2023年黑龙江软件水平考试考试模拟卷(7)
![2023年黑龙江软件水平考试考试模拟卷(7)_第1页](https://file6.zhuangpeitu.com/fileroot6/2023-2/11/563310af-bb6a-4c5f-b70d-3b7bbd2d62e2/563310af-bb6a-4c5f-b70d-3b7bbd2d62e21.gif)
![2023年黑龙江软件水平考试考试模拟卷(7)_第2页](/images/s.gif)
![2023年黑龙江软件水平考试考试模拟卷(7)_第3页](/images/s.gif)
《2023年黑龙江软件水平考试考试模拟卷(7)》由会员分享,可在线阅读,更多相关《2023年黑龙江软件水平考试考试模拟卷(7)(44页珍藏版)》请在装配图网上搜索。
1、2023年黑龙江软件水平考试考试模拟卷(7)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.Networks can be interconnected by different devices. In the physical layer, networks can be connected by (41) or hubs, which just move the bits from one network to an identical network. One layer up we
2、find bridges and switches, which operate at data link layer. They can accept (42) , examine the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have
3、(43) network layer, the router may be able to translate between the packet formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (44) . As an example, gateways betwee
4、n Internet E-mail and X.400 E-mail must (45) the E-mail message and change various header fields.AreapersBrelaysCconnectorsDmodems 2.A typical (11) language contains an applicative sub-language which approximates the mathematical abstractions of timeless functions applied to spaceless values, where
5、the actual operation sequences and use of storage space during expression evaluation are organized behind the (12) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (13) results
6、 during expression evaluation stored at the discretion of the language implementation, and effecting parameter (14) and (15) operations through value copying.AforegroundBbackgroundCscreenDscenes 3. (31) data effectively is crucial for success in todays competitive environment. Managers must know how
7、 to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration uses a base document that contains copies of other objects. (34) integratio
8、n uses a base document that contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in plain English, without the computer syntax.AsimilarityBinteroperabilityCdiversityDinteraction 4.MIMD systems can be classified into (1) -ori
9、ented systems, high-availability systems and response-oriented systems. The goal of (1) -oriented multiprocessing is to obtain high (1) (2) minimal computing cost. The techniques employed by multiprocessor operating systems to achieve this goal take advantage of an inherent processing versus input/o
10、utput balance in the workload to produce (3) and (4) loading of system (5)AbalanceBbalancedCbalancesDbalancing 5.A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the brows
11、er knows how to deal with (26) , and that it has a mechanism for (27) graphical files. Display text, display graphics, and (28) hyperlinks-theres 99 percent of the (29) value. Thats not to say that the manufacturers didnt go all-out to attach a hyperactive efflorescence of useless capabilities onto
12、their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you cant wait to delete from your favorites of bookmarks menu Remember when client-side Java applets were supposed to become the preferred (30) for application development Remember frames and all thei
13、r nasty side effectsAdisplayingBillustratingCdrawingDwriting 6.SOCKS is a genetic proxy protocol for TCP/IP-based networking, applications. SOCKS includes two (21) , the SOCKS server and the SOCKS client. The SOCKS server is implemented at the application layer. The SOCKS client is implemented betwe
14、en applications and the (22) layer. When an application client needs to connect to an application server, the client connects to a SOCKS proxy server. The proxy server connects to the application server instead of the client, and (23) data between the client and the application server. For the appli
15、cation server, the proxy server is the (24) . SOCKS is also one of the popular (25) to network firewalls. Because of its simplicity and flexibility, SOCKS has been used as genetic application proxy in virtual private network (VPN), and for extranet applications.AtransportBtransmissionCnetworkDdatali
16、nk 7.Most computer systems are (16) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (17) to an outsider attack by preventing. (18) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (19) users. Detecting
17、 such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (20) by tools referred to as Intrusion Detection Systems.AreliableBsecureCindestructibleDsteady 8.Soon, more of the information w
18、e receive via the Internet could come (6) in digital wrappers. Wrappers are made up (7) software code thats targeted to do specific things with the data (8) within them, such as helping to define queries for search engines. They also keep (9) from (10) access to that code.AcloseBclosedCencloseDenclo
19、sed 9.Networks can be interconnected by different devices. In the physical layer, networks can be connected by (41) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches, which operate at data link layer. They can accept (42) , examine
20、the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (43) network layer, the router may be able to translate between the packet formats. In the t
21、ransport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (44) . As an example, gateways between Internet E-mail and X.400 E-mail must (45) the E-mail message and change various header fi
22、elds.AframesBpacketsCpackagesDcells 10.Traditional structured analysis techniques focus upon the flow of (36) within a system. Object-oriented analysis emphasizes the building of real-world models. It examines requirements from the perspective of the classes and objects found in the vocabulary of th
