【计算机类职业资格】系统分析师-专业英语(三)及答案解析.doc

上传人:feelhesitate105 文档编号:1336226 上传时间:2019-10-17 格式:DOC 页数:18 大小:88.50KB
下载 相关 举报
【计算机类职业资格】系统分析师-专业英语(三)及答案解析.doc_第1页
第1页 / 共18页
【计算机类职业资格】系统分析师-专业英语(三)及答案解析.doc_第2页
第2页 / 共18页
【计算机类职业资格】系统分析师-专业英语(三)及答案解析.doc_第3页
第3页 / 共18页
【计算机类职业资格】系统分析师-专业英语(三)及答案解析.doc_第4页
第4页 / 共18页
【计算机类职业资格】系统分析师-专业英语(三)及答案解析.doc_第5页
第5页 / 共18页
点击查看更多>>
资源描述

1、系统分析师-专业英语(三)及答案解析(总分:45.00,做题时间:90 分钟)Most IP layer-based proxy mechanisms, such as network address translation (NAT), only support uni-directional proxy, from the internal network to external network (the Internet). The proxy establishes the communication channel by (86) IP addresses. The IP addre

2、sses must be (87) . These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. IP layer-based proxy mechanisms need additional software (88) for each application that uses (89) channels. SOCKS identifi

3、es communication targets through domain names, overcoming the restriction of using private IP addresses. SOCKS can use domain names to establish communication between separate LANs, with (90) IP addresses.(分数:5.00)(1).A. manufacturing B. manipulatingC. conduct D. implement(分数:1.00)A.B.C.D.(2).A. rou

4、table B. locatableC. path-selected D. road-defined(分数:1.00)A.B.C.D.(3).A. groups B. blocksC. models D. modules(分数:1.00)A.B.C.D.(4).A. plenty B. manyC. multiple D. more(分数:1.00)A.B.C.D.(5).A. duplicating B. crossingC. overlapping D. repeating(分数:1.00)A.B.C.D.The primary advantages of a Client/Server

5、system arise from splitting the processing between the client system and the database server. Since the bulk of the database processing is done on the back-end, the speed of the DBMS isnt tied to the speed of the (31) .The major disadvantage of Client/Server system is the increased cost of (32) and

6、support personnel who maintain the database server. There is also the issue of (33) with so many parts comprising the entire C/S system; Murphys Law can kick in-the more pieces that compose the system, the more pieces that can fail. Its also harder to track down problems when the system (34) . And i

7、t can initially take longer to get all the components set up and working together. All this is compounded by the general lack of experience and expertise of potential support personnel and programmers, due to the relative newness of the technology. As C/S system become more common, this problem shou

8、ld abate.Therefore the C/S system is more (35) .(分数:5.00)(1).A. network B. operating systemC. personal computer D. workstation(分数:1.00)A.B.C.D.(2).A. administrative B. bureaucraticC. manager D. official(分数:1.00)A.B.C.D.(3).A. complexity B. possibilityC. simplicity D. variety(分数:1.00)A.B.C.D.(4).A. b

9、urns B. crashesC. runs D. uses(分数:1.00)A.B.C.D.(5).A. efficient and easy to setup B. efficient and robustC. efficient but difficult to maintain D. robust but difficult to setup(分数:1.00)A.B.C.D.During the past years, intelligent technology has evolved (116) three generations. The first was characteri

10、zed by tools such as prolog and OPS. prolog is a simple backward-chaining environment, and OPS is a simple forward-chaining environment. This led to the second generation of knowledge-engineering environments. Its goal was to model, prototype and construct (117) systems.All three generations were or

11、iented toward generic (118) and represented generalized implementation environments for the construction of expert systems. knowledge bases and AI applications.Some of the solution-oriented products are also seamlessly integrated with generic knowledge-engineering environments, permitting end users

