【计算机类职业资格】系统分析师-13及答案解析.doc
《【计算机类职业资格】系统分析师-13及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】系统分析师-13及答案解析.doc(10页珍藏版)》请在麦多课文档分享上搜索。
1、系统分析师-13 及答案解析(总分:100.00,做题时间:90 分钟)一、单项选择题(总题数:6,分数:100.00)SOX is an alternative _ for XML. It is useful for reading and creating XML content in a _ editor. It is then easily transformed into proper XML. SOX was created because developers can spend a great deal of time with raw XML. For many of us,
2、 the popular XML_ have not reached a point where their tree views, tables and forms can completely substitute for the underlying _ language. This is not surprising when one considers that developers still use a text view, albeit enhanced, for editing other languages such as JavA. SOX uses _ to repre
3、sent the structure of an XML document, which eliminates the need for closing tags and a number of quoting devices. The result is surprisingly clear.(分数:20.00)A.semanticB.pragmaticsC.syntaxD.grammarA.graphicB.programC.commandD.textA.textsB.editorsC.creatorsD.tagsA.programmingB.commandC.markupD.intera
4、ctiveA.indentingB.structureC.frameworkD.bracketWith hundreds of millions of electronic _ taking place daily, businesses and organizations have a strong incentive to protect the _ of the data exchanged in this manner, and to positively ensure the _ of those involved in the transactions. This has led
5、to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community h
6、as been the development of standards-based security _ that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in _ and integrating security provisions at the deepest levels of the machine operation has significant benefits for bo
7、th users and those responsible for securing IT operations.(分数:20.00)A.devicesB.transactionsC.communicationsD.businessesA.operationB.completenessC.integrityD.interchangeA.identitiesB.homogeneitiesC.creationsD.operationsA.appliancesB.chipsC.toolsD.meansA.softwareB.formC.computerD.siliconWLANs are incr
8、easingly popular because they enable cost-effective connections among people, applications and data that were not possible, or not cost-effective, in the past. For example, WLAN-based applications can enable free-grained management of supply and distribution _ to improve their efficienty and reduce
9、_. WLANs can also enable entirely new business processes. To cite but one example, hospitals are using WLAN-enabled point-of-care applications to reduce errors and improve overall _ care. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure.
10、For example, they can protect corporate data by preventing _ through rogue access points. They help control salary costs, by allowing IT staffs to manage larger networks without adding staff. And they can improve overall network management by integrating with customers“ existing systems, such as Ope
11、n View and UniCenter. Fortunately, it isn“t necessary to measure these benefits to justify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-consuming. _ and administrative chores.(分数:15.00)A.choresB.chainsC.changesD.linksA.personelB.expensesC.ove
12、rheadD.hardwareA.financeB.patientC.affairD.doctorA.intrusionB.aggressionC.inbreakD.infallA.exploitationB.connectionC.departmentD.deploymentTo compete in today“s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their inte
13、rnal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become _. Third parties can introduce risk in a variety of ways from connecting with an infected la
14、ptop to unauthorized access of network resources to _ activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle“s security approa
15、ch, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch _ of service attacks or steal _ information by snooping the network. As they access the corporate network, mobile and
16、 remote users inadvertently can infect the network with _ and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.(分数:15.00)A.damageableB.susceptibleC.vulnerableD.changeableA.v
17、enomousB.maliciousC.feloniousD.villainousA.denialB.virtuousC.completeD.traverseA.reservedB.confidentialC.completeD.mysteriousA.sicknessB.diseaseC.virusesD.germsAn Enterprise Resource Planning (ERP) is built upon a commercial _ that promises the seamless _ of all the information flowing through the c
18、ompanyfinancial, accounting, human resources, supply chain and customer information. In implementation, all ERP systems include several features. The system is installed on a typical database management system. It requires initial setup according to the organization“s process, but it may be _accordi
19、ng to the organization“s unique process requirements through a tool set contained within the ERP applications. Using ERP, _ can be prescribed to automate approval processes through established chains of commanD. One of the methods used to effect rapid implementation of the ERP system is to conduct c
20、oncurrent _ sessions during the early stages of ERP implementation.(分数:15.00)A.operating systemB.middlewareC.software packageD.management systemA.associationB.connectionC.combinationD.integrationA.customizedB.madeC.manufacturedD.producedA.functionsB.processesC.informationD.workflowsA.JRPB.BPRC.RADD.
21、JADA project management technique that is currently in widespread use is the _. The purpose of this technique is to detail, in hierarchical fashion, all of the activities that are required to meet project objectives. There are some special activities called _, which are events that signify the accom
22、plishment or completion of major deliverables during the project. Most system development methodologies also provide _, whose purpose is to contain the various pieces of relevant information-feasibility assessments, schedules, needs analysis, and so forth-in a single place so that they can be presen
23、ted to project clients and other related parties. Several types of important network diagrams are used in project management. _was developed to make clear the interdependence between project tasks before those tasks are scheduled. _ offers the advantage of clearly showing overlapping tasks.(分数:15.00
24、)A.Functional decomposition diagramB.Work Breakdown StructureC.Structure ChartD.Organizational StructureA.feasibility checkpointsB.phasesC.iterationsD.milestonesA.baseline planB.project planningC.statement of workD.information system planningA.CPMB.Network DiagramC.PERTD.Gantt chartA.CPMB.Network Di
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 系统分析 13 答案 解析 DOC
