ImageVerifierCode 换一换
格式:DOC , 页数:68 ,大小:323.50KB ,
资源ID:1336265      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1336265.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(【计算机类职业资格】系统分析师-计算机专业英语及答案解析.doc)为本站会员(eventdump275)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

【计算机类职业资格】系统分析师-计算机专业英语及答案解析.doc

1、系统分析师-计算机专业英语及答案解析(总分:95.00,做题时间:90 分钟)一、B单项选择题/B(总题数:19,分数:95.00)Developing reliable software on time and withinU U 1 /U /Urepresents a difficult endeavor for many organizations.Usually business solutions have three main aspects:people,U U 2 /U /U, and technology.The main reason for failing softwar

2、e projects has little to do with technology and tools, and much to do with lack of processU U 3 /U /U. Experience has shown that introducing new technology and tools in an immature or undisciplined environment is likely to increase the chaos. CASE tools are not enough. “A fool with a tool is still a

3、 fool!“Structured method was the first wave of the software industry. This was the beginning of transforming software development from a “U U 4 /U /Uindustry“ to mass production.Software process movement if the second wave in the software industry.The process maturity movement prepares the way for t

4、he third wave of the software industry: “software industrialization“. Software development will become like an assembly and manufacturing process. A critical enabling factor is a disciplined software engineering process with predictable quality,U U 5 /U /Uand functionality.(分数:5.00)(1). A. forecast

5、B. preparation C. budget D. economy(分数:1.00)A.B.C.D.(2). A. process B. skill C. organization D. interface(分数:1.00)A.B.C.D.(3). A. law B. discipline C. plan D. evaluation(分数:1.00)A.B.C.D.(4). A. college B. family C. workshop D. cottage(分数:1.00)A.B.C.D.(5). A. plan B. schedule C. effort D. product(分数:

6、1.00)A.B.C.D.Activity Based Costing (ABC) is anU U 6 /U /Utechnique that allows an organization to determine the actualU U 7 /U /Uassociated with each product and service produced by the organization without regard to the organizational structure. This chapter explains some of the uses and benefits

7、of Activity Based Costing. We use IDEFOU U 8 /U /Umodeling in conjunction with ABC to enable more effective businessU U 9 /U /Udesign decisions.In order to achieve the major goals of business process improvement, process simplification and improvement, FAA managers need to fully understand the cost,

8、 time, and quality of activities performed by employees or machines throughout an entire organization. ABC methods enableU U 10 /U /Uto cost out measurements to business simplification and process improvement.(分数:5.00)(1). A. computing B. campaigning C. programming D. accounting(分数:1.00)A.B.C.D.(2).

9、 A. activity B. quality C. cost D. process(分数:1.00)A.B.C.D.(3). A. activity B. flowchart C. design D. management(分数:1.00)A.B.C.D.(4). A. data B. benefit C. process D. image(分数:1.00)A.B.C.D.(5). A. computers B. managers C. clients D. consumers(分数:1.00)A.B.C.D.One of the difficulties in building an SQ

10、L-like query language for the Web is the absence of a databaseU U 11 /U /Ufor this huge, heterogeneous repository of information. However, if we are interested in HTML documents only, we can construct a virtual schema from the implicit structure of these files. Thus, at the highest level ofU U 12 /U

11、 /U, every such document is identified by its Uniform Resource Locator (URL), and aU U 13 /U /Uand a text. Also, Web severs provide some additional information such as the type, length, and the last modification date of a document. So for data mining purposes, we can consider the set of all HTML doc

12、uments as a relation:Document (url, title, text, type, length, modif)Where all theU U 14 /U /Uare character strings. In this framework, an individual document is identified with aU U 15 /U /Uin this relation. Of course, if some optional information is missing from the HTML document, the associate fi

13、elds will be left blank, but this is not uncommon in any database.(分数:5.00)(1). A. schema B. platform C. module D. relation(分数:1.00)A.B.C.D.(2). A. protocol B. control C. abstraction D. presentation(分数:1.00)A.B.C.D.(3). A. table B. title C. driver D. event(分数:1.00)A.B.C.D.(4). A. type B. links C. ch

