2023年黑龙江软件水平考试考试模拟卷(7)

上传人:h****8 文档编号:187304456 上传时间:2023-02-13 格式:DOCX 页数:44 大小:23.21KB
收藏 版权申诉 举报 下载
2023年黑龙江软件水平考试考试模拟卷(7)_第1页
第1页 / 共44页
2023年黑龙江软件水平考试考试模拟卷(7)_第2页
第2页 / 共44页
2023年黑龙江软件水平考试考试模拟卷(7)_第3页
第3页 / 共44页
资源描述:

《2023年黑龙江软件水平考试考试模拟卷(7)》由会员分享,可在线阅读,更多相关《2023年黑龙江软件水平考试考试模拟卷(7)(44页珍藏版)》请在装配图网上搜索。

1、2023年黑龙江软件水平考试考试模拟卷(7)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.Networks can be interconnected by different devices. In the physical layer, networks can be connected by (41) or hubs, which just move the bits from one network to an identical network. One layer up we

2、find bridges and switches, which operate at data link layer. They can accept (42) , examine the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have

3、(43) network layer, the router may be able to translate between the packet formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (44) . As an example, gateways betwee

4、n Internet E-mail and X.400 E-mail must (45) the E-mail message and change various header fields.AreapersBrelaysCconnectorsDmodems 2.A typical (11) language contains an applicative sub-language which approximates the mathematical abstractions of timeless functions applied to spaceless values, where

5、the actual operation sequences and use of storage space during expression evaluation are organized behind the (12) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (13) results

6、 during expression evaluation stored at the discretion of the language implementation, and effecting parameter (14) and (15) operations through value copying.AforegroundBbackgroundCscreenDscenes 3. (31) data effectively is crucial for success in todays competitive environment. Managers must know how

7、 to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration uses a base document that contains copies of other objects. (34) integratio

8、n uses a base document that contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in plain English, without the computer syntax.AsimilarityBinteroperabilityCdiversityDinteraction 4.MIMD systems can be classified into (1) -ori

9、ented systems, high-availability systems and response-oriented systems. The goal of (1) -oriented multiprocessing is to obtain high (1) (2) minimal computing cost. The techniques employed by multiprocessor operating systems to achieve this goal take advantage of an inherent processing versus input/o

10、utput balance in the workload to produce (3) and (4) loading of system (5)AbalanceBbalancedCbalancesDbalancing 5.A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the brows

11、er knows how to deal with (26) , and that it has a mechanism for (27) graphical files. Display text, display graphics, and (28) hyperlinks-theres 99 percent of the (29) value. Thats not to say that the manufacturers didnt go all-out to attach a hyperactive efflorescence of useless capabilities onto

12、their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you cant wait to delete from your favorites of bookmarks menu Remember when client-side Java applets were supposed to become the preferred (30) for application development Remember frames and all thei

13、r nasty side effectsAdisplayingBillustratingCdrawingDwriting 6.SOCKS is a genetic proxy protocol for TCP/IP-based networking, applications. SOCKS includes two (21) , the SOCKS server and the SOCKS client. The SOCKS server is implemented at the application layer. The SOCKS client is implemented betwe

14、en applications and the (22) layer. When an application client needs to connect to an application server, the client connects to a SOCKS proxy server. The proxy server connects to the application server instead of the client, and (23) data between the client and the application server. For the appli

15、cation server, the proxy server is the (24) . SOCKS is also one of the popular (25) to network firewalls. Because of its simplicity and flexibility, SOCKS has been used as genetic application proxy in virtual private network (VPN), and for extranet applications.AtransportBtransmissionCnetworkDdatali

16、nk 7.Most computer systems are (16) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (17) to an outsider attack by preventing. (18) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (19) users. Detecting

17、 such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (20) by tools referred to as Intrusion Detection Systems.AreliableBsecureCindestructibleDsteady 8.Soon, more of the information w

18、e receive via the Internet could come (6) in digital wrappers. Wrappers are made up (7) software code thats targeted to do specific things with the data (8) within them, such as helping to define queries for search engines. They also keep (9) from (10) access to that code.AcloseBclosedCencloseDenclo

19、sed 9.Networks can be interconnected by different devices. In the physical layer, networks can be connected by (41) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches, which operate at data link layer. They can accept (42) , examine

