欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    【计算机类职业资格】系统分析师-13及答案解析.doc

    • 资源ID:1336214       资源大小:60KB        全文页数:10页
    • 资源格式: DOC        下载积分:5000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要5000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    【计算机类职业资格】系统分析师-13及答案解析.doc

    1、系统分析师-13 及答案解析(总分:100.00,做题时间:90 分钟)一、单项选择题(总题数:6,分数:100.00)SOX is an alternative _ for XML. It is useful for reading and creating XML content in a _ editor. It is then easily transformed into proper XML. SOX was created because developers can spend a great deal of time with raw XML. For many of us,

    2、 the popular XML_ have not reached a point where their tree views, tables and forms can completely substitute for the underlying _ language. This is not surprising when one considers that developers still use a text view, albeit enhanced, for editing other languages such as JavA. SOX uses _ to repre

    3、sent the structure of an XML document, which eliminates the need for closing tags and a number of quoting devices. The result is surprisingly clear.(分数:20.00)A.semanticB.pragmaticsC.syntaxD.grammarA.graphicB.programC.commandD.textA.textsB.editorsC.creatorsD.tagsA.programmingB.commandC.markupD.intera

    4、ctiveA.indentingB.structureC.frameworkD.bracketWith hundreds of millions of electronic _ taking place daily, businesses and organizations have a strong incentive to protect the _ of the data exchanged in this manner, and to positively ensure the _ of those involved in the transactions. This has led

    5、to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community h

    6、as been the development of standards-based security _ that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in _ and integrating security provisions at the deepest levels of the machine operation has significant benefits for bo

    7、th users and those responsible for securing IT operations.(分数:20.00)A.devicesB.transactionsC.communicationsD.businessesA.operationB.completenessC.integrityD.interchangeA.identitiesB.homogeneitiesC.creationsD.operationsA.appliancesB.chipsC.toolsD.meansA.softwareB.formC.computerD.siliconWLANs are incr

    8、easingly popular because they enable cost-effective connections among people, applications and data that were not possible, or not cost-effective, in the past. For example, WLAN-based applications can enable free-grained management of supply and distribution _ to improve their efficienty and reduce

    9、_. WLANs can also enable entirely new business processes. To cite but one example, hospitals are using WLAN-enabled point-of-care applications to reduce errors and improve overall _ care. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure.

    10、For example, they can protect corporate data by preventing _ through rogue access points. They help control salary costs, by allowing IT staffs to manage larger networks without adding staff. And they can improve overall network management by integrating with customers“ existing systems, such as Ope

    11、n View and UniCenter. Fortunately, it isn“t necessary to measure these benefits to justify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-consuming. _ and administrative chores.(分数:15.00)A.choresB.chainsC.changesD.linksA.personelB.expensesC.ove

    12、rheadD.hardwareA.financeB.patientC.affairD.doctorA.intrusionB.aggressionC.inbreakD.infallA.exploitationB.connectionC.departmentD.deploymentTo compete in today“s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their inte

    13、rnal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become _. Third parties can introduce risk in a variety of ways from connecting with an infected la

    14、ptop to unauthorized access of network resources to _ activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle“s security approa

    15、ch, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch _ of service attacks or steal _ information by snooping the network. As they access the corporate network, mobile and

    16、 remote users inadvertently can infect the network with _ and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.(分数:15.00)A.damageableB.susceptibleC.vulnerableD.changeableA.v

    17、enomousB.maliciousC.feloniousD.villainousA.denialB.virtuousC.completeD.traverseA.reservedB.confidentialC.completeD.mysteriousA.sicknessB.diseaseC.virusesD.germsAn Enterprise Resource Planning (ERP) is built upon a commercial _ that promises the seamless _ of all the information flowing through the c

    18、ompanyfinancial, accounting, human resources, supply chain and customer information. In implementation, all ERP systems include several features. The system is installed on a typical database management system. It requires initial setup according to the organization“s process, but it may be _accordi

    19、ng to the organization“s unique process requirements through a tool set contained within the ERP applications. Using ERP, _ can be prescribed to automate approval processes through established chains of commanD. One of the methods used to effect rapid implementation of the ERP system is to conduct c

    20、oncurrent _ sessions during the early stages of ERP implementation.(分数:15.00)A.operating systemB.middlewareC.software packageD.management systemA.associationB.connectionC.combinationD.integrationA.customizedB.madeC.manufacturedD.producedA.functionsB.processesC.informationD.workflowsA.JRPB.BPRC.RADD.

    21、JADA project management technique that is currently in widespread use is the _. The purpose of this technique is to detail, in hierarchical fashion, all of the activities that are required to meet project objectives. There are some special activities called _, which are events that signify the accom

    22、plishment or completion of major deliverables during the project. Most system development methodologies also provide _, whose purpose is to contain the various pieces of relevant information-feasibility assessments, schedules, needs analysis, and so forth-in a single place so that they can be presen

    23、ted to project clients and other related parties. Several types of important network diagrams are used in project management. _was developed to make clear the interdependence between project tasks before those tasks are scheduled. _ offers the advantage of clearly showing overlapping tasks.(分数:15.00

    24、)A.Functional decomposition diagramB.Work Breakdown StructureC.Structure ChartD.Organizational StructureA.feasibility checkpointsB.phasesC.iterationsD.milestonesA.baseline planB.project planningC.statement of workD.information system planningA.CPMB.Network DiagramC.PERTD.Gantt chartA.CPMB.Network Di

    25、agramC.PERTD.Gantt chart系统分析师-13 答案解析(总分:100.00,做题时间:90 分钟)一、单项选择题(总题数:6,分数:100.00)SOX is an alternative _ for XML. It is useful for reading and creating XML content in a _ editor. It is then easily transformed into proper XML. SOX was created because developers can spend a great deal of time with r

    26、aw XML. For many of us, the popular XML_ have not reached a point where their tree views, tables and forms can completely substitute for the underlying _ language. This is not surprising when one considers that developers still use a text view, albeit enhanced, for editing other languages such as Ja

    27、vA. SOX uses _ to represent the structure of an XML document, which eliminates the need for closing tags and a number of quoting devices. The result is surprisingly clear.(分数:20.00)A.semanticB.pragmaticsC.syntax D.grammar解析:A.graphicB.programC.commandD.text 解析:A.textsB.editors C.creatorsD.tags解析:A.p

    28、rogrammingB.commandC.markup D.interactive解析:A.indenting B.structureC.frameworkD.bracket解析:SOX 是另外一种 XML 语法,可以用它在文本编辑器中阅读和生成 XML 内容。它也很容易转换成适当的 XML 文档。SOX 的产生是由于开发人员在处理原始的 XML 文档时花费了大量的时间。对很多人来说,通常的 XML 编辑器还没有达到可以用树图、表格和窗体来完全代替基本标记语言的地步。这是很自然的,因为有些人认为开发人员还在使用文本界面编辑其他语言,例如,Java。SOX 使用了锯齿状缩进的方式来表示 XML

    29、文档的结构,这就不需要使用括号和引号了,其结果是显而易见的。With hundreds of millions of electronic _ taking place daily, businesses and organizations have a strong incentive to protect the _ of the data exchanged in this manner, and to positively ensure the _ of those involved in the transactions. This has led to an industry-wi

    30、de quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the devel

    31、opment of standards-based security _ that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in _ and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and thos

    32、e responsible for securing IT operations.(分数:20.00)A.devicesB.transactions C.communicationsD.businesses解析:A.operationB.completenessC.integrity D.interchange解析:A.identities B.homogeneitiesC.creationsD.operations解析:A.appliancesB.chips C.toolsD.means解析:A.softwareB.formC.computerD.silicon 解析:每天发生上亿次的电子交

    33、易,这使得商业机构产生了保护电子交易数据完整性和确认交易数据标识的迫切需求,从而导致整个行业都在探索更好更安全的控制 IT 操作的方法,探索在整个网络基础结构和客户设备中深入而广泛地部署增强的安全机制的方法。一种能够实现安全社区的有效设想是在客户机硬件中开发基于标准的安全芯片。在硅片中封装核心安全能力、在机器操作的最深层次集成安全设施的理论,对用户、对那些负责 IT 安全运营的人员都有极大的好处。WLANs are increasingly popular because they enable cost-effective connections among people, applicat

    34、ions and data that were not possible, or not cost-effective, in the past. For example, WLAN-based applications can enable free-grained management of supply and distribution _ to improve their efficienty and reduce _. WLANs can also enable entirely new business processes. To cite but one example, hos

    35、pitals are using WLAN-enabled point-of-care applications to reduce errors and improve overall _ care. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure. For example, they can protect corporate data by preventing _ through rogue access poin

    36、ts. They help control salary costs, by allowing IT staffs to manage larger networks without adding staff. And they can improve overall network management by integrating with customers“ existing systems, such as Open View and UniCenter. Fortunately, it isn“t necessary to measure these benefits to jus

