欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    【计算机类职业资格】系统分析师-专业英语(四)及答案解析.doc

    • 资源ID:1336228       资源大小:81.50KB        全文页数:17页
    • 资源格式: DOC        下载积分:5000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要5000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    【计算机类职业资格】系统分析师-专业英语(四)及答案解析.doc

    1、系统分析师-专业英语(四)及答案解析(总分:40.00,做题时间:90 分钟)One of the difficulties in building an SQL-like query language for the Web is the absence of a database (131) for this huge, heterogeneous repository of information. However, if we are interested in HTML documents only, we can construct a virtual schema from th

    2、e implicit structure of these files. Thus, at the highest level of (132) , every such document is identified by its Uniform Resource Locator (URL), and a (133) and a text. Also, Web severs provide some additional information such as the type, length, and the last modification date of a document. So

    3、for data mining purposes, we can consider the set of all HTML documents as a relation:Document (url, rifle, text, type, length, modif)Where all the (134) are character strings. In this framework, an individual document is identified with a (135) in this relation. Of course, if some optional informat

    4、ion is missing from the HTML document, the associate fields will be left blank, but this is not uncommon in any database.(分数:5.00)(1).A. schema B. platform C. module D. relation(分数:1.00)A.B.C.D.(2).A. protocol B. control C. abstraction D. presentation(分数:1.00)A.B.C.D.(3).A. table B. title C. driver

    5、D. event(分数:1.00)A.B.C.D.(4).A. type B. links C. characteristics D. attributes(分数:1.00)A.B.C.D.(5).A. relation B. field C. script D. tuple(分数:1.00)A.B.C.D.VRML is a (151) for 3D multimedia and shared virtual worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structure

    6、d graphics, and extra (152) (z and time) to the presentation of documents. The applications of VRML are (153) , ranging from simple business graphics to entertaining WWW page graphics, manufacturing, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communitie

    7、s.X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwards (154) with VRML. Furthermore, it is componentized, profiled, and extensible, which makes it possible to use X3D in very different (155) , from high-end visualizations to lightweight applications.

    8、(分数:5.00)(1).A. link B. format C. structure D. procedure(分数:1.00)A.B.C.D.(2).A. subject B. object C. dimensions D. disconnection(分数:1.00)A.B.C.D.(3).A. broad B. implicit C. explicit D. special(分数:1.00)A.B.C.D.(4).A. imconsistent B. independentC. applicable D. compatible(分数:1.00)A.B.C.D.(5).A. scenar

    9、ios B. placesC. applications D. programs(分数:1.00)A.B.C.D.Developing reliable software on time and within (106) represents a difficult endeavor for many organizations.Usually business solutions have three main aspects: people, (107) , and technology. The main reason for failing software projects has

    10、little to do with .technology and tools, and much to do with lack of process (108) . Experience has shown that introducing new technology and tools in an immature or undisciplined environment is likely to increase the chaos. CASE tools are not enough. “A fool with a tool is still a fool!“Structured

    11、method was the first wave of the software industry. This was the beginning of transforming software development from a“ (109) industry to mass production. Software process movement if the second wave in the software industry. The process maturity movement prepares the way for the third wave of the s

    12、oftware industry: “software industrialization“. Software development will become like an assembly and manufacturing process. A critical enabling factor is a disciplined software engineering process with predictable quality, (110) and functionality.(分数:5.00)(1).A. forecast B. preparationC. budget D.

    13、economy(分数:1.00)A.B.C.D.(2).A. process B. skillC. organization D. interface(分数:1.00)A.B.C.D.(3).A. law B. disciplineC. plan D. evaluation(分数:1.00)A.B.C.D.(4).A. college B. familyC. workshop D. cottage(分数:1.00)A.B.C.D.(5).A. plan B. scheduleC. effort D. product(分数:1.00)A.B.C.D.You want to use the Web

    14、 to let (76) users or your customers look (77) corporate information. But you want to keep installation at the user end (78) and you dont want just. (79) to get (80) your databases. That may be where an application server enters the picture. For more user machine independent, these software packages

    15、, typically written in the (81) programming language for use on Windows (82) -based systems, act as go-betweens (83) browser-equipped end users to the databases that (84) the information they need to (85) .(分数:10.00)(1).A. informer B. internal C. inside D. outside(分数:1.00)A.B.C.D.(2).A. at B. by C.

