【计算机类职业资格】多媒体应用设计师-专业英语及答案解析.doc
《【计算机类职业资格】多媒体应用设计师-专业英语及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】多媒体应用设计师-专业英语及答案解析.doc(14页珍藏版)》请在麦多课文档分享上搜索。
1、多媒体应用设计师-专业英语及答案解析(总分:45.00,做题时间:90 分钟)DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be
2、further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to pr
3、ocess very large (70) documents that do not fit into the memory available for processing.(分数:5.00)A.specificB.neutralC.containedD.relatedA.textB.ImageC.PageD.graphicA.tableB.treeC.controlD.eventA.documentB.processorC.discD.memoryA.XMLB.HTMLC.scriptD.WebMelissa and LoveLetter made use of the trust th
4、at exists between friends or colleagues. Imagine receiving an (71) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (72) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previou
5、s emails, web pages (73) .As administrators seek to block dangerous email attachments through the recognition of well-known (74) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will sti
6、ll run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (75) access to your netwo
7、rk.(分数:5.00)A.attachmentB.packetC.datagramD.messageA.virtualB.virusC.wormsD.bacteriaA.memoryB.cachesC.portsD.registersA.namesB.cookiesC.softwareD.extensionsA.crackerB.userC.customerD.clientOriginally introduced by Netscape Communications, (66) are a general mechanism which HTTP Server side applicati
8、ons, such as CGI (67) , can use to both store and retrieve information on the HTTP (68) side of the connection. Basically, Cookies can be used to compensate for the (69) nature of HTTE The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (70) .(
9、分数:5.00)A.BrowsersB.CookiesC.ConnectionsD.ScriptsA.graphicsB.processesC.scriptsD.textsA.ClientB.EditorC.CreatorD.ServerA.fixedB.flexibleC.stableD.statelessA.programsB.applicationsC.frameworksD.constrainsWebSQL is a SQL-like (71) language for extracting information from the web. Its capabilities for
10、performing navigation of web (72) make it a useful tool for automating several web-related tasks that require the systematic processing of either all the links in a (73) , all the pages that can be reached from a given URL through (74) that match a pattern, or a combination of both. WebSQL also prov
11、ides transparent access to index servers that can be queried via the Common (75) Interface.(分数:5.00)A.queryB.transactionC.communicationD.programmingA.browsersB.serversC.hypertextsD.clientsA.hypertextB.pageC.protocolD.operationA.pathsB.chipsC.toolsD.directoriesA.RouterB.DeviceC.ComputerD.GatewayTCP/I
12、P (71) layer protocols provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need like the ability to transfer a file in the case of HTTE In short, the application layer provides an (
13、74) between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options the Transmission Control Protocol (TCP) and the User Datagra
14、m Protocol (UDP).(分数:5.00)A.applicationB.transportC.linkD.networkA.hardwareB.softwareC.packetD.equipmentA.servicesB.processesC.applicationsD.addressA.iterationB.objectC.interfaceD.activityA.applicationB.sessionC.physicalD.transportIt should go without saying that the focus of UML is modeling. Howeve
15、r, what that means, exactly, can be an open-ended question. (71) is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use differe
16、nt pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more (72) . A diagram graphically represents things, and the relationships between these things. These (73) can be representations of real-world objects, pure software constructs, or a descripti
17、on of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (74) are u se
18、d to capture the physical organization of the things in your system, i.e., how one object relates to another. (75) focus on the behavior of elements in a system. For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements.(分数:5.00)A.Progr
19、ammingB.AnalyzingC.DesigningD.ModelingA.viewsB.diagramsC.user viewsD.structure picturesA.thingsB.picturesC.languagesD.diagramsA.Activity diagramsB.Use-case diagramsC.Structural diagramsD.Behavioral diagramsA.Activity diagramsB.Use-case diagramsC.Structural diagramsD.Behavioral diagramsObserve that f
20、or the programmer, as for the chef, the urgency of the patron (顾客) may govern the scheduled completion of the task, but it cannot govern the actual completion. An omelette (煎鸡蛋) , promised in two minutes, may appear to be progressing nicely. But when it has not set in two minutes, the customer has t
21、wo choices-waits or eats it raw. Software customers have had (71) choices.Now I do not think software (72) have less inherent courage and firmness than chefs, nor than other engineering managers. But false (73) to match the patrons desired date is much more common in our discipline than elsewhere in
22、 engineering. It is very (74) to make a vigorous, plausible, and job risking defense of an estimate that is derived by no quantitative method, supported by little data, and certified chiefly by the hunches of the managers.Clearly two solutions are needed. We need to develop and publicize productivit
23、y figures, bug-incidence figures, estimating rules, and so on. The whole profession can only profit from (75) such data. Until estimating is on a sounder basis, individual managers will need to stiffen their backbones and defend their estimates with the assurance that their poor hunches are better t
24、han wish derived estimates.(分数:5.00)A.noB.the sameC.otherD.lots of(2).A.testers B constructors C. managers D. architects(分数:1.00)A.B.C.D.A.tasksB.jobsC.worksD.schedulingA.easyB.difficultC.simpleD.painlessA.sharingB.excludingC.omittingD.ignoringVirtual reality (or VR (1) ) is kind of a buzzword these
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 多媒体 应用 设计师 专业 英语 答案 解析 DOC
