ImageVerifierCode 换一换
格式:DOC , 页数:14 ,大小:75.50KB ,
资源ID:1340439      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1340439.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(【计算机类职业资格】软件设计师-计算机专业英语(二)及答案解析.doc)为本站会员(tireattitude366)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

【计算机类职业资格】软件设计师-计算机专业英语(二)及答案解析.doc

1、软件设计师-计算机专业英语(二)及答案解析(总分:40.00,做题时间:90 分钟)MIDI enables people to use (11) computers and electronic musical instruments. There are actually three components to MIDI, the communications“ (12) .“, the Hardware Interface and a distribution (13) called “Standard MIDI Files“. In the context of the WWW, th

2、e most interesting component is the (14) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (15) are stored in MIDI files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use

3、 of MIDI today.(分数:5.00)(1).A. personal B. electronic C. multimedia D. network(分数:1.00)A.B.C.D.(2).A. device B. protocol C. network D. controller(分数:1.00)A.B.C.D.(3).A. format B. text C. wave D. center(分数:1.00)A.B.C.D.(4).A. Video B. Faxmail C. Graphic D. Audio(分数:1.00)A.B.C.D.(5).A. messages B. pac

4、kets C. frame D. information(分数:1.00)A.B.C.D.Spread spectrum simply means that data is sent in small pieces Over a number of the (46) frequencies available for use at any time in the specified range. Devices using (47) spread spectrum (DSSS) communicate by (48) each byte of data into several parts a

5、nd sending them concurrently on different (49) . DSSS uses a lot of the available (50) , about 22 megahertz (MHz) .(分数:5.00)(1).A. continuous B. high C. low D. discrete(分数:1.00)A.B.C.D.(2).A. direct-sequence B. discrete-sequenceC. duplicate-sequence D. dedicate-sequence(分数:1.00)A.B.C.D.(3).A. splitt

6、ing B. combining C. packing D. compacting(分数:1.00)A.B.C.D.(4).A. bits B. frequencies C. packets D. messages(分数:1.00)A.B.C.D.(5).A. rate B. velocity C. bandwidth D. period(分数:1.00)A.B.C.D.(41) is a protocol that a host uses to inform a router when it joins or leaves an Internet multicast group.(42) i

7、s an error detection code that most data communication networks use.(43) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.(44) is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-peri

8、odic basis over a range of media.(45) is an identifier of a web page.(分数:5.00)(1).A. ICMP B. SMTP C. IGMP D. ARP(分数:1.00)A.B.C.D.(2).A. 4B/5B B. CRC C. Manchester Code D. Huffman Code(分数:1.00)A.B.C.D.(3).A. OSPF B. RIP C. RARP D. BGP(分数:1.00)A.B.C.D.(4).A. ISDN B.X.25 C. Frame Relay D. ATM(分数:1.00)A

9、B.C.D.(5).A. HTTP B. URL C. HTML D. TAG(分数:1.00)A.B.C.D.Networks can be interconnected by different devices. In the physical layer networks can be connected by (31) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches which operate at

10、 data link layer. They can accept (32) , examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process. In network layer, we have routers that can connect two networks. If two networks have (33) network layer, the muter may be able to tra

11、nslate between the packer formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (34) . As an example, gateways between Internet e-mail and X.400 e-mail must (35) the

12、e-mail message and change various header fields.(分数:5.00)(1).A. reapers B. relays C. packages D. modems(分数:1.00)A.B.C.D.(2).A. frames B. packets C. packages D. cells(分数:1.00)A.B.C.D.(3).A. special B. dependent C. similar D. dissimilar(分数:1.00)A.B.C.D.(4).A. syntax B. semantics C. language D. format(

13、分数:1.00)A.B.C.D.(5).A. analyze B. parse C. delete D. create(分数:1.00)A.B.C.D.(51) is a six bytes OSI layer 2 address which is burned into every networking device that provides its unique identity for point to point communication.(52) is a professional organization of individuals in multiple professio