23、e (37) domain. Traditional system design method emphasizes the proper and effective structure of a complex system. Object-oriented design method encompasses the process of object-oriented decomposition and a (38) for depicting both logical and physical as well as static and dynamic models of the sys
24、tem under design. Object-oriented programming is a method of implementation in which programs are organized as cooperative collections of objects, each of which represents an (39) of some class, and whose classes are all members of a hierarchy of classes united via (40) relationships.AproblemBsoluti
25、onCdataDprogram 11.A typical (11) language contains an applicative sub-language which approximates the mathematical abstractions of timeless functions applied to spaceless values, where the actual operation sequences and use of storage space during expression evaluation are organized behind the (12)
26、 . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (13) results during expression evaluation stored at the discretion of the language implementation, and effecting parameter (14
27、) and (15) operations through value copying.AmiddleBintermediateCpreviousDfinal 12.A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the browser knows how to deal with (26)
28、 , and that it has a mechanism for (27) graphical files. Display text, display graphics, and (28) hyperlinks-theres 99 percent of the (29) value. Thats not to say that the manufacturers didnt go all-out to attach a hyperactive efflorescence of useless capabilities onto their browsers. Remember when
29、media channels in the browser were a big deal, instead of the clutter you cant wait to delete from your favorites of bookmarks menu Remember when client-side Java applets were supposed to become the preferred (30) for application development Remember frames and all their nasty side effectsAdirectBna
30、vigateCindicateDgo-on 13.Most computer systems are (16) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (17) to an outsider attack by preventing. (18) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (
31、19) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (20) by tools referred to as Intrusion Detection Systems.AvisitBaccessCI/ODread/write 14.Soon, more of the in
32、formation we receive via the Internet could come (6) in digital wrappers. Wrappers are made up (7) software code thats targeted to do specific things with the data (8) within them, such as helping to define queries for search engines. They also keep (9) from (10) access to that code.AinsidersBmoneyC
33、outsidersDwarehouse 15.MIMD systems can be classified into (1) -oriented systems, high-availability systems and response-oriented systems. The goal of (1) -oriented multiprocessing is to obtain high (1) (2) minimal computing cost. The techniques employed by multiprocessor operating systems to achiev
34、e this goal take advantage of an inherent processing versus input/output balance in the workload to produce (3) and (4) loading of system (5)AuniformBuniqueCunitDunited 16. (31) data effectively is crucial for success in todays competitive environment. Managers must know how to use a variety of tool
35、s. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration uses a base document that contains copies of other objects. (34) integration uses a base document th
36、at contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in plain English, without the computer syntax.ASimulatedBDuplicatedCDynamicDStatic 17.SOCKS is a genetic proxy protocol for TCP/IP-based networking, applications. SOCKS
37、 includes two (21) , the SOCKS server and the SOCKS client. The SOCKS server is implemented at the application layer. The SOCKS client is implemented between applications and the (22) layer. When an application client needs to connect to an application server, the client connects to a SOCKS proxy se
38、rver. The proxy server connects to the application server instead of the client, and (23) data between the client and the application server. For the application server, the proxy server is the (24) . SOCKS is also one of the popular (25) to network firewalls. Because of its simplicity and flexibili
39、ty, SOCKS has been used as genetic application proxy in virtual private network (VPN), and for extranet applications.ArelaysBreplacesCreplaysDrepeals 18.A typical (11) language contains an applicative sub-language which approximates the mathematical abstractions of timeless functions applied to spac
40、eless values, where the actual operation sequences and use of storage space during expression evaluation are organized behind the (12) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by
41、 having (13) results during expression evaluation stored at the discretion of the language implementation, and effecting parameter (14) and (15) operations through value copying.AtransverseBtransportationCtransmissionDtranslation 19.Networks can be interconnected by different devices. In the physica
42、l layer, networks can be connected by (41) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches, which operate at data link layer. They can accept (42) , examine the MAC address, and forward the frames to a different network while doin
43、g minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (43) network layer, the router may be able to translate between the packet formats. In the transport layer we find transport gateway, which can interface between two
