欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    【计算机类职业资格】系统分析师-专业英语(二)及答案解析.doc

    • 资源ID:1336227       资源大小:85KB        全文页数:18页
    • 资源格式: DOC        下载积分:5000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要5000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    【计算机类职业资格】系统分析师-专业英语(二)及答案解析.doc

    1、系统分析师-专业英语(二)及答案解析(总分:45.00,做题时间:90 分钟)The approach we propose is a system-oriented methodology for knowledge acquisition, this orientation emphasizes ongoing documentation throughout each cycle and technique applied. Program-wide documentation is suggested, both for the purpose of internal (91) and

    2、 for later verification and (92) efforts. The documentation system we propose includes a central “knowledge acquisition (93) “ which is (94) to reflect knowledge acquisition plans, session nodes, and domain expert participation. Specifically, (95) within the database system include knowledge acquisi

    3、tion forms, which document plans for, and notes from, knowledge acquisition session, domain expert file, and rule content forms.(分数:5.00)(1).A. interchange B. interfaceC. communication D. message(分数:1.00)A.B.C.D.(2).A. validation B. confirmC. effection D. evaluation(分数:1.00)A.B.C.D.(3).A. dataset B.

    4、 collectionC. file D. database(分数:1.00)A.B.C.D.(4).A. edited B. updatedC. exchanged D. revised(分数:1.00)A.B.C.D.(5).A. templates B. samplesC. examples D. temper(分数:1.00)A.B.C.D.Rapid application development (RAD) systems purport to lighten the developers (46) by making it easy to program an applicati

    5、on with simple intuitive steps.RAD tools (47) the developer everything needed to construct a fully functional application quickly and easily. They make short work of modifying the developed product to (48) changes after the program is finished. Applications developed with RAD tools are constructed a

    6、s they are envisioned. As an applications real usefulness (49) , the developer armed with RAD tools should be able to (50) on new features with little fuss.(分数:5.00)(1).A. burden B. trouble C. task D. weight(分数:1.00)A.B.C.D.(2).A. offer B. order C. refer D. release(分数:1.00)A.B.C.D.(3).A. accommodate

    7、 B. account C. decrease D. eliminate(分数:1.00)A.B.C.D.(4).A. appearances B. emerges C. recognizes D. solves(分数:1.00)A.B.C.D.(5).A. beat B. change C. debug D. tack(分数:1.00)A.B.C.D.Although the bulk of industry resources and energies have focused on developing the fastest (11) or slickest (12) , more a

    8、nd more mindshare is turning to the evolution of the computer interface. Advancements in the areas of input devices, (13) processing and virtual reality could lead to fundamental changes in the way human and computer interact. The technological battlefield of the future will be adding layers between

    9、 the user and the raw machine to make the (14) as invisible as possible. (15) represents the next evolutionary step for the interface.(分数:5.00)(1).A. microprocessor B. operating systemsC. voice D. interface(分数:1.00)A.B.C.D.(2).A. microprocessor B. operating systemsC. voice D. interface(分数:1.00)A.B.C

    10、.D.(3).A. microprocessor B. operating systemsC. voice D. interface(分数:1.00)A.B.C.D.(4).A. microprocessor B. operating systemsC. voice D. interface(分数:1.00)A.B.C.D.(5).A. microprocessor B. operating systemsC. voice D. virtual reality(分数:1.00)A.B.C.D.All known techniques for handling complex problems

    11、successfully seem to fall into one of the three classes: subdividing the problem (51) , ignoring irrelevant detail in a safe way (52) , and having an independent agent (53) the internal consistency (contextual checking). The first two provide guidelines for solving the problem, the third serves to p

    12、rovide early warnings. A good programming language supports all three.In subdividing problem, some of the subproblems may be similar to the (54) problem. It leads us to a (55) solution. This (55) solution is viable provided each of the subproblems is easier to solve than the original problem.(分数:5.0

