欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    【计算机类职业资格】数据库系统工程师-计算机专业英语(三)及答案解析.doc

    • 资源ID:1335767       资源大小:91.50KB        全文页数:22页
    • 资源格式: DOC        下载积分:5000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要5000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    【计算机类职业资格】数据库系统工程师-计算机专业英语(三)及答案解析.doc

    1、数据库系统工程师-计算机专业英语(三)及答案解析(总分:44.00,做题时间:90 分钟)In (85) software, one question of near-universal interest is how rapidly Windows NT, which began shipping last summer, will be (86) in the marketplace and for what uses. For the most part, observers are (87) about the operating systems long term prospects

    2、, but expect it to remain on (88) rather than desktops during 1994, saying that it wont become a mainstream product until (89) PCs typically have 16 to 24 MB of RAM, which is unlikely to happen next year.(分数:5.00)(1).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. syst

    3、ems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(2).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(3).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(4).A.

    4、 applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(5).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.Object-oriented DBMS integrated a variety of (81) da

    5、ta types-such as business procedures, graphics, pictures, voice and annotated text.Object orientation also makes a (82) to application development efficiency. It makes the data, functions, attributes, and relationships an integral part of the (83) . In this way, objects can be reused and replicated.

    6、Some leading RDBMS vendors support the concept of integrating object management capabilities with their current line of relational products. That capability enable users to the development cycle, since integrity logic and business roles no longer need to be programmed (84) each application.(分数:4.00)

    7、(1).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.F.G.H.I.J.K.L.(2).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.

    8、F.G.H.I.J.K.L.(3).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.F.G.H.I.J.K.L.(4).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1

    9、.00)A.B.C.D.E.F.G.H.I.J.K.L.A local-area network (LAN) is a communications network that (125) a variety of devices and provides a (126) for information exchange among those devices. The scope of the LAN is small typically a single building or a cluster (丛) of buildings. The LAN is usually owned by t

    10、he same organization that owns the (127) devices. The internal data rate of LAN is at least several Mb/s.The basic of LAN communication is broadcasting. At each station, there is a transmitter/receiver that communicates over a (128) shared, By other stations. A transmission from any one station is (

    11、129) to and received by all other stations.(分数:5.00)(1).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.(2).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I

    12、. modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.(3).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.(4).A. adopted B. attachedC. selected D. unified(分数:1.00)A.B.C.D.(5).A. broadcast B. cabl

    13、e C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (16) from a friend who asks you to open it. This is what happe

    14、ns with Melissa and several other similar email (17) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (18) .As administrators seek to block dangerous email attachments through the recognition of well-known

    15、(19) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that look

    16、s like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (20) access to your network.(分数:5.00)(1).A. attachment B. packet C. datagram D. message(分数:1.00)A.B.C.D.(2).A. virtual B. virus C. worms D. bacteria(

    17、分数:1.00)A.B.C.D.(3).A. memory B. caches C. ports D. registers(分数:1.00)A.B.C.D.(4).A. names B. cookies C. software D. extensions(分数:1.00)A.B.C.D.(5).A. cracker B. user C. customer D. client(分数:1.00)A.B.C.D.The relational database model requires the data be (110) through programs that dont rely on the

    18、 position of the data in the database. This is in direct (111) to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program (112) a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and (113) the inform

    19、ation. The (114) on how the search is done are specific to the DBMS and vary from product to product.(分数:5.00)(1).A. accessed B. moved C. read D. wrote(分数:1.00)A.B.C.D.(2).A. conduct B. contract C. contrast D. construct(分数:1.00)A.B.C.D.(3).A. consulting B. containing C. querying D. queuing(分数:1.00)A

    20、.B.C.D.(4).A. erases B. provides C. proves D. values(分数:1.00)A.B.C.D.(5).A. details B. documents C. tails D. tenants(分数:1.00)A.B.C.D.Network managers have long (140) practical voice-over-IP (VOIP) solutions. VOIP (141) ease network management and decreases costs by converging a companys telephony an

