design is a (46) process. It requires a certain amount of fl air on the part of the (47) . Design can not be learned from a book . It must be practiced and learnt by experience and study of existing systems. A well (48) software system is straightforward to
17、implement and maintain , easily (49) and reliable. Badly (48) software systems, although they may work are (50) to be expensive to maintain , difficult to test and unreliable.(分数:5.00)A.createB.creativeC.creatingD.createdA.designerB.userC.computerD.designA.designB.designingC.designedD.designsA.maint
18、ainB.maintainsC.maintainingD.maintainedA.likeB.unlikelyC.unlikeD.likelyIn C program, all variables must be declared before (52) , usually at the (53) of the function before any executable statements.(分数:2.00)A.statedB.instructedC.illustratedD.useA.endB.middleC.beginningD.last21.Array is a contiguous
19、,numbered set of variables of a given base type,which can be used and passed to functions as a (67) (分数:1.00)A.recordB.unitC.fileD.parameterAn instruction is made up of (41) that specify the function to be performed and operands that represent the data to be operated on. For example, if an instructi
20、on is to perform the operation of (42) two numbers, it must know (43) the two numbers are. The processors job is to (44) instructions and operands from memory and to perform each operation. Having done that, it signals (45) to send it next instruction.(分数:5.00)A.dataB.addressC.registerD.operationsA.
21、addedB.addingC.addD.additionA.whenB.whichC.whereD.whoA.getB.pushC.makeD.putA.hard diskB.registerC.memoryD.cache22.Very brief, simple expressions in program are easy to write correctly and effortless to (4) .(分数:1.00)A.defendB.debugC.defaultD.detectSoftware quality assurance is now an emerging sub -
22、discipline of (36) . As Buckly and oston point out, (37) software quality assurance is likely to lead to an ultimate (38) of software costs. However, the major hurdle in the path of software management in this area is the lack of usable software (39) . The development of accepted and generally appli
23、cable standards should be one of the principal goals of (40) in software engineering.(分数:5.00)A.software engineeringB.software designC.codingD.testingA.effectiveB.effortlessC.studyD.weekA.balanceB.incrementC.productionD.reductionA.mechanismB.engineeringC.standardsD.designA.productionB.planningC.mana
24、gementD.research23.SOAP uses (20) technologies to define an extensible messaging framework providing a message construct that can be exchanged over a variety of underlying protocols(分数:1.00)A.HTYPB.HTMLC.XMLD.XHTMLBecause web servers are (31) and application independent, they can send or request dat
25、a from legacy or external applications including databases. All replies, once converted into (32) mark-up language, can then be transmitted to a (33) . Used in this way, Intranets can offer (34) desktop support costs, easy links with legacy applications and databases and, above all, (35) of use.(分数:
26、5.00)A.machineB.IPC.platformD.networkA.plaintextB.hypertextC.ciphertextD.supertextA.browserB.applicationC.routerD.serverA.higherB.lowerC.sameD.differentA.hardB.difficultC.easeD.around24.There is only one Web (7) technology URIs.(分数:1.00)A.accessingB.naming/addressingC.communicatingD.searching25. (9)
27、 is not a basic element of communication protocols(分数:1.00)A.formatB.grammarC.transmit mediaD.timer26.In object-oriented program languages, a class must exposure its (13) to the outside.(分数:1.00)A.variantsB.algorithmC.interfaceD.statements27.The standard class (17) in C + + language contain many use
28、ful classes for input and output, string handling, mathematical computations, and system programming tasks.(分数:1.00)A.databaseB.filesC.librariesD.subroutine28.A requirement is a feature of the system or a description of something the system is capable of doing in order to fulfill the systems (71) (分
29、数:1.00)A.planB.purposeC.documentD.Design29. (6) is an important one, but not the only web data formats.(分数:1.00)A.HTTPB.HTMLC.WWWD.Explorer30.1OOBASE-TX makes use of two pairs of twisted pair cable,one pair used for (73) and the other for reception(分数:1.00)A.detectionB.transmissionC.relationD.Connec
30、tion31. (65) is the address of a variable or a variable in which the address of another variable is stored(分数:1.00)A.DirectorB.RecordC.ArrayD.Pointer32.Gateway is a device used to connect two separate network that use (2) communication protocol.(分数:1.00)A.same kind ofB.similarC.differentD.same33.On
31、a virtual memory system, the logical memory space available to the program is totally (14) of the physical memory space.(分数:1.00)A.dependentB.independentC.inD.outsideIn C language, external variables have to be defined (54) function, this (55) actual storage for it.(分数:2.00)A.inB.outC.insideD.outsid
32、eA.allocatesB.locatesC.findsD.100ks for34. (77) is not a programming language(分数:1.00)A.COBOLB.JavaC.CMMD.Basic35.The operating system has several major components,including the (64) ,a memory management system,the file system manager,device drivers,and the system libraries(分数:1.00)A.application ker
33、nelB.information kernelC.network kernelD.system kernel36.In Java language, objects are instances of (5) .(分数:1.00)A.classB.typeC.structureD.moduleBy using (26) , a 600M -byte music CD can be compressed to 50M bytes or less. It can be streamed (downloaded in chunks) so that you can begin listening to
34、 the opening bars while the (27) of the file arrives in the background. And, most important, the music files of this kind retain good listening (28) that earlier (29) schemes lacked. That (30) of features makes accessing and distributing music on the web practical for the first time.(分数:5.00)A.JPGB.
