分享
第 14 章:专业英语.pdf
下载文档

ID:3306800

大小:452.73KB

页数:16页

格式:PDF

时间:2024-02-27

收藏 分享赚钱
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,汇文网负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
网站客服:3074922707
14 章:专业英语 专业 英语
您现在的位置:希赛网 云阅读 软件设计师考试习题集 习题1第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题1上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题2上一节本书简介下一节第14章 专业英语14.1 习题 MIMD systems can be classified into_(1)_-oriented systems,high-availabilitysystems and response-oriented systems.The goal of_(1)_-oriented multiprocessing is toobtain high_(1)_ _(2)_minimal computing cost.The techniques employed by multiprocessoroperating systems to achieve this goal take advantage of an inherent processing versusinput/output balance in the workload to produce _(3)_ and_(4)_loading ofsystem_(5)_.(1)A.though B.through C.throughout D.throughput(2)A.at B.of C.on D.to(3)A.balance B.balanced C.balances D.balancing(4)A.uniform B.unique C.unit D.united(5)A.resource B.resources C.source D.sources版权方授权希赛网发布,侵权必究 Soon,more of the information we receive via the Internet could come_(6)_indigital wrappers.Wrappers are made up_(7)_software code thats targeted to do specificthings with the data _(8)_within them,such as helping to define queries for searchengines.They also keep_(9)_from_(10)_access to that code.(6)A.package B.packaged C.packages D.packaging(7)A.of B.off C.on D.out(8)A.close B.closed C.enclose D.enclosed(9)A.insiders B.money C.outsiders D.warehouse(10)A.gain B.gained C.gains D.gaining版权方授权希赛网发布,侵权必究第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题3上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题4 A typical_(11)_language contains an applicative sub-language whichapproximates the mathematical abstractions of timeless functions applied tospacelessvalues,where the actual operation sequences and use of storage space duringexpression evaluation are organized behind the_(12)_.In this setting,values are datastructures of low volume,typically a few computer words or less,which means that anillusion of spacelessness can be realized by having_(13)_results during expressionevaluation stored at the discretion of the language implementation,and effectingparameter_(14)_and_(15)_operations through value copying.(11)A.imperative B.mandatory C.compulsory D.voluntary(12)A.foreground B.background C.screen D.scenes(13)A.middle B.intermediate C.previous D.final(14)A.transverse B.transportation C.transmission D.translation(15)A.assignment B.design C.value D.dispatch版权方授权希赛网发布,侵权必究 Most computer systems are_(16)_to two different groups of attacks:Insiderattacks and outsider attacks.A system that is known to be_(17)_to an outsider attack bypreventing_(18)_from outside can still be vulnerable to the insider attacks accomplished byabusive usage of_(19)_users.Detecting such abusive usage as well as attacks by outsidesnot only provides information on damage assessment,but also helps to prevent futureattacks.These attacks are usually_(20)_by tools referred to as Intrusion DetectionSystems.(16)A.vulnerable B.week C.sensitively D.helpless(17)A.reliable B.secure C.indestructible D.steady(18)A.visit B.access C.I/O D.read/write(19)A.power B.rights C.authorized D.common(20)A.searched B.checked C.tested D.detected版权方授权希赛网发布,侵权必究上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题5上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题6 SOCKS is a generic proxy protocol for ICP/IP-based networking,applications.SOCKSincludes two_(21)_,the SOCKS server and the SOCKS client.The SOCKS server isimplemented at the application layer.The SOCKS client is implemented betweenapplications and the_(22)_layer.When an application client needs to connect to anapplication server,the client connects to a SOCKS proxy server.The proxy server connects tothe application server instead of the client,and_(23)_data between the client and theapplication server.For the application server,the proxy server is the_(24)_.SOCKS is alsoone of the popular_(25)_to network firewalls.Because of its simplicity and flexibility,SOCKS has been used as generic application proxy in virtual private network(VPN),andfor extranet applications.(21)A.elements B.components C.services D.clients(22)A.transport B.transmission C.network D.datalink(23)A.relays B.replaces C.replays D.repeals(24)A.workstation B.user C.customer D.client(25)A.methods B.alternatives C.choices D.replacements版权方授权希赛网发布,侵权必究 A Web browser is simply a terminal emulator,designed to display text on ascreen.The two essential differences between an ordinary terminal emulator and a Webbrowser are that the browser knows how to deal with_(26)_,and that it has amechanism for_(27)_graphical files.Display text,display graphics,and _(28)_hyperlinks-theres 99 percent of the_(29)_value.Thats not to say that themanufacturers didnt go all-out to attach a hyperactive efflorescence of useless capabilitiesonto their browsers.Remember when media channels in the browser were a big deal,instead of the clutter you cant wait to delete from your favorites of bookmarks menu?Remember when client-side Java applets were supposed to become the preferred_(30)_for application development?Remember frames and all their nasty side effects?