1、软件设计师-计算机专业英语(二)及答案解析(总分:40.00,做题时间:90 分钟)MIDI enables people to use (11) computers and electronic musical instruments. There are actually three components to MIDI, the communications“ (12) .“, the Hardware Interface and a distribution (13) called “Standard MIDI Files“. In the context of the WWW, th
2、e most interesting component is the (14) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (15) are stored in MIDI files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use
3、 of MIDI today.(分数:5.00)(1).A. personal B. electronic C. multimedia D. network(分数:1.00)A.B.C.D.(2).A. device B. protocol C. network D. controller(分数:1.00)A.B.C.D.(3).A. format B. text C. wave D. center(分数:1.00)A.B.C.D.(4).A. Video B. Faxmail C. Graphic D. Audio(分数:1.00)A.B.C.D.(5).A. messages B. pac
4、kets C. frame D. information(分数:1.00)A.B.C.D.Spread spectrum simply means that data is sent in small pieces Over a number of the (46) frequencies available for use at any time in the specified range. Devices using (47) spread spectrum (DSSS) communicate by (48) each byte of data into several parts a
5、nd sending them concurrently on different (49) . DSSS uses a lot of the available (50) , about 22 megahertz (MHz) .(分数:5.00)(1).A. continuous B. high C. low D. discrete(分数:1.00)A.B.C.D.(2).A. direct-sequence B. discrete-sequenceC. duplicate-sequence D. dedicate-sequence(分数:1.00)A.B.C.D.(3).A. splitt
6、ing B. combining C. packing D. compacting(分数:1.00)A.B.C.D.(4).A. bits B. frequencies C. packets D. messages(分数:1.00)A.B.C.D.(5).A. rate B. velocity C. bandwidth D. period(分数:1.00)A.B.C.D.(41) is a protocol that a host uses to inform a router when it joins or leaves an Internet multicast group.(42) i
7、s an error detection code that most data communication networks use.(43) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.(44) is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-peri
8、odic basis over a range of media.(45) is an identifier of a web page.(分数:5.00)(1).A. ICMP B. SMTP C. IGMP D. ARP(分数:1.00)A.B.C.D.(2).A. 4B/5B B. CRC C. Manchester Code D. Huffman Code(分数:1.00)A.B.C.D.(3).A. OSPF B. RIP C. RARP D. BGP(分数:1.00)A.B.C.D.(4).A. ISDN B.X.25 C. Frame Relay D. ATM(分数:1.00)A
9、.B.C.D.(5).A. HTTP B. URL C. HTML D. TAG(分数:1.00)A.B.C.D.Networks can be interconnected by different devices. In the physical layer networks can be connected by (31) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches which operate at
10、 data link layer. They can accept (32) , examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process. In network layer, we have routers that can connect two networks. If two networks have (33) network layer, the muter may be able to tra
11、nslate between the packer formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (34) . As an example, gateways between Internet e-mail and X.400 e-mail must (35) the
12、e-mail message and change various header fields.(分数:5.00)(1).A. reapers B. relays C. packages D. modems(分数:1.00)A.B.C.D.(2).A. frames B. packets C. packages D. cells(分数:1.00)A.B.C.D.(3).A. special B. dependent C. similar D. dissimilar(分数:1.00)A.B.C.D.(4).A. syntax B. semantics C. language D. format(
13、分数:1.00)A.B.C.D.(5).A. analyze B. parse C. delete D. create(分数:1.00)A.B.C.D.(51) is a six bytes OSI layer 2 address which is burned into every networking device that provides its unique identity for point to point communication.(52) is a professional organization of individuals in multiple professio
14、ns which focuses on effort on lower-layer protocols.(53) functions with two layers of protocols. It can connect networks of different speeds and can be adapted to an environment as it expands.(54) is the popular LAN developed under the direction of the IEEE802.5.(55) is the popular backbone technolo
15、gy for transmitting information at high speed with a high level of fault tolerance which is developed under the direction of ANSI.(分数:5.00)(1).A. The MAC address B. The IP addressC. The subnet address D. The virtual address(分数:1.00)A.B.C.D.(2).A. ISO B. ANSI C. CCIT D. IEEE(分数:1.00)A.B.C.D.(3).A. Th
16、e hub B. The bridge C. The router D. The proxy(分数:1.00)A.B.C.D.(4).A. Ethernet B. Token Bus C. Token Ring D. DQDB(分数:1.00)A.B.C.D.(5).A.X.25 B. ATM C. FDDI D. SMDS(分数:1.00)A.B.C.D.Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an (26) from
17、a friend who asks you to open it. This is what happens with Melissa and several other similar email (27) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (28) .As administrators seek to block dangerous emai
18、l attachments through the recognition of well-known (29) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to p
19、enetrate networks by sending an attachment that looks like a flash movie, which while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (30) access to your network.(分数:5.00)(1).A. attachment B. packet C. datagram D. message,(分数:1.00)A
20、.B.C.D.(2).A. virtual B. virus C. worms D. bacteria(分数:1.00)A.B.C.D.(3).A. memory B. caches C. ports D. registers(分数:1.00)A.B.C.D.(4).A. names B. cookies C. software D. extensions(分数:1.00)A.B.C.D.(5).A. cracker B. user C. customer D. client(分数:1.00)A.B.C.D.Originally introduced by Netscape Communica
21、tions, (1) are a general mechanism which HTFP Server side applications, such as CGI (2) , can use to both store and retrieve information on the HTTP (3) side of the connection. Basically, Cookies can be used to compensate for the (4) nature of HTTP. The addition of a simple, persistent, client-side
22、state significantly extends the capabilities of WWW-based (5) .(分数:5.00)(1).A. Browsers B. Cookies C. Connections D. Scripts(分数:1.00)A.B.C.D.(2).A. graphics B. processes C. scripts D. texts(分数:1.00)A.B.C.D.(3).A. Client B. Editor C. Creator D. Server(分数:1.00)A.B.C.D.(4).A. fixed B. flexible C. stabl
23、e D. stateless(分数:1.00)A.B.C.D.(5).A. programs B. applications C. frameworks D. constraints(分数:1.00)A.B.C.D.The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (36) of the technical requirements for the software product.During the requirements d
24、efinition phase, the requirements definition team uses an interative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each (37) that it must meet. The starting point is usually a set of high
25、level requirements from the (38) that describe the project or problem.In either case, the requirements definition team formulates an overall concept for the system and then defines (39) showing how the system will be operated, publishes the system and operations concept document and conducts a syste
26、m concept review (SCR) .Following the SCR, the team derives (40) requirements for the system from the high level requirements and the system and operations concept using structured or object-oriented analysis. The team specifies the software functions and algorithms needed to satisfy each detailed r
27、equirement.(分数:5.00)(1).A. function B. definition C. specification D. statement(分数:1.00)A.B.C.D.(2).A. criterion B. standard C. model D. system(分数:1.00)A.B.C.D.(3).A. producer B. customer C. programmer D. analyser(分数:1.00)A.B.C.D.(4).A. roles B. principles C. scenarios D. scenes(分数:1.00)A.B.C.D.(5).
28、A. cotailed B. outlined C. total D. complete(分数:1.00)A.B.C.D.软件设计师-计算机专业英语(二)答案解析(总分:40.00,做题时间:90 分钟)MIDI enables people to use (11) computers and electronic musical instruments. There are actually three components to MIDI, the communications“ (12) .“, the Hardware Interface and a distribution (13)
29、 called “Standard MIDI Files“. In the context of the WWW, the most interesting component is the (14) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (15) are stored in MIDI files, the events are also time-stamped for playback in the proper se
30、quence. Music delivered by MIDI files is the most common use of MIDI today.(分数:5.00)(1).A. personal B. electronic C. multimedia D. network(分数:1.00)A.B.C. D.解析:(2).A. device B. protocol C. network D. controller(分数:1.00)A.B. C.D.解析:(3).A. format B. text C. wave D. center(分数:1.00)A. B.C.D.解析:(4).A. Vid
31、eo B. Faxmail C. Graphic D. Audio(分数:1.00)A.B.C.D. 解析:(5).A. messages B. packets C. frame D. information(分数:1.00)A. B.C.D.解析:解析 MIDI 使人们能够使用多媒体(multimedia)计算机和电子音乐设备。实际上,MIDI 由三个部分组成:通信“协议(protocol)”、硬件接口和被称为标准 MIDI 文件的发布格式(format)。在 WWW 的内容中,最令人感兴趣的部分是音频(Audio)格式。从原理上看,MIDI 文件包含了一系列 MIDI 协议消息。然而,当
32、MIDI 协议消息(messages)被存储在 MIDI 文件时,事件也都被加上时间戳,以便能按正确的顺序进行回放。目前,通过 MIDI 文件传递音乐是 MIDI 最主要的应用。Spread spectrum simply means that data is sent in small pieces Over a number of the (46) frequencies available for use at any time in the specified range. Devices using (47) spread spectrum (DSSS) communicate by
33、 (48) each byte of data into several parts and sending them concurrently on different (49) . DSSS uses a lot of the available (50) , about 22 megahertz (MHz) .(分数:5.00)(1).A. continuous B. high C. low D. discrete(分数:1.00)A.B.C.D. 解析:(2).A. direct-sequence B. discrete-sequenceC. duplicate-sequence D.
34、 dedicate-sequence(分数:1.00)A. B.C.D.解析:(3).A. splitting B. combining C. packing D. compacting(分数:1.00)A. B.C.D.解析:(4).A. bits B. frequencies C. packets D. messages(分数:1.00)A.B. C.D.解析:(5).A. rate B. velocity C. bandwidth D. period(分数:1.00)A.B.C. D.解析:解析 简单地说,扩频就是在一个可以随时使用的频率范围内,把数据用码片在大量不连续的 (discre
35、te)频率上同时发送。使用直序(direct-sequence)扩频的设备,相互之间通信是通过把每个字节的数据分成(splitting)几个部分在不同频率(frequencies)上同时传送。直序扩频使用了大约 22MHz 的可用带宽(bandwidth)。(41) is a protocol that a host uses to inform a router when it joins or leaves an Internet multicast group.(42) is an error detection code that most data communication net
36、works use.(43) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.(44) is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-periodic basis over a range of media.(45) is an identifier of
37、a web page.(分数:5.00)(1).A. ICMP B. SMTP C. IGMP D. ARP(分数:1.00)A.B.C. D.解析:(2).A. 4B/5B B. CRC C. Manchester Code D. Huffman Code(分数:1.00)A.B. C.D.解析:(3).A. OSPF B. RIP C. RARP D. BGP(分数:1.00)A.B. C.D.解析:(4).A. ISDN B.X.25 C. Frame Relay D. ATM(分数:1.00)A.B.C.D. 解析:(5).A. HTTP B. URL C. HTML D. TAG(分
38、数:1.00)A.B. C.D.解析:解析 (1)IGMP(因特网组管理协议)是一个主机用户在加入或离开因特网组播组时用于通知路由器的协议。(2)CRC(循环冗余码)是在数据通信网络中最多使用的错误检测码。(3)RIP(路由信息协议)是一种利用距离矢量算法来传播路由信息的内部网关协议。(4)ATM(异步传输模式)是一种传输模式。在这种传输模式中,所有类型的信息都被组织在一个大小固定的信元中,通过异步或非周期方式在一定范围的介质上传输。(5)URL(统一资源定位器)是一张网页的惟一标识符。Networks can be interconnected by different devices. I
39、n the physical layer networks can be connected by (31) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches which operate at data link layer. They can accept (32) , examine the MAC address and forward the frames to a different network
40、while doing minor protocol translation in the process. In network layer, we have routers that can connect two networks. If two networks have (33) network layer, the muter may be able to translate between the packer formats. In the transport layer we find transport gateway, which can interface betwee
41、n two transport connections. Finally, in the application layer, application gateways translate message (34) . As an example, gateways between Internet e-mail and X.400 e-mail must (35) the e-mail message and change various header fields.(分数:5.00)(1).A. reapers B. relays C. packages D. modems(分数:1.00
42、)A. B.C.D.解析:(2).A. frames B. packets C. packages D. cells(分数:1.00)A. B.C.D.解析:(3).A. special B. dependent C. similar D. dissimilar(分数:1.00)A.B.C.D. 解析:(4).A. syntax B. semantics C. language D. format(分数:1.00)A. B.C.D.解析:(5).A. analyze B. parse C. delete D. create(分数:1.00)A.B. C.D.解析:解析 网络可以通过不同的设备互
43、连。在物理层,网络用中继器(reapers)或集线器互连,它们只是在相同的网络之间传送比特串。在比物理层高一层的数据链路层,可以使用网桥和交换机,它们能够接收数据帧(frames),检测 MAC 地址,并可以实现少量的协议转换,把数据帧转发到不同的网络中。在网络层,我们可以使用路由器连接两个网络。如果两个网络有着不同的 (dissimilar)网络层,路由器能够对分组格式进行转换。在传输层,我们使用传输网关,它可以在两个传输连接之间建立接口。最后,在应用层,应用网关实现消息语法(syntax)之间的翻译。例如,在 Internet 邮件和 X.400 邮件之间的网关必须对邮件报文进行语法分析(
44、parse),并对报文各个字段做出修改。(51) is a six bytes OSI layer 2 address which is burned into every networking device that provides its unique identity for point to point communication.(52) is a professional organization of individuals in multiple professions which focuses on effort on lower-layer protocols.(53)
45、 functions with two layers of protocols. It can connect networks of different speeds and can be adapted to an environment as it expands.(54) is the popular LAN developed under the direction of the IEEE802.5.(55) is the popular backbone technology for transmitting information at high speed with a hig
46、h level of fault tolerance which is developed under the direction of ANSI.(分数:5.00)(1).A. The MAC address B. The IP addressC. The subnet address D. The virtual address(分数:1.00)A. B.C.D.解析:(2).A. ISO B. ANSI C. CCIT D. IEEE(分数:1.00)A.B.C.D. 解析:(3).A. The hub B. The bridge C. The router D. The proxy(分
47、数:1.00)A.B. C.D.解析:(4).A. Ethernet B. Token Bus C. Token Ring D. DQDB(分数:1.00)A.B.C. D.解析:(5).A.X.25 B. ATM C. FDDI D. SMDS(分数:1.00)A.B.C. D.解析:解析 (1)MAC 地址(The MAC address)是一个位于 OSI 第二层的六位地址。它被内置到每个网络设备里,以给每个点对点的通信提供惟一的标识。(2)IEEE 是一个专业组织,它由多个领域内的专业人士组成,主要致力于低层协议。(3)网桥(The bridge)的功能涉及两层协议。它可以连接不同速度
48、的网络,也可以适应扩展的环境。(4)令牌环网(Token Ring)是根据 IEEE802.5 标准开发的流行的局域网。(5)FDDI 是高速传输信息的流行的骨干技术,并具有高度的容错性,它是在 ANSI 的指导下开发的。Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an (26) from a friend who asks you to open it. This is what happens with Melissa a
49、nd several other similar email (27) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (28) .As administrators seek to block dangerous email attachments through the recognition of well-known (29) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an