2023年浙江软件水平考试考试模拟卷(7)

上传人:h****6 文档编号:185792698 上传时间:2023-02-06 格式:DOCX 页数:31 大小:19.95KB
收藏 版权申诉 举报 下载
2023年浙江软件水平考试考试模拟卷(7)_第1页
第1页 / 共31页
2023年浙江软件水平考试考试模拟卷(7)_第2页
第2页 / 共31页
2023年浙江软件水平考试考试模拟卷(7)_第3页
第3页 / 共31页
资源描述:

《2023年浙江软件水平考试考试模拟卷(7)》由会员分享,可在线阅读,更多相关《2023年浙江软件水平考试考试模拟卷(7)(31页珍藏版)》请在装配图网上搜索。

1、2023年浙江软件水平考试考试模拟卷(7)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.Even though current technologies make the ultimate segmented network impractical, new technologies and products hold the promise of making the concept a reality. Most important of all these new technolog

2、ies are () . The ultimate switched LAN, which is technically possible, now, exhibits the following characteristics:1. High-speed yet cost-effective switching devices can be implemented on a wide scale, providing dedicated connections for individual users and supporting the aggregate () of all networ

3、ked users.2. The ability to deploy switching capabilities incrementally into the () base. Switching implementations support switching of individual users or groups so that existing users of shared media modules can continue to use the existing equipment until they can justify moving to dedicate swit

4、ched LAN connections.3. Support and enhancement of existing routed environments. Switching () routint, but rather can be introduced into the network without making any changes to the existing routing equipment or configuration. () play a critical role in the integration of switching into existing ne

5、tworks.providing dedicated connections for individual users and supporting the aggregate () of all networked users.A.specific requirementsB.bandwidth requirementsC.permanent requirementsD.security requirements2.Windows NT或Windows 2000是当前流行的一类操作系统,()是WindowsNT真正的中心,它提供了一组操作系统原语和机制。Windows NT采用线程机制来提高

6、系统的()。NT采用基于()的方案选定线程执行的次序。NT采用基于()的方案选定线程执行的次序。A先来先服务B时间片轮转C随机选择D优先级3.设有员工实体Employee(employeeID,name,sex,age,tel,department),其中employeeID为员工号,name为员工姓名,sex为员工性别,age为员工年龄,tel为员工电话(要求记录该员工的手机号码和办公室电话),departID为员工所在部门号(要求参照另一部门实体Deparxment的主码depmtID)。Employee实体中存在的派生属性及其原因是();Employee实体中还存在多值属性,该属性及其该

7、属性的处理为();对属性depaitmentID的约束是()。对属性depaitmentID的约束是()。APrimary Key NOTNULLBPIimary,KeyCForeign KeyDCandidate Key4.System analysis is traditionally done top-down using structured analysis based on () Object-oriented analysis focuses on creation of modelsThe three types of the analysis model are () The

8、re are two substages of object-oriented analysis () focuses on real-world things whose semantics the application capturesThe object constructed in the requirement analysis shows the () of the real-world system and organizes it into workable pieces () addresses the computer aspects ofthe application

9、that are visible to usersThe objects are those which can be expected to vary from time to time quite rapidlySystem analysis is traditionally done top-down using structured analysis based on ()Afunctional decompositionBobject abstractionCdata inheritanceDinformation generalization5.The ARPANET () ( t

10、he rules of syntax that enable computers to communicate on a network) were originally designed for openness and flexibility, not for () The ARPA researchers needed to share information easily, so everyone needed to be an unrestricted insider on the network. Although the approach was appropriate at t

11、he time, it is not one that lends itself to today’s commercial and government use.As more locations with computers (known as () in Internet parlance)joined the ARPANET, the usefulness of the network grew. The ARPANET consisted primarily of university and government computers, and the applicati

12、ons supported on this network were simple: electronic mail ( E - mail), electronic news groups, and () connection to other computers. By 1971, the Internet linked about two dozen research and government sites, and researchers had begun to use it to exchange () not directly related to the ARPANET its

13、elf. The network was becoming an important tool for collaborative research.not for () The ARPA researchers needed to share information easily.A.safetyB.guardC.attachmentD.security6.Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting use

14、rs to () fraudulent Web sites without their knowledge or consent. Pharming has been called phishing without a lure.In phishing, the perpetrator sends out legitimate- () looking e-malls, appearing to come from some of the Web’s most popular sites, in an effort to obtain personal and financial i

15、nformation from individual recipients. But in pharming, larger numbers of computer users can be () victimized because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form of pharming attack, code sent in an e-mail modifies lo

16、cal host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected () bookmark entry.

17、 Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing()A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected () bookmark entry.A.hypertextB.comp

18、utationC.expectationD.bookmark7.Even though current technologies make the ultimate segmented network impractical, new technologies and products hold the promise of making the concept a reality. Most important of all these new technologies are () . The ultimate switched LAN, which is technically poss

19、ible, now, exhibits the following characteristics:1. High-speed yet cost-effective switching devices can be implemented on a wide scale, providing dedicated connections for individual users and supporting the aggregate () of all networked users.2. The ability to deploy switching capabilities increme

20、ntally into the () base. Switching implementations support switching of individual users or groups so that existing users of shared media modules can continue to use the existing equipment until they can justify moving to dedicate switched LAN connections.3. Support and enhancement of existing route

21、d environments. Switching () routint, but rather can be introduced into the network without making any changes to the existing routing equipment or configuration. () play a critical role in the integration of switching into existing networks.The ability to deploy switching capabilities incrementally

22、 into the () base.A.deviceB.distributedC.installedD.integrated8.System analysis is traditionally done top-down using structured analysis based on () Object-oriented analysis focuses on creation of modelsThe three types of the analysis model are () There are two substages of object-oriented analysis

23、() focuses on real-world things whose semantics the application capturesThe object constructed in the requirement analysis shows the () of the real-world system and organizes it into workable pieces () addresses the computer aspects ofthe application that are visible to usersThe objects are those wh

24、ich can be expected to vary from time to time quite rapidlyThe three types of the analysis model are ()Afunction model,class model and state modelBclass model,interaction model and state modelCclass model,interaction model and sequence modelDfunction model,interaction model and state model9.The ARPA

25、NET () ( the rules of syntax that enable computers to communicate on a network) were originally designed for openness and flexibility, not for () The ARPA researchers needed to share information easily, so everyone needed to be an unrestricted insider on the network. Although the approach was approp

26、riate at the time, it is not one that lends itself to today’s commercial and government use.As more locations with computers (known as () in Internet parlance)joined the ARPANET, the usefulness of the network grew. The ARPANET consisted primarily of university and government computers, and the

27、 applications supported on this network were simple: electronic mail ( E - mail), electronic news groups, and () connection to other computers. By 1971, the Internet linked about two dozen research and government sites, and researchers had begun to use it to exchange () not directly related to the A

28、RPANET itself. The network was becoming an important tool for collaborative research.known as () in Internet parlanceA.sitesB.placesC.locationsD.positions10.Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to () fraudulent Web

29、sites without their knowledge or consent. Pharming has been called phishing without a lure.In phishing, the perpetrator sends out legitimate- () looking e-malls, appearing to come from some of the Web’s most popular sites, in an effort to obtain personal and financial information from individu

30、al recipients. But in pharming, larger numbers of computer users can be () victimized because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form of pharming attack, code sent in an e-mail modifies local host files on a pers

31、onal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected () bookmark entry. Some spyware removal pr

32、ograms can correct the corruption, but it frequently recurs unless the user changes browsing()but it frequently recurs unless the user changes browsing()A.habits signatureB.siteC.ragesD.address11.Even though current technologies make the ultimate segmented network impractical, new technologies and p

33、roducts hold the promise of making the concept a reality. Most important of all these new technologies are () . The ultimate switched LAN, which is technically possible, now, exhibits the following characteristics:1. High-speed yet cost-effective switching devices can be implemented on a wide scale,

34、 providing dedicated connections for individual users and supporting the aggregate () of all networked users.2. The ability to deploy switching capabilities incrementally into the () base. Switching implementations support switching of individual users or groups so that existing users of shared medi

35、a modules can continue to use the existing equipment until they can justify moving to dedicate switched LAN connections.3. Support and enhancement of existing routed environments. Switching () routint, but rather can be introduced into the network without making any changes to the existing routing e

36、quipment or configuration. () play a critical role in the integration of switching into existing networks.Switching () routint.A.assignedB.does not justifyC.replaceD.does not replace12.System analysis is traditionally done top-down using structured analysis based on () Object-oriented analysis focus

37、es on creation of modelsThe three types of the analysis model are () There are two substages of object-oriented analysis () focuses on real-world things whose semantics the application capturesThe object constructed in the requirement analysis shows the () of the real-world system and organizes it i

38、nto workable pieces () addresses the computer aspects ofthe application that are visible to usersThe objects are those which can be expected to vary from time to time quite rapidly()focuses on real-world things whose semantics the application captures.AStatic analysisBSemantic analysisCScope analysi

39、sDDomain analysis13.The ARPANET () ( the rules of syntax that enable computers to communicate on a network) were originally designed for openness and flexibility, not for () The ARPA researchers needed to share information easily, so everyone needed to be an unrestricted insider on the network. Alth

40、ough the approach was appropriate at the time, it is not one that lends itself to today’s commercial and government use.As more locations with computers (known as () in Internet parlance)joined the ARPANET, the usefulness of the network grew. The ARPANET consisted primarily of university and g

41、overnment computers, and the applications supported on this network were simple: electronic mail ( E - mail), electronic news groups, and () connection to other computers. By 1971, the Internet linked about two dozen research and government sites, and researchers had begun to use it to exchange () n

42、ot directly related to the ARPANET itself. The network was becoming an important tool for collaborative research.and () connection to other computers.A.longB.remoteC.farD.distant14.System analysis is traditionally done top-down using structured analysis based on () Object-oriented analysis focuses o

43、n creation of modelsThe three types of the analysis model are () There are two substages of object-oriented analysis () focuses on real-world things whose semantics the application capturesThe object constructed in the requirement analysis shows the () of the real-world system and organizes it into

44、workable pieces () addresses the computer aspects ofthe application that are visible to usersThe objects are those which can be expected to vary from time to time quite rapidlyThe object constructed in the requirement analysis shows the () of the real-world system and organizes it into workable piec

45、esAstatic structureBsystem componentsCdata flowsDprogram procedures15.Even though current technologies make the ultimate segmented network impractical, new technologies and products hold the promise of making the concept a reality. Most important of all these new technologies are () . The ultimate s

46、witched LAN, which is technically possible, now, exhibits the following characteristics:1. High-speed yet cost-effective switching devices can be implemented on a wide scale, providing dedicated connections for individual users and supporting the aggregate () of all networked users.2. The ability to

47、 deploy switching capabilities incrementally into the () base. Switching implementations support switching of individual users or groups so that existing users of shared media modules can continue to use the existing equipment until they can justify moving to dedicate switched LAN connections.3. Sup

48、port and enhancement of existing routed environments. Switching () routint, but rather can be introduced into the network without making any changes to the existing routing equipment or configuration. () play a critical role in the integration of switching into existing networks.() play a critical r

49、ole in the integration of switching into existing networks.A.RoutersB.DevicesC.I/OD.DSP16.The ARPANET () ( the rules of syntax that enable computers to communicate on a network) were originally designed for openness and flexibility, not for () The ARPA researchers needed to share information easily,

50、 so everyone needed to be an unrestricted insider on the network. Although the approach was appropriate at the time, it is not one that lends itself to today’s commercial and government use.As more locations with computers (known as () in Internet parlance)joined the ARPANET, the usefulness of

51、 the network grew. The ARPANET consisted primarily of university and government computers, and the applications supported on this network were simple: electronic mail ( E - mail), electronic news groups, and () connection to other computers. By 1971, the Internet linked about two dozen research and

52、government sites, and researchers had begun to use it to exchange () not directly related to the ARPANET itself. The network was becoming an important tool for collaborative research.and researchers had begun to use it to exchange () not directly related to the ARPANET itself.A.materialsB.wordsC.inf

53、ormationD.news17.Even though current technologies make the ultimate segmented network impractical, new technologies and products hold the promise of making the concept a reality. Most important of all these new technologies are () . The ultimate switched LAN, which is technically possible, now, exhi

54、bits the following characteristics:1. High-speed yet cost-effective switching devices can be implemented on a wide scale, providing dedicated connections for individual users and supporting the aggregate () of all networked users.2. The ability to deploy switching capabilities incrementally into the

55、 () base. Switching implementations support switching of individual users or groups so that existing users of shared media modules can continue to use the existing equipment until they can justify moving to dedicate switched LAN connections.3. Support and enhancement of existing routed environments.

56、 Switching () routint, but rather can be introduced into the network without making any changes to the existing routing equipment or configuration. () play a critical role in the integration of switching into existing networks.Most important of all these new technologies are () .A.switch-based LANsB

57、.WANsC.user servicesD.LAN-BY-PHONE18.System analysis is traditionally done top-down using structured analysis based on () Object-oriented analysis focuses on creation of modelsThe three types of the analysis model are () There are two substages of object-oriented analysis () focuses on real-world th

58、ings whose semantics the application capturesThe object constructed in the requirement analysis shows the () of the real-world system and organizes it into workable pieces () addresses the computer aspects ofthe application that are visible to usersThe objects are those which can be expected to vary

