1、系统分析师-计算机专业英语及答案解析(总分:95.00,做题时间:90 分钟)一、B单项选择题/B(总题数:19,分数:95.00)Developing reliable software on time and withinU U 1 /U /Urepresents a difficult endeavor for many organizations.Usually business solutions have three main aspects:people,U U 2 /U /U, and technology.The main reason for failing softwar
2、e projects has little to do with technology and tools, and much to do with lack of processU U 3 /U /U. Experience has shown that introducing new technology and tools in an immature or undisciplined environment is likely to increase the chaos. CASE tools are not enough. “A fool with a tool is still a
3、 fool!“Structured method was the first wave of the software industry. This was the beginning of transforming software development from a “U U 4 /U /Uindustry“ to mass production.Software process movement if the second wave in the software industry.The process maturity movement prepares the way for t
4、he third wave of the software industry: “software industrialization“. Software development will become like an assembly and manufacturing process. A critical enabling factor is a disciplined software engineering process with predictable quality,U U 5 /U /Uand functionality.(分数:5.00)(1). A. forecast
5、B. preparation C. budget D. economy(分数:1.00)A.B.C.D.(2). A. process B. skill C. organization D. interface(分数:1.00)A.B.C.D.(3). A. law B. discipline C. plan D. evaluation(分数:1.00)A.B.C.D.(4). A. college B. family C. workshop D. cottage(分数:1.00)A.B.C.D.(5). A. plan B. schedule C. effort D. product(分数:
6、1.00)A.B.C.D.Activity Based Costing (ABC) is anU U 6 /U /Utechnique that allows an organization to determine the actualU U 7 /U /Uassociated with each product and service produced by the organization without regard to the organizational structure. This chapter explains some of the uses and benefits
7、of Activity Based Costing. We use IDEFOU U 8 /U /Umodeling in conjunction with ABC to enable more effective businessU U 9 /U /Udesign decisions.In order to achieve the major goals of business process improvement, process simplification and improvement, FAA managers need to fully understand the cost,
8、 time, and quality of activities performed by employees or machines throughout an entire organization. ABC methods enableU U 10 /U /Uto cost out measurements to business simplification and process improvement.(分数:5.00)(1). A. computing B. campaigning C. programming D. accounting(分数:1.00)A.B.C.D.(2).
9、 A. activity B. quality C. cost D. process(分数:1.00)A.B.C.D.(3). A. activity B. flowchart C. design D. management(分数:1.00)A.B.C.D.(4). A. data B. benefit C. process D. image(分数:1.00)A.B.C.D.(5). A. computers B. managers C. clients D. consumers(分数:1.00)A.B.C.D.One of the difficulties in building an SQ
10、L-like query language for the Web is the absence of a databaseU U 11 /U /Ufor this huge, heterogeneous repository of information. However, if we are interested in HTML documents only, we can construct a virtual schema from the implicit structure of these files. Thus, at the highest level ofU U 12 /U
11、 /U, every such document is identified by its Uniform Resource Locator (URL), and aU U 13 /U /Uand a text. Also, Web severs provide some additional information such as the type, length, and the last modification date of a document. So for data mining purposes, we can consider the set of all HTML doc
12、uments as a relation:Document (url, title, text, type, length, modif)Where all theU U 14 /U /Uare character strings. In this framework, an individual document is identified with aU U 15 /U /Uin this relation. Of course, if some optional information is missing from the HTML document, the associate fi