14、ns which focuses on effort on lower-layer protocols.(53) functions with two layers of protocols. It can connect networks of different speeds and can be adapted to an environment as it expands.(54) is the popular LAN developed under the direction of the IEEE802.5.(55) is the popular backbone technolo

15、gy for transmitting information at high speed with a high level of fault tolerance which is developed under the direction of ANSI.(分数:5.00)(1).A. The MAC address B. The IP addressC. The subnet address D. The virtual address(分数:1.00)A.B.C.D.(2).A. ISO B. ANSI C. CCIT D. IEEE(分数:1.00)A.B.C.D.(3).A. Th

16、e hub B. The bridge C. The router D. The proxy(分数:1.00)A.B.C.D.(4).A. Ethernet B. Token Bus C. Token Ring D. DQDB(分数:1.00)A.B.C.D.(5).A.X.25 B. ATM C. FDDI D. SMDS(分数:1.00)A.B.C.D.Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an (26) from

17、a friend who asks you to open it. This is what happens with Melissa and several other similar email (27) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (28) .As administrators seek to block dangerous emai

18、l attachments through the recognition of well-known (29) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to p

19、enetrate networks by sending an attachment that looks like a flash movie, which while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (30) access to your network.(分数:5.00)(1).A. attachment B. packet C. datagram D. message,(分数:1.00)A

20、B.C.D.(2).A. virtual B. virus C. worms D. bacteria(分数:1.00)A.B.C.D.(3).A. memory B. caches C. ports D. registers(分数:1.00)A.B.C.D.(4).A. names B. cookies C. software D. extensions(分数:1.00)A.B.C.D.(5).A. cracker B. user C. customer D. client(分数:1.00)A.B.C.D.Originally introduced by Netscape Communica

21、tions, (1) are a general mechanism which HTFP Server side applications, such as CGI (2) , can use to both store and retrieve information on the HTTP (3) side of the connection. Basically, Cookies can be used to compensate for the (4) nature of HTTP. The addition of a simple, persistent, client-side

22、state significantly extends the capabilities of WWW-based (5) .(分数:5.00)(1).A. Browsers B. Cookies C. Connections D. Scripts(分数:1.00)A.B.C.D.(2).A. graphics B. processes C. scripts D. texts(分数:1.00)A.B.C.D.(3).A. Client B. Editor C. Creator D. Server(分数:1.00)A.B.C.D.(4).A. fixed B. flexible C. stabl

23、e D. stateless(分数:1.00)A.B.C.D.(5).A. programs B. applications C. frameworks D. constraints(分数:1.00)A.B.C.D.The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (36) of the technical requirements for the software product.During the requirements d

24、efinition phase, the requirements definition team uses an interative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each (37) that it must meet. The starting point is usually a set of high

25、level requirements from the (38) that describe the project or problem.In either case, the requirements definition team formulates an overall concept for the system and then defines (39) showing how the system will be operated, publishes the system and operations concept document and conducts a syste

26、m concept review (SCR) .Following the SCR, the team derives (40) requirements for the system from the high level requirements and the system and operations concept using structured or object-oriented analysis. The team specifies the software functions and algorithms needed to satisfy each detailed r

27、equirement.(分数:5.00)(1).A. function B. definition C. specification D. statement(分数:1.00)A.B.C.D.(2).A. criterion B. standard C. model D. system(分数:1.00)A.B.C.D.(3).A. producer B. customer C. programmer D. analyser(分数:1.00)A.B.C.D.(4).A. roles B. principles C. scenarios D. scenes(分数:1.00)A.B.C.D.(5).

