【计算机类职业资格】信息处理技术员-计算机专业英语及答案解析.doc

上传人:eventdump275 文档编号:1329137 上传时间:2019-10-17 格式:DOC 页数:10 大小:54.50KB
下载 相关 举报
【计算机类职业资格】信息处理技术员-计算机专业英语及答案解析.doc_第1页
第1页 / 共10页
【计算机类职业资格】信息处理技术员-计算机专业英语及答案解析.doc_第2页
第2页 / 共10页
【计算机类职业资格】信息处理技术员-计算机专业英语及答案解析.doc_第3页
第3页 / 共10页
【计算机类职业资格】信息处理技术员-计算机专业英语及答案解析.doc_第4页
第4页 / 共10页
【计算机类职业资格】信息处理技术员-计算机专业英语及答案解析.doc_第5页
第5页 / 共10页
点击查看更多>>
资源描述

1、信息处理技术员-计算机专业英语及答案解析(总分:30.00,做题时间:90 分钟)Structured programming practices (1) rise to Pascal, in which constructs were introduced to make programs more readable and better (2) . (3) provided a combination of assembly language and high-level structure to create a general-purpose language that could b

2、e used from system to application programming. Next came object orientation, which is (4) of a methodology and design philosophy than a language issue. This is (5) by the addition of so-called OO extensions to current languages, such as application.(分数:5.00)A.givingB.givenC.gaveD.givesA.structureB.s

3、tructuredC.constructsD.structuresA.logicB.functionC.flexibleD.applicationA.moreB.littleC.a matterD.importantA.evidenceB.evidencedC.evidencesD.evidencingNET is both a business strategy from Microsoft and its (6) of (7) support for what are known as Web services, the ability to use the Web rather than

4、 your own computer for various services. Microsofts goal is to provide individual and business users with a (8) interoperable and Web-enabled interface for applications and computing devices and to make computing activities increasingly Web browser-oriented. The NET (9) includes servers; building-bl

5、ock services, such as Web-based data storage; and device software. It also includes Passport, Microsofts fill-in-the-form-only-once identity (10) service.(分数:5.00)A.individualB.collectionC.setD.unitA.applicationB.applicationsC.organizingD.programmingA.seamB.seamingC.seamlessD.seamlesslyA.planeB.plat

6、eC.platformD.plantA.verificationB.validC.validateD.validation1.There are many page replacement algorithms in the page management.Most frequently used algorithm is (11) (分数:1.00)A.PPTB.OPTC.LRUD.FIFO2.Every host and router on the Internet has an IP address, which encodes its (12) .(分数:1.00)A.host num

7、berB.network numberC.host number and socketD.host number and network number3.When you choose a command name that is followed by “.“ on menu, a (13) box appears in which you provide more information.(分数:1.00)A.textB.dialogC.listD.check4.In C language, it is convenient to use a (14) to exit from a loo

8、p.(分数:1.00)A.breakB.endC.stopD.quit5. (15) is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.(分数:1.00)A.RouterB.Network CardC.FirewallD.Protocol6.In a certain cache system, the modified cache block is written to main memory only whe

9、n the block is replaced. All of the following are used to describe this policy EXCEPT (16) .(分数:1.00)A.store-inB.copy-backC.write-backD.write-through7.The methods used in Asynchronous Transfer Mode (ATM) are switch technology and (17) is used to describe this mode.(分数:1.00)A.cell exchangeB.message e

10、xchangeC.information exchangeD.packet exchange8.In advanced PC bus or local bus, (18) has the fastest data throughput.(分数:1.00)A.EISAB.MCAC.PCID.ISA9. (19) is encoded with Differential Manchester in the diagram below.(分数:1.00)A.10110011100B.I1001100011C.00111001101D.1100011001010. (20) is NOT a conc

11、ept of White Box Testing.(分数:1.00)A.You should execute all logical decisions on their tree and false sides.B.You should execute all independent paths within a module at least once.C.You should execute all loops at their boundary conditions.D.You should execute all interfaces at their boundary condit

12、ions.11.TCP service is obtained by having both the sender and the receiver create and points, which are called (21) 。(分数:1.00)A.Network addressB.supenet addressC.socketD.IP address12.Most frequently used algorithm for page replacement is (22) .(分数:1.00)A.LRUB.FIFOC.OPTD.PPT13.Enhancing a software pr

13、oduct may consume (23) percent of the total life-cycle effort.(分数:1.00)A.80B.30C.50D.4214.The basic function of the file system is accessing files by names. The function can be realized by (24) .(分数:1.00)A.directory-managingB.boosting the speed of the file-accessingC.file-protectingD.improving the u

14、tilization of storage15.Which one of the following expressions is equivalent to X BETWEEN 15 AND 25? (25) .(分数:1.00)A.X15 AND X25B.X=15 AND X=25C.X25 AND X15D.X=15 AND X=2516.The central processing unit(CPU), sometimes referred to as the processor, interprets (解释) and carries out the basic (26) that

15、 operate a computer.(分数:1.00)A.databaseB.filesC.blockD.instructions17.Output is data that has been processed into useful form called (27) . That is a computer processes input into output.(分数:1.00)A.dataB.informationC.interfaceD.system18.Consumption of the total life-cycle effort in software maintena

16、nce is (28) that in software development.(分数:1.00)A.less thanB.larger thanC.equal or less thanD.equal or larger than19.What refers to the protocols used to determine who goes next on a multi-access channel? (29) (分数:1.00)A.MAC(medium access control)B.ARP(address resolution protocol)C.NAT(network add