    21、d data infrastructures into one network. And a VOIP solution implemented at a companys head-quarters with far-reaching branch offices can (142) tremendous amounts of (143) in long distance phone bills, provided that solution delivers POTS-like voice (144) over the Internet.(分数:5.00)(1).A. await B. a

    22、waited C. awaiting D. awaits(分数:1.00)A.B.C.D.(2).A. promise B. promised C. promises D. promising(分数:1.00)A.B.C.D.(3).A. get B. put C. save D. waste(分数:1.00)A.B.C.D.(4).A. cash B. money C. space D. time(分数:1.00)A.B.C.D.(5).A. frequency B. length C. quality D. quantity(分数:1.00)A.B.C.D.(31) analysis em

    23、phasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems. Ultimately, the system models become the (32) for designing and constructing an improved system. (33) is such a technique. The emphasis in this technique is process-centered. Systems analy

    24、sts draw a series of process models called (34) . (35) is another such technique that integrates data and process concerns into constructs called objects.(分数:5.00)(1).A. Prototyping B. Accelerated C. Model-driven D. Iterative(分数:1.00)A.B.C.D.(2).A. image B. picture C. layout D. blueprint(分数:1.00)A.B

    25、.C.D.(3).A. Structured analysis B. Information EngineeringC. Discovery Prototyping D. Object-Oriented analysis(分数:1.00)A.B.C.D.(4).A.PERT B. DFD C. ERD D. UML(分数:1.00)A.B.C.D.(5).A. Structured analysis B. Information EngineeringC. Discovery Prototyping D. Object-Oriented analysis(分数:1.00)A.B.C.D.Whi

    26、le most recent attention in the AI field has been focused on expert system software, AI (66) has also seen dramatic advances. Activity in the past years was characterized by new low-cost, powerful Lisp machines, the introduction of AI workstations, Lisp compilers becoming available for all major pro

    27、fessional and engineering workstations, and the personal computer emerging as a (67) . tool for expert system development. The next few years will see this technology evolves further.Because the (68) of an AI computer represents a sizable investment, companies should carefully (69) all options that

    28、are available as well as have a good idea of what the next generation of systems will offer in order to (70) the optimum system. This publication provides the information necessary to gain this understanding.(分数:5.00)(1).A. choice B. read C. important D. softwareE. hardware F. significant G. emergen

    29、ce H. surveyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(2).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surveyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(3).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surv

    30、eyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(4).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surveyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(5).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surveyI. purch

    31、ase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.A typical (160) language contains an applicative sub-language which approximates the mathematical abstractions of “timeless“ functions applied to “spaceless“ values, where the actual operation sequences and use of storage space during expression evaluation a

    32、re organized behind the (161) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (162) results during expression evaluation stored at the discretion of the language implementatio

    33、n, and effecting parameter (163) and (164) operations through value copying.(分数:5.00)(1).A. imperative B. mandatory C. compulsory D. voluntary(分数:1.00)A.B.C.D.(2).A. foreground B. background C. screen D. scenes(分数:1.00)A.B.C.D.(3).A. middle B. intermediate C. previous D. final(分数:1.00)A.B.C.D.(4).A.

    34、 transverse B. transportation C. transmission D. translation(分数:1.00)A.B.C.D.(5).A. assignment B. design C. value D. dispatch(分数:1.00)A.B.C.D.数据库系统工程师-计算机专业英语(三)答案解析(总分:44.00,做题时间:90 分钟)In (85) software, one question of near-universal interest is how rapidly Windows NT, which began shipping last sum

    35、mer, will be (86) in the marketplace and for what uses. For the most part, observers are (87) about the operating systems long term prospects, but expect it to remain on (88) rather than desktops during 1994, saying that it wont become a mainstream product until (89) PCs typically have 16 to 24 MB o

    36、f RAM, which is unlikely to happen next year.(分数:5.00)(1).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G. H.解析:(2).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.