35、MP3C.MP4D.VODA.nextB.pastC.restD.hostA.quantityB.massC.amountD.qualityA.compressionB.codingC.transmissionD.playingA.differenceB.combinationC.additionD.condition37.In C language, there are several methods of communicating data between functions, one of which is by (51) 。(分数:1.00)A.argumentsB.variable
36、sC.messagesD.constants38.Comment is nonprogram (78) embedded in a program to explain its form and function to human readers(分数:1.00)A.commandB.expressionC.textD.statement39. (8) could find out syntax errors in a source program.(分数:1.00)A.ComplierB.Operate systemC.ApplicationD.ExplainerA firewall is
37、a security system designed to (62) an organizations network against (63) (分数:2.00)A.preventB.protectC.developD.exploitA.operatingB.programmingC.threatsD.service程序员-计算机英语答案解析(总分:79.00,做题时间:90 分钟)1.Each instruction is processed (75) ,and several instructions are at varying stages of execution in the p
38、rocessor at any given time,this is called instruction pipelining(分数:1.00)A.exactlyB.sequencingC.sequentially D.intermittently解析:解析 每一条指令都是顺序处理的,在某个给定时刻,数条指令同时处在不同的执行阶段,这种执行方式称为指令的流水处理。2.The error messages given by a C compiler show the message text,the most common (68) of the error,and a suggestion
39、for fixing the error(分数:1.00)A.consequenceB.cause C.informationD.result解析:解析 C 编译器给出的错误信息包括信息文本、最常见的错误原因和一个纠正错误的建议。3.Hash functions can generate a (1) bit string from an arbitrarily long piece of plain text.(分数:1.00)A.longB.shortC.variable-lengthD.fixed - length 解析:解析 Hash 函数能够根据任意长度的纯文本产生一个固定长度的字符串
40、。4.In C language,the usual expression statements are assignments or (59) (分数:1.00)A.I/OsB.function callsC.operationsD.evaluations 解析:解析 c 语言中,表达式通常是赋值语句或者函数调用。5.(分数:1.00)A.program written in low - level language is called “ (3) “A. compilerB.executableC.sourceD.assemble 解析:解析 一段用低级语言编写的程序称为“汇编程序”。6.
41、C+ is used with proper (66) design techniques(分数:1.00)A.class-orientedB.object-basedC.face to objectD.object-oriented 解析:解析 C+使用了一定的面向对象设计技术。For users, microkernel technology promises (11) , compact and sophisticated operating systems that are typically (12) across a range of hardware platforms.(分数:
42、2.00)A.quicklyB.speedC.slowD.fast 解析:A.portable B.madeC.moveableD.use解析:解析 对用户来说,微内核技术承诺了可以实现快速,紧凑,复杂精密的操作系统,而且该系统在一定范围的硬件平台上都是轻便的。7.In C program,it is convenient to use a break to exit from a (57) (分数:1.00)A.functionB.loop C.classD.structure解析:解析 c 语言中,使用一个 break语句跳出循环是很方便的。8.In C language, (58) is
43、 a collection of one or more variables,possibly of different types, grouped together under a single name for convenient handling.(分数:1.00)A.a classB.a structure C.an arrayD.a function解析:解析 语言中,一个结构是由一个或者多个相同类型或不同类型的变量构成的集合,这些变量用一个简单的名字组织在一起,可以很方便地引用。9.A clickable string or graphic that points to ano
44、ther Web page or document is called (18) 。(分数:1.00)A.LinkB.AnchorC.BrowserD.Hyperlink 解析:解析 一个可以点击的指向另一个网页或者文档的字符串或者图片称为超链接。10.In C language,the increment and decrement operator can only be applied to (56) ,so an expression like x(a+b)-is illegal.(分数:1.00)A.integersB.StringsC.variables D.pointers解析:
45、解析 c 语言中,自增和自减操作符,只能适用于变量,所以一个类似 x(a+b)-的表达式是非法的。11.People usually install (10) to fix known security holes.(分数:1.00)A.patches B.compensationsC.complementsD.additions解析:解析 人们常常安装补丁程序以修复已知的安全漏洞。12.Which one of these statements about connecting to the Internet is true? (76) (分数:1.00)A.You must have a
46、modem to connect to the InternetB.You must have a telephone line to connect to the InternetC.The Internet can be used to connect computers with different ISP D.The Internet can only be used to link computers with same operating system解析:解析 下列关于连接到 Internet的说法中,哪一个是正确的?C. Internet 能够连接使用不同ISP(Interne
47、t服务提供商)的计算机(21) put computers to practical business use, but below the surface it is the heart of an (22) - the kernel - that provides the technical wizardry to juggle multiple programs, connect to networks and store (23) .A traditional kernel provides all the functions for applications. The kernel
48、(24) memory, I/O devices and parcels out processor time.The kernel also supports (25) and fault tolerance, which is the ability to recover automatically when parts of the system fail.(分数:5.00)A.DatabasesB.Applications C.DriversD.Games解析:A.DBMSB.WindowsC.ApplicationD.operating system 解析:A.textB.data
49、C.imageD.graphics解析:A.manages B.manageC.managedD.managing解析:A.authenticationB.auto - correctionC.security D.problem解析:解析 应用程序(Applications)使计算机有了实际的商业用途,但在这种表面现象之下(operating system),是操作系统(operating system)的内核为多程序间的切换、网络的连接和数据(data)存储提供了技术的支持。传统的内核为应用程序提供各种功能,内核管理(manage)内存、I/O 设备并分配 CPU的时隙。内核还支持安全机制(security)及容错机制,即当系统的一部分崩溃时,内核能够自动恢复。13.An identifier is a sequence of letters and digits,the first character must be (60) (分数:1.00)A.a letter B.a stringC.an arrayD.a interger解析:解析 标识符是一个由字母和数字组成的字符序列,它要求首
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1