20、the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (43) network layer, the router may be able to translate between the packet formats. In the t

21、ransport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (44) . As an example, gateways between Internet E-mail and X.400 E-mail must (45) the E-mail message and change various header fi

22、elds.AframesBpacketsCpackagesDcells 10.Traditional structured analysis techniques focus upon the flow of (36) within a system. Object-oriented analysis emphasizes the building of real-world models. It examines requirements from the perspective of the classes and objects found in the vocabulary of th

23、e (37) domain. Traditional system design method emphasizes the proper and effective structure of a complex system. Object-oriented design method encompasses the process of object-oriented decomposition and a (38) for depicting both logical and physical as well as static and dynamic models of the sys

24、tem under design. Object-oriented programming is a method of implementation in which programs are organized as cooperative collections of objects, each of which represents an (39) of some class, and whose classes are all members of a hierarchy of classes united via (40) relationships.AproblemBsoluti

25、onCdataDprogram 11.A typical (11) language contains an applicative sub-language which approximates the mathematical abstractions of timeless functions applied to spaceless values, where the actual operation sequences and use of storage space during expression evaluation are organized behind the (12)

26、 . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (13) results during expression evaluation stored at the discretion of the language implementation, and effecting parameter (14

27、) and (15) operations through value copying.AmiddleBintermediateCpreviousDfinal 12.A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the browser knows how to deal with (26)

28、 , and that it has a mechanism for (27) graphical files. Display text, display graphics, and (28) hyperlinks-theres 99 percent of the (29) value. Thats not to say that the manufacturers didnt go all-out to attach a hyperactive efflorescence of useless capabilities onto their browsers. Remember when

29、media channels in the browser were a big deal, instead of the clutter you cant wait to delete from your favorites of bookmarks menu Remember when client-side Java applets were supposed to become the preferred (30) for application development Remember frames and all their nasty side effectsAdirectBna

30、vigateCindicateDgo-on 13.Most computer systems are (16) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (17) to an outsider attack by preventing. (18) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (

31、19) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (20) by tools referred to as Intrusion Detection Systems.AvisitBaccessCI/ODread/write 14.Soon, more of the in

32、formation we receive via the Internet could come (6) in digital wrappers. Wrappers are made up (7) software code thats targeted to do specific things with the data (8) within them, such as helping to define queries for search engines. They also keep (9) from (10) access to that code.AinsidersBmoneyC

33、outsidersDwarehouse 15.MIMD systems can be classified into (1) -oriented systems, high-availability systems and response-oriented systems. The goal of (1) -oriented multiprocessing is to obtain high (1) (2) minimal computing cost. The techniques employed by multiprocessor operating systems to achiev

34、e this goal take advantage of an inherent processing versus input/output balance in the workload to produce (3) and (4) loading of system (5)AuniformBuniqueCunitDunited 16. (31) data effectively is crucial for success in todays competitive environment. Managers must know how to use a variety of tool

35、s. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration uses a base document that contains copies of other objects. (34) integration uses a base document th

36、at contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in plain English, without the computer syntax.ASimulatedBDuplicatedCDynamicDStatic 17.SOCKS is a genetic proxy protocol for TCP/IP-based networking, applications. SOCKS

37、 includes two (21) , the SOCKS server and the SOCKS client. The SOCKS server is implemented at the application layer. The SOCKS client is implemented between applications and the (22) layer. When an application client needs to connect to an application server, the client connects to a SOCKS proxy se

38、rver. The proxy server connects to the application server instead of the client, and (23) data between the client and the application server. For the application server, the proxy server is the (24) . SOCKS is also one of the popular (25) to network firewalls. Because of its simplicity and flexibili

39、ty, SOCKS has been used as genetic application proxy in virtual private network (VPN), and for extranet applications.ArelaysBreplacesCreplaysDrepeals 18.A typical (11) language contains an applicative sub-language which approximates the mathematical abstractions of timeless functions applied to spac

40、eless values, where the actual operation sequences and use of storage space during expression evaluation are organized behind the (12) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by

41、 having (13) results during expression evaluation stored at the discretion of the language implementation, and effecting parameter (14) and (15) operations through value copying.AtransverseBtransportationCtransmissionDtranslation 19.Networks can be interconnected by different devices. In the physica

