【计算机类职业资格】系统分析师-计算机专业英语及答案解析.doc

上传人:eventdump275 文档编号:1336265 上传时间:2019-10-17 格式:DOC 页数:68 大小:323.50KB
下载 相关 举报
【计算机类职业资格】系统分析师-计算机专业英语及答案解析.doc_第1页
第1页 / 共68页
【计算机类职业资格】系统分析师-计算机专业英语及答案解析.doc_第2页
第2页 / 共68页
【计算机类职业资格】系统分析师-计算机专业英语及答案解析.doc_第3页
第3页 / 共68页
【计算机类职业资格】系统分析师-计算机专业英语及答案解析.doc_第4页
第4页 / 共68页
【计算机类职业资格】系统分析师-计算机专业英语及答案解析.doc_第5页
第5页 / 共68页
点击查看更多>>
资源描述

1、系统分析师-计算机专业英语及答案解析(总分:95.00,做题时间:90 分钟)一、B单项选择题/B(总题数:19,分数:95.00)Developing reliable software on time and withinU U 1 /U /Urepresents a difficult endeavor for many organizations.Usually business solutions have three main aspects:people,U U 2 /U /U, and technology.The main reason for failing softwar

2、e projects has little to do with technology and tools, and much to do with lack of processU U 3 /U /U. Experience has shown that introducing new technology and tools in an immature or undisciplined environment is likely to increase the chaos. CASE tools are not enough. “A fool with a tool is still a

3、 fool!“Structured method was the first wave of the software industry. This was the beginning of transforming software development from a “U U 4 /U /Uindustry“ to mass production.Software process movement if the second wave in the software industry.The process maturity movement prepares the way for t

4、he third wave of the software industry: “software industrialization“. Software development will become like an assembly and manufacturing process. A critical enabling factor is a disciplined software engineering process with predictable quality,U U 5 /U /Uand functionality.(分数:5.00)(1). A. forecast

5、B. preparation C. budget D. economy(分数:1.00)A.B.C.D.(2). A. process B. skill C. organization D. interface(分数:1.00)A.B.C.D.(3). A. law B. discipline C. plan D. evaluation(分数:1.00)A.B.C.D.(4). A. college B. family C. workshop D. cottage(分数:1.00)A.B.C.D.(5). A. plan B. schedule C. effort D. product(分数:

6、1.00)A.B.C.D.Activity Based Costing (ABC) is anU U 6 /U /Utechnique that allows an organization to determine the actualU U 7 /U /Uassociated with each product and service produced by the organization without regard to the organizational structure. This chapter explains some of the uses and benefits

7、of Activity Based Costing. We use IDEFOU U 8 /U /Umodeling in conjunction with ABC to enable more effective businessU U 9 /U /Udesign decisions.In order to achieve the major goals of business process improvement, process simplification and improvement, FAA managers need to fully understand the cost,

8、 time, and quality of activities performed by employees or machines throughout an entire organization. ABC methods enableU U 10 /U /Uto cost out measurements to business simplification and process improvement.(分数:5.00)(1). A. computing B. campaigning C. programming D. accounting(分数:1.00)A.B.C.D.(2).

9、 A. activity B. quality C. cost D. process(分数:1.00)A.B.C.D.(3). A. activity B. flowchart C. design D. management(分数:1.00)A.B.C.D.(4). A. data B. benefit C. process D. image(分数:1.00)A.B.C.D.(5). A. computers B. managers C. clients D. consumers(分数:1.00)A.B.C.D.One of the difficulties in building an SQ

10、L-like query language for the Web is the absence of a databaseU U 11 /U /Ufor this huge, heterogeneous repository of information. However, if we are interested in HTML documents only, we can construct a virtual schema from the implicit structure of these files. Thus, at the highest level ofU U 12 /U

11、 /U, every such document is identified by its Uniform Resource Locator (URL), and aU U 13 /U /Uand a text. Also, Web severs provide some additional information such as the type, length, and the last modification date of a document. So for data mining purposes, we can consider the set of all HTML doc

12、uments as a relation:Document (url, title, text, type, length, modif)Where all theU U 14 /U /Uare character strings. In this framework, an individual document is identified with aU U 15 /U /Uin this relation. Of course, if some optional information is missing from the HTML document, the associate fi