12、to add (119) rules and objects, as well as predefined knowledge-based logic to address problems in manufacturing simulation.Marketplace orientation is rapidly (120) toward solution-oriented intelligent product environments. the fourth generation represents a new line of thinking and develop-merit by

13、 commercial fu-ms. will reduce the cost risk and development time associated with problem solving.(分数:5.00)(1).A. custom B. knowledge C. through D. problem solving(分数:1.00)A.B.C.D.(2).A. custom B. knowledge C. through D. problem solving(分数:1.00)A.B.C.D.(3).A. custom B. knowledge C. through D. proble

14、m solving(分数:1.00)A.B.C.D.(4).A. custom B. knowledge C. through D. problem solving(分数:1.00)A.B.C.D.(5).A. custom B. knowledge C. through D. shifting(分数:1.00)A.B.C.D.Todays response to the data access dilemma eschews the traditional archival approach in favor of emerging standards for what are descri

15、bed as the documents of the future: compound documents. Product users and developers hope the latest standards effort-such as OpenDoc and Microsoft Corp.s Object Linking and Embedding (OLE) will (26) data accessibility.OpenDoc is a standards group (27) a common look and feel throughout documents, ev

16、en though different applications are used.OLE technologies allow Microsoft to (28) its various software products. Microsoft creates, governs and distributes the OLE capability, which is what most (29) it from the open OpenDoc approach. Thus, users can assemble (30) of varying application to create c

17、ompound documents. With OLE users can, for example, embed an Excel chart in a Microsoft word report.(分数:5.00)(1).A. get B. make C. ensure D. take(分数:1.00)A.B.C.D.(2).A. seeking B. seeked C. seeks D. seek(分数:1.00)A.B.C.D.(3).A. connect B. link C. concatenate D. contact(分数:1.00)A.B.C.D.(4).A. divide B

18、. distinguish C. divides D. distinguishes(分数:1.00)A.B.C.D.(5).A. pieces B. document C. content D. files(分数:1.00)A.B.C.D.Across a wide variety of fields, data are being collected and accumulated at a dramatic pace. There is an urgent need for a new generation of computational theories and tools to as

19、sist humans in (96) useful information (knowledge) from the rapidly growing (97) of digital data. These theories and tools are the subject of the emerging field of knowledge discovery in database (KDD). At an abstract level, the KDD field is concerned with the development of methods and techniques f

20、or making (98) of data. The basic problem addressed by the KDD process is one of mapping low-level data(which are typically too voluminous to understand and digest easily) into other forms that might be more (99) (for example, a short report), more (100) (for example, a descriptive approximation or

21、model of the process that generated the data), or more useful (for example, a predictive model for estimating the value of future cases). At the core of the process is the application of specific data-mining methods for pattern discovery and extraction.(分数:5.00)(1).A. expiring B. examiningC. extract

22、ing D. extricating(分数:1.00)A.B.C.D.(2).A. voice B. volumesC. states D. speed(分数:1.00)A.B.C.D.(3).A. reason B. senseC. specification D. summary(分数:1.00)A.B.C.D.(4).A. dense B. compactC. extensile D. short(分数:1.00)A.B.C.D.(5).A. theoretical B. meaningfulC. sophisticated D. abstract(分数:1.00)A.B.C.D.One

23、 study conducted by a psychologist (121) of interviewing workers before and after the installation of a robot. The robot was used to control a matching process of stamping and assembling metal parts. Prior to installation, much of the work done by skilled machinists. After installation, the robot di

24、d the work, but the workers controlled the robot through the robot through a control panel. The results of the study indicated that the workers praised the robot (122) eliminating the physical labor and fatigue (123) the manual operation, but complained of more and continued stress. Prior to install

25、ation of the robot, there was time for talking or short periods of relaxation between jobs. Now, however, because of the speed of the robot, there was a need for constant scanning and monitoring of the operation (124) performed by the robot has the installation of the robot created a better work env

26、ironment? Has the change from physical labor to mental stress resulted in an improved (125) of life? Much additional research is necessary.(分数:5.00)(1).A. Of B. consisted C. for D. being(分数:1.00)A.B.C.D.(2).A. Of B. consisted C. for D. being(分数:1.00)A.B.C.D.(3).A. Of B. consisted C. for D. being(分数:

27、1.00)A.B.C.D.(4).A. Of B. consisted C. for D. being(分数:1.00)A.B.C.D.(5).A. Of B. consisted C. quality D. being(分数:1.00)A.B.C.D.An Intranet is (66) the application of Internet technology within an internal or closed user group. Intranets are company (67) and do not have a (68) connection to the Inter

28、net. Used properly an Intranet is highly effective corporate tool, capable of regularly (69) information to empower the workforce with the information needed to perform their roles. Used in this way, an Intranet represents a step towards the (70) office.(分数:5.00)(1).A. simple B. simply C. single D.

29、singly(分数:1.00)A.B.C.D.(2).A. common B. shared C. special D. specific(分数:1.00)A.B.C.D.(3).A. physical B. psychological C. spatial D. spirited(分数:1.00)A.B.C.D.(4).A. update B. updated C. updates D. updating(分数:1.00)A.B.C.D.(5).A. painless B. painness C. paperless D. paperness(分数:1.00)A.B.C.D.To compe

30、te in todays fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points.

31、In allowing this open access for third parties, LANs become (171) . Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to (172) activity. For many organizations, however, the operational complexity and costs to en

32、sure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castles security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns.

33、Employees with malicious intent can launch (173) of service attacks or steal (174) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (175) and worms acquired from unprotected public networks. Hackers masquerad

34、ing as internal users can take advantage of weak internal security to gain access to confidential information.(分数:5.00)(1).A. damageable B. susceptible C. vulnerable D. changeable(分数:1.00)A.B.C.D.(2).A. venomous B. malicious C. felonious D. villainous(分数:1.00)A.B.C.D.(3).A. denial B. virtuous C. com

35、plete D. traverse(分数:1.00)A.B.C.D.(4).A. reserved B. confidential C. complete D. mysterious(分数:1.00)A.B.C.D.(5).A. sickness B. disease C. viruses D. germs(分数:1.00)A.B.C.D.astute service providers realize that the continued support of legacy X.25 and asynchronous network element using separate operat

36、ions network is cost (141) . For example, the maintenance of multiple networks can require additional staff. Often, this staff must be trained on multiple vendor technologies, sometimes requiring parallel groups specializing in each (142) . Hence, additional maintenance procedures must be maintained

37、 and administrative records are (143) . The duplication of transport facilities to carry (144) network traffic is an inefficient use of resources. And not surprisingly, more technologies installed in a central office means the necessity for more physical space and an increase in power connections an

38、d power consumption, migration of these (145) network elements to IP-based DCns is alogical strategy.(分数:5.00)(1).A. prohibitive B. feasible C. connective D. special(分数:1.00)A.B.C.D.(2).A. line B. platform C. sever D. switch(分数:1.00)A.B.C.D.(3).A. declined B. proliferated C. destroyed D. produced(分数

39、:1.00)A.B.C.D.(4).A. overlook B. overlie C. overlay D. overleap(分数:1.00)A.B.C.D.(5).A. traditional B. dominancy C. redundancy D. legacy(分数:1.00)A.B.C.D.系统分析师-专业英语(三)答案解析(总分:45.00,做题时间:90 分钟)Most IP layer-based proxy mechanisms, such as network address translation (NAT), only support uni-directional

40、proxy, from the internal network to external network (the Internet). The proxy establishes the communication channel by (86) IP addresses. The IP addresses must be (87) . These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such

41、as, multimedia applications. IP layer-based proxy mechanisms need additional software (88) for each application that uses (89) channels. SOCKS identifies communication targets through domain names, overcoming the restriction of using private IP addresses. SOCKS can use domain names to establish comm