42、l layer, networks can be connected by (41) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches, which operate at data link layer. They can accept (42) , examine the MAC address, and forward the frames to a different network while doin

43、g minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (43) network layer, the router may be able to translate between the packet formats. In the transport layer we find transport gateway, which can interface between two

44、 transport connections. Finally, in the application layer, application gateways translate message (44) . As an example, gateways between Internet E-mail and X.400 E-mail must (45) the E-mail message and change various header fields.AspecialBdependentCsimilarDdissimilar 20. (31) data effectively is c

45、rucial for success in todays competitive environment. Managers must know how to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration

46、 uses a base document that contains copies of other objects. (34) integration uses a base document that contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in plain English, without the computer syntax.ALinkedBpointedCDynam

47、icDStatic 21.MIMD systems can be classified into (1) -oriented systems, high-availability systems and response-oriented systems. The goal of (1) -oriented multiprocessing is to obtain high (1) (2) minimal computing cost. The techniques employed by multiprocessor operating systems to achieve this goa

48、l take advantage of an inherent processing versus input/output balance in the workload to produce (3) and (4) loading of system (5)AresourceBresourcesCsourceDsources 22.Traditional structured analysis techniques focus upon the flow of (36) within a system. Object-oriented analysis emphasizes the bui

49、lding of real-world models. It examines requirements from the perspective of the classes and objects found in the vocabulary of the (37) domain. Traditional system design method emphasizes the proper and effective structure of a complex system. Object-oriented design method encompasses the process o

50、f object-oriented decomposition and a (38) for depicting both logical and physical as well as static and dynamic models of the system under design. Object-oriented programming is a method of implementation in which programs are organized as cooperative collections of objects, each of which represent

51、s an (39) of some class, and whose classes are all members of a hierarchy of classes united via (40) relationships.AmarkBpictureCsymbolDnotation 23.A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator a

52、nd a Web browser are that the browser knows how to deal with (26) , and that it has a mechanism for (27) graphical files. Display text, display graphics, and (28) hyperlinks-theres 99 percent of the (29) value. Thats not to say that the manufacturers didnt go all-out to attach a hyperactive efflores

53、cence of useless capabilities onto their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you cant wait to delete from your favorites of bookmarks menu Remember when client-side Java applets were supposed to become the preferred (30) for application devel

54、opment Remember frames and all their nasty side effectsAWeb browsersBterminalsCemulatorsDnetworks 24.SOCKS is a genetic proxy protocol for TCP/IP-based networking, applications. SOCKS includes two (21) , the SOCKS server and the SOCKS client. The SOCKS server is implemented at the application layer.

55、 The SOCKS client is implemented between applications and the (22) layer. When an application client needs to connect to an application server, the client connects to a SOCKS proxy server. The proxy server connects to the application server instead of the client, and (23) data between the client and

56、 the application server. For the application server, the proxy server is the (24) . SOCKS is also one of the popular (25) to network firewalls. Because of its simplicity and flexibility, SOCKS has been used as genetic application proxy in virtual private network (VPN), and for extranet applications.

57、AworkstationBuserCcustomerDclient 25.Most computer systems are (16) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (17) to an outsider attack by preventing. (18) from outside can still be vulnerable to the insider attacks accomplished by abusiv

58、e usage of (19) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (20) by tools referred to as Intrusion Detection Systems.ApowerBtightsCauthorizedDcommon 26.Soon,

59、 more of the information we receive via the Internet could come (6) in digital wrappers. Wrappers are made up (7) software code thats targeted to do specific things with the data (8) within them, such as helping to define queries for search engines. They also keep (9) from (10) access to that code.A

60、gainBgainedCgainsDgaining 27.A typical (11) language contains an applicative sub-language which approximates the mathematical abstractions of timeless functions applied to spaceless values, where the actual operation sequences and use of storage space during expression evaluation are organized behin

61、d the (12) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (13) results during expression evaluation stored at the discretion of the language implementation, and effecting par

62、ameter (14) and (15) operations through value copying.AassignmentBdesignCvalueDdispatch 28.Networks can be interconnected by different devices. In the physical layer, networks can be connected by (41) or hubs, which just move the bits from one network to an identical network. One layer up we find br

63、idges and switches, which operate at data link layer. They can accept (42) , examine the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (43) network la

展开阅读全文
温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!