    37、 C.D.E.F.G.H.解析:(3).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D. E.F.G.H.解析:(4).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E. F.G.H.解析:(5).A. applications B.

    38、 accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F. G.H.解析:解析 在系统软件中,最近被广泛关心的一个问题是,去年夏天开始出售的 Windows NT将会以多快的速度被市场接受,以及它将起什么作用。大部分观察员对该操作系统的长远前景表示出热情,但预料在 1994年间它仍将用在服务器而非台式机领域。他们说,在典型的台式机具有 16MB至 24MB内存之前,它不会成为主流产品,而这件事明年是不大可能发生的。Object-oriented DBM

    39、S integrated a variety of (81) data types-such as business procedures, graphics, pictures, voice and annotated text.Object orientation also makes a (82) to application development efficiency. It makes the data, functions, attributes, and relationships an integral part of the (83) . In this way, obje

    40、cts can be reused and replicated.Some leading RDBMS vendors support the concept of integrating object management capabilities with their current line of relational products. That capability enable users to the development cycle, since integrity logic and business roles no longer need to be programme

    41、d (84) each application.(分数:4.00)(1).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A. B.C.D.E.F.G.H.I.J.K. L.解析:(2).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K.

    42、 real-world L. into(分数:1.00)A.B.C.D. E.F.G.H.I.J.K.L.解析:(3).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.F.G. H.I.J.K.L.解析:(4).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI

    43、. extent J. shorten K. real-world L. into(分数:1.00)A.B. C.D.E.F.G.H.I.J.K.L. 解析:解析 面向对象的数据库管理系统集成了现实世界的多种数据类型,如业务过程、图形、图片、语音和注释文本等。面向对象对应用开发效率也有贡献。它使数据、函数、属性和关系成为对象的完整的部分。这样,对象就可以被重用和复制。某些领先的关系数据库管理系统的供应商支持将对象管理能力与他们目前经营的关系型产品线相结合的概念。这种能力可以使用户缩短开发周期,因为完整的逻辑和事务规则不再需要编写到每个应用编程中。A local-area network (LA

    44、N) is a communications network that (125) a variety of devices and provides a (126) for information exchange among those devices. The scope of the LAN is small typically a single building or a cluster (丛) of buildings. The LAN is usually owned by the same organization that owns the (127) devices. Th

    45、e internal data rate of LAN is at least several Mb/s.The basic of LAN communication is broadcasting. At each station, there is a transmitter/receiver that communicates over a (128) shared, By other stations. A transmission from any one station is (129) to and received by all other stations.(分数:5.00)

    46、(1).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D. E.F.G.H.I.J.解析:(2).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.

    47、F.G. H.I.J.解析:(3).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B. C.D.E.F.G.H.I.J.解析:(4).A. adopted B. attachedC. selected D. unified(分数:1.00)A.B.C.D.解析:(5).A. broadcast B. cable C. controlD. interconnects E. inter

    48、net F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A. B.C.D.E.F.G.H.I.J.解析:解析 局域网是将许多设备互连在一起并提供一种在这些设备间交换信息的方法的通信网络。局域网范围小,通常只在一个建筑物或一群建筑物范围内。一个局域网通常为拥有互联设备的同一个组织所拥有。局域网的内部传输率至少为数 Mb/s。局域网的基本通信方式为广播方式。每个站都有一个转发/接收器,通过一个与其他站共享的媒介来通信。从任何一个站发送的消息都被广播到所有的站并被这些站接收。Melissa and LoveLet

    49、ter made use of the trust that exists between friends or colleagues. Imagine receiving an (16) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (17) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (18) .As administrators seek to block dangerous email attachments through the recognition of well-known (19) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat a


    注意事项

    本文(【计算机类职业资格】数据库系统工程师-计算机专业英语(三)及答案解析.doc)为本站会员(hopesteam270)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开