1、数据库系统工程师-计算机专业英语(三)及答案解析(总分:44.00,做题时间:90 分钟)In (85) software, one question of near-universal interest is how rapidly Windows NT, which began shipping last summer, will be (86) in the marketplace and for what uses. For the most part, observers are (87) about the operating systems long term prospects
2、, but expect it to remain on (88) rather than desktops during 1994, saying that it wont become a mainstream product until (89) PCs typically have 16 to 24 MB of RAM, which is unlikely to happen next year.(分数:5.00)(1).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. syst
3、ems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(2).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(3).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(4).A.
4、 applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.(5).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G.H.Object-oriented DBMS integrated a variety of (81) da
5、ta types-such as business procedures, graphics, pictures, voice and annotated text.Object orientation also makes a (82) to application development efficiency. It makes the data, functions, attributes, and relationships an integral part of the (83) . In this way, objects can be reused and replicated.
6、Some leading RDBMS vendors support the concept of integrating object management capabilities with their current line of relational products. That capability enable users to the development cycle, since integrity logic and business roles no longer need to be programmed (84) each application.(分数:4.00)
7、(1).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.F.G.H.I.J.K.L.(2).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.
8、F.G.H.I.J.K.L.(3).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.F.G.H.I.J.K.L.(4).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1
9、.00)A.B.C.D.E.F.G.H.I.J.K.L.A local-area network (LAN) is a communications network that (125) a variety of devices and provides a (126) for information exchange among those devices. The scope of the LAN is small typically a single building or a cluster (丛) of buildings. The LAN is usually owned by t
10、he same organization that owns the (127) devices. The internal data rate of LAN is at least several Mb/s.The basic of LAN communication is broadcasting. At each station, there is a transmitter/receiver that communicates over a (128) shared, By other stations. A transmission from any one station is (
11、129) to and received by all other stations.(分数:5.00)(1).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.(2).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I
12、. modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.(3).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.(4).A. adopted B. attachedC. selected D. unified(分数:1.00)A.B.C.D.(5).A. broadcast B. cabl
13、e C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.F.G.H.I.J.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (16) from a friend who asks you to open it. This is what happe
14、ns with Melissa and several other similar email (17) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (18) .As administrators seek to block dangerous email attachments through the recognition of well-known
15、(19) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that look
16、s like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (20) access to your network.(分数:5.00)(1).A. attachment B. packet C. datagram D. message(分数:1.00)A.B.C.D.(2).A. virtual B. virus C. worms D. bacteria(
17、分数:1.00)A.B.C.D.(3).A. memory B. caches C. ports D. registers(分数:1.00)A.B.C.D.(4).A. names B. cookies C. software D. extensions(分数:1.00)A.B.C.D.(5).A. cracker B. user C. customer D. client(分数:1.00)A.B.C.D.The relational database model requires the data be (110) through programs that dont rely on the
18、 position of the data in the database. This is in direct (111) to the other database mode, where the program has to follow a series of pointers to the data it seeks. A program (112) a relational database simply asks for the data it seeks; the DBMS performs the necessary searches and (113) the inform
19、ation. The (114) on how the search is done are specific to the DBMS and vary from product to product.(分数:5.00)(1).A. accessed B. moved C. read D. wrote(分数:1.00)A.B.C.D.(2).A. conduct B. contract C. contrast D. construct(分数:1.00)A.B.C.D.(3).A. consulting B. containing C. querying D. queuing(分数:1.00)A
20、.B.C.D.(4).A. erases B. provides C. proves D. values(分数:1.00)A.B.C.D.(5).A. details B. documents C. tails D. tenants(分数:1.00)A.B.C.D.Network managers have long (140) practical voice-over-IP (VOIP) solutions. VOIP (141) ease network management and decreases costs by converging a companys telephony an
