【计算机类职业资格】系统分析师-专业英语(四)及答案解析.doc
《【计算机类职业资格】系统分析师-专业英语(四)及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】系统分析师-专业英语(四)及答案解析.doc(17页珍藏版)》请在麦多课文档分享上搜索。
1、系统分析师-专业英语(四)及答案解析(总分:40.00,做题时间:90 分钟)One of the difficulties in building an SQL-like query language for the Web is the absence of a database (131) for this huge, heterogeneous repository of information. However, if we are interested in HTML documents only, we can construct a virtual schema from th
2、e implicit structure of these files. Thus, at the highest level of (132) , every such document is identified by its Uniform Resource Locator (URL), and a (133) and a text. Also, Web severs provide some additional information such as the type, length, and the last modification date of a document. So
3、for data mining purposes, we can consider the set of all HTML documents as a relation:Document (url, rifle, text, type, length, modif)Where all the (134) are character strings. In this framework, an individual document is identified with a (135) in this relation. Of course, if some optional informat
4、ion is missing from the HTML document, the associate fields will be left blank, but this is not uncommon in any database.(分数:5.00)(1).A. schema B. platform C. module D. relation(分数:1.00)A.B.C.D.(2).A. protocol B. control C. abstraction D. presentation(分数:1.00)A.B.C.D.(3).A. table B. title C. driver
5、D. event(分数:1.00)A.B.C.D.(4).A. type B. links C. characteristics D. attributes(分数:1.00)A.B.C.D.(5).A. relation B. field C. script D. tuple(分数:1.00)A.B.C.D.VRML is a (151) for 3D multimedia and shared virtual worlds on the WWW. In comparison to HTML, VRML adds the next level of interaction, structure
6、d graphics, and extra (152) (z and time) to the presentation of documents. The applications of VRML are (153) , ranging from simple business graphics to entertaining WWW page graphics, manufacturing, scientific, entertainment, and educational applications, and 3D shared virtual worlds and communitie
7、s.X3D is the name under which the development of VRML is continued. X3D is based on XML and is backwards (154) with VRML. Furthermore, it is componentized, profiled, and extensible, which makes it possible to use X3D in very different (155) , from high-end visualizations to lightweight applications.
8、(分数:5.00)(1).A. link B. format C. structure D. procedure(分数:1.00)A.B.C.D.(2).A. subject B. object C. dimensions D. disconnection(分数:1.00)A.B.C.D.(3).A. broad B. implicit C. explicit D. special(分数:1.00)A.B.C.D.(4).A. imconsistent B. independentC. applicable D. compatible(分数:1.00)A.B.C.D.(5).A. scenar
9、ios B. placesC. applications D. programs(分数:1.00)A.B.C.D.Developing reliable software on time and within (106) represents a difficult endeavor for many organizations.Usually business solutions have three main aspects: people, (107) , and technology. The main reason for failing software projects has
10、little to do with .technology and tools, and much to do with lack of process (108) . Experience has shown that introducing new technology and tools in an immature or undisciplined environment is likely to increase the chaos. CASE tools are not enough. “A fool with a tool is still a fool!“Structured
11、method was the first wave of the software industry. This was the beginning of transforming software development from a“ (109) industry to mass production. Software process movement if the second wave in the software industry. The process maturity movement prepares the way for the third wave of the s
12、oftware industry: “software industrialization“. Software development will become like an assembly and manufacturing process. A critical enabling factor is a disciplined software engineering process with predictable quality, (110) and functionality.(分数:5.00)(1).A. forecast B. preparationC. budget D.
13、economy(分数:1.00)A.B.C.D.(2).A. process B. skillC. organization D. interface(分数:1.00)A.B.C.D.(3).A. law B. disciplineC. plan D. evaluation(分数:1.00)A.B.C.D.(4).A. college B. familyC. workshop D. cottage(分数:1.00)A.B.C.D.(5).A. plan B. scheduleC. effort D. product(分数:1.00)A.B.C.D.You want to use the Web
14、 to let (76) users or your customers look (77) corporate information. But you want to keep installation at the user end (78) and you dont want just. (79) to get (80) your databases. That may be where an application server enters the picture. For more user machine independent, these software packages
15、, typically written in the (81) programming language for use on Windows (82) -based systems, act as go-betweens (83) browser-equipped end users to the databases that (84) the information they need to (85) .(分数:10.00)(1).A. informer B. internal C. inside D. outside(分数:1.00)A.B.C.D.(2).A. at B. by C.
16、in D. out(分数:1.00)A.B.C.D.(3).A. simple B. simply C. single D. singly(分数:1.00)A.B.C.D.(4).A. any B. anyone C. anything D. anywhere(分数:1.00)A.B.C.D.(5).A. into B. off C. onto D. out(分数:1.00)A.B.C.D.(6).A. C B. C+ C. SQL D. Java(分数:1.00)A.B.C.D.(7).A. NC B. NT C. PC D. PT(分数:1.00)A.B.C.D.(8).A. link B
17、. linkage C. linking D. links(分数:1.00)A.B.C.D.(9).A. held B. helt C. hold D. holt(分数:1.00)A.B.C.D.(10).A. access B. accessing C. assert D. asserting(分数:1.00)A.B.C.D.The heat generated by the operating system war between rivals IBM Corp. and Microsoft Corp. is (21) .Windows 95 and OS/2 introduce a ne
18、w (22) . Both systems claim to multitask legacy DOS and 16-bit Windows applications. However, only OS/2 can provide full memory (crash) protection for these legacy applications because it is capable of running each DOS and Windows application within its full-protected memory address space.Windows 95
19、 will run all current Windows applications in the same shared- memory address space, affording full memory protection only to the (23) 32-bit Windows 95 applications. In other word, Windows 95 users will have to (24) their current Windows applications to Windows 95 version to match the memory protec
20、tion OS/2 now delivers.While OS/2 does afford superior memory protection and multitasking for legacy DOS and Windows applications, it will not be able to run any Windows 95 applications. IBM may address this (25) in an update of the OS but has no present plans to do so.(分数:5.00)(1).A. intensify B. i
21、ntensified C. intensifying D. intensifies(分数:1.00)A.B.C.D.(2).A. place B. environment C. condition D. action(分数:1.00)A.B.C.D.(3).A. old B. big C. new D. original(分数:1.00)A.B.C.D.(4).A. upgrade B. upstair C. downstair D. downgrade(分数:1.00)A.B.C.D.(5).A. mistake B. advantage C. benefit D. shortcoming(
22、分数:1.00)A.B.C.D.Public Key Infrastructure (PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network (VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong auth
23、entication and non-repudiation of transactions.eToken enables the users of PKI systems to generate and store (101) and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip (102) opera
24、tions, ensuring that users keys axe never exposed to the PC environment, eToken eliminates the need to store (103) and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.A digital signature is crea
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 系统分析 师专 英语四 答案 解析 DOC