59、 from time to time quite rapidly()addresses the computer aspects ofthe application that are visible to users.AProgram analysisBFunction requirementCApplication analysisDPhysical model19.单层单面DVD的存储容量为4.7GB,它的容量是CD-ROM的 (13) 倍,其容量提高的主要原因是 (14) 。A5B7C9D11 20.超文本是一种信息管理技术,其组织形式以 (9) 作为基本单位,用 (10) 组织信息块之

60、间的关联关系。A文本(Text)B节点(Node)C链(Link)D环球网(Web) 21.多媒体中的媒体有两重常用含义,一是指存储信息的实体,如 (7) 等;二是指表达与传递信息的载体,如 (8) 等。A文字、图形、磁带、半导体存储器B磁盘、光盘、磁带、半导体存储器C文字、图形、图像、声音D声卡、磁带、半导体存储器 22.多媒体中的媒体有两重常用含义,一是指存储信息的实体,如 (7) 等;二是指表达与传递信息的载体,如 (8) 等。A文字、图形、磁带、半导体存储器B磁盘、光盘、磁带、半导体存储器C文字、图形、图像、声音D声卡、磁带、半导体存储器 23.超文本是一种信息管理技术,其组织形式以

61、(9) 作为基本单位,用 (10) 组织信息块之间的关联关系。A文本(Text)B节点(Node)C链(Link)D环球网(Web) 24.单层单面DVD的存储容量为4.7GB,它的容量是CD-ROM的 (13) 倍,其容量提高的主要原因是 (14) 。A加大盘片厚度、减小光道间距B减小最小凹凸坑长度、减小光道间距C加大盘片厚度、增加盘片直径D增加盘片直径、减小光道问距 25.根据国家电子政务工程建设项目档案管理暂行办法中的规定,软件开发类文档保存期限不少于30年的是_。A系统上线保障方案B系统维护手册C设计变更报审D测试报告26.中华人民共和国政府采购法第二十四条规定,两个以上的自然人、法人

62、或者其他组织可以组成一个联合体,以一个供应商的身份共同参加政府采购。以下关于联合体供应商的叙述,_是不正确的。A参加联合体的供应商均应具备相关的条件B参加联合体的供应商应当向采购人提交联合协议,载明联合体各方承担的工作和义务C参加联合体的供应商各方应当共同与采购人签订采购合同D参加联合体的次要供应商不需要就采购合同约定的事项对采购人承担连带责任27.以下关于招投标的说法,错误的是_。A招标人设有标底的,标底必须保密B依法必须进行招标的项目,自招标文件开始发出之日起至投标人提交投标文件截止之日止,最短不得少于二十日C国家重点项目和省、自治区、直辖市人民政府确定的地方重点项目不适宜公开招标的,经相

63、关部门批准,可以不进行招标D招标人具有编制招标文件和组织评标能力的,可以自行办理招标事宜28.GB/T 162602006对软件质量度量做了详细的规定,其中_可用于开发阶段的非执行软件产品,如标书、需求定义、设计规格说明等。A外部度量B管理度量C使用质量的度量D内部度量29.根据中华人民共和国政府采购法,关于询价采购的程序,下面说法不正确的是_。A询价小组应由采购人的代表和有关专家共五人以上的单数组成,其中专家的人数不得少于成员总数的2/3B询价小组应根据采购需求,从符合相应资格条件的供应商名单中确定不少于三家的供应商,并向其发出询价通知书让其报价C询价小组应要求被询价的供应商一次报出不得更改

64、的价格D采购人应根据符合采购需求、质量和服务相等且报价最低的原则确定成交供应商,并将结果通知所有被询价的未成交的供应商30.根据GB/T 114572006的规定,使客户能确认是否接受系统的正式测试为_。A合格性测试B验收测试C运行测试D系统测试31.关于软件用户质量要求,以下说法正确的是_。A用户质量要求可通过内部质量的度量、外部度量,有时是功能度量来确定为质量要求B用户质量要求可通过用户需求质量的度量、内部度量,有时是外部度量来确定为质量要求C用户质量要求可通过使用质量的度量、外部度量,有时是内部度量来确定为质量要求D用户质量要求可通过使用质量的外部度量、内部度量,有时是需求度量来确定为质量要求32.根据GB/T 16260.1中对软件产品质量模型的描述,软件产品的使用质量不包括_。A有效性B生产率C满意度D易用性33.根据计算机软件质量保证计划规范GB/T 125041990,为确保软件的实现满足需求而需要的基本文档中不包括_。A项目实施计划B软件验证与确认计划C软件设

展开阅读全文
温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!