13、elds will be left blank, but this is not uncommon in any database.(分数:5.00)(1). A. schema B. platform C. module D. relation(分数:1.00)A.B.C.D.(2). A. protocol B. control C. abstraction D. presentation(分数:1.00)A.B.C.D.(3). A. table B. title C. driver D. event(分数:1.00)A.B.C.D.(4). A. type B. links C. ch
14、aracteristics D. attributes(分数:1.00)A.B.C.D.(5). A. relation B. field C. script D. tuple(分数:1.00)A.B.C.D.When the system upon which a transport entity is running fails and subsequently restarts, theU U 16 /U /Uinformation of all active connections is lost. The affected connections become half-open,
15、as the side that did not fail does not yet realize the problem.The still active side of a half-open connections can close the connection using aU U 17 /U /Utimer. This timer measures the time the transport machine will continue to await anU U 18 /U /Uof a transmitted segment after the segment has be
16、en retransmitted the maximum number of times.0When the timerU U 19 /U /U, the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user.In the event that a transpor
17、t entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment, the failed side returns an RST i to every segment i that it receives, when the RST i reaches the other side, it must be checked for validity based on theU U 20 /U /Unumber i, as t
18、he RST could be in response to an old segment, if the reset is valid, the transport entity performs an abnormal termination.(分数:5.00)(1). A. data B. state C. signal D. control(分数:1.00)A.B.C.D.(2). A. give-up B. abandon C. quit D. connection(分数:1.00)A.B.C.D.(3). A. reset B. acknowledgment C. sequence
19、 D. synchroizer(分数:1.00)A.B.C.D.(4). A. stops B. restarts C. expires D. abandons(分数:1.00)A.B.C.D.(5). A. sequence B. acknowledgment C. connection D. message(分数:1.00)A.B.C.D.Astute service providers realize that the continued support of legacy X.25 and asynchronous network element using separate oper
20、ations network is costU U 21 /U /U. For example, the maintenance of multiple networks can require additional staff. Often, this staff must be trained on multiple vendor technologies, sometimes requiring parallel groups specializing in eachU U 22 /U /U. Hence, additional maintenance procedures must b
21、e maintained and administrative records areU U 23 /U /U. The duplication of transport facilities to carryU U 24 /U /Unetwork traffic is an inefficient use of resources. And not surprisingly, more technologies installed in a central office means the necessity for more physical space, and an increase
22、in power connections and power consumption. Migration of theseU U 25 /U /Unetwork elements to IP-based DCNs is alogical strategy.(分数:5.00)(1). A. prohibitive B. feasible C. connective D. special(分数:1.00)A.B.C.D.(2). A. line B. platform C. sever D. switch(分数:1.00)A.B.C.D.(3). A. declined B. prolifera
23、ted C. destroyed D. produced(分数:1.00)A.B.C.D.(4). A. overlook B. overlie C. overlay D. overleap(分数:1.00)A.B.C.D.(5). A. traditional B. dominancy C. redundancy D. legacy(分数:1.00)A.B.C.D.Microsofts COM is a softwareU U 26 /U /Uthat allows applications to be built from binary software components. COM i
24、s the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism
25、to identify components and their interfaces uniquely.OLE is a compoundU U 27 /U /Ustandard developed by Microsoft. OLE makes it possible to createU U 28 /U /Uwith one application and link or embed them in a second application. Embedded objects retain their original format andU U 29 /U /Uto the appli
26、cation that created them. Support for OLE is built into the Windows and MacOS Operating Systems. AU U 30 /U /Ucompound document standard developed mainly by Apple and IBM is called OpenDoc.(分数:5.00)(1). A. architecture B. protocol C. procedure D. structure(分数:1.00)A.B.C.D.(2). A. text B. graphic C.
