欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    【计算机类职业资格】软件设计师-计算机专业英语(二)及答案解析.doc

    • 资源ID:1340439       资源大小:75.50KB        全文页数:14页
    • 资源格式: DOC        下载积分:5000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要5000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    【计算机类职业资格】软件设计师-计算机专业英语(二)及答案解析.doc

    1、软件设计师-计算机专业英语(二)及答案解析(总分:40.00,做题时间:90 分钟)MIDI enables people to use (11) computers and electronic musical instruments. There are actually three components to MIDI, the communications“ (12) .“, the Hardware Interface and a distribution (13) called “Standard MIDI Files“. In the context of the WWW, th

    2、e most interesting component is the (14) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (15) are stored in MIDI files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use

    3、 of MIDI today.(分数:5.00)(1).A. personal B. electronic C. multimedia D. network(分数:1.00)A.B.C.D.(2).A. device B. protocol C. network D. controller(分数:1.00)A.B.C.D.(3).A. format B. text C. wave D. center(分数:1.00)A.B.C.D.(4).A. Video B. Faxmail C. Graphic D. Audio(分数:1.00)A.B.C.D.(5).A. messages B. pac

    4、kets C. frame D. information(分数:1.00)A.B.C.D.Spread spectrum simply means that data is sent in small pieces Over a number of the (46) frequencies available for use at any time in the specified range. Devices using (47) spread spectrum (DSSS) communicate by (48) each byte of data into several parts a

    5、nd sending them concurrently on different (49) . DSSS uses a lot of the available (50) , about 22 megahertz (MHz) .(分数:5.00)(1).A. continuous B. high C. low D. discrete(分数:1.00)A.B.C.D.(2).A. direct-sequence B. discrete-sequenceC. duplicate-sequence D. dedicate-sequence(分数:1.00)A.B.C.D.(3).A. splitt

    6、ing B. combining C. packing D. compacting(分数:1.00)A.B.C.D.(4).A. bits B. frequencies C. packets D. messages(分数:1.00)A.B.C.D.(5).A. rate B. velocity C. bandwidth D. period(分数:1.00)A.B.C.D.(41) is a protocol that a host uses to inform a router when it joins or leaves an Internet multicast group.(42) i

    7、s an error detection code that most data communication networks use.(43) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.(44) is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-peri

    8、odic basis over a range of media.(45) is an identifier of a web page.(分数:5.00)(1).A. ICMP B. SMTP C. IGMP D. ARP(分数:1.00)A.B.C.D.(2).A. 4B/5B B. CRC C. Manchester Code D. Huffman Code(分数:1.00)A.B.C.D.(3).A. OSPF B. RIP C. RARP D. BGP(分数:1.00)A.B.C.D.(4).A. ISDN B.X.25 C. Frame Relay D. ATM(分数:1.00)A

    9、.B.C.D.(5).A. HTTP B. URL C. HTML D. TAG(分数:1.00)A.B.C.D.Networks can be interconnected by different devices. In the physical layer networks can be connected by (31) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches which operate at

    10、 data link layer. They can accept (32) , examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process. In network layer, we have routers that can connect two networks. If two networks have (33) network layer, the muter may be able to tra

    11、nslate between the packer formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (34) . As an example, gateways between Internet e-mail and X.400 e-mail must (35) the

    12、e-mail message and change various header fields.(分数:5.00)(1).A. reapers B. relays C. packages D. modems(分数:1.00)A.B.C.D.(2).A. frames B. packets C. packages D. cells(分数:1.00)A.B.C.D.(3).A. special B. dependent C. similar D. dissimilar(分数:1.00)A.B.C.D.(4).A. syntax B. semantics C. language D. format(

    13、分数:1.00)A.B.C.D.(5).A. analyze B. parse C. delete D. create(分数:1.00)A.B.C.D.(51) is a six bytes OSI layer 2 address which is burned into every networking device that provides its unique identity for point to point communication.(52) is a professional organization of individuals in multiple professio