42、unication between separate LANs, with (90) IP addresses.(分数:5.00)(1).A. manufacturing B. manipulatingC. conduct D. implement(分数:1.00)A.B. C.D.解析:(2).A. routable B. locatableC. path-selected D. road-defined(分数:1.00)A. B.C.D.解析:(3).A. groups B. blocksC. models D. modules(分数:1.00)A.B.C.D. 解析:(4).A. ple

43、nty B. manyC. multiple D. more(分数:1.00)A.B.C. D.解析:(5).A. duplicating B. crossingC. overlapping D. repeating(分数:1.00)A.B.C. D.解析:解析 大部分基于 IP 层的代理机制(例如网络地址翻译 NAT)只支持从内部网络到外部网络(Internet)的单向代理。代理通过操作 IP 地址建立通信通道。IP 地址必须是可路由的。这种代理机制使得那些必须建立返回数据通道的应用无法建立它们的数据通道,例如多媒体应用。基于 IP 层的代理机制对每一个使用多个通道的应用都需要附加的软件模块

44、。SOCKS 通过域名识别通信目标,克服了使用专用 IP地址的局限。SOCKS 可使用域名在各个分离的 LAN 之间建立通信,这些 LAN 具有重叠的 IP 地址。分析 在(86)小题的备选项中,manipulating 和 conduct 都有“操作”的意思,但 manipulating 侧重于“处理、使用”,而 conduct 侧重于“引导、管理”。在(90)小题的备选项中,duplicating 是指“复制、副本”,指完全一样。而 overlapping 是指“重叠、交叉”,既有相同的部分,也有不同的部分。The primary advantages of a Client/Server

45、 system arise from splitting the processing between the client system and the database server. Since the bulk of the database processing is done on the back-end, the speed of the DBMS isnt tied to the speed of the (31) .The major disadvantage of Client/Server system is the increased cost of (32) and

46、 support personnel who maintain the database server. There is also the issue of (33) with so many parts comprising the entire C/S system; Murphys Law can kick in-the more pieces that compose the system, the more pieces that can fail. Its also harder to track down problems when the system (34) . And

47、it can initially take longer to get all the components set up and working together. All this is compounded by the general lack of experience and expertise of potential support personnel and programmers, due to the relative newness of the technology. As C/S system become more common, this problem sho

48、uld abate.Therefore the C/S system is more (35) .(分数:5.00)(1).A. network B. operating systemC. personal computer D. workstation(分数:1.00)A.B.C.D. 解析:(2).A. administrative B. bureaucraticC. manager D. official(分数:1.00)A. B.C.D.解析:(3).A. complexity B. possibilityC. simplicity D. variety(分数:1.00)A. B.C.

49、D.解析:(4).A. burns B. crashesC. runs D. uses(分数:1.00)A.B. C.D.解析:(5).A. efficient and easy to setup B. efficient and robustC. efficient but difficult to maintain D. robust but difficult to setup(分数:1.00)A.B.C. D.解析:解析 客户机/服务器(C/S)系统的主要优点来自它把客户端和数据库服务器的处理进行分离,因为大量的数据处理放在后台完成,DBMS 的速度不会受到工作站速度的影响。C/S 系统的主要缺点是维护数据库服务器的管理和支持人员的成本增加。另外,因为 C/S 系统由很多模块组成,从而增加了系统的复杂性。Murphy 定理表明,组成系统的模块越多,失败的模块就越多。当系统崩溃时,很难跟踪到错误之处。而且,C/S 需要首先花很长的时间进行构件开发和组装。因为相对来说,这些技术比较新,缺乏经验、技术支持专家和程序员,但随着 C/S 系统的普及,这个问题将得到缓解。因此,C/S 系统的效率高,但维护困难。分析 这是一道关于 OS 结构模式的讨论试题。C/S 是基于资源不对等,且为实现共享而提出来的,是 20 世纪 90

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 考试资料 > 职业资格

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1