ImageVerifierCode 换一换
格式:DOC , 页数:25 ,大小:105.50KB ,
资源ID:1336178      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1336178.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(【计算机类职业资格】程序员-计算机英语及答案解析.doc)为本站会员(cleanass300)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

【计算机类职业资格】程序员-计算机英语及答案解析.doc

1、程序员-计算机英语及答案解析(总分:79.00,做题时间:90 分钟)1.Each instruction is processed (75) ,and several instructions are at varying stages of execution in the processor at any given time,this is called instruction pipelining(分数:1.00)A.exactlyB.sequencingC.sequentiallyD.intermittently2.The error messages given by a C c

2、ompiler show the message text,the most common (68) of the error,and a suggestion for fixing the error(分数:1.00)A.consequenceB.causeC.informationD.result3.Hash functions can generate a (1) bit string from an arbitrarily long piece of plain text.(分数:1.00)A.longB.shortC.variable-lengthD.fixed - length4.

3、In C language,the usual expression statements are assignments or (59) (分数:1.00)A.I/OsB.function callsC.operationsD.evaluations5.(分数:1.00)A.program written in low - level language is called “ (3) “A. compilerB.executableC.sourceD.assemble6.C+ is used with proper (66) design techniques(分数:1.00)A.class

4、-orientedB.object-basedC.face to objectD.object-orientedFor users, microkernel technology promises (11) , compact and sophisticated operating systems that are typically (12) across a range of hardware platforms.(分数:2.00)A.quicklyB.speedC.slowD.fastA.portableB.madeC.moveableD.use7.In C program,it is

5、convenient to use a break to exit from a (57) (分数:1.00)A.functionB.loopC.classD.structure8.In C language, (58) is a collection of one or more variables,possibly of different types, grouped together under a single name for convenient handling.(分数:1.00)A.a classB.a structureC.an arrayD.a function9.A c

6、lickable string or graphic that points to another Web page or document is called (18) 。(分数:1.00)A.LinkB.AnchorC.BrowserD.Hyperlink10.In C language,the increment and decrement operator can only be applied to (56) ,so an expression like x(a+b)-is illegal.(分数:1.00)A.integersB.StringsC.variablesD.pointe

7、rs11.People usually install (10) to fix known security holes.(分数:1.00)A.patchesB.compensationsC.complementsD.additions12.Which one of these statements about connecting to the Internet is true? (76) (分数:1.00)A.You must have a modem to connect to the InternetB.You must have a telephone line to connect

8、 to the InternetC.The Internet can be used to connect computers with different ISPD.The Internet can only be used to link computers with same operating system(21) put computers to practical business use, but below the surface it is the heart of an (22) - the kernel - that provides the technical wiza

9、rdry to juggle multiple programs, connect to networks and store (23) .A traditional kernel provides all the functions for applications. The kernel (24) memory, I/O devices and parcels out processor time.The kernel also supports (25) and fault tolerance, which is the ability to recover automatically

10、when parts of the system fail.(分数:5.00)A.DatabasesB.ApplicationsC.DriversD.GamesA.DBMSB.WindowsC.ApplicationD.operating systemA.textB.dataC.imageD.graphicsA.managesB.manageC.managedD.managingA.authenticationB.auto - correctionC.securityD.problem13.An identifier is a sequence of letters and digits,th

11、e first character must be (60) (分数:1.00)A.a letterB.a stringC.an arrayD.a interger14.ActiveX is a set of specifications and software that allow small programs or software components to (72) (分数:1.00)A.work togetherB.work aloneC.simplifyD.reuse15.Object-oriented DBMS integrated a variety of (16) data

12、 types -such as business procedures, graphics, pictures, voice and annotated text.(分数:1.00)A.objectB.theoreticalC.shortenD.real - world16.One use of networks is to let several computers (61) data such as file systems,printers,and tape drives(分数:1.00)A.copyB.communicateC.transferD.shareThe following