21、d data infrastructures into one network. And a VOIP solution implemented at a companys head-quarters with far-reaching branch offices can (142) tremendous amounts of (143) in long distance phone bills, provided that solution delivers POTS-like voice (144) over the Internet.(分数:5.00)(1).A. await B. a
22、waited C. awaiting D. awaits(分数:1.00)A.B.C.D.(2).A. promise B. promised C. promises D. promising(分数:1.00)A.B.C.D.(3).A. get B. put C. save D. waste(分数:1.00)A.B.C.D.(4).A. cash B. money C. space D. time(分数:1.00)A.B.C.D.(5).A. frequency B. length C. quality D. quantity(分数:1.00)A.B.C.D.(31) analysis em
23、phasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems. Ultimately, the system models become the (32) for designing and constructing an improved system. (33) is such a technique. The emphasis in this technique is process-centered. Systems analy
24、sts draw a series of process models called (34) . (35) is another such technique that integrates data and process concerns into constructs called objects.(分数:5.00)(1).A. Prototyping B. Accelerated C. Model-driven D. Iterative(分数:1.00)A.B.C.D.(2).A. image B. picture C. layout D. blueprint(分数:1.00)A.B
25、.C.D.(3).A. Structured analysis B. Information EngineeringC. Discovery Prototyping D. Object-Oriented analysis(分数:1.00)A.B.C.D.(4).A.PERT B. DFD C. ERD D. UML(分数:1.00)A.B.C.D.(5).A. Structured analysis B. Information EngineeringC. Discovery Prototyping D. Object-Oriented analysis(分数:1.00)A.B.C.D.Whi
26、le most recent attention in the AI field has been focused on expert system software, AI (66) has also seen dramatic advances. Activity in the past years was characterized by new low-cost, powerful Lisp machines, the introduction of AI workstations, Lisp compilers becoming available for all major pro
27、fessional and engineering workstations, and the personal computer emerging as a (67) . tool for expert system development. The next few years will see this technology evolves further.Because the (68) of an AI computer represents a sizable investment, companies should carefully (69) all options that
28、are available as well as have a good idea of what the next generation of systems will offer in order to (70) the optimum system. This publication provides the information necessary to gain this understanding.(分数:5.00)(1).A. choice B. read C. important D. softwareE. hardware F. significant G. emergen
29、ce H. surveyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(2).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surveyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(3).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surv
30、eyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(4).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surveyI. purchase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.(5).A. choice B. read C. important D. softwareE. hardware F. significant G. emergence H. surveyI. purch
31、ase J. select(分数:1.00)A.B.C.D.E.F.G.H.I.J.A typical (160) language contains an applicative sub-language which approximates the mathematical abstractions of “timeless“ functions applied to “spaceless“ values, where the actual operation sequences and use of storage space during expression evaluation a
32、re organized behind the (161) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (162) results during expression evaluation stored at the discretion of the language implementatio
33、n, and effecting parameter (163) and (164) operations through value copying.(分数:5.00)(1).A. imperative B. mandatory C. compulsory D. voluntary(分数:1.00)A.B.C.D.(2).A. foreground B. background C. screen D. scenes(分数:1.00)A.B.C.D.(3).A. middle B. intermediate C. previous D. final(分数:1.00)A.B.C.D.(4).A.
34、 transverse B. transportation C. transmission D. translation(分数:1.00)A.B.C.D.(5).A. assignment B. design C. value D. dispatch(分数:1.00)A.B.C.D.数据库系统工程师-计算机专业英语(三)答案解析(总分:44.00,做题时间:90 分钟)In (85) software, one question of near-universal interest is how rapidly Windows NT, which began shipping last sum
35、mer, will be (86) in the marketplace and for what uses. For the most part, observers are (87) about the operating systems long term prospects, but expect it to remain on (88) rather than desktops during 1994, saying that it wont become a mainstream product until (89) PCs typically have 16 to 24 MB o
36、f RAM, which is unlikely to happen next year.(分数:5.00)(1).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F.G. H.解析:(2).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.
37、 C.D.E.F.G.H.解析:(3).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D. E.F.G.H.解析:(4).A. applications B. accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E. F.G.H.解析:(5).A. applications B.