13、elds will be left blank, but this is not uncommon in any database.(分数:5.00)(1). A. schema B. platform C. module D. relation(分数:1.00)A.B.C.D.(2). A. protocol B. control C. abstraction D. presentation(分数:1.00)A.B.C.D.(3). A. table B. title C. driver D. event(分数:1.00)A.B.C.D.(4). A. type B. links C. ch

14、aracteristics D. attributes(分数:1.00)A.B.C.D.(5). A. relation B. field C. script D. tuple(分数:1.00)A.B.C.D.When the system upon which a transport entity is running fails and subsequently restarts, theU U 16 /U /Uinformation of all active connections is lost. The affected connections become half-open,

15、as the side that did not fail does not yet realize the problem.The still active side of a half-open connections can close the connection using aU U 17 /U /Utimer. This timer measures the time the transport machine will continue to await anU U 18 /U /Uof a transmitted segment after the segment has be

16、en retransmitted the maximum number of times.0When the timerU U 19 /U /U, the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user.In the event that a transpor

17、t entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment, the failed side returns an RST i to every segment i that it receives, when the RST i reaches the other side, it must be checked for validity based on theU U 20 /U /Unumber i, as t

18、he RST could be in response to an old segment, if the reset is valid, the transport entity performs an abnormal termination.(分数:5.00)(1). A. data B. state C. signal D. control(分数:1.00)A.B.C.D.(2). A. give-up B. abandon C. quit D. connection(分数:1.00)A.B.C.D.(3). A. reset B. acknowledgment C. sequence

19、 D. synchroizer(分数:1.00)A.B.C.D.(4). A. stops B. restarts C. expires D. abandons(分数:1.00)A.B.C.D.(5). A. sequence B. acknowledgment C. connection D. message(分数:1.00)A.B.C.D.Astute service providers realize that the continued support of legacy X.25 and asynchronous network element using separate oper

20、ations network is costU U 21 /U /U. For example, the maintenance of multiple networks can require additional staff. Often, this staff must be trained on multiple vendor technologies, sometimes requiring parallel groups specializing in eachU U 22 /U /U. Hence, additional maintenance procedures must b

21、e maintained and administrative records areU U 23 /U /U. The duplication of transport facilities to carryU U 24 /U /Unetwork traffic is an inefficient use of resources. And not surprisingly, more technologies installed in a central office means the necessity for more physical space, and an increase

22、in power connections and power consumption. Migration of theseU U 25 /U /Unetwork elements to IP-based DCNs is alogical strategy.(分数:5.00)(1). A. prohibitive B. feasible C. connective D. special(分数:1.00)A.B.C.D.(2). A. line B. platform C. sever D. switch(分数:1.00)A.B.C.D.(3). A. declined B. prolifera

23、ted C. destroyed D. produced(分数:1.00)A.B.C.D.(4). A. overlook B. overlie C. overlay D. overleap(分数:1.00)A.B.C.D.(5). A. traditional B. dominancy C. redundancy D. legacy(分数:1.00)A.B.C.D.Microsofts COM is a softwareU U 26 /U /Uthat allows applications to be built from binary software components. COM i

24、s the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism

25、to identify components and their interfaces uniquely.OLE is a compoundU U 27 /U /Ustandard developed by Microsoft. OLE makes it possible to createU U 28 /U /Uwith one application and link or embed them in a second application. Embedded objects retain their original format andU U 29 /U /Uto the appli

26、cation that created them. Support for OLE is built into the Windows and MacOS Operating Systems. AU U 30 /U /Ucompound document standard developed mainly by Apple and IBM is called OpenDoc.(分数:5.00)(1). A. architecture B. protocol C. procedure D. structure(分数:1.00)A.B.C.D.(2). A. text B. graphic C.

27、document D. database(分数:1.00)A.B.C.D.(3). A. table B. event C. objects D. function(分数:1.00)A.B.C.D.(4). A. characteristics B. address C. page D. links(分数:1.00)A.B.C.D.(5). A. completing B. competing C. connecting D. contained(分数:1.00)A.B.C.D.VRML is aU U 31 /U /Ufor 3D multimedia and shared virtual

28、worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structured graphics, and extra U U 32 /U /U(z and time) to the presentation of documents. The applications of VRML are U U 33 /U /U, ranging from simple business graphics to entertaining WWW page graphics, manufacturi

29、ng, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communities.X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwardsU U 34 /U /Uwith VRML. Furthermore, it is componentized, profiled, and extensible, which mak