17、ress translation)D.CIDR(classless interdomain routing)20.Which one of the following describes the similarity between the stack and the queue? (30) (分数:1.00)A.logical characteristicsB.physical characteristicsC.operation methodD.element type信息处理技术员-计算机专业英语答案解析(总分:30.00,做题时间:90 分钟)Structured programmin

18、g practices (1) rise to Pascal, in which constructs were introduced to make programs more readable and better (2) . (3) provided a combination of assembly language and high-level structure to create a general-purpose language that could be used from system to application programming. Next came objec

19、t orientation, which is (4) of a methodology and design philosophy than a language issue. This is (5) by the addition of so-called OO extensions to current languages, such as application.(分数:5.00)A.givingB.givenC.gave D.gives解析:A.structureB.structured C.constructsD.structures解析:A.logicB.functionC.fl

20、exibleD.application 解析:A.more B.littleC.a matterD.important解析:A.evidenceB.evidenced C.evidencesD.evidencing解析:NET is both a business strategy from Microsoft and its (6) of (7) support for what are known as Web services, the ability to use the Web rather than your own computer for various services. M

21、icrosofts goal is to provide individual and business users with a (8) interoperable and Web-enabled interface for applications and computing devices and to make computing activities increasingly Web browser-oriented. The NET (9) includes servers; building-block services, such as Web-based data stora

22、ge; and device software. It also includes Passport, Microsofts fill-in-the-form-only-once identity (10) service.(分数:5.00)A.individualB.collection C.setD.unit解析:A.applicationB.applicationsC.organizingD.programming 解析:A.seamB.seamingC.seamlessD.seamlessly 解析:A.planeB.plateC.platform D.plant解析:A.verifi

23、cation B.validC.validateD.validation解析:1.There are many page replacement algorithms in the page management.Most frequently used algorithm is (11) (分数:1.00)A.PPTB.OPTC.LRU D.FIFO解析:2.Every host and router on the Internet has an IP address, which encodes its (12) .(分数:1.00)A.host numberB.network numbe

24、rC.host number and socketD.host number and network number 解析:3.When you choose a command name that is followed by “.“ on menu, a (13) box appears in which you provide more information.(分数:1.00)A.textB.dialog C.listD.check解析:4.In C language, it is convenient to use a (14) to exit from a loop.(分数:1.00

25、)A.break B.endC.stopD.quit解析:5. (15) is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.(分数:1.00)A.RouterB.Network CardC.Firewall D.Protocol解析:6.In a certain cache system, the modified cache block is written to main memory only when

26、the block is replaced. All of the following are used to describe this policy EXCEPT (16) .(分数:1.00)A.store-inB.copy-backC.write-backD.write-through 解析:7.The methods used in Asynchronous Transfer Mode (ATM) are switch technology and (17) is used to describe this mode.(分数:1.00)A.cell exchange B.messag

27、e exchangeC.information exchangeD.packet exchange解析:8.In advanced PC bus or local bus, (18) has the fastest data throughput.(分数:1.00)A.EISAB.MCAC.PCI D.ISA解析:9. (19) is encoded with Differential Manchester in the diagram below.(分数:1.00)A.10110011100B.I1001100011 C.00111001101D.11000110010解析:10. (20)

28、 is NOT a concept of White Box Testing.(分数:1.00)A.You should execute all logical decisions on their tree and false sides.B.You should execute all independent paths within a module at least once.C.You should execute all loops at their boundary conditions.D.You should execute all interfaces at their b

29、oundary conditions. 解析:11.TCP service is obtained by having both the sender and the receiver create and points, which are called (21) 。(分数:1.00)A.Network addressB.supenet addressC.socketD.IP address 解析:12.Most frequently used algorithm for page replacement is (22) .(分数:1.00)A.LRU B.FIFOC.OPTD.PPT解析:

30、13.Enhancing a software product may consume (23) percent of the total life-cycle effort.(分数:1.00)A.80B.30C.50D.42 解析:14.The basic function of the file system is accessing files by names. The function can be realized by (24) .(分数:1.00)A.directory-managing B.boosting the speed of the file-accessingC.f

31、ile-protectingD.improving the utilization of storage解析:15.Which one of the following expressions is equivalent to X BETWEEN 15 AND 25? (25) .(分数:1.00)A.X15 AND X25B.X=15 AND X=25C.X25 AND X15D.X=15 AND X=25 解析:16.The central processing unit(CPU), sometimes referred to as the processor, interprets (解

32、释) and carries out the basic (26) that operate a computer.(分数:1.00)A.databaseB.filesC.blockD.instructions 解析:17.Output is data that has been processed into useful form called (27) . That is a computer processes input into output.(分数:1.00)A.dataB.information C.interfaceD.system解析:18.Consumption of th

33、e total life-cycle effort in software maintenance is (28) that in software development.(分数:1.00)A.less thanB.larger than C.equal or less thanD.equal or larger than解析:19.What refers to the protocols used to determine who goes next on a multi-access channel? (29) (分数:1.00)A.MAC(medium access control) B.ARP(address resolution protocol)C.NAT(network address translation)D.CIDR(classless interdomain routing)解析:20.Which one of the following describes the similarity between the stack and the queue? (30) (分数:1.00)A.logical characteristics B.physical characteristicsC.operation methodD.element type解析:

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 考试资料 > 职业资格

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1