14、aracteristics D. attributes(分数:1.00)A.B.C.D.(5). A. relation B. field C. script D. tuple(分数:1.00)A.B.C.D.When the system upon which a transport entity is running fails and subsequently restarts, theU U 16 /U /Uinformation of all active connections is lost. The affected connections become half-open,

15、as the side that did not fail does not yet realize the problem.The still active side of a half-open connections can close the connection using aU U 17 /U /Utimer. This timer measures the time the transport machine will continue to await anU U 18 /U /Uof a transmitted segment after the segment has be

16、en retransmitted the maximum number of times.0When the timerU U 19 /U /U, the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user.In the event that a transpor

17、t entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment, the failed side returns an RST i to every segment i that it receives, when the RST i reaches the other side, it must be checked for validity based on theU U 20 /U /Unumber i, as t

18、he RST could be in response to an old segment, if the reset is valid, the transport entity performs an abnormal termination.(分数:5.00)(1). A. data B. state C. signal D. control(分数:1.00)A.B.C.D.(2). A. give-up B. abandon C. quit D. connection(分数:1.00)A.B.C.D.(3). A. reset B. acknowledgment C. sequence

19、 D. synchroizer(分数:1.00)A.B.C.D.(4). A. stops B. restarts C. expires D. abandons(分数:1.00)A.B.C.D.(5). A. sequence B. acknowledgment C. connection D. message(分数:1.00)A.B.C.D.Astute service providers realize that the continued support of legacy X.25 and asynchronous network element using separate oper

20、ations network is costU U 21 /U /U. For example, the maintenance of multiple networks can require additional staff. Often, this staff must be trained on multiple vendor technologies, sometimes requiring parallel groups specializing in eachU U 22 /U /U. Hence, additional maintenance procedures must b

21、e maintained and administrative records areU U 23 /U /U. The duplication of transport facilities to carryU U 24 /U /Unetwork traffic is an inefficient use of resources. And not surprisingly, more technologies installed in a central office means the necessity for more physical space, and an increase

22、in power connections and power consumption. Migration of theseU U 25 /U /Unetwork elements to IP-based DCNs is alogical strategy.(分数:5.00)(1). A. prohibitive B. feasible C. connective D. special(分数:1.00)A.B.C.D.(2). A. line B. platform C. sever D. switch(分数:1.00)A.B.C.D.(3). A. declined B. prolifera

23、ted C. destroyed D. produced(分数:1.00)A.B.C.D.(4). A. overlook B. overlie C. overlay D. overleap(分数:1.00)A.B.C.D.(5). A. traditional B. dominancy C. redundancy D. legacy(分数:1.00)A.B.C.D.Microsofts COM is a softwareU U 26 /U /Uthat allows applications to be built from binary software components. COM i

24、s the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism

25、to identify components and their interfaces uniquely.OLE is a compoundU U 27 /U /Ustandard developed by Microsoft. OLE makes it possible to createU U 28 /U /Uwith one application and link or embed them in a second application. Embedded objects retain their original format andU U 29 /U /Uto the appli

26、cation that created them. Support for OLE is built into the Windows and MacOS Operating Systems. AU U 30 /U /Ucompound document standard developed mainly by Apple and IBM is called OpenDoc.(分数:5.00)(1). A. architecture B. protocol C. procedure D. structure(分数:1.00)A.B.C.D.(2). A. text B. graphic C.

27、document D. database(分数:1.00)A.B.C.D.(3). A. table B. event C. objects D. function(分数:1.00)A.B.C.D.(4). A. characteristics B. address C. page D. links(分数:1.00)A.B.C.D.(5). A. completing B. competing C. connecting D. contained(分数:1.00)A.B.C.D.VRML is aU U 31 /U /Ufor 3D multimedia and shared virtual

28、worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structured graphics, and extra U U 32 /U /U(z and time) to the presentation of documents. The applications of VRML are U U 33 /U /U, ranging from simple business graphics to entertaining WWW page graphics, manufacturi

29、ng, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communities.X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwardsU U 34 /U /Uwith VRML. Furthermore, it is componentized, profiled, and extensible, which mak