13、suggestions increase programs (69) and make them easier to Maintain:1Use a standard indention technique,blank lines,form feeds,and spaces2Insert plenty of (70) into your code(分数:2.00)A.reliabilityB.securityC.readabilityD.usabilityA.java codeB.C+ codeC.assemble codeD.comments17.A typical peripheral d

14、evice has an address which the processor uses to select the devices internal (74) (分数:1.00)A.dataB.controlsC.signalsD.registers18.One of the guidelines in writing the C code is as follows: write code that is as clear as (15) .(分数:1.00)A.readableB.reusableC.possibleD.semantic19.When the result of an

15、operation becomes larger than the limits of the representation, (79) occurs(分数:1.00)A.overexposureB.overdraftC.overflowD.overdose20.EJB technology enables rapid and simplified development of distributed, (19) ,secure and portable applications based on Java technology.(分数:1.00)A.stand-aloneB.integrat

16、ionC.transactionalD.internationalSoftware design is a (46) process. It requires a certain amount of fl air on the part of the (47) . Design can not be learned from a book . It must be practiced and learnt by experience and study of existing systems. A well (48) software system is straightforward to

17、implement and maintain , easily (49) and reliable. Badly (48) software systems, although they may work are (50) to be expensive to maintain , difficult to test and unreliable.(分数:5.00)A.createB.creativeC.creatingD.createdA.designerB.userC.computerD.designA.designB.designingC.designedD.designsA.maint

18、ainB.maintainsC.maintainingD.maintainedA.likeB.unlikelyC.unlikeD.likelyIn C program, all variables must be declared before (52) , usually at the (53) of the function before any executable statements.(分数:2.00)A.statedB.instructedC.illustratedD.useA.endB.middleC.beginningD.last21.Array is a contiguous

19、,numbered set of variables of a given base type,which can be used and passed to functions as a (67) (分数:1.00)A.recordB.unitC.fileD.parameterAn instruction is made up of (41) that specify the function to be performed and operands that represent the data to be operated on. For example, if an instructi

20、on is to perform the operation of (42) two numbers, it must know (43) the two numbers are. The processors job is to (44) instructions and operands from memory and to perform each operation. Having done that, it signals (45) to send it next instruction.(分数:5.00)A.dataB.addressC.registerD.operationsA.

21、addedB.addingC.addD.additionA.whenB.whichC.whereD.whoA.getB.pushC.makeD.putA.hard diskB.registerC.memoryD.cache22.Very brief, simple expressions in program are easy to write correctly and effortless to (4) .(分数:1.00)A.defendB.debugC.defaultD.detectSoftware quality assurance is now an emerging sub -

22、discipline of (36) . As Buckly and oston point out, (37) software quality assurance is likely to lead to an ultimate (38) of software costs. However, the major hurdle in the path of software management in this area is the lack of usable software (39) . The development of accepted and generally appli

23、cable standards should be one of the principal goals of (40) in software engineering.(分数:5.00)A.software engineeringB.software designC.codingD.testingA.effectiveB.effortlessC.studyD.weekA.balanceB.incrementC.productionD.reductionA.mechanismB.engineeringC.standardsD.designA.productionB.planningC.mana

24、gementD.research23.SOAP uses (20) technologies to define an extensible messaging framework providing a message construct that can be exchanged over a variety of underlying protocols(分数:1.00)A.HTYPB.HTMLC.XMLD.XHTMLBecause web servers are (31) and application independent, they can send or request dat

25、a from legacy or external applications including databases. All replies, once converted into (32) mark-up language, can then be transmitted to a (33) . Used in this way, Intranets can offer (34) desktop support costs, easy links with legacy applications and databases and, above all, (35) of use.(分数:

26、5.00)A.machineB.IPC.platformD.networkA.plaintextB.hypertextC.ciphertextD.supertextA.browserB.applicationC.routerD.serverA.higherB.lowerC.sameD.differentA.hardB.difficultC.easeD.around24.There is only one Web (7) technology URIs.(分数:1.00)A.accessingB.naming/addressingC.communicatingD.searching25. (9)