38、 accepted C. clients D. enthusiasticE. servers F. desktop G. systems H. replaced(分数:1.00)A.B.C.D.E.F. G.H.解析:解析 在系统软件中,最近被广泛关心的一个问题是,去年夏天开始出售的 Windows NT将会以多快的速度被市场接受,以及它将起什么作用。大部分观察员对该操作系统的长远前景表示出热情,但预料在 1994年间它仍将用在服务器而非台式机领域。他们说,在典型的台式机具有 16MB至 24MB内存之前,它不会成为主流产品,而这件事明年是不大可能发生的。Object-oriented DBM
39、S integrated a variety of (81) data types-such as business procedures, graphics, pictures, voice and annotated text.Object orientation also makes a (82) to application development efficiency. It makes the data, functions, attributes, and relationships an integral part of the (83) . In this way, obje
40、cts can be reused and replicated.Some leading RDBMS vendors support the concept of integrating object management capabilities with their current line of relational products. That capability enable users to the development cycle, since integrity logic and business roles no longer need to be programme
41、d (84) each application.(分数:4.00)(1).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A. B.C.D.E.F.G.H.I.J.K. L.解析:(2).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K.
42、 real-world L. into(分数:1.00)A.B.C.D. E.F.G.H.I.J.K.L.解析:(3).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI. extent J. shorten K. real-world L. into(分数:1.00)A.B.C.D.E.F.G. H.I.J.K.L.解析:(4).A. tool B. in C. idea D. contributionE. joke F. short G. object H. theoreticalI
43、. extent J. shorten K. real-world L. into(分数:1.00)A.B. C.D.E.F.G.H.I.J.K.L. 解析:解析 面向对象的数据库管理系统集成了现实世界的多种数据类型,如业务过程、图形、图片、语音和注释文本等。面向对象对应用开发效率也有贡献。它使数据、函数、属性和关系成为对象的完整的部分。这样,对象就可以被重用和复制。某些领先的关系数据库管理系统的供应商支持将对象管理能力与他们目前经营的关系型产品线相结合的概念。这种能力可以使用户缩短开发周期,因为完整的逻辑和事务规则不再需要编写到每个应用编程中。A local-area network (LA
44、N) is a communications network that (125) a variety of devices and provides a (126) for information exchange among those devices. The scope of the LAN is small typically a single building or a cluster (丛) of buildings. The LAN is usually owned by the same organization that owns the (127) devices. Th
45、e internal data rate of LAN is at least several Mb/s.The basic of LAN communication is broadcasting. At each station, there is a transmitter/receiver that communicates over a (128) shared, By other stations. A transmission from any one station is (129) to and received by all other stations.(分数:5.00)
46、(1).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D. E.F.G.H.I.J.解析:(2).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B.C.D.E.
47、F.G. H.I.J.解析:(3).A. broadcast B. cable C. controlD. interconnects E. internet F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A.B. C.D.E.F.G.H.I.J.解析:(4).A. adopted B. attachedC. selected D. unified(分数:1.00)A.B.C.D.解析:(5).A. broadcast B. cable C. controlD. interconnects E. inter
48、net F. meanderG. means H. medium I. modemJ. output switch relay(分数:1.00)A. B.C.D.E.F.G.H.I.J.解析:解析 局域网是将许多设备互连在一起并提供一种在这些设备间交换信息的方法的通信网络。局域网范围小,通常只在一个建筑物或一群建筑物范围内。一个局域网通常为拥有互联设备的同一个组织所拥有。局域网的内部传输率至少为数 Mb/s。局域网的基本通信方式为广播方式。每个站都有一个转发/接收器,通过一个与其他站共享的媒介来通信。从任何一个站发送的消息都被广播到所有的站并被这些站接收。Melissa and LoveLet
49、ter made use of the trust that exists between friends or colleagues. Imagine receiving an (16) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (17) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (18) .As administrators seek to block dangerous email attachments through the recognition of well-known (19) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat a