欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    【计算机类职业资格】程序员-计算机英语及答案解析.doc

    • 资源ID:1336178       资源大小:105.50KB        全文页数:25页
    • 资源格式: DOC        下载积分:5000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要5000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    【计算机类职业资格】程序员-计算机英语及答案解析.doc

    1、程序员-计算机英语及答案解析(总分:79.00,做题时间:90 分钟)1.Each instruction is processed (75) ,and several instructions are at varying stages of execution in the processor at any given time,this is called instruction pipelining(分数:1.00)A.exactlyB.sequencingC.sequentiallyD.intermittently2.The error messages given by a C c

    2、ompiler show the message text,the most common (68) of the error,and a suggestion for fixing the error(分数:1.00)A.consequenceB.causeC.informationD.result3.Hash functions can generate a (1) bit string from an arbitrarily long piece of plain text.(分数:1.00)A.longB.shortC.variable-lengthD.fixed - length4.

    3、In C language,the usual expression statements are assignments or (59) (分数:1.00)A.I/OsB.function callsC.operationsD.evaluations5.(分数:1.00)A.program written in low - level language is called “ (3) “A. compilerB.executableC.sourceD.assemble6.C+ is used with proper (66) design techniques(分数:1.00)A.class

    4、-orientedB.object-basedC.face to objectD.object-orientedFor users, microkernel technology promises (11) , compact and sophisticated operating systems that are typically (12) across a range of hardware platforms.(分数:2.00)A.quicklyB.speedC.slowD.fastA.portableB.madeC.moveableD.use7.In C program,it is

    5、convenient to use a break to exit from a (57) (分数:1.00)A.functionB.loopC.classD.structure8.In C language, (58) is a collection of one or more variables,possibly of different types, grouped together under a single name for convenient handling.(分数:1.00)A.a classB.a structureC.an arrayD.a function9.A c

    6、lickable string or graphic that points to another Web page or document is called (18) 。(分数:1.00)A.LinkB.AnchorC.BrowserD.Hyperlink10.In C language,the increment and decrement operator can only be applied to (56) ,so an expression like x(a+b)-is illegal.(分数:1.00)A.integersB.StringsC.variablesD.pointe

    7、rs11.People usually install (10) to fix known security holes.(分数:1.00)A.patchesB.compensationsC.complementsD.additions12.Which one of these statements about connecting to the Internet is true? (76) (分数:1.00)A.You must have a modem to connect to the InternetB.You must have a telephone line to connect

    8、 to the InternetC.The Internet can be used to connect computers with different ISPD.The Internet can only be used to link computers with same operating system(21) put computers to practical business use, but below the surface it is the heart of an (22) - the kernel - that provides the technical wiza

    9、rdry to juggle multiple programs, connect to networks and store (23) .A traditional kernel provides all the functions for applications. The kernel (24) memory, I/O devices and parcels out processor time.The kernel also supports (25) and fault tolerance, which is the ability to recover automatically

    10、when parts of the system fail.(分数:5.00)A.DatabasesB.ApplicationsC.DriversD.GamesA.DBMSB.WindowsC.ApplicationD.operating systemA.textB.dataC.imageD.graphicsA.managesB.manageC.managedD.managingA.authenticationB.auto - correctionC.securityD.problem13.An identifier is a sequence of letters and digits,th

    11、e first character must be (60) (分数:1.00)A.a letterB.a stringC.an arrayD.a interger14.ActiveX is a set of specifications and software that allow small programs or software components to (72) (分数:1.00)A.work togetherB.work aloneC.simplifyD.reuse15.Object-oriented DBMS integrated a variety of (16) data

    12、 types -such as business procedures, graphics, pictures, voice and annotated text.(分数:1.00)A.objectB.theoreticalC.shortenD.real - world16.One use of networks is to let several computers (61) data such as file systems,printers,and tape drives(分数:1.00)A.copyB.communicateC.transferD.shareThe following

    13、suggestions increase programs (69) and make them easier to Maintain:1Use a standard indention technique,blank lines,form feeds,and spaces2Insert plenty of (70) into your code(分数:2.00)A.reliabilityB.securityC.readabilityD.usabilityA.java codeB.C+ codeC.assemble codeD.comments17.A typical peripheral d

    14、evice has an address which the processor uses to select the devices internal (74) (分数:1.00)A.dataB.controlsC.signalsD.registers18.One of the guidelines in writing the C code is as follows: write code that is as clear as (15) .(分数:1.00)A.readableB.reusableC.possibleD.semantic19.When the result of an

    15、operation becomes larger than the limits of the representation, (79) occurs(分数:1.00)A.overexposureB.overdraftC.overflowD.overdose20.EJB technology enables rapid and simplified development of distributed, (19) ,secure and portable applications based on Java technology.(分数:1.00)A.stand-aloneB.integrat

    16、ionC.transactionalD.internationalSoftware design is a (46) process. It requires a certain amount of fl air on the part of the (47) . Design can not be learned from a book . It must be practiced and learnt by experience and study of existing systems. A well (48) software system is straightforward to

    17、implement and maintain , easily (49) and reliable. Badly (48) software systems, although they may work are (50) to be expensive to maintain , difficult to test and unreliable.(分数:5.00)A.createB.creativeC.creatingD.createdA.designerB.userC.computerD.designA.designB.designingC.designedD.designsA.maint

    18、ainB.maintainsC.maintainingD.maintainedA.likeB.unlikelyC.unlikeD.likelyIn C program, all variables must be declared before (52) , usually at the (53) of the function before any executable statements.(分数:2.00)A.statedB.instructedC.illustratedD.useA.endB.middleC.beginningD.last21.Array is a contiguous

    19、,numbered set of variables of a given base type,which can be used and passed to functions as a (67) (分数:1.00)A.recordB.unitC.fileD.parameterAn instruction is made up of (41) that specify the function to be performed and operands that represent the data to be operated on. For example, if an instructi

    20、on is to perform the operation of (42) two numbers, it must know (43) the two numbers are. The processors job is to (44) instructions and operands from memory and to perform each operation. Having done that, it signals (45) to send it next instruction.(分数:5.00)A.dataB.addressC.registerD.operationsA.

    21、addedB.addingC.addD.additionA.whenB.whichC.whereD.whoA.getB.pushC.makeD.putA.hard diskB.registerC.memoryD.cache22.Very brief, simple expressions in program are easy to write correctly and effortless to (4) .(分数:1.00)A.defendB.debugC.defaultD.detectSoftware quality assurance is now an emerging sub -

    22、discipline of (36) . As Buckly and oston point out, (37) software quality assurance is likely to lead to an ultimate (38) of software costs. However, the major hurdle in the path of software management in this area is the lack of usable software (39) . The development of accepted and generally appli

    23、cable standards should be one of the principal goals of (40) in software engineering.(分数:5.00)A.software engineeringB.software designC.codingD.testingA.effectiveB.effortlessC.studyD.weekA.balanceB.incrementC.productionD.reductionA.mechanismB.engineeringC.standardsD.designA.productionB.planningC.mana

    24、gementD.research23.SOAP uses (20) technologies to define an extensible messaging framework providing a message construct that can be exchanged over a variety of underlying protocols(分数:1.00)A.HTYPB.HTMLC.XMLD.XHTMLBecause web servers are (31) and application independent, they can send or request dat

    25、a from legacy or external applications including databases. All replies, once converted into (32) mark-up language, can then be transmitted to a (33) . Used in this way, Intranets can offer (34) desktop support costs, easy links with legacy applications and databases and, above all, (35) of use.(分数:

    26、5.00)A.machineB.IPC.platformD.networkA.plaintextB.hypertextC.ciphertextD.supertextA.browserB.applicationC.routerD.serverA.higherB.lowerC.sameD.differentA.hardB.difficultC.easeD.around24.There is only one Web (7) technology URIs.(分数:1.00)A.accessingB.naming/addressingC.communicatingD.searching25. (9)

    27、 is not a basic element of communication protocols(分数:1.00)A.formatB.grammarC.transmit mediaD.timer26.In object-oriented program languages, a class must exposure its (13) to the outside.(分数:1.00)A.variantsB.algorithmC.interfaceD.statements27.The standard class (17) in C + + language contain many use

    28、ful classes for input and output, string handling, mathematical computations, and system programming tasks.(分数:1.00)A.databaseB.filesC.librariesD.subroutine28.A requirement is a feature of the system or a description of something the system is capable of doing in order to fulfill the systems (71) (分

    29、数:1.00)A.planB.purposeC.documentD.Design29. (6) is an important one, but not the only web data formats.(分数:1.00)A.HTTPB.HTMLC.WWWD.Explorer30.1OOBASE-TX makes use of two pairs of twisted pair cable,one pair used for (73) and the other for reception(分数:1.00)A.detectionB.transmissionC.relationD.Connec

    30、tion31. (65) is the address of a variable or a variable in which the address of another variable is stored(分数:1.00)A.DirectorB.RecordC.ArrayD.Pointer32.Gateway is a device used to connect two separate network that use (2) communication protocol.(分数:1.00)A.same kind ofB.similarC.differentD.same33.On

    31、a virtual memory system, the logical memory space available to the program is totally (14) of the physical memory space.(分数:1.00)A.dependentB.independentC.inD.outsideIn C language, external variables have to be defined (54) function, this (55) actual storage for it.(分数:2.00)A.inB.outC.insideD.outsid

    32、eA.allocatesB.locatesC.findsD.100ks for34. (77) is not a programming language(分数:1.00)A.COBOLB.JavaC.CMMD.Basic35.The operating system has several major components,including the (64) ,a memory management system,the file system manager,device drivers,and the system libraries(分数:1.00)A.application ker

    33、nelB.information kernelC.network kernelD.system kernel36.In Java language, objects are instances of (5) .(分数:1.00)A.classB.typeC.structureD.moduleBy using (26) , a 600M -byte music CD can be compressed to 50M bytes or less. It can be streamed (downloaded in chunks) so that you can begin listening to

    34、 the opening bars while the (27) of the file arrives in the background. And, most important, the music files of this kind retain good listening (28) that earlier (29) schemes lacked. That (30) of features makes accessing and distributing music on the web practical for the first time.(分数:5.00)A.JPGB.

    35、MP3C.MP4D.VODA.nextB.pastC.restD.hostA.quantityB.massC.amountD.qualityA.compressionB.codingC.transmissionD.playingA.differenceB.combinationC.additionD.condition37.In C language, there are several methods of communicating data between functions, one of which is by (51) 。(分数:1.00)A.argumentsB.variable

    36、sC.messagesD.constants38.Comment is nonprogram (78) embedded in a program to explain its form and function to human readers(分数:1.00)A.commandB.expressionC.textD.statement39. (8) could find out syntax errors in a source program.(分数:1.00)A.ComplierB.Operate systemC.ApplicationD.ExplainerA firewall is

    37、a security system designed to (62) an organizations network against (63) (分数:2.00)A.preventB.protectC.developD.exploitA.operatingB.programmingC.threatsD.service程序员-计算机英语答案解析(总分:79.00,做题时间:90 分钟)1.Each instruction is processed (75) ,and several instructions are at varying stages of execution in the p

    38、rocessor at any given time,this is called instruction pipelining(分数:1.00)A.exactlyB.sequencingC.sequentially D.intermittently解析:解析 每一条指令都是顺序处理的,在某个给定时刻,数条指令同时处在不同的执行阶段,这种执行方式称为指令的流水处理。2.The error messages given by a C compiler show the message text,the most common (68) of the error,and a suggestion

    39、for fixing the error(分数:1.00)A.consequenceB.cause C.informationD.result解析:解析 C 编译器给出的错误信息包括信息文本、最常见的错误原因和一个纠正错误的建议。3.Hash functions can generate a (1) bit string from an arbitrarily long piece of plain text.(分数:1.00)A.longB.shortC.variable-lengthD.fixed - length 解析:解析 Hash 函数能够根据任意长度的纯文本产生一个固定长度的字符串

    40、。4.In C language,the usual expression statements are assignments or (59) (分数:1.00)A.I/OsB.function callsC.operationsD.evaluations 解析:解析 c 语言中,表达式通常是赋值语句或者函数调用。5.(分数:1.00)A.program written in low - level language is called “ (3) “A. compilerB.executableC.sourceD.assemble 解析:解析 一段用低级语言编写的程序称为“汇编程序”。6.

    41、C+ is used with proper (66) design techniques(分数:1.00)A.class-orientedB.object-basedC.face to objectD.object-oriented 解析:解析 C+使用了一定的面向对象设计技术。For users, microkernel technology promises (11) , compact and sophisticated operating systems that are typically (12) across a range of hardware platforms.(分数:

    42、2.00)A.quicklyB.speedC.slowD.fast 解析:A.portable B.madeC.moveableD.use解析:解析 对用户来说,微内核技术承诺了可以实现快速,紧凑,复杂精密的操作系统,而且该系统在一定范围的硬件平台上都是轻便的。7.In C program,it is convenient to use a break to exit from a (57) (分数:1.00)A.functionB.loop C.classD.structure解析:解析 c 语言中,使用一个 break语句跳出循环是很方便的。8.In C language, (58) is

    43、 a collection of one or more variables,possibly of different types, grouped together under a single name for convenient handling.(分数:1.00)A.a classB.a structure C.an arrayD.a function解析:解析 语言中,一个结构是由一个或者多个相同类型或不同类型的变量构成的集合,这些变量用一个简单的名字组织在一起,可以很方便地引用。9.A clickable string or graphic that points to ano

    44、ther Web page or document is called (18) 。(分数:1.00)A.LinkB.AnchorC.BrowserD.Hyperlink 解析:解析 一个可以点击的指向另一个网页或者文档的字符串或者图片称为超链接。10.In C language,the increment and decrement operator can only be applied to (56) ,so an expression like x(a+b)-is illegal.(分数:1.00)A.integersB.StringsC.variables D.pointers解析:

    45、解析 c 语言中,自增和自减操作符,只能适用于变量,所以一个类似 x(a+b)-的表达式是非法的。11.People usually install (10) to fix known security holes.(分数:1.00)A.patches B.compensationsC.complementsD.additions解析:解析 人们常常安装补丁程序以修复已知的安全漏洞。12.Which one of these statements about connecting to the Internet is true? (76) (分数:1.00)A.You must have a

    46、modem to connect to the InternetB.You must have a telephone line to connect to the InternetC.The Internet can be used to connect computers with different ISP D.The Internet can only be used to link computers with same operating system解析:解析 下列关于连接到 Internet的说法中,哪一个是正确的?C. Internet 能够连接使用不同ISP(Interne

    47、t服务提供商)的计算机(21) put computers to practical business use, but below the surface it is the heart of an (22) - the kernel - that provides the technical wizardry to juggle multiple programs, connect to networks and store (23) .A traditional kernel provides all the functions for applications. The kernel

    48、(24) memory, I/O devices and parcels out processor time.The kernel also supports (25) and fault tolerance, which is the ability to recover automatically when parts of the system fail.(分数:5.00)A.DatabasesB.Applications C.DriversD.Games解析:A.DBMSB.WindowsC.ApplicationD.operating system 解析:A.textB.data

    49、C.imageD.graphics解析:A.manages B.manageC.managedD.managing解析:A.authenticationB.auto - correctionC.security D.problem解析:解析 应用程序(Applications)使计算机有了实际的商业用途,但在这种表面现象之下(operating system),是操作系统(operating system)的内核为多程序间的切换、网络的连接和数据(data)存储提供了技术的支持。传统的内核为应用程序提供各种功能,内核管理(manage)内存、I/O 设备并分配 CPU的时隙。内核还支持安全机制(security)及容错机制,即当系统的一部分崩溃时,内核能够自动恢复。13.An identifier is a sequence of letters and digits,the first character must be (60) (分数:1.00)A.a letter B.a stringC.an arrayD.a interger解析:解析 标识符是一个由字母和数字组成的字符序列,它要求首


    注意事项

    本文(【计算机类职业资格】程序员-计算机英语及答案解析.doc)为本站会员(cleanass300)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开