27、document D. database(分数:1.00)A.B.C.D.(3). A. table B. event C. objects D. function(分数:1.00)A.B.C.D.(4). A. characteristics B. address C. page D. links(分数:1.00)A.B.C.D.(5). A. completing B. competing C. connecting D. contained(分数:1.00)A.B.C.D.VRML is aU U 31 /U /Ufor 3D multimedia and shared virtual
28、worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structured graphics, and extra U U 32 /U /U(z and time) to the presentation of documents. The applications of VRML are U U 33 /U /U, ranging from simple business graphics to entertaining WWW page graphics, manufacturi
29、ng, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communities.X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwardsU U 34 /U /Uwith VRML. Furthermore, it is componentized, profiled, and extensible, which mak
30、es it possible to use X3D in very differentU U 35 /U /U, from high-end visualizations to lightweight applications.(分数:5.00)(1). A. link B. format C. structure D. procedure(分数:1.00)A.B.C.D.(2). A. subject B. object C. dimensions D. disconnection(分数:1.00)A.B.C.D.(3). A. broad B. implicit C. explicit D
31、. special(分数:1.00)A.B.C.D.(4). A. imconsistent B. independent C. applicable D. compatible(分数:1.00)A.B.C.D.(5). A. scenarios B. places C. applications D. programs(分数:1.00)A.B.C.D.SOX is an alternativeU U 36 /U /Ufor XML. It is useful for reading and creating XML content in aU U 37 /U /Ueditor. It is
32、then easily transformed into proper XML. SOX was created because developers can spend a great deal of time with raw XML. For many of us, the popular XML U U 38 /U /Uhave not reached a point where their tree views, tables and forms can completely substitute for the underlying.U U 39 /U /Ulanguage. Th
33、is is not surprising when one considers that developers still use a text view, albeit enhanced, for editing other languages such as JavA. SOX usesU U 40 /U /Uto represent the structure of an XML document, which eliminates the need for closing tags and a number of quoting devices. The result is surpr
34、isingly clear.(分数:5.00)(1). A. semantic B. pragmatics C. syntax D. grammar(分数:1.00)A.B.C.D.(2). A. graphic B. program C. command D. text(分数:1.00)A.B.C.D.(3). A. texts B. editors C. creators D. tags(分数:1.00)A.B.C.D.(4). A. programming B. command C. markup D. interactive(分数:1.00)A.B.C.D.(5). A. indent
35、ing B. structure C. framework D. bracket(分数:1.00)A.B.C.D.With hundreds of millions of electronicU U 41 /U /Utaking place daily, businesses and organizations have a strong incentive to protect theU U 42 /U /Uof the data exchanged in this manner, and to positively ensure theU U 43 /U /Uof those involv
36、ed in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the ima
37、ginations of the security community has been the development of standards-based securityU U 44 /U /Uthat can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities inU U 45 /U /Uand integrating security provisions at the deepest levels o
38、f the machine operation has significant benefits for both users and those responsible for securing IT operations.(分数:5.00)(1). A. devices B. transactions C. communications D. businesses(分数:1.00)A.B.C.D.(2). A. operation B. completeness C. integrity D. interchange(分数:1.00)A.B.C.D.(3). A. identities B
39、. homogeneities C. creations D. operations(分数:1.00)A.B.C.D.(4). A. appliances B. chips C. tools D. means(分数:1.00)A.B.C.D.(5). A. software B. form C. computer D. silicon(分数:1.00)A.B.C.D.WLANs are increasingly popular because they enable cost-effective connections among people, applications and data t
40、hat were not possible, or not cost-effective, in the past. For example, WLAN-based applications can enable fine-grained management of supply and distributionU U 46 /U /Uto improve their efficienty and reduceU U 47 /U /U. WLANs can also enable entirely new business processes. To cite but one example,
41、 hospitals are using WLAN-enabled point-of-care applications to reduce errors and improve overallU U 48 /U /Ucare. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure. For example, they can protect corporate data by preventingU U 49 /U /Uthr
42、ough rogue access points. They help control salary costs, by allowing IT staffs to manage larger networks without adding staff. And they can improve overall network mananement by integrating with customers existing systems, such as OpenView and UniCenter. Fortunately, it isnt necessary to measure th
43、ese benefits to justify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-consumingU U 50 /U /Uand administrative chores.(分数:5.00)(1). A. chores B. chains C. changes D. links(分数:1.00)A.B.C.D.(2). A. personel B. expenses C. overhead D. hardware(分数:
44、1.00)A.B.C.D.(3). A. finance B. patient C. affair D. doctor(分数:1.00)A.B.C.D.(4). A. intrusion B. aggression C. inbreak D. infall(分数:1.00)A.B.C.D.(5). A. exploitation B. connection C. department D. deployment(分数:1.00)A.B.C.D.To compete in todays fast-paced competitive environment, organizations are i
45、ncreasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs becomeU U 51 /U
46、 /U. Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources toU U 52 /U /Uactivity. For many organizations,however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty