试卷详情
-
软件设计师-专业英语
-
[单项选择]A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the browser knows how to deal with (26) , and that it has a mechanism for (27) graphical files. Display text, display graphics, and (28) hyperlinks-there’s 99 percent of the (29) value. That’s not to say that the manufacturers didn’t go all-out to attach a hyperactive efflorescence of useless capabilities onto their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you can’t wait to delete from your favorites of bookmarks menu Remember when client-side Java applets were supposed to become the preferred (30) for application development Remember frames and all their nasty side effects
A. superlinks
B. links
C. hyperlinks
D. connections
-
[单项选择]Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (56) from a friend who asks you to open it. This is what happens with Melissa and several other similar Email (57) . Upon running, such worms usually proceed to send themselves out to Email addresses from the victim’s address book, previous Emails, Web pages (58)
As administrators seek to block dangerous Email attachments through the recognition of well-known (59) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.
Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (60) access to your netw
A. attachment
B. packet
C. datagram
D. message
-
[单项选择]Soon, more of the information we receive via the Internet could come (6) in digital wrappers. Wrappers are made up (7) software code that’s targeted to do specific things with the data (8) within them, such as helping to define queries for search engines. They also keep (9) from (10) access to that code.
A. package
B. packaged
C. packages
D. packaging
-
[单项选择]Ravi, like many project (126) , had studied the waterfall model of software development as the primary software life-cycle (127) . He was all set to use it for an upcoming project, his first assignment. However, Ravi found that the waterfall model could not be used because the customer wanted the software delivered in stages, something that implied that the system had to be delivered and built in (128) and not as (129) .
The situation in many other projects is not very different. The real world rarely presents a problem in which a standard process, or the process used in a previous project, is the best choice. To be the most suitable, an existing process must be (130) to the new problem. A development process, even after tailoring, generally cannot handle change requests. To accommodate change requests without losing control of the project, you must supplement the development process with a requirement change management process.
A. customers
B. managers
C. users
D. administrators
-
[单项选择]Most computer systems are (16) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (17) to an outsider attack by preventing.
(18) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (19) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (20) by tools referred to as Intrusion Detection Systems.
A. vulnerable
B. week
C. sensitively
D. helpless
-
[单项选择]It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question. (101) is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more (102) . A diagram graphically represents things, and the relationships between these things. These (103) can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (104)
A. Programming
B. Analyzing
C. Designing
D. Modeling
-
[单项选择] (31) data effectively is crucial for success in today’s competitive environment. Managers must know how to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration uses a base document that contains copies of other objects. (34) integration uses a base document that contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in "plain" English, without the computer syntax.
A. Generalizing
B. Sharing
C. General-using
D. Globalizing
-
[单项选择]SOCKS is a genetic proxy protocol for TCP/IP-based networking, applications. SOCKS includes two (21) , the SOCKS server and the SOCKS client. The SOCKS server is implemented at the application layer. The SOCKS client is implemented between applications and the (22) layer. When an application client needs to connect to an application server, the client connects to a SOCKS proxy server. The proxy server connects to the application server instead of the client, and (23) data between the client and the application server. For the application server, the proxy server is the (24) . SOCKS is also one of the popular (25) to network firewalls. Because of its simplicity and flexibility, SOCKS has been used as genetic application proxy in virtual private network (VPN), and for extranet applications.
A. elements
B. components
C. services
D. clients
-
[单项选择]Virtualization is an approach to IT that pools and shares (86) so that utilization is optimized and supplies automatically meet demand. Traditional IT environments are often silos, where both technology and human (87) . are aligned around an application or business function. With a virtualized (88) , people, processes, and technology are focused on meeting service levels, (89) is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexible. We offer a broad spectrum of virtualization (90) that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources.
A. advantages
B. resources
C. benefits
D. precedents
-
[单项选择]NAC’s (Network Access Control) role is to restrict network access to only compliant endpoints and (81) users. However, NAC is not a complete LAN (82) solution; additional proactive and (83) security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 100Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security (84) In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures-real-time, multilevel (85) inspection and microsecond threat containment.
A. automated
B. distinguished
C. authenticated
D. destructed
-
[单项选择]The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (46) of the technical requirements for the software product.
During the requirements definition phase, the requirements definition team uses an iterative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each (47) that it must meet. The starting point is usually a set of high-level requirements from the (48) that describe the project or problem.
In either case, the requirements definition team formulates an overall concept for the system and then defines (49) showing how the system will be operated, publishes the system and operations concept document, and conducts a system concept review (SCR).
Following the SCR, the team derives (50) requirements for the system from the high-level requirements and the system and o
A. function
B. definition
C. model
D. statement
-
[单项选择]Certificates are (66) documents attesting to the (67) of a public key to an individual or other entity. They allow verification of the claim that a given public key does in fact belong to a given individual. Certificates help prevent someone from using a phony key to (68) someone else. In their simplest form, Certificates contain a public key and a name. As commonly used, a certificate also contains an (69) date, the name, of the CA that issued the certificate, a serial number, and perhaps other information. Most importantly, it contains the digital (70) of the certificate issuer. The most widely accepted format for certificates is X.509, thus, Certificates can be read or written by any application complying with X.509.
A. text
B. data
C. digital
D. structured
-
[单项选择]Networks can be interconnected by different devices. In the physical layer, networks can be connected by (41) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches, which operate at data link layer. They can accept (42) , examine the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (43) network layer, the router may be able to translate between the packet formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (44) . As an example, gateways between Internet E-mail and X.400 E-mail must (45) the E-mail message and change various header fields.
A. reapers
B. relays
C. connectors
D. modems
-
[单项选择]Why is (111) fun What delights may its practitiopect as his reward First is the sheer joy of making things. As the child delights in his mud pie, so the adult enjoys building things, especially things of his own design. Second is the pleasure of making things that are useful to other people. Third is the fascination of fashioning complex puzzle-like objects of interlocking moving parts and watching them work in subtle cycles, playing out the consequences of principles built in from the beginning. Fourth is the joy of always learning, which springs from the (112) nature of the task. In one way or another the problem is ever new, and its solver learns something: sometimes (113) , sometimes theoretical, and sometimes both. Finally, there is the delight of working in such a tractable medium. The (114) , like the poet, works only slightly removed from pure thought-stuff. Few media of creation are so flexible, so easy to polish and rework, so readily capable
A. programming
B. composing
C. working
D. writing
-
[单项选择]Originally introduced by Netscape Communications, (71) are a general mechanism which HTTP Server side applications, such as CGI (72) , can use to both store and retrieve information on the HTTP (73) side of the connection. Basically, Cookies can be used to compensate for the (74) nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (75)
A. Browsers
B. Cookies
C. Connections
D. Scripts
-
[单项选择]For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the (106) of a software-intensive system. As the (107) standard modeling language, the UML facilitates communication and reduces confusion among project (108) The recent standardization of UML 2.0 has further extended the language’s scope and viability. Its inherent expressiveness allows users to (109) everything from enterprise information systems and distributed Web-based applications to real-time embedded systems. The UML is not limited to modeling software. In fact, it is expressive enough to model (110) systems, such as workflow in the legal system, the structure and behavior of a patient healthcare system, software engineering in aircraft combat systems, and the design of hardware. To understand the UML, you need to form a conceptual model of the language, and this requires learning three m
A. classes
B. components
C. sequences
D. artifacts
-
[单项选择]MIDI enables people to use (61) computers and electronic musical instruments. There are actually three components to M1DI, the communications " (62) ", the Hardware Interface and a distribution (63) called "Standard MIDI Files". In the context of the WWW, the most interesting component is the (64) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (65) are stored in MID! files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use of MIDI today.
A. personal
B. electronic
C. multimedia
D. network
-
[单项选择]DOM is a platform and language- (51) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (52) . DOM is a (53) -based API to documents, which requires the whole document to be represented in (54) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (55) documents that do not fit info the memory available for processing.
A. specific
B. neutral
C. contained
D. related
-
[单项选择]The Rational Unified Process (RUP) is a software engineering process, which captures many of best practices in modern software development. The notions of (91) and scenarios have been proven to be an excellent way to capture function requirements. RUP can be described in two dimensions - time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive (92) which is concluded with a well-defined (93) and can be further broken down into (94) - a complete development loop resulting in a release of an executable product, a subset of the final product under development, which grows incrementally to become the final system. The content structure refers to the disciplines, which group (95) logically by nature.
A. artifacts
B. use-cases
C. actors
D. workers
-
[单项选择]People are indulging in an illusion whenever they find themselves explaining at a cocktail (鸡尾酒) party, say, that the are "in computers", or " in telecommunications", or "in electronic funds transfer". The implication is that they are part of the high-tech world. Just between us, they usually aren’t. The researchers who made fundamental breakthroughs in those areas are in a high-tech business. The rest of us are (121) of their work. We use computers and other new technology components to develop our products or to organize our affairs. Because we go about this work in teams and projects and other tightly knit working group (紧密联系在一起的工作小组), we are mostly in the human communication business. Our successes stem from good human interactions by all participants in the effort, and our failures stem from poor human interactions.
The main reason we tend to focus on the (122) rather than the human side of work is not because it’s more (123) , but because it’s easie
A. creators
B. innovators
C. appliers
D. inventors
-
[单项选择]Traditional structured analysis techniques focus upon the flow of (36) within a system. Object-oriented analysis emphasizes the building of real-world models. It examines requirements from the perspective of the classes and objects found in the vocabulary of the (37) domain.
Traditional system design method emphasizes the proper and effective structure of a complex system. Object-oriented design method encompasses the process of object-oriented decomposition and a (38) for depicting both logical and physical as well as static and dynamic models of the system under design.
Object-oriented programming is a method of implementation in which programs are organized as cooperative collections of objects, each of which represents an (39) of some class, and whose classes are all members of a hierarchy of classes united via (40) relationships.
A. control
B. program
C. data
D. reference
-
[单项选择]Observe that for the programmer, as for the chef, the urgency of the patron (顾客) may govern the scheduled completion of the task, but it cannot govern the actual completion. An omelette (煎鸡蛋) , promised in two minutes, may appear to be progressing nicely. Butwhen it has not set in two minutes, the customer has two choices--waits or eats it raw. Software customers have had (116) choices.
Now I do not think software (117) have less inherent courage and firmness thanchefs, nor than other engineering managers. But false (118) to match the patron’s desireddate is much more common in our discipline than elsewhere in engineering. It is very (119) to make a vigorous, plausible, and job risking defense of an estimate that is derived by no quantitative method, supported by little data, and certified chiefly by the hunches of the managers.
Clearly two solutions are needed. We need to develop and publicize productivity figures, bug-incidence figures, e
A. no
B. the same
C. other
D. lots of
-
[单项选择]WebSQL is a SQL-like (76) language for extracting information from the web. Its capabilities for performing navigation of web (77) make it a useful tool for automating several web-related tasks that require the systematic processing of either ail the finks in a (78) , all the pages that can be reached from a given URL through (79) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (80) Interface.
A. query
B. transaction
C. communication
D. programming
-
[单项选择]MIMD systems can be classified into (1) -oriented systems, high-availability systems and response-oriented systems. The goal of (1) -oriented multiprocessing is to obtain high
(1) (2) minimal computing cost. The techniques employed by multiprocessor operating systems to achieve this goal take advantage of an inherent processing versus input/output balance in the workload to produce (3) and (4) loading of system (5)
A. though
B. through
C. throughout
D. throughput
-
[单项选择]Object-oriented analysis (OOA) is a semiformal specification technique for the object-oriented paradigm. Object-oriented analysis consists of three steps. The first step is (96) . It determines how the various results are computed by the product and presents this information in the form of a (97) and associated scenarios. The second is (98) , which determines the classes and their attributes, then determines the interrelationships and interaction among the classes. The last step is (99) , which determines the actions performed by or to each class or subclass and presents this information in the form of (100)
A. use-case modeling
B. class modeling
C. dynamic modeling
D. behavioral modeling
-
[单项选择]A typical (11) language contains an applicative sub-language which approximates the mathematical abstractions of "timeless" functions applied to "spaceless’ values, where the actual operation sequences and use of storage space during expression evaluation are organized behind the (12) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (13) results during expression evaluation stored at the discretion of the language implementation, and effecting parameter (14) and (15) operations through value copying.
A. imperative
B. mandatory
C. compulsory
D. voluntary