27、 is not a basic element of communication protocols(分数:1.00)A.formatB.grammarC.transmit mediaD.timer26.In object-oriented program languages, a class must exposure its (13) to the outside.(分数:1.00)A.variantsB.algorithmC.interfaceD.statements27.The standard class (17) in C + + language contain many use

28、ful classes for input and output, string handling, mathematical computations, and system programming tasks.(分数:1.00)A.databaseB.filesC.librariesD.subroutine28.A requirement is a feature of the system or a description of something the system is capable of doing in order to fulfill the systems (71) (分

29、数:1.00)A.planB.purposeC.documentD.Design29. (6) is an important one, but not the only web data formats.(分数:1.00)A.HTTPB.HTMLC.WWWD.Explorer30.1OOBASE-TX makes use of two pairs of twisted pair cable,one pair used for (73) and the other for reception(分数:1.00)A.detectionB.transmissionC.relationD.Connec

30、tion31. (65) is the address of a variable or a variable in which the address of another variable is stored(分数:1.00)A.DirectorB.RecordC.ArrayD.Pointer32.Gateway is a device used to connect two separate network that use (2) communication protocol.(分数:1.00)A.same kind ofB.similarC.differentD.same33.On

31、a virtual memory system, the logical memory space available to the program is totally (14) of the physical memory space.(分数:1.00)A.dependentB.independentC.inD.outsideIn C language, external variables have to be defined (54) function, this (55) actual storage for it.(分数:2.00)A.inB.outC.insideD.outsid

32、eA.allocatesB.locatesC.findsD.100ks for34. (77) is not a programming language(分数:1.00)A.COBOLB.JavaC.CMMD.Basic35.The operating system has several major components,including the (64) ,a memory management system,the file system manager,device drivers,and the system libraries(分数:1.00)A.application ker

33、nelB.information kernelC.network kernelD.system kernel36.In Java language, objects are instances of (5) .(分数:1.00)A.classB.typeC.structureD.moduleBy using (26) , a 600M -byte music CD can be compressed to 50M bytes or less. It can be streamed (downloaded in chunks) so that you can begin listening to

34、 the opening bars while the (27) of the file arrives in the background. And, most important, the music files of this kind retain good listening (28) that earlier (29) schemes lacked. That (30) of features makes accessing and distributing music on the web practical for the first time.(分数:5.00)A.JPGB.

35、MP3C.MP4D.VODA.nextB.pastC.restD.hostA.quantityB.massC.amountD.qualityA.compressionB.codingC.transmissionD.playingA.differenceB.combinationC.additionD.condition37.In C language, there are several methods of communicating data between functions, one of which is by (51) 。(分数:1.00)A.argumentsB.variable

36、sC.messagesD.constants38.Comment is nonprogram (78) embedded in a program to explain its form and function to human readers(分数:1.00)A.commandB.expressionC.textD.statement39. (8) could find out syntax errors in a source program.(分数:1.00)A.ComplierB.Operate systemC.ApplicationD.ExplainerA firewall is

37、a security system designed to (62) an organizations network against (63) (分数:2.00)A.preventB.protectC.developD.exploitA.operatingB.programmingC.threatsD.service程序员-计算机英语答案解析(总分:79.00,做题时间:90 分钟)1.Each instruction is processed (75) ,and several instructions are at varying stages of execution in the p

38、rocessor at any given time,this is called instruction pipelining(分数:1.00)A.exactlyB.sequencingC.sequentially D.intermittently解析:解析 每一条指令都是顺序处理的,在某个给定时刻,数条指令同时处在不同的执行阶段,这种执行方式称为指令的流水处理。2.The error messages given by a C compiler show the message text,the most common (68) of the error,and a suggestion

39、for fixing the error(分数:1.00)A.consequenceB.cause C.informationD.result解析:解析 C 编译器给出的错误信息包括信息文本、最常见的错误原因和一个纠正错误的建议。3.Hash functions can generate a (1) bit string from an arbitrarily long piece of plain text.(分数:1.00)A.longB.shortC.variable-lengthD.fixed - length 解析:解析 Hash 函数能够根据任意长度的纯文本产生一个固定长度的字符串

40、。4.In C language,the usual expression statements are assignments or (59) (分数:1.00)A.I/OsB.function callsC.operationsD.evaluations 解析:解析 c 语言中,表达式通常是赋值语句或者函数调用。5.(分数:1.00)A.program written in low - level language is called “ (3) “A. compilerB.executableC.sourceD.assemble 解析:解析 一段用低级语言编写的程序称为“汇编程序”。6.

