试卷详情
-
软件设计师-计算机专业英语(二)
-
[单项选择]
(51) is a six bytes OSI layer 2 address which is burned into every networking device that provides its unique identity for point to point communication.
(51)是()
(52) is a professional organization of individuals in multiple professions which focuses on effort on lower-layer protocols.
(53) functions with two layers of protocols. It can connect networks of different speeds and can be adapted to an environment as it expands.
(54) is the popular LAN developed under the direction of the IEEE802.5.
(55) is the popular backbone technology for transmitting information at high speed with a high level of fault tolerance which is developed under the direction of ANSI.
A. The MAC address
B. The IP address
C. The subnet address
D. The virtual address
-
[单项选择]
MIDI enables people to use (11) computers and electronic musical instruments. There are actually three components to MIDI, the communications" (12) .", the Hardware Interface and a distribution (13) called "Standard MIDI Files". In the context of the WWW, the most interesting component is the (14) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (15) are stored in MIDI files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use of MIDI today.
(11)是()
A. personal
B. electronic
C. multimedia
D. network
-
[单项选择]
Originally introduced by Netscape Communications, (1) are a general mechanism which HTFP Server side applications, such as CGI (2) , can use to both store and retrieve information on the HTTP (3) side of the connection. Basically, Cookies can be used to compensate for the (4) nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (5) .
(1)是()
A. Browsers
B. Cookies
C. Connections
D. Scripts
-
[单项选择]
Networks can be interconnected by different devices. In the physical layer networks can be connected by (31) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches which operate at data link layer. They can accept (32) , examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process. In network layer, we have routers that can connect two networks. If two networks have (33) network layer, the muter may be able to translate between the packer formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (34) . As an example, gateways between Internet e-mail and X.400 e-mail must (35) the e-mail message and change various header fields.
(31)是()
A. reapers
B. relays
C. packages
D. modems
-
[单项选择]
The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (36) of the technical requirements for the software product.
During the requirements definition phase, the requirements definition team uses an interative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each (37) that it must meet. The starting point is usually a set of high level requirements from the (38) that describe the project or problem.
In either case, the requirements definition team formulates an overall concept for ’the system and then defines (39) showing how the system will be operated, publishes the system and operations concept document and conducts a system concept review (SCR) .
Following the SCR, the team derives (40) requirements for the system from the high level requirements and the
A. function
B. definition
C. specification
D. statement -
[单项选择]
(41) is a protocol that a host uses to inform a router when it joins or leaves an Internet multicast group.
(41)是()
(42) is an error detection code that most data communication networks use.
(43) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.
(44) is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-periodic basis over a range of media.
(45) is an identifier of a web page.
A. ICMP
B. SMTP
C. IGMP
D. ARP
-
[单项选择]
Spread spectrum simply means that data is sent in small pieces Over a number of the (46) frequencies available for use at any time in the specified range. Devices using (47) spread spectrum (DSSS) communicate by (48) each byte of data into several parts and sending them concurrently on different (49) . DSSS uses a lot of the available (50) , about 22 megahertz (MHz) .
(46)是()
A. continuous
B. high
C. low
D. discrete
-
[单项选择]Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an (26) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (27) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim’s address book, previous emails, web pages (28) .A. attachment B. packet C. datagram D. message,