(26)A.superlinks B.links C.hyperlinks D.connections上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题7上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题8(27)A.displaying B.illustrating C.drawing D.writing(28)A.direct B.navigate C.indicate D.go-on(29)A.Web browsers B.terminals C.emulators D.networks(30)A.plane B.plant C.plate D.platform版权方授权希赛网发布,侵权必究 _(31)_data effectively is crucial for success in todays competitiveenvironment.Managers must know how to use a variety of tools.Integrated data takesinformation from different sources and puts it together in a meaningful and usefulway.One of the difficulties of this is the_(32)_in hardware and software._(33)_integration uses a base document that contains copies of other objects._(34)_integration uses a base document that contains the current or most recent version of thesource document it contains._(35)_provides an overview of the program written inplain English,without the computer syntax.(31)A.Generalizing B.Sharing C.General-using D.Globalizing(32)A.similarity B.interoperability C.diversity D.interaction(33)A.Simulated B.Duplicated C.Dynamic D.Static(34)A.Linked B.pointed C.Dynamic D.Static(35)A.High-level language B.Decision tree C.Pseudocode D.Flowchart版权方授权希赛网发布,侵权必究 Traditional structured analysis techniques focus upon the flow of_(36)_within asystem.Object-oriented analysis emphasizes the building of real-world models.It examinesrequirements from the perspective of the classes and objects found in the vocabulary ofthe_(37)_domain.Traditional system design method emphasizes the proper and effective structure of acomplex system.Object-oriented design method encompasses the process of object-oriented decomposition and a_(38)_for depicting both logical and physical as well as上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题9上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日static and dynamic models of the system under design.Object-oriented programming is a method of implementation in which programs areorganized as cooperative collections of objects,each of which represents an_(39)_ofsome class,and whose classes are all members of a hierarchy of classes united via_(40)_relationships.(36)A.control B.program C.data D.reference(37)A.problem B.solution C.data D.program(38)A.mark B.picture C.symbol D.notation(39)A.instance B.example C.existence D.implementation(40)A.control B.inheritance C.inference D.connection版权方授权希赛网发布,侵权必究 Networks can be interconnected by different devices.In the physical layer,networkscan be connected by_(41)_or hubs,which just move the bits from one network to anidentical network.One layer up we find bridges and switches,which operate at data linklayer.They can accept_(42)_,examine the MAC address,and forward the frames to adifferent network while doing minor protocol translation in the process.In the networklayer,we have routers that can connect two networks.If two networks have_(43)_network layer,the router may be able to translate between the packet formats.In thetransport layer we find transport gateway,which can interface between two transportconnections.Finally,in the application layer,application gateways translate message_(44)_.As an example,gateways between Internet E-mail and X.400 E-mailmust_(45)_the E-mail message and change various header fields.(41)A.reapers B.relays C.connectors D.modems(42)A.frames B.packets C.packages D.cells(43)A.special B.dependent C.similar D.dissimilar(44)A.syntax B.semantics C.language D.format(45)A.analyze B.parse C.delete D.create版权方授权希赛网发布,侵权必究习题10上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题11The purpose of the requirements definition phase is to produce a clear,complete,consistent,and testable_(46)_of the technical requirements for the software product.During the requirements definition phase,the requirements definition team uses aniterative process to expand a broad statement of the system requirements into a completeand detailed specification of each function that the software must perform andeach_(47)_that it must meet.The starting point is usually a set of high-levelrequirements from the_(48)_that describe the project or problem.In either case,the requirements definition team formulates an overall concept for thesystem and then defines_(49)_ showing how the system will be operated,publishes thesystem and operations concept document,and conducts a system concept review(SCR)。Following the SCR,the team derives_(50)_requirements for the system from thehigh-level requirements and the system and operations concept.Using structured or object-oriented analysis the team specifies the software functions and algorithms needed to satisfyeach detailed requirement.(46)A.function B.definition C.model D.statement(47)A.criterion B.standard C.scenarios D.system(48)A.producer B.customer C.specification D.analyser(49)A.rules B.principles C.programmer D.scenes(50)A.detailed B.outlined C.total D.complete版权方授权希赛网发布,侵权必究 DOM is a platform and language-_(51)_API that allows programs and scripts todynamically access and update the content,structure and style of WWW documents(currently,definitions for HTML and XML documents are part of the specification)。