30、es it possible to use X3D in very differentU U 35 /U /U, from high-end visualizations to lightweight applications.(分数:5.00)(1). A. link B. format C. structure D. procedure(分数:1.00)A.B.C.D.(2). A. subject B. object C. dimensions D. disconnection(分数:1.00)A.B.C.D.(3). A. broad B. implicit C. explicit D

31、. special(分数:1.00)A.B.C.D.(4). A. imconsistent B. independent C. applicable D. compatible(分数:1.00)A.B.C.D.(5). A. scenarios B. places C. applications D. programs(分数:1.00)A.B.C.D.SOX is an alternativeU U 36 /U /Ufor XML. It is useful for reading and creating XML content in aU U 37 /U /Ueditor. It is

32、then easily transformed into proper XML. SOX was created because developers can spend a great deal of time with raw XML. For many of us, the popular XML U U 38 /U /Uhave not reached a point where their tree views, tables and forms can completely substitute for the underlying.U U 39 /U /Ulanguage. Th

33、is is not surprising when one considers that developers still use a text view, albeit enhanced, for editing other languages such as JavA. SOX usesU U 40 /U /Uto represent the structure of an XML document, which eliminates the need for closing tags and a number of quoting devices. The result is surpr

34、isingly clear.(分数:5.00)(1). A. semantic B. pragmatics C. syntax D. grammar(分数:1.00)A.B.C.D.(2). A. graphic B. program C. command D. text(分数:1.00)A.B.C.D.(3). A. texts B. editors C. creators D. tags(分数:1.00)A.B.C.D.(4). A. programming B. command C. markup D. interactive(分数:1.00)A.B.C.D.(5). A. indent

35、ing B. structure C. framework D. bracket(分数:1.00)A.B.C.D.With hundreds of millions of electronicU U 41 /U /Utaking place daily, businesses and organizations have a strong incentive to protect theU U 42 /U /Uof the data exchanged in this manner, and to positively ensure theU U 43 /U /Uof those involv

36、ed in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the ima

37、ginations of the security community has been the development of standards-based securityU U 44 /U /Uthat can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities inU U 45 /U /Uand integrating security provisions at the deepest levels o

38、f the machine operation has significant benefits for both users and those responsible for securing IT operations.(分数:5.00)(1). A. devices B. transactions C. communications D. businesses(分数:1.00)A.B.C.D.(2). A. operation B. completeness C. integrity D. interchange(分数:1.00)A.B.C.D.(3). A. identities B

39、. homogeneities C. creations D. operations(分数:1.00)A.B.C.D.(4). A. appliances B. chips C. tools D. means(分数:1.00)A.B.C.D.(5). A. software B. form C. computer D. silicon(分数:1.00)A.B.C.D.WLANs are increasingly popular because they enable cost-effective connections among people, applications and data t

40、hat were not possible, or not cost-effective, in the past. For example, WLAN-based applications can enable fine-grained management of supply and distributionU U 46 /U /Uto improve their efficienty and reduceU U 47 /U /U. WLANs can also enable entirely new business processes. To cite but one example,

41、 hospitals are using WLAN-enabled point-of-care applications to reduce errors and improve overallU U 48 /U /Ucare. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure. For example, they can protect corporate data by preventingU U 49 /U /Uthr

42、ough rogue access points. They help control salary costs, by allowing IT staffs to manage larger networks without adding staff. And they can improve overall network mananement by integrating with customers existing systems, such as OpenView and UniCenter. Fortunately, it isnt necessary to measure th

43、ese benefits to justify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-consumingU U 50 /U /Uand administrative chores.(分数:5.00)(1). A. chores B. chains C. changes D. links(分数:1.00)A.B.C.D.(2). A. personel B. expenses C. overhead D. hardware(分数:

44、1.00)A.B.C.D.(3). A. finance B. patient C. affair D. doctor(分数:1.00)A.B.C.D.(4). A. intrusion B. aggression C. inbreak D. infall(分数:1.00)A.B.C.D.(5). A. exploitation B. connection C. department D. deployment(分数:1.00)A.B.C.D.To compete in todays fast-paced competitive environment, organizations are i

45、ncreasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs becomeU U 51 /U

46、 /U. Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources toU U 52 /U /Uactivity. For many organizations,however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1