    13、0)(1).A. abrogation B. abstraction C. composition D. contraction(分数:1.00)A.B.C.D.(2).A. abrogation B. abstraction C. composition D. contraction(分数:1.00)A.B.C.D.(3).A. check B. original C. perform D. recursive(分数:1.00)A.B.C.D.(4).A. check B. original C. perform D. recursive(分数:1.00)A.B.C.D.(5).A. che

    14、ck B. original C. perform D. recursive(分数:1.00)A.B.C.D.Activity Based Costing (ABC) is an (126) technique that allows an organization to determine the actual (127) associated with each product and service produced by the organization without regard to the organizational structure. This chapter expla

    15、ins some of the uses and benefits of Activity Based Costing. We use IDEFO (128) modeling in conjunction with ABC to enable more effective business (129) design decisions.In order to achieve the major goals of business process improvement, process simplification and improvement, FAA managers need to

    16、fully understand the cost, time, and quality of activities performed by employees or machines throughout an entire organization. ABC methods enable (130) to cost out measurements to business simplification and process improvement.(分数:5.00)(1).A. computing B. campaigningC. programming D. accounting(分

    17、数:1.00)A.B.C.D.(2).A. activity B. qualityC. cost D. process(分数:1.00)A.B.C.D.(3).A. activity B. flowchartC. design D. management(分数:1.00)A.B.C.D.(4).A. data B. benefitC. process D. image(分数:1.00)A.B.C.D.(5).A. computers B. managersC. clients D. consumers(分数:1.00)A.B.C.D.WLANs are increasingly popular

    18、 because they enable cost-effective connections among people, applications and data that were not possible, or not cost-effective, in the past. For example, WLAN-based applications can enable fine-grained management of supply and distribution (166) to improve their efficienty and reduce (167) . WLAN

    19、s can also enable entirely new business processes. To cite but one example, hospitals are using WLAN-enabled point-of-care applications to reduce errors and improve overall (168) care. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure. For

    20、 example, they can protect corporate data by preventing (169) through rogue access points. They help control salary costs, by allowing IT staffs to manage larger networks without adding staff. And they can improve overall network mananement by integrating with customers existing systems, such as Ope

    21、nView and UniCenter. Fortunately, it isnt necessary to measure these benefits to justify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-consuming (170) and administrative chores.(分数:5.00)(1).A. chores B. chains C. changes D. links(分数:1.00)A.B.C

    22、.D.(2).A. personel B. expenses C. overhead D. hardware(分数:1.00)A.B.C.D.(3).A. finance B. patient C. affair D. doctor(分数:1.00)A.B.C.D.(4).A. intrusion B. aggression C. inbreak D. infall(分数:1.00)A.B.C.D.(5).A. exploitation B. connection C. department D. deployment(分数:1.00)A.B.C.D.With hundreds of mill

    23、ions of electronic (161) taking place daily, businesses and organizations have a strong incentive to protect the (162) of the data exchanged in this manner, and to positively ensure the (163) of those involved in the transactions. This has led to an industry-wide quest for better, more secure method

    24、s for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security (164

    25、 ) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (165 ) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT

    26、 operations.(分数:5.00)(1).A. devices B. transactions C. communications D. businesses(分数:1.00)A.B.C.D.(2).A. operation B. completeness C. integrity D. interchange(分数:1.00)A.B.C.D.(3).A. identities B. homogeneities C. creations D. operations(分数:1.00)A.B.C.D.(4).A. appliances B. chips C. tools D. means(

    27、分数:1.00)A.B.C.D.(5).A. software B. form C. computer D. silicon(分数:1.00)A.B.C.D.Prior to the UML, there was no clear leading (111) language. Users had to choose from among many similar modeling languages with minor differences in overall (112) power. Most of the modeling languages shared a set of com

    28、monly accepted concepts that are expressed slightly differently in various languages. This lack of (113) discouraged new users from entering the OO market and from doing OO modeling, without greatly expanding the power of modeling. Users longed for the industry to adopt one, or a very few, broadly s

    29、upported modeling languages suitable for (114) usage.Some vendors were discouraged from entering the OO modeling area because of the need to support many similar, but slightly different, modeling languages. In particular, the supply of add-on tools has been depressed because small vendors cannot aff