28、A. cotailed B. outlined C. total D. complete(分数:1.00)A.B.C.D.软件设计师-计算机专业英语(二)答案解析(总分:40.00,做题时间:90 分钟)MIDI enables people to use (11) computers and electronic musical instruments. There are actually three components to MIDI, the communications“ (12) .“, the Hardware Interface and a distribution (13)

29、 called “Standard MIDI Files“. In the context of the WWW, the most interesting component is the (14) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (15) are stored in MIDI files, the events are also time-stamped for playback in the proper se

30、quence. Music delivered by MIDI files is the most common use of MIDI today.(分数:5.00)(1).A. personal B. electronic C. multimedia D. network(分数:1.00)A.B.C. D.解析:(2).A. device B. protocol C. network D. controller(分数:1.00)A.B. C.D.解析:(3).A. format B. text C. wave D. center(分数:1.00)A. B.C.D.解析:(4).A. Vid

31、eo B. Faxmail C. Graphic D. Audio(分数:1.00)A.B.C.D. 解析:(5).A. messages B. packets C. frame D. information(分数:1.00)A. B.C.D.解析:解析 MIDI 使人们能够使用多媒体(multimedia)计算机和电子音乐设备。实际上,MIDI 由三个部分组成:通信“协议(protocol)”、硬件接口和被称为标准 MIDI 文件的发布格式(format)。在 WWW 的内容中,最令人感兴趣的部分是音频(Audio)格式。从原理上看,MIDI 文件包含了一系列 MIDI 协议消息。然而,当

32、MIDI 协议消息(messages)被存储在 MIDI 文件时,事件也都被加上时间戳,以便能按正确的顺序进行回放。目前,通过 MIDI 文件传递音乐是 MIDI 最主要的应用。Spread spectrum simply means that data is sent in small pieces Over a number of the (46) frequencies available for use at any time in the specified range. Devices using (47) spread spectrum (DSSS) communicate by

33、 (48) each byte of data into several parts and sending them concurrently on different (49) . DSSS uses a lot of the available (50) , about 22 megahertz (MHz) .(分数:5.00)(1).A. continuous B. high C. low D. discrete(分数:1.00)A.B.C.D. 解析:(2).A. direct-sequence B. discrete-sequenceC. duplicate-sequence D.

34、 dedicate-sequence(分数:1.00)A. B.C.D.解析:(3).A. splitting B. combining C. packing D. compacting(分数:1.00)A. B.C.D.解析:(4).A. bits B. frequencies C. packets D. messages(分数:1.00)A.B. C.D.解析:(5).A. rate B. velocity C. bandwidth D. period(分数:1.00)A.B.C. D.解析:解析 简单地说,扩频就是在一个可以随时使用的频率范围内,把数据用码片在大量不连续的 (discre

35、te)频率上同时发送。使用直序(direct-sequence)扩频的设备,相互之间通信是通过把每个字节的数据分成(splitting)几个部分在不同频率(frequencies)上同时传送。直序扩频使用了大约 22MHz 的可用带宽(bandwidth)。(41) is a protocol that a host uses to inform a router when it joins or leaves an Internet multicast group.(42) is an error detection code that most data communication net

36、works use.(43) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.(44) is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-periodic basis over a range of media.(45) is an identifier of

37、a web page.(分数:5.00)(1).A. ICMP B. SMTP C. IGMP D. ARP(分数:1.00)A.B.C. D.解析:(2).A. 4B/5B B. CRC C. Manchester Code D. Huffman Code(分数:1.00)A.B. C.D.解析:(3).A. OSPF B. RIP C. RARP D. BGP(分数:1.00)A.B. C.D.解析:(4).A. ISDN B.X.25 C. Frame Relay D. ATM(分数:1.00)A.B.C.D. 解析:(5).A. HTTP B. URL C. HTML D. TAG(分

38、数:1.00)A.B. C.D.解析:解析 (1)IGMP(因特网组管理协议)是一个主机用户在加入或离开因特网组播组时用于通知路由器的协议。(2)CRC(循环冗余码)是在数据通信网络中最多使用的错误检测码。(3)RIP(路由信息协议)是一种利用距离矢量算法来传播路由信息的内部网关协议。(4)ATM(异步传输模式)是一种传输模式。在这种传输模式中,所有类型的信息都被组织在一个大小固定的信元中,通过异步或非周期方式在一定范围的介质上传输。(5)URL(统一资源定位器)是一张网页的惟一标识符。Networks can be interconnected by different devices. I