Thedocument can be further processed and the results of that processing can be incorporatedback into the presented_(52)_.DOM is a _(53)_-based API to documents,whichrequires the whole document to be represented in_(54)_while processing it.A simpleralternative to DOM is the eventbased SAX,which can be used to process verylarge_(55)_documents that do not fit info the memory available for processing.(51)A.specific B.neutral C.contained D.related(52)A.text B.image C.page D.graphic(53)A.table B.tree C.control D.event上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题12上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题13(54)A.document B.processor C.disc D.memory(55)A.XML B.HTML C.script D.web版权方授权希赛网发布,侵权必究 Melissa and LoveLetter made use of the trust that exists between friends orcolleagues.Imagine receiving an_(56)_ from a friend who asks you to open it.This iswhat happens with Melissa and several other similar Email _(57)_.Upon running,suchworms usually proceed to send themselves out to Email addresses from the victims addressbook,previous Emails,Web pages_(58)_.As administrators seek to block dangerous Email attachments through the recognitionof well-known_(59)_,virus writers use other extensions to circumvent suchprotection.Executable(。exe)files are renamed to.bat and.cmd plus a whole list ofother extensions and will still run and successfully infect target users.Frequently,hackers try to penetrate networks by sending an attachment that looks likea flash movie,which,while displaying some cute animation,simultaneously runs commandsin the background to steal your passwords and give the_(60)_access to your network.(56)A.attachment B.packet C.datagram D.message(57)A.virtual B.virus C.worms D.bacteria(58)A.memory B.caches C.ports D.registers(59)A.names B.cookies C.software D.extensions(60)A.cracker B.user C.customer D.client版权方授权希赛网发布,侵权必究 MIDI enables people to use_(61)_computers and electronic musicalinstruments.There are actually three components to MIDI,the communications _(62)_,the Hardware Interface and a distribution_(63)_called Standard MIDI Files.In thecontext of the WWW,the most interesting component is the_(64)_Format.In principle,MIDI files contain sequences of MIDI Protocol messages.However,when MIDI上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题14上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题15Protocol_(65)_are stored in MIDI files,the events are also time-stamped for playback inthe proper sequence.Music delivered by MIDI files is the most common use of MIDI today.(61)A.personal B.electronic C.multimedia D.network(62)A.device B.protocol C.network D.controller(63)A.format B.text C.wave D.center(64)A.Video B.Faxmail C.Graphic D.Audio(65)A.messages B.packets C.frame D.information版权方授权希赛网发布,侵权必究 Certificates are_(66)_documents attesting to the_(67)_of a public key to anindividual or other entity.They allow verification of the claim that a given public key does infact belong to a given individual.Certificates help prevent someone from using a phony keyto_(68)_someone else.In their simplest form,Certificates contain a public key and aname.As commonly used,a certificate also contains an_(69)_date,the name of the CAthat issued the certificate,a serial number,and perhaps other information.Mostimportantly,it contains the digital _(70)_of the certificate issuer.The most widelyaccepted format for certificates is X.509,thus,Certificates can be read or written by anyapplication complying with X.509.(66)A.text B.data C.digital D.structured(67)A.connecting B.binding C.composing D.conducting(68)A.impersonate B.personate C.damage D.control(69)A.communication B.computation C.expectation D.expiration(70)A.signature B.mark C.stamp D.hypertext版权方授权希赛网发布,侵权必究 Originally introduced by Netscape Communications,_(71)_are a generalmechanism which HTTP Server side applications,such as CGI_(72)_,can use to bothstore and retrieve information on the HTTP_(73)_side of the connection.Basically,上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题16上一节本书简介下一节第 14 章:专业英语作者:希赛教育软考学院 来源:希赛网 2014年05月08日习题17Cookies can be used to compensate for the_(74)_nature of HTTP.The addition of asimple,persistent,client-side state significantly extends the capabilities of WWW-based_(75)_.(71)A.Browsers B.Cookies C.Connections D.Scripts(72)A.graphics B.processes C.scripts D.texts(73)A.Client B.Editor C.Creator D.Server(74)A.fixed B.flexible C.stable D.stateless(75)A.programs B.applications C.frameworks D.constrains版权方授权希赛网发布,侵权必究 WebSQL is a SQL-like_(76)_language for extracting information from the web.Itscapabilities for performing navigation of web_(77)_make it a useful tool for automatingseveral web-related tasks that require the systematic processing of either ail the links in a_(78)_,all the pages that can be reached from a given URL through_(79)_thatmatch a pattern,or a combination of both.WebSQL also provides transparent

此文档下载收益归作者所有

下载文档
你可能关注的文档
收起
展开