    14、ns which focuses on effort on lower-layer protocols.(53) functions with two layers of protocols. It can connect networks of different speeds and can be adapted to an environment as it expands.(54) is the popular LAN developed under the direction of the IEEE802.5.(55) is the popular backbone technolo

    15、gy for transmitting information at high speed with a high level of fault tolerance which is developed under the direction of ANSI.(分数:5.00)(1).A. The MAC address B. The IP addressC. The subnet address D. The virtual address(分数:1.00)A.B.C.D.(2).A. ISO B. ANSI C. CCIT D. IEEE(分数:1.00)A.B.C.D.(3).A. Th

    16、e hub B. The bridge C. The router D. The proxy(分数:1.00)A.B.C.D.(4).A. Ethernet B. Token Bus C. Token Ring D. DQDB(分数:1.00)A.B.C.D.(5).A.X.25 B. ATM C. FDDI D. SMDS(分数:1.00)A.B.C.D.Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an (26) from

    17、a friend who asks you to open it. This is what happens with Melissa and several other similar email (27) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (28) .As administrators seek to block dangerous emai

    18、l attachments through the recognition of well-known (29) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to p

    19、enetrate networks by sending an attachment that looks like a flash movie, which while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (30) access to your network.(分数:5.00)(1).A. attachment B. packet C. datagram D. message,(分数:1.00)A

    20、.B.C.D.(2).A. virtual B. virus C. worms D. bacteria(分数:1.00)A.B.C.D.(3).A. memory B. caches C. ports D. registers(分数:1.00)A.B.C.D.(4).A. names B. cookies C. software D. extensions(分数:1.00)A.B.C.D.(5).A. cracker B. user C. customer D. client(分数:1.00)A.B.C.D.Originally introduced by Netscape Communica

    21、tions, (1) are a general mechanism which HTFP Server side applications, such as CGI (2) , can use to both store and retrieve information on the HTTP (3) side of the connection. Basically, Cookies can be used to compensate for the (4) nature of HTTP. The addition of a simple, persistent, client-side

    22、state significantly extends the capabilities of WWW-based (5) .(分数:5.00)(1).A. Browsers B. Cookies C. Connections D. Scripts(分数:1.00)A.B.C.D.(2).A. graphics B. processes C. scripts D. texts(分数:1.00)A.B.C.D.(3).A. Client B. Editor C. Creator D. Server(分数:1.00)A.B.C.D.(4).A. fixed B. flexible C. stabl

    23、e D. stateless(分数:1.00)A.B.C.D.(5).A. programs B. applications C. frameworks D. constraints(分数:1.00)A.B.C.D.The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (36) of the technical requirements for the software product.During the requirements d

    24、efinition phase, the requirements definition team uses an interative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each (37) that it must meet. The starting point is usually a set of high

    25、level requirements from the (38) that describe the project or problem.In either case, the requirements definition team formulates an overall concept for the system and then defines (39) showing how the system will be operated, publishes the system and operations concept document and conducts a syste

    26、m concept review (SCR) .Following the SCR, the team derives (40) requirements for the system from the high level requirements and the system and operations concept using structured or object-oriented analysis. The team specifies the software functions and algorithms needed to satisfy each detailed r

    27、equirement.(分数:5.00)(1).A. function B. definition C. specification D. statement(分数:1.00)A.B.C.D.(2).A. criterion B. standard C. model D. system(分数:1.00)A.B.C.D.(3).A. producer B. customer C. programmer D. analyser(分数:1.00)A.B.C.D.(4).A. roles B. principles C. scenarios D. scenes(分数:1.00)A.B.C.D.(5).

    28、A. cotailed B. outlined C. total D. complete(分数:1.00)A.B.C.D.软件设计师-计算机专业英语(二)答案解析(总分:40.00,做题时间:90 分钟)MIDI enables people to use (11) computers and electronic musical instruments. There are actually three components to MIDI, the communications“ (12) .“, the Hardware Interface and a distribution (13)

    29、 called “Standard MIDI Files“. In the context of the WWW, the most interesting component is the (14) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (15) are stored in MIDI files, the events are also time-stamped for playback in the proper se

    30、quence. Music delivered by MIDI files is the most common use of MIDI today.(分数:5.00)(1).A. personal B. electronic C. multimedia D. network(分数:1.00)A.B.C. D.解析:(2).A. device B. protocol C. network D. controller(分数:1.00)A.B. C.D.解析:(3).A. format B. text C. wave D. center(分数:1.00)A. B.C.D.解析:(4).A. Vid

    31、eo B. Faxmail C. Graphic D. Audio(分数:1.00)A.B.C.D. 解析:(5).A. messages B. packets C. frame D. information(分数:1.00)A. B.C.D.解析:解析 MIDI 使人们能够使用多媒体(multimedia)计算机和电子音乐设备。实际上,MIDI 由三个部分组成:通信“协议(protocol)”、硬件接口和被称为标准 MIDI 文件的发布格式(format)。在 WWW 的内容中,最令人感兴趣的部分是音频(Audio)格式。从原理上看,MIDI 文件包含了一系列 MIDI 协议消息。然而,当

    32、MIDI 协议消息(messages)被存储在 MIDI 文件时,事件也都被加上时间戳,以便能按正确的顺序进行回放。目前,通过 MIDI 文件传递音乐是 MIDI 最主要的应用。Spread spectrum simply means that data is sent in small pieces Over a number of the (46) frequencies available for use at any time in the specified range. Devices using (47) spread spectrum (DSSS) communicate by

    33、 (48) each byte of data into several parts and sending them concurrently on different (49) . DSSS uses a lot of the available (50) , about 22 megahertz (MHz) .(分数:5.00)(1).A. continuous B. high C. low D. discrete(分数:1.00)A.B.C.D. 解析:(2).A. direct-sequence B. discrete-sequenceC. duplicate-sequence D.

    34、 dedicate-sequence(分数:1.00)A. B.C.D.解析:(3).A. splitting B. combining C. packing D. compacting(分数:1.00)A. B.C.D.解析:(4).A. bits B. frequencies C. packets D. messages(分数:1.00)A.B. C.D.解析:(5).A. rate B. velocity C. bandwidth D. period(分数:1.00)A.B.C. D.解析:解析 简单地说,扩频就是在一个可以随时使用的频率范围内,把数据用码片在大量不连续的 (discre

    35、te)频率上同时发送。使用直序(direct-sequence)扩频的设备,相互之间通信是通过把每个字节的数据分成(splitting)几个部分在不同频率(frequencies)上同时传送。直序扩频使用了大约 22MHz 的可用带宽(bandwidth)。(41) is a protocol that a host uses to inform a router when it joins or leaves an Internet multicast group.(42) is an error detection code that most data communication net

    36、works use.(43) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.(44) is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-periodic basis over a range of media.(45) is an identifier of

    37、a web page.(分数:5.00)(1).A. ICMP B. SMTP C. IGMP D. ARP(分数:1.00)A.B.C. D.解析:(2).A. 4B/5B B. CRC C. Manchester Code D. Huffman Code(分数:1.00)A.B. C.D.解析:(3).A. OSPF B. RIP C. RARP D. BGP(分数:1.00)A.B. C.D.解析:(4).A. ISDN B.X.25 C. Frame Relay D. ATM(分数:1.00)A.B.C.D. 解析:(5).A. HTTP B. URL C. HTML D. TAG(分

    38、数:1.00)A.B. C.D.解析:解析 (1)IGMP(因特网组管理协议)是一个主机用户在加入或离开因特网组播组时用于通知路由器的协议。(2)CRC(循环冗余码)是在数据通信网络中最多使用的错误检测码。(3)RIP(路由信息协议)是一种利用距离矢量算法来传播路由信息的内部网关协议。(4)ATM(异步传输模式)是一种传输模式。在这种传输模式中,所有类型的信息都被组织在一个大小固定的信元中,通过异步或非周期方式在一定范围的介质上传输。(5)URL(统一资源定位器)是一张网页的惟一标识符。Networks can be interconnected by different devices. I

    39、n the physical layer networks can be connected by (31) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches which operate at data link layer. They can accept (32) , examine the MAC address and forward the frames to a different network

    40、while doing minor protocol translation in the process. In network layer, we have routers that can connect two networks. If two networks have (33) network layer, the muter may be able to translate between the packer formats. In the transport layer we find transport gateway, which can interface betwee

    41、n two transport connections. Finally, in the application layer, application gateways translate message (34) . As an example, gateways between Internet e-mail and X.400 e-mail must (35) the e-mail message and change various header fields.(分数:5.00)(1).A. reapers B. relays C. packages D. modems(分数:1.00

    42、)A. B.C.D.解析:(2).A. frames B. packets C. packages D. cells(分数:1.00)A. B.C.D.解析:(3).A. special B. dependent C. similar D. dissimilar(分数:1.00)A.B.C.D. 解析:(4).A. syntax B. semantics C. language D. format(分数:1.00)A. B.C.D.解析:(5).A. analyze B. parse C. delete D. create(分数:1.00)A.B. C.D.解析:解析 网络可以通过不同的设备互

    43、连。在物理层,网络用中继器(reapers)或集线器互连,它们只是在相同的网络之间传送比特串。在比物理层高一层的数据链路层,可以使用网桥和交换机,它们能够接收数据帧(frames),检测 MAC 地址,并可以实现少量的协议转换,把数据帧转发到不同的网络中。在网络层,我们可以使用路由器连接两个网络。如果两个网络有着不同的 (dissimilar)网络层,路由器能够对分组格式进行转换。在传输层,我们使用传输网关,它可以在两个传输连接之间建立接口。最后,在应用层,应用网关实现消息语法(syntax)之间的翻译。例如,在 Internet 邮件和 X.400 邮件之间的网关必须对邮件报文进行语法分析(

    44、parse),并对报文各个字段做出修改。(51) is a six bytes OSI layer 2 address which is burned into every networking device that provides its unique identity for point to point communication.(52) is a professional organization of individuals in multiple professions which focuses on effort on lower-layer protocols.(53)

    45、 functions with two layers of protocols. It can connect networks of different speeds and can be adapted to an environment as it expands.(54) is the popular LAN developed under the direction of the IEEE802.5.(55) is the popular backbone technology for transmitting information at high speed with a hig

    46、h level of fault tolerance which is developed under the direction of ANSI.(分数:5.00)(1).A. The MAC address B. The IP addressC. The subnet address D. The virtual address(分数:1.00)A. B.C.D.解析:(2).A. ISO B. ANSI C. CCIT D. IEEE(分数:1.00)A.B.C.D. 解析:(3).A. The hub B. The bridge C. The router D. The proxy(分

    47、数:1.00)A.B. C.D.解析:(4).A. Ethernet B. Token Bus C. Token Ring D. DQDB(分数:1.00)A.B.C. D.解析:(5).A.X.25 B. ATM C. FDDI D. SMDS(分数:1.00)A.B.C. D.解析:解析 (1)MAC 地址(The MAC address)是一个位于 OSI 第二层的六位地址。它被内置到每个网络设备里,以给每个点对点的通信提供惟一的标识。(2)IEEE 是一个专业组织,它由多个领域内的专业人士组成,主要致力于低层协议。(3)网桥(The bridge)的功能涉及两层协议。它可以连接不同速度

    48、的网络,也可以适应扩展的环境。(4)令牌环网(Token Ring)是根据 IEEE802.5 标准开发的流行的局域网。(5)FDDI 是高速传输信息的流行的骨干技术,并具有高度的容错性,它是在 ANSI 的指导下开发的。Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an (26) from a friend who asks you to open it. This is what happens with Melissa a

    49、nd several other similar email (27) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (28) .As administrators seek to block dangerous email attachments through the recognition of well-known (29) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an


    注意事项

    本文(【计算机类职业资格】软件设计师-计算机专业英语(二)及答案解析.doc)为本站会员(tireattitude366)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开