    30、ord to support many different formats from many different (115) modeling tools. It is important to the entire O0 industry to encourage broadly based tools and vendors, as well as niche products that cater to the needs of specialized groups.(分数:5.00)(1).A. programming B. modelingC. formal D. intellig

    31、ent(分数:1.00)A.B.C.D.(2).A. control B. expressiveC. conductive D. interactive(分数:1.00)A.B.C.D.(3).A. agreement B. understandingC. characteristic D. diversity(分数:1.00)A.B.C.D.(4).A. distinctive B. special-purposeC. separate D. general-purpose(分数:1.00)A.B.C.D.(5).A. internal B. externalC. front-end D.

    32、back-end(分数:1.00)A.B.C.D.Asynchronous Transfer Mode (ATM) is a (16) that promises to change the fabric of local and wide area communications.The key advantage of ATM is the capability to move voice, data, graphics and (17) at speeds of up to 2 gigabits per second.An ATM switch allows you to create a

    33、 (18) network that is completely independent from the (19) configuration of the network.ATM uses a (20) called cell switching to convert data into fixed length cells of 53 bytes each, so they can be switched very quickly and efficiently.(分数:5.00)(1).A. technology B. video images C. logical D. physic

    34、al(分数:1.00)A.B.C.D.(2).A. technology B. video images C. logical D. physical(分数:1.00)A.B.C.D.(3).A. technology B. video images C. logical D. physical(分数:1.00)A.B.C.D.(4).A. technology B. video images C. logical D. physical(分数:1.00)A.B.C.D.(5).A. technology B. video images C. logical D. technique(分数:1

    35、.00)A.B.C.D.系统分析师-专业英语(二)答案解析(总分:45.00,做题时间:90 分钟)The approach we propose is a system-oriented methodology for knowledge acquisition, this orientation emphasizes ongoing documentation throughout each cycle and technique applied. Program-wide documentation is suggested, both for the purpose of intern

    36、al (91) and for later verification and (92) efforts. The documentation system we propose includes a central “knowledge acquisition (93) “ which is (94) to reflect knowledge acquisition plans, session nodes, and domain expert participation. Specifically, (95) within the database system include knowle

    37、dge acquisition forms, which document plans for, and notes from, knowledge acquisition session, domain expert file, and rule content forms.(分数:5.00)(1).A. interchange B. interfaceC. communication D. message(分数:1.00)A.B.C. D.解析:(2).A. validation B. confirmC. effection D. evaluation(分数:1.00)A. B.C.D.解

    38、析:(3).A. dataset B. collectionC. file D. database(分数:1.00)A.B.C.D. 解析:(4).A. edited B. updatedC. exchanged D. revised(分数:1.00)A.B. C.D.解析:(5).A. templates B. samplesC. examples D. temper(分数:1.00)A. B.C.D.解析:解析 我们所建议的方法是一种面向系统的知识获取方法,强调在每个周期和技术应用中进行文档记录。建立程序范围的文档是必要的,一是为了内部交流,二是为了以后的验证和确认使用。我们所建议的文档系

    39、统包含一个中央知识获取数据库,它需要更新以反映知识获取计划、会话结点和领域专家参与情况。特别是数据库系统中的模板包含了为知识获取会话建立的知识获取表格、知识获取会话过程中的记录、领域专家文件以及规则内容表格等。分析 在(92)小题的备选答案中,validation 和 confirm 都有“确认”的意思,但 validation 是名词,confirm 是动词。evaluation 的意思是“评价、估价”。Rapid application development (RAD) systems purport to lighten the developers (46) by making it

    40、 easy to program an application with simple intuitive steps.RAD tools (47) the developer everything needed to construct a fully functional application quickly and easily. They make short work of modifying the developed product to (48) changes after the program is finished. Applications developed wit

    41、h RAD tools are constructed as they are envisioned. As an applications real usefulness (49) , the developer armed with RAD tools should be able to (50) on new features with little fuss.(分数:5.00)(1).A. burden B. trouble C. task D. weight(分数:1.00)A. B.C.D.解析:(2).A. offer B. order C. refer D. release(分