    16、in D. out(分数:1.00)A.B.C.D.(3).A. simple B. simply C. single D. singly(分数:1.00)A.B.C.D.(4).A. any B. anyone C. anything D. anywhere(分数:1.00)A.B.C.D.(5).A. into B. off C. onto D. out(分数:1.00)A.B.C.D.(6).A. C B. C+ C. SQL D. Java(分数:1.00)A.B.C.D.(7).A. NC B. NT C. PC D. PT(分数:1.00)A.B.C.D.(8).A. link B

    17、. linkage C. linking D. links(分数:1.00)A.B.C.D.(9).A. held B. helt C. hold D. holt(分数:1.00)A.B.C.D.(10).A. access B. accessing C. assert D. asserting(分数:1.00)A.B.C.D.The heat generated by the operating system war between rivals IBM Corp. and Microsoft Corp. is (21) .Windows 95 and OS/2 introduce a ne

    18、w (22) . Both systems claim to multitask legacy DOS and 16-bit Windows applications. However, only OS/2 can provide full memory (crash) protection for these legacy applications because it is capable of running each DOS and Windows application within its full-protected memory address space.Windows 95

    19、 will run all current Windows applications in the same shared- memory address space, affording full memory protection only to the (23) 32-bit Windows 95 applications. In other word, Windows 95 users will have to (24) their current Windows applications to Windows 95 version to match the memory protec

    20、tion OS/2 now delivers.While OS/2 does afford superior memory protection and multitasking for legacy DOS and Windows applications, it will not be able to run any Windows 95 applications. IBM may address this (25) in an update of the OS but has no present plans to do so.(分数:5.00)(1).A. intensify B. i

    21、ntensified C. intensifying D. intensifies(分数:1.00)A.B.C.D.(2).A. place B. environment C. condition D. action(分数:1.00)A.B.C.D.(3).A. old B. big C. new D. original(分数:1.00)A.B.C.D.(4).A. upgrade B. upstair C. downstair D. downgrade(分数:1.00)A.B.C.D.(5).A. mistake B. advantage C. benefit D. shortcoming(

    22、分数:1.00)A.B.C.D.Public Key Infrastructure (PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network (VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong auth

    23、entication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store (101) and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip (102) opera

    24、tions, ensuring that users keys axe never exposed to the PC environment, eToken eliminates the need to store (103) and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is crea

    25、ted using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee (104) of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro

    26、offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.The most secure use of authentication involves enclosing at least one certificate with every signed message. The message (105) verifies the certificate using the CAs pub

    27、lic key. If the senders public key is legitimate, the recipient verifies the messages signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.(分数:5.00)(1).A. messages B. certificatesC. applets D. passwords(分数:1.00)A.B.C.D.(2).A. co

    28、nformance B. conferenceC. non-repudiation D. secrecy(分数:1.00)A.B.C.D.(3).A. recipient B. writerC. sender D. browser(分数:1.00)A.B.C.D.(4).A. private keys B. public keysC. authentication codes D. message digests(分数:1.00)A.B.C.D.(5).A. interpretation B. detectionC. encryption D. translation(分数:1.00)A.B.

    29、C.D.When the system upon which a transport entity is running fails and subsequently restarts, the (136) information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The still active side of a half-open connec

    30、tions can close the connection using a (137) timer. This timer measures the time the transport machine will continue to await an (138) of a transmitted segment after the segment has been retransmitted the maximum number of times. When the timer (139) , the transport entity assumes that either the ot

    31、her transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user.In the event that a transport entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment,

    32、the failed side returns an RST i to every segment i that it receives, when the RST i reaches the other side, it must be checked for validity based on the (140) number i, as the RST could be in response to an old segment, if the reset is valid, the transport entity performs an abnormal termination.(分

    33、数:5.00)(1).A. data B. state C. signal D. control(分数:1.00)A.B.C.D.(2).A. give-up B. abandon C. quit D. connection(分数:1.00)A.B.C.D.(3).A. reset B. acknowledgment C. sequence D. synchroizer(分数:1.00)A.B.C.D.(4).A. stops B. restarts C. expires D. abandons(分数:1.00)A.B.C.D.(5).A. sequence B. acknowledgment

    34、 C. connection D. message(分数:1.00)A.B.C.D.系统分析师-专业英语(四)答案解析(总分:40.00,做题时间:90 分钟)One of the difficulties in building an SQL-like query language for the Web is the absence of a database (131) for this huge, heterogeneous repository of information. However, if we are interested in HTML documents only,

    35、we can construct a virtual schema from the implicit structure of these files. Thus, at the highest level of (132) , every such document is identified by its Uniform Resource Locator (URL), and a (133) and a text. Also, Web severs provide some additional information such as the type, length, and the

    36、last modification date of a document. So for data mining purposes, we can consider the set of all HTML documents as a relation:Document (url, rifle, text, type, length, modif)Where all the (134) are character strings. In this framework, an individual document is identified with a (135) in this relat

    37、ion. Of course, if some optional information is missing from the HTML document, the associate fields will be left blank, but this is not uncommon in any database.(分数:5.00)(1).A. schema B. platform C. module D. relation(分数:1.00)A. B.C.D.解析:(2).A. protocol B. control C. abstraction D. presentation(分数:

    38、1.00)A.B.C. D.解析:(3).A. table B. title C. driver D. event(分数:1.00)A.B. C.D.解析:(4).A. type B. links C. characteristics D. attributes(分数:1.00)A.B.C.D. 解析:(5).A. relation B. field C. script D. tuple(分数:1.00)A.B.C.D. 解析:解析 为 Web建立类似 SQL一样的查询语言的困难之一是缺乏一个为这个庞大而异构的信息库的建立的数据库模式。但是,如果我们仅仅关心 HTML文档的话,那么我们可以从这