44、 transport connections. Finally, in the application layer, application gateways translate message (44) . As an example, gateways between Internet E-mail and X.400 E-mail must (45) the E-mail message and change various header fields.AspecialBdependentCsimilarDdissimilar 20. (31) data effectively is c
45、rucial for success in todays competitive environment. Managers must know how to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration
46、 uses a base document that contains copies of other objects. (34) integration uses a base document that contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in plain English, without the computer syntax.ALinkedBpointedCDynam
47、icDStatic 21.MIMD systems can be classified into (1) -oriented systems, high-availability systems and response-oriented systems. The goal of (1) -oriented multiprocessing is to obtain high (1) (2) minimal computing cost. The techniques employed by multiprocessor operating systems to achieve this goa
48、l take advantage of an inherent processing versus input/output balance in the workload to produce (3) and (4) loading of system (5)AresourceBresourcesCsourceDsources 22.Traditional structured analysis techniques focus upon the flow of (36) within a system. Object-oriented analysis emphasizes the bui
49、lding of real-world models. It examines requirements from the perspective of the classes and objects found in the vocabulary of the (37) domain. Traditional system design method emphasizes the proper and effective structure of a complex system. Object-oriented design method encompasses the process o
50、f object-oriented decomposition and a (38) for depicting both logical and physical as well as static and dynamic models of the system under design. Object-oriented programming is a method of implementation in which programs are organized as cooperative collections of objects, each of which represent
51、s an (39) of some class, and whose classes are all members of a hierarchy of classes united via (40) relationships.AmarkBpictureCsymbolDnotation 23.A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator a
52、nd a Web browser are that the browser knows how to deal with (26) , and that it has a mechanism for (27) graphical files. Display text, display graphics, and (28) hyperlinks-theres 99 percent of the (29) value. Thats not to say that the manufacturers didnt go all-out to attach a hyperactive efflores
53、cence of useless capabilities onto their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you cant wait to delete from your favorites of bookmarks menu Remember when client-side Java applets were supposed to become the preferred (30) for application devel
54、opment Remember frames and all their nasty side effectsAWeb browsersBterminalsCemulatorsDnetworks 24.SOCKS is a genetic proxy protocol for TCP/IP-based networking, applications. SOCKS includes two (21) , the SOCKS server and the SOCKS client. The SOCKS server is implemented at the application layer.
55、 The SOCKS client is implemented between applications and the (22) layer. When an application client needs to connect to an application server, the client connects to a SOCKS proxy server. The proxy server connects to the application server instead of the client, and (23) data between the client and
56、 the application server. For the application server, the proxy server is the (24) . SOCKS is also one of the popular (25) to network firewalls. Because of its simplicity and flexibility, SOCKS has been used as genetic application proxy in virtual private network (VPN), and for extranet applications.
57、AworkstationBuserCcustomerDclient 25.Most computer systems are (16) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (17) to an outsider attack by preventing. (18) from outside can still be vulnerable to the insider attacks accomplished by abusiv
58、e usage of (19) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (20) by tools referred to as Intrusion Detection Systems.ApowerBtightsCauthorizedDcommon 26.Soon,
59、 more of the information we receive via the Internet could come (6) in digital wrappers. Wrappers are made up (7) software code thats targeted to do specific things with the data (8) within them, such as helping to define queries for search engines. They also keep (9) from (10) access to that code.A
60、gainBgainedCgainsDgaining 27.A typical (11) language contains an applicative sub-language which approximates the mathematical abstractions of timeless functions applied to spaceless values, where the actual operation sequences and use of storage space during expression evaluation are organized behin
61、d the (12) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (13) results during expression evaluation stored at the discretion of the language implementation, and effecting par
62、ameter (14) and (15) operations through value copying.AassignmentBdesignCvalueDdispatch 28.Networks can be interconnected by different devices. In the physical layer, networks can be connected by (41) or hubs, which just move the bits from one network to an identical network. One layer up we find br
63、idges and switches, which operate at data link layer. They can accept (42) , examine the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (43) network la
- 温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 新人版英语八年级下册Unit5总复习ppt课件
- 新人教部编版一年级语文上第五单元ppt课件(全套)
- 高鸿业经济学基础第十五章-总需求-总供给模型-授课-河北工大宋建林课件
- 新人教版高中数学《等差数列前n项和》课件
- 新人教部编版五年级语文上册第六单元测试卷课件
- 高鸿业微观经济学课件第4章生产论
- 高鸿业--微观经济学-第一章课件
- 新人教版部编本五年级下册语文13 人物描写一组 ppt课件
- 新人教版高中化学必修第一册——电解质的电离ppt课件
- 新人教版部编教材二年级下册第一单元3《贝的故事》优质课教学ppt课件
- 高风险作业培训讲义_002
- 新人教版语文三年级下册第五单元全套ppt课件部编版
- 新人教版英语八年级上册第二单元全部ppt课件
- 《走一步再走一步》重点课件
- 新人教版语文一年级上册:识字1《天地人》课件