    42、数:1.00)A. B.C.D.解析:(3).A. accommodate B. account C. decrease D. eliminate(分数:1.00)A. B.C.D.解析:(4).A. appearances B. emerges C. recognizes D. solves(分数:1.00)A. B.C.D.解析:(5).A. beat B. change C. debug D. tack(分数:1.00)A.B.C.D. 解析:解析 快速应用开发(RAD)通过简单而直观的步骤使应用编程变得简单,从而减轻开发人员的负担。RAD 工具为开发人员提供了快速而简单地构建一个完整功

    43、能应用所需的一切,这些工具能缩短修改已经完成的产品的工作量,这种修改是为了适应程序完成后的变化。使用 RAD 工具开发的应用就像计划那样构建。当应用的真实有效性出现时,使用 RAD 工具的开发人员必须能够有条不紊地添加新的特征。分析 常见的 RAD 工具有 PowerBuilder、Visual Basic、Delphi、Oracle/Development 2000 等。RAD工具的主要特点是具有图形开发界面和可视计算技术的支持,程序员只需通过简单的鼠标点击和键盘交互操作,即可以快速生成应用程序代码。本题的 E 小题的四个备选项中,只有 beat 和 tack 能与 on 搭配,其中 bea

    44、t on 的含义是“火般照晒,波浪似扑向”,tack on 的含义是“添加”。Although the bulk of industry resources and energies have focused on developing the fastest (11) or slickest (12) , more and more mindshare is turning to the evolution of the computer interface. Advancements in the areas of input devices, (13) processing and vi

    45、rtual reality could lead to fundamental changes in the way human and computer interact. The technological battlefield of the future will be adding layers between the user and the raw machine to make the (14) as invisible as possible. (15) represents the next evolutionary step for the interface.(分数:5

    46、.00)(1).A. microprocessor B. operating systemsC. voice D. interface(分数:1.00)A. B.C.D.解析:(2).A. microprocessor B. operating systemsC. voice D. interface(分数:1.00)A.B. C.D.解析:(3).A. microprocessor B. operating systemsC. voice D. interface(分数:1.00)A.B.C. D.解析:(4).A. microprocessor B. operating systemsC.

    47、 voice D. interface(分数:1.00)A.B.C.D. 解析:(5).A. microprocessor B. operating systemsC. voice D. virtual reality(分数:1.00)A.B.C.D. 解析:解析 尽管大量的工业资源和精力集中于开发最快的微处理器和最灵活的操作系统,但越来越多的思想正在转向计算机接口的发展。在输入设备、语音处理和虚拟现实方面的进展可导致人机交互方式的根本改变。未来的技术战场将在用户和裸机之间加入多层,以使接口尽可能透明。虚拟现实代表着接口的下一个演化方向。分析 虚拟现实技术又称灵境技术,是采用计算机技术为核心的

    48、现代高科技生成逼真的视、听、触觉一体化的特定范围的虚拟环境。用户可以使用必要的特定装备(如数据衣、数据手套、数据鞋以及头盔、立体眼镜等),就可以自然地和虚拟环境中的客体进行交互,相互影响,从而产生亲临现场的感受和体验。这就是虚拟现实技术的浸没感(immersion)或临场参与感,虚拟现实具有交互性和想象性。All known techniques for handling complex problems successfully seem to fall into one of the three classes: subdividing the problem (51) , ignorin

    49、g irrelevant detail in a safe way (52) , and having an independent agent (53) the internal consistency (contextual checking). The first two provide guidelines for solving the problem, the third serves to provide early warnings. A good programming language supports all three.In subdividing problem, some of the subproblems may be similar to the (54) problem. It leads us to a (55) solution. This (55) solution is viable provided each of the subproblems is easier to solve than the original problem.(分数:5.00)(1).A. abrogation B. abstraction C. composition D. contracti


    注意事项

    本文(【计算机类职业资格】系统分析师-专业英语(二)及答案解析.doc)为本站会员(feelhesitate105)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开