39、n the physical layer networks can be connected by (31) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches which operate at data link layer. They can accept (32) , examine the MAC address and forward the frames to a different network

40、while doing minor protocol translation in the process. In network layer, we have routers that can connect two networks. If two networks have (33) network layer, the muter may be able to translate between the packer formats. In the transport layer we find transport gateway, which can interface betwee

41、n two transport connections. Finally, in the application layer, application gateways translate message (34) . As an example, gateways between Internet e-mail and X.400 e-mail must (35) the e-mail message and change various header fields.(分数:5.00)(1).A. reapers B. relays C. packages D. modems(分数:1.00

42、A. B.C.D.解析:(2).A. frames B. packets C. packages D. cells(分数:1.00)A. B.C.D.解析:(3).A. special B. dependent C. similar D. dissimilar(分数:1.00)A.B.C.D. 解析:(4).A. syntax B. semantics C. language D. format(分数:1.00)A. B.C.D.解析:(5).A. analyze B. parse C. delete D. create(分数:1.00)A.B. C.D.解析:解析 网络可以通过不同的设备互

43、连。在物理层,网络用中继器(reapers)或集线器互连,它们只是在相同的网络之间传送比特串。在比物理层高一层的数据链路层,可以使用网桥和交换机,它们能够接收数据帧(frames),检测 MAC 地址,并可以实现少量的协议转换,把数据帧转发到不同的网络中。在网络层,我们可以使用路由器连接两个网络。如果两个网络有着不同的 (dissimilar)网络层,路由器能够对分组格式进行转换。在传输层,我们使用传输网关,它可以在两个传输连接之间建立接口。最后,在应用层,应用网关实现消息语法(syntax)之间的翻译。例如,在 Internet 邮件和 X.400 邮件之间的网关必须对邮件报文进行语法分析(

44、parse),并对报文各个字段做出修改。(51) is a six bytes OSI layer 2 address which is burned into every networking device that provides its unique identity for point to point communication.(52) is a professional organization of individuals in multiple professions which focuses on effort on lower-layer protocols.(53)

45、 functions with two layers of protocols. It can connect networks of different speeds and can be adapted to an environment as it expands.(54) is the popular LAN developed under the direction of the IEEE802.5.(55) is the popular backbone technology for transmitting information at high speed with a hig

46、h level of fault tolerance which is developed under the direction of ANSI.(分数:5.00)(1).A. The MAC address B. The IP addressC. The subnet address D. The virtual address(分数:1.00)A. B.C.D.解析:(2).A. ISO B. ANSI C. CCIT D. IEEE(分数:1.00)A.B.C.D. 解析:(3).A. The hub B. The bridge C. The router D. The proxy(分

47、数:1.00)A.B. C.D.解析:(4).A. Ethernet B. Token Bus C. Token Ring D. DQDB(分数:1.00)A.B.C. D.解析:(5).A.X.25 B. ATM C. FDDI D. SMDS(分数:1.00)A.B.C. D.解析:解析 (1)MAC 地址(The MAC address)是一个位于 OSI 第二层的六位地址。它被内置到每个网络设备里,以给每个点对点的通信提供惟一的标识。(2)IEEE 是一个专业组织,它由多个领域内的专业人士组成,主要致力于低层协议。(3)网桥(The bridge)的功能涉及两层协议。它可以连接不同速度

48、的网络,也可以适应扩展的环境。(4)令牌环网(Token Ring)是根据 IEEE802.5 标准开发的流行的局域网。(5)FDDI 是高速传输信息的流行的骨干技术,并具有高度的容错性,它是在 ANSI 的指导下开发的。Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an (26) from a friend who asks you to open it. This is what happens with Melissa a

49、nd several other similar email (27) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (28) .As administrators seek to block dangerous email attachments through the recognition of well-known (29) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1