30、es it possible to use X3D in very differentU U 35 /U /U, from high-end visualizations to lightweight applications.(分数:5.00)(1). A. link B. format C. structure D. procedure(分数:1.00)A.B.C.D.(2). A. subject B. object C. dimensions D. disconnection(分数:1.00)A.B.C.D.(3). A. broad B. implicit C. explicit D

31、. special(分数:1.00)A.B.C.D.(4). A. imconsistent B. independent C. applicable D. compatible(分数:1.00)A.B.C.D.(5). A. scenarios B. places C. applications D. programs(分数:1.00)A.B.C.D.SOX is an alternativeU U 36 /U /Ufor XML. It is useful for reading and creating XML content in aU U 37 /U /Ueditor. It is

32、then easily transformed into proper XML. SOX was created because developers can spend a great deal of time with raw XML. For many of us, the popular XML U U 38 /U /Uhave not reached a point where their tree views, tables and forms can completely substitute for the underlying.U U 39 /U /Ulanguage. Th

33、is is not surprising when one considers that developers still use a text view, albeit enhanced, for editing other languages such as JavA. SOX usesU U 40 /U /Uto represent the structure of an XML document, which eliminates the need for closing tags and a number of quoting devices. The result is surpr

34、isingly clear.(分数:5.00)(1). A. semantic B. pragmatics C. syntax D. grammar(分数:1.00)A.B.C.D.(2). A. graphic B. program C. command D. text(分数:1.00)A.B.C.D.(3). A. texts B. editors C. creators D. tags(分数:1.00)A.B.C.D.(4). A. programming B. command C. markup D. interactive(分数:1.00)A.B.C.D.(5). A. indent

35、ing B. structure C. framework D. bracket(分数:1.00)A.B.C.D.With hundreds of millions of electronicU U 41 /U /Utaking place daily, businesses and organizations have a strong incentive to protect theU U 42 /U /Uof the data exchanged in this manner, and to positively ensure theU U 43 /U /Uof those involv

36、ed in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the ima

37、ginations of the security community has been the development of standards-based securityU U 44 /U /Uthat can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities inU U 45 /U /Uand integrating security provisions at the deepest levels o

38、f the machine operation has significant benefits for both users and those responsible for securing IT operations.(分数:5.00)(1). A. devices B. transactions C. communications D. businesses(分数:1.00)A.B.C.D.(2). A. operation B. completeness C. integrity D. interchange(分数:1.00)A.B.C.D.(3). A. identities B

39、. homogeneities C. creations D. operations(分数:1.00)A.B.C.D.(4). A. appliances B. chips C. tools D. means(分数:1.00)A.B.C.D.(5). A. software B. form C. computer D. silicon(分数:1.00)A.B.C.D.WLANs are increasingly popular because they enable cost-effective connections among people, applications and data t

40、hat were not possible, or not cost-effective, in the past. For example, WLAN-based applications can enable fine-grained management of supply and distributionU U 46 /U /Uto improve their efficienty and reduceU U 47 /U /U. WLANs can also enable entirely new business processes. To cite but one example,

41、 hospitals are using WLAN-enabled point-of-care applications to reduce errors and improve overallU U 48 /U /Ucare. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure. For example, they can protect corporate data by preventingU U 49 /U /Uthr

42、ough rogue access points. They help control salary costs, by allowing IT staffs to manage larger networks without adding staff. And they can improve overall network mananement by integrating with customers existing systems, such as OpenView and UniCenter. Fortunately, it isnt necessary to measure th

43、ese benefits to justify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-consumingU U 50 /U /Uand administrative chores.(分数:5.00)(1). A. chores B. chains C. changes D. links(分数:1.00)A.B.C.D.(2). A. personel B. expenses C. overhead D. hardware(分数:

44、1.00)A.B.C.D.(3). A. finance B. patient C. affair D. doctor(分数:1.00)A.B.C.D.(4). A. intrusion B. aggression C. inbreak D. infall(分数:1.00)A.B.C.D.(5). A. exploitation B. connection C. department D. deployment(分数:1.00)A.B.C.D.To compete in todays fast-paced competitive environment, organizations are i

45、ncreasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs becomeU U 51 /U

46、 /U. Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources toU U 52 /U /Uactivity. For many organizations,however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 考试资料 > 职业资格

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1