    39、些文件的固有结构中构造一个虚拟模式。这样一来,在最高级的抽象层次上,每一个这样的文档都可由它的 URL、标题和正文标识。而且,Web 服务器提供一些附加的信息,例如类型、长度和文档的最后修改日期等。因此,从数据挖掘的角度来看,我们可以把所有 HTML文档组成的集合看作一个关系:Document (url, title, text, type, length, modif)其中所有的履性都是字符串类型。在这个框架下,单个文档由关系中的一个重组来标识。当然,如果HTML文档丢失了一些可选信息,则相关的域将为空值,但是这在任何数据库中都是常见的方法。VRML is a (151) for 3D mu

    40、ltimedia and shared virtual worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structured graphics, and extra (152) (z and time) to the presentation of documents. The applications of VRML are (153) , ranging from simple business graphics to entertaining WWW page graph

    41、ics, manufacturing, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communities.X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwards (154) with VRML. Furthermore, it is componentized, profiled, and extensible

    42、, which makes it possible to use X3D in very different (155) , from high-end visualizations to lightweight applications.(分数:5.00)(1).A. link B. format C. structure D. procedure(分数:1.00)A.B. C.D.解析:(2).A. subject B. object C. dimensions D. disconnection(分数:1.00)A.B.C. D.解析:(3).A. broad B. implicit C.

    43、 explicit D. special(分数:1.00)A. B.C.D.解析:(4).A. imconsistent B. independentC. applicable D. compatible(分数:1.00)A.B.C.D. 解析:(5).A. scenarios B. placesC. applications D. programs(分数:1.00)A. B.C.D.解析:解析 VRML 是为 3D多媒体和在 WWW上共享虚拟现实定义的文档格式。与 HTML 相比,VRML 增加了低一级的交互作用、结构化的图形和表现文档的附加的维元(z 和时间)。VRML 的应用是很广泛的,

    44、应用范围从简单的商业图形到娱乐性的 WWW页面,从制造业、科学、娱乐和教育方面的应用到三维共享虚拟现实和虚拟社区等。VRML的继续发展就是 X3D。X3D 是基于 XML的,是与 VRML向后兼容的,而且它是组件化的、形象化的,是可扩展的,这使得 X3D可以应用在完全不同的情景中,从高端的可视化应用到轻量级的应用都是 X3D的领域。Developing reliable software on time and within (106) represents a difficult endeavor for many organizations.Usually business solutio

    45、ns have three main aspects: people, (107) , and technology. The main reason for failing software projects has little to do with .technology and tools, and much to do with lack of process (108) . Experience has shown that introducing new technology and tools in an immature or undisciplined environmen

    46、t is likely to increase the chaos. CASE tools are not enough. “A fool with a tool is still a fool!“Structured method was the first wave of the software industry. This was the beginning of transforming software development from a“ (109) industry to mass production. Software process movement if the se

    47、cond wave in the software industry. The process maturity movement prepares the way for the third wave of the software industry: “software industrialization“. Software development will become like an assembly and manufacturing process. A critical enabling factor is a disciplined software engineering

    48、process with predictable quality, (110) and functionality.(分数:5.00)(1).A. forecast B. preparationC. budget D. economy(分数:1.00)A.B.C. D.解析:(2).A. process B. skillC. organization D. interface(分数:1.00)A. B.C.D.解析:(3).A. law B. disciplineC. plan D. evaluation(分数:1.00)A.B. C.D.解析:(4).A. college B. family

    49、C. workshop D. cottage(分数:1.00)A.B.C.D. 解析:(5).A. plan B. scheduleC. effort D. product(分数:1.00)A.B. C.D.解析:解析 对很多组织来说,在给定的时间和预算范围内开发可靠的软件,意味着艰难的努力。业务解决方案通常有三个方面,分别是人员、过程和技术,软件项目失败的主要原因与技术和工具几乎没有关系,大部分是因为缺乏过程定义。经验表明,在一个不成熟或者没有定义的环境引进新技术和工具,只能是乱上加乱。 CASE 工具并不意味着一切,正如:“A fool with a tool is still a fool!”。结构化方法掀起了软件产业的第一次浪潮,是从作坊式工业(cottage industry,家庭手工业)到大规模生产的转变的开端。软件过程改进是软件产业的第二次浪潮,且过程成熟为软件产业的第三次浪潮(软件工业化)铺平了道路。软件开发将如装配和制造过程一般,而要做到这一点,一个重要的因素就是需要一个具有可预测的质量、进度和功能的,已定义的软件工程过程。You want to use the Web to let (76) users or your customers look (77) corporate information. Bu


    注意事项

    本文(【计算机类职业资格】系统分析师-专业英语(四)及答案解析.doc)为本站会员(feelhesitate105)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开