欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    【计算机类职业资格】系统分析师-计算机专业英语及答案解析.doc

    • 资源ID:1336265       资源大小:323.50KB        全文页数:68页
    • 资源格式: DOC        下载积分:5000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要5000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    【计算机类职业资格】系统分析师-计算机专业英语及答案解析.doc

    1、系统分析师-计算机专业英语及答案解析(总分:95.00,做题时间:90 分钟)一、B单项选择题/B(总题数:19,分数:95.00)Developing reliable software on time and withinU U 1 /U /Urepresents a difficult endeavor for many organizations.Usually business solutions have three main aspects:people,U U 2 /U /U, and technology.The main reason for failing softwar

    2、e projects has little to do with technology and tools, and much to do with lack of processU U 3 /U /U. Experience has shown that introducing new technology and tools in an immature or undisciplined environment is likely to increase the chaos. CASE tools are not enough. “A fool with a tool is still a

    3、 fool!“Structured method was the first wave of the software industry. This was the beginning of transforming software development from a “U U 4 /U /Uindustry“ to mass production.Software process movement if the second wave in the software industry.The process maturity movement prepares the way for t

    4、he third wave of the software industry: “software industrialization“. Software development will become like an assembly and manufacturing process. A critical enabling factor is a disciplined software engineering process with predictable quality,U U 5 /U /Uand functionality.(分数:5.00)(1). A. forecast

    5、B. preparation C. budget D. economy(分数:1.00)A.B.C.D.(2). A. process B. skill C. organization D. interface(分数:1.00)A.B.C.D.(3). A. law B. discipline C. plan D. evaluation(分数:1.00)A.B.C.D.(4). A. college B. family C. workshop D. cottage(分数:1.00)A.B.C.D.(5). A. plan B. schedule C. effort D. product(分数:

    6、1.00)A.B.C.D.Activity Based Costing (ABC) is anU U 6 /U /Utechnique that allows an organization to determine the actualU U 7 /U /Uassociated with each product and service produced by the organization without regard to the organizational structure. This chapter explains some of the uses and benefits

    7、of Activity Based Costing. We use IDEFOU U 8 /U /Umodeling in conjunction with ABC to enable more effective businessU U 9 /U /Udesign decisions.In order to achieve the major goals of business process improvement, process simplification and improvement, FAA managers need to fully understand the cost,

    8、 time, and quality of activities performed by employees or machines throughout an entire organization. ABC methods enableU U 10 /U /Uto cost out measurements to business simplification and process improvement.(分数:5.00)(1). A. computing B. campaigning C. programming D. accounting(分数:1.00)A.B.C.D.(2).

    9、 A. activity B. quality C. cost D. process(分数:1.00)A.B.C.D.(3). A. activity B. flowchart C. design D. management(分数:1.00)A.B.C.D.(4). A. data B. benefit C. process D. image(分数:1.00)A.B.C.D.(5). A. computers B. managers C. clients D. consumers(分数:1.00)A.B.C.D.One of the difficulties in building an SQ

    10、L-like query language for the Web is the absence of a databaseU U 11 /U /Ufor this huge, heterogeneous repository of information. However, if we are interested in HTML documents only, we can construct a virtual schema from the implicit structure of these files. Thus, at the highest level ofU U 12 /U

    11、 /U, every such document is identified by its Uniform Resource Locator (URL), and aU U 13 /U /Uand a text. Also, Web severs provide some additional information such as the type, length, and the last modification date of a document. So for data mining purposes, we can consider the set of all HTML doc

    12、uments as a relation:Document (url, title, text, type, length, modif)Where all theU U 14 /U /Uare character strings. In this framework, an individual document is identified with aU U 15 /U /Uin this relation. Of course, if some optional information is missing from the HTML document, the associate fi

    13、elds will be left blank, but this is not uncommon in any database.(分数:5.00)(1). A. schema B. platform C. module D. relation(分数:1.00)A.B.C.D.(2). A. protocol B. control C. abstraction D. presentation(分数:1.00)A.B.C.D.(3). A. table B. title C. driver D. event(分数:1.00)A.B.C.D.(4). A. type B. links C. ch

    14、aracteristics D. attributes(分数:1.00)A.B.C.D.(5). A. relation B. field C. script D. tuple(分数:1.00)A.B.C.D.When the system upon which a transport entity is running fails and subsequently restarts, theU U 16 /U /Uinformation of all active connections is lost. The affected connections become half-open,

    15、as the side that did not fail does not yet realize the problem.The still active side of a half-open connections can close the connection using aU U 17 /U /Utimer. This timer measures the time the transport machine will continue to await anU U 18 /U /Uof a transmitted segment after the segment has be

    16、en retransmitted the maximum number of times.0When the timerU U 19 /U /U, the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user.In the event that a transpor

    17、t entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment, the failed side returns an RST i to every segment i that it receives, when the RST i reaches the other side, it must be checked for validity based on theU U 20 /U /Unumber i, as t

    18、he RST could be in response to an old segment, if the reset is valid, the transport entity performs an abnormal termination.(分数:5.00)(1). A. data B. state C. signal D. control(分数:1.00)A.B.C.D.(2). A. give-up B. abandon C. quit D. connection(分数:1.00)A.B.C.D.(3). A. reset B. acknowledgment C. sequence

    19、 D. synchroizer(分数:1.00)A.B.C.D.(4). A. stops B. restarts C. expires D. abandons(分数:1.00)A.B.C.D.(5). A. sequence B. acknowledgment C. connection D. message(分数:1.00)A.B.C.D.Astute service providers realize that the continued support of legacy X.25 and asynchronous network element using separate oper

    20、ations network is costU U 21 /U /U. For example, the maintenance of multiple networks can require additional staff. Often, this staff must be trained on multiple vendor technologies, sometimes requiring parallel groups specializing in eachU U 22 /U /U. Hence, additional maintenance procedures must b

    21、e maintained and administrative records areU U 23 /U /U. The duplication of transport facilities to carryU U 24 /U /Unetwork traffic is an inefficient use of resources. And not surprisingly, more technologies installed in a central office means the necessity for more physical space, and an increase

    22、in power connections and power consumption. Migration of theseU U 25 /U /Unetwork elements to IP-based DCNs is alogical strategy.(分数:5.00)(1). A. prohibitive B. feasible C. connective D. special(分数:1.00)A.B.C.D.(2). A. line B. platform C. sever D. switch(分数:1.00)A.B.C.D.(3). A. declined B. prolifera

    23、ted C. destroyed D. produced(分数:1.00)A.B.C.D.(4). A. overlook B. overlie C. overlay D. overleap(分数:1.00)A.B.C.D.(5). A. traditional B. dominancy C. redundancy D. legacy(分数:1.00)A.B.C.D.Microsofts COM is a softwareU U 26 /U /Uthat allows applications to be built from binary software components. COM i

    24、s the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism

    25、to identify components and their interfaces uniquely.OLE is a compoundU U 27 /U /Ustandard developed by Microsoft. OLE makes it possible to createU U 28 /U /Uwith one application and link or embed them in a second application. Embedded objects retain their original format andU U 29 /U /Uto the appli

    26、cation that created them. Support for OLE is built into the Windows and MacOS Operating Systems. AU U 30 /U /Ucompound document standard developed mainly by Apple and IBM is called OpenDoc.(分数:5.00)(1). A. architecture B. protocol C. procedure D. structure(分数:1.00)A.B.C.D.(2). A. text B. graphic C.

    27、document D. database(分数:1.00)A.B.C.D.(3). A. table B. event C. objects D. function(分数:1.00)A.B.C.D.(4). A. characteristics B. address C. page D. links(分数:1.00)A.B.C.D.(5). A. completing B. competing C. connecting D. contained(分数:1.00)A.B.C.D.VRML is aU U 31 /U /Ufor 3D multimedia and shared virtual

    28、worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structured graphics, and extra U U 32 /U /U(z and time) to the presentation of documents. The applications of VRML are U U 33 /U /U, ranging from simple business graphics to entertaining WWW page graphics, manufacturi

    29、ng, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communities.X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwardsU U 34 /U /Uwith VRML. Furthermore, it is componentized, profiled, and extensible, which mak

    30、es it possible to use X3D in very differentU U 35 /U /U, from high-end visualizations to lightweight applications.(分数:5.00)(1). A. link B. format C. structure D. procedure(分数:1.00)A.B.C.D.(2). A. subject B. object C. dimensions D. disconnection(分数:1.00)A.B.C.D.(3). A. broad B. implicit C. explicit D

    31、. special(分数:1.00)A.B.C.D.(4). A. imconsistent B. independent C. applicable D. compatible(分数:1.00)A.B.C.D.(5). A. scenarios B. places C. applications D. programs(分数:1.00)A.B.C.D.SOX is an alternativeU U 36 /U /Ufor XML. It is useful for reading and creating XML content in aU U 37 /U /Ueditor. It is

    32、then easily transformed into proper XML. SOX was created because developers can spend a great deal of time with raw XML. For many of us, the popular XML U U 38 /U /Uhave not reached a point where their tree views, tables and forms can completely substitute for the underlying.U U 39 /U /Ulanguage. Th

    33、is is not surprising when one considers that developers still use a text view, albeit enhanced, for editing other languages such as JavA. SOX usesU U 40 /U /Uto represent the structure of an XML document, which eliminates the need for closing tags and a number of quoting devices. The result is surpr

    34、isingly clear.(分数:5.00)(1). A. semantic B. pragmatics C. syntax D. grammar(分数:1.00)A.B.C.D.(2). A. graphic B. program C. command D. text(分数:1.00)A.B.C.D.(3). A. texts B. editors C. creators D. tags(分数:1.00)A.B.C.D.(4). A. programming B. command C. markup D. interactive(分数:1.00)A.B.C.D.(5). A. indent

    35、ing B. structure C. framework D. bracket(分数:1.00)A.B.C.D.With hundreds of millions of electronicU U 41 /U /Utaking place daily, businesses and organizations have a strong incentive to protect theU U 42 /U /Uof the data exchanged in this manner, and to positively ensure theU U 43 /U /Uof those involv

    36、ed in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the ima

    37、ginations of the security community has been the development of standards-based securityU U 44 /U /Uthat can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities inU U 45 /U /Uand integrating security provisions at the deepest levels o

    38、f the machine operation has significant benefits for both users and those responsible for securing IT operations.(分数:5.00)(1). A. devices B. transactions C. communications D. businesses(分数:1.00)A.B.C.D.(2). A. operation B. completeness C. integrity D. interchange(分数:1.00)A.B.C.D.(3). A. identities B

    39、. homogeneities C. creations D. operations(分数:1.00)A.B.C.D.(4). A. appliances B. chips C. tools D. means(分数:1.00)A.B.C.D.(5). A. software B. form C. computer D. silicon(分数:1.00)A.B.C.D.WLANs are increasingly popular because they enable cost-effective connections among people, applications and data t

    40、hat were not possible, or not cost-effective, in the past. For example, WLAN-based applications can enable fine-grained management of supply and distributionU U 46 /U /Uto improve their efficienty and reduceU U 47 /U /U. WLANs can also enable entirely new business processes. To cite but one example,

    41、 hospitals are using WLAN-enabled point-of-care applications to reduce errors and improve overallU U 48 /U /Ucare. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure. For example, they can protect corporate data by preventingU U 49 /U /Uthr

    42、ough rogue access points. They help control salary costs, by allowing IT staffs to manage larger networks without adding staff. And they can improve overall network mananement by integrating with customers existing systems, such as OpenView and UniCenter. Fortunately, it isnt necessary to measure th

    43、ese benefits to justify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-consumingU U 50 /U /Uand administrative chores.(分数:5.00)(1). A. chores B. chains C. changes D. links(分数:1.00)A.B.C.D.(2). A. personel B. expenses C. overhead D. hardware(分数:

    44、1.00)A.B.C.D.(3). A. finance B. patient C. affair D. doctor(分数:1.00)A.B.C.D.(4). A. intrusion B. aggression C. inbreak D. infall(分数:1.00)A.B.C.D.(5). A. exploitation B. connection C. department D. deployment(分数:1.00)A.B.C.D.To compete in todays fast-paced competitive environment, organizations are i

    45、ncreasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs becomeU U 51 /U

    46、 /U. Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources toU U 52 /U /Uactivity. For many organizations,however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty


    注意事项

    本文(【计算机类职业资格】系统分析师-计算机专业英语及答案解析.doc)为本站会员(eventdump275)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开