41、C+ is used with proper (66) design techniques(分数:1.00)A.class-orientedB.object-basedC.face to objectD.object-oriented 解析:解析 C+使用了一定的面向对象设计技术。For users, microkernel technology promises (11) , compact and sophisticated operating systems that are typically (12) across a range of hardware platforms.(分数:

42、2.00)A.quicklyB.speedC.slowD.fast 解析:A.portable B.madeC.moveableD.use解析:解析 对用户来说,微内核技术承诺了可以实现快速,紧凑,复杂精密的操作系统,而且该系统在一定范围的硬件平台上都是轻便的。7.In C program,it is convenient to use a break to exit from a (57) (分数:1.00)A.functionB.loop C.classD.structure解析:解析 c 语言中,使用一个 break语句跳出循环是很方便的。8.In C language, (58) is

43、 a collection of one or more variables,possibly of different types, grouped together under a single name for convenient handling.(分数:1.00)A.a classB.a structure C.an arrayD.a function解析:解析 语言中,一个结构是由一个或者多个相同类型或不同类型的变量构成的集合,这些变量用一个简单的名字组织在一起,可以很方便地引用。9.A clickable string or graphic that points to ano

44、ther Web page or document is called (18) 。(分数:1.00)A.LinkB.AnchorC.BrowserD.Hyperlink 解析:解析 一个可以点击的指向另一个网页或者文档的字符串或者图片称为超链接。10.In C language,the increment and decrement operator can only be applied to (56) ,so an expression like x(a+b)-is illegal.(分数:1.00)A.integersB.StringsC.variables D.pointers解析:

45、解析 c 语言中,自增和自减操作符,只能适用于变量,所以一个类似 x(a+b)-的表达式是非法的。11.People usually install (10) to fix known security holes.(分数:1.00)A.patches B.compensationsC.complementsD.additions解析:解析 人们常常安装补丁程序以修复已知的安全漏洞。12.Which one of these statements about connecting to the Internet is true? (76) (分数:1.00)A.You must have a

46、modem to connect to the InternetB.You must have a telephone line to connect to the InternetC.The Internet can be used to connect computers with different ISP D.The Internet can only be used to link computers with same operating system解析:解析 下列关于连接到 Internet的说法中,哪一个是正确的?C. Internet 能够连接使用不同ISP(Interne

47、t服务提供商)的计算机(21) put computers to practical business use, but below the surface it is the heart of an (22) - the kernel - that provides the technical wizardry to juggle multiple programs, connect to networks and store (23) .A traditional kernel provides all the functions for applications. The kernel

48、(24) memory, I/O devices and parcels out processor time.The kernel also supports (25) and fault tolerance, which is the ability to recover automatically when parts of the system fail.(分数:5.00)A.DatabasesB.Applications C.DriversD.Games解析:A.DBMSB.WindowsC.ApplicationD.operating system 解析:A.textB.data

49、C.imageD.graphics解析:A.manages B.manageC.managedD.managing解析:A.authenticationB.auto - correctionC.security D.problem解析:解析 应用程序(Applications)使计算机有了实际的商业用途,但在这种表面现象之下(operating system),是操作系统(operating system)的内核为多程序间的切换、网络的连接和数据(data)存储提供了技术的支持。传统的内核为应用程序提供各种功能,内核管理(manage)内存、I/O 设备并分配 CPU的时隙。内核还支持安全机制(security)及容错机制,即当系统的一部分崩溃时,内核能够自动恢复。13.An identifier is a sequence of letters and digits,the first character must be (60) (分数:1.00)A.a letter B.a stringC.an arrayD.a interger解析:解析 标识符是一个由字母和数字组成的字符序列,它要求首

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1