    37、tify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-consuming. _ and administrative chores.(分数:15.00)A.choresB.chains C.changesD.links解析:A.personelB.expensesC.overhead D.hardware解析:A.financeB.patient C.affairD.doctor解析:A.intrusion B.aggressionC

    38、.inbreakD.infall解析:A.exploitationB.connectionC.departmentD.deployment 解析:在过去,应用和数据难以获得或者获得的成本很高,现在,WLAN 因为能使人们之间互连的性价比很高,而得到了广泛的应用。例如,基于 WLAN 的应用能使供应链得到很好的管理,提高效率并减少经费开支。WLAN 使新的业务流程成为可能。一个例子是,医院正在使用基于 WLAN 的护理点应用,以便减少错误,改进对病人的全面护理工作。WLAN 管理方案提供了一系列的其他好处,这些好处是很实在的,但是又难以度量。例如,它可以防止通过欺诈访问点的方式的入侵,以保护企业

    39、数据。WLAN 允许 IT 团队在不增加人员的基础上管理更大的网络,从而有助于控制薪水开支。WALN 通过集成客户已有的系统,例如,OpenView 和 UniCenter 等,有助于加强全面网络管理。幸运的是,我们不必度量这些好处来证明对 WLAN管理方案的投资是正确的,WLAN 管理方案只需使耗时的部署工作和事务性工作得以最小化,就可以很快得到补偿。To compete in today“s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, v

    40、isitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become _. Third parties can introduce risk in a variety of w

    41、ays from connecting with an infected laptop to unauthorized access of network resources to _ activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently

    42、use a moat and castle“s security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch _ of service attacks or steal _ information by snooping the network. As they a

    43、ccess the corporate network, mobile and remote users inadvertently can infect the network with _ and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.(分数:15.00)A.damageableB

    44、.susceptibleC.vulnerable D.changeable解析:A.venomousB.malicious C.feloniousD.villainous解析:A.denial B.virtuousC.completeD.traverse解析:A.reservedB.confidential C.completeD.mysterious解析:A.sicknessB.diseaseC.viruses D.germs解析:为了适应当今的快速竞争环境,组织正逐步允许承包商、合作伙伴、访问者和顾客访问它们的企业内部网络,这些用户可以在会议室或办公室通过有线端口连接网络,或者通过无线访问

    45、点。在这种允许第三方进行的开放式访问中,局域网变得难以防护。第三方可能以各种方式带来风险,从用一台受感染的膝上型电脑到连接未授权访问的网络资源进行恶意活动。然而,对很多组织而言,考虑到操作的复杂性和保证系统安全的成本,第三方网络访问是禁止的。接受调查的注册信息安全管理人员中,有 52%的人表示他们目前使用防火墙,而且承认在内部的防御措施是脆弱的。来自内部用户的威胁也正逐步成为安全考虑的一个因素。怀有恶意的员工可能发起拒绝服务攻击或者通过窥探网络窃取机密信息。当移动的和远程的用户访问网络时,他们一不小心就会使网络感染来自未受保护的公众网络的病毒和蠕虫。黑客伪装成内部用户,会利用脆弱的内部安全获得

    46、访问机密信息的权限。An Enterprise Resource Planning (ERP) is built upon a commercial _ that promises the seamless _ of all the information flowing through the companyfinancial, accounting, human resources, supply chain and customer information. In implementation, all ERP systems include several features. The

    47、system is installed on a typical database management system. It requires initial setup according to the organization“s process, but it may be _according to the organization“s unique process requirements through a tool set contained within the ERP applications. Using ERP, _ can be prescribed to autom

    48、ate approval processes through established chains of commanD. One of the methods used to effect rapid implementation of the ERP system is to conduct concurrent _ sessions during the early stages of ERP implementation.(分数:15.00)A.operating systemB.middlewareC.software package D.management system解析:A.associationB.connectionC.combinationD.integration 解析:A.customized B.madeC.manufacturedD.produced解析:A.functionsB.processesC.informationD.workflows 解析:A.JRPB.BPR C.RADD.JAD解析:企业资源计划(ERP)是在一个商用软件包上建立起来的,这个软件包保证了企业中信息流(金融、财务、人力资源、供应链和客户信息)的无缝集成。在实现阶段,所有的 ERP 都有这些特征:系统被安装在一个典型的数据库管理系统上;根据企业的流程进行初步设置,但是


    注意事项

    本文(【计算机类职业资格】系统分析师-13及答案解析.doc)为本站会员(Iclinic170)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开