2023年江西软件水平考试考试真题卷(8)

上传人:M****1 文档编号:445897941 上传时间:2024-01-22 格式:DOCX 页数:28 大小:18.60KB
返回 下载 相关 举报
2023年江西软件水平考试考试真题卷(8)_第1页
第1页 / 共28页
2023年江西软件水平考试考试真题卷(8)_第2页
第2页 / 共28页
2023年江西软件水平考试考试真题卷(8)_第3页
第3页 / 共28页
2023年江西软件水平考试考试真题卷(8)_第4页
第4页 / 共28页
2023年江西软件水平考试考试真题卷(8)_第5页
第5页 / 共28页
点击查看更多>>
资源描述

《2023年江西软件水平考试考试真题卷(8)》由会员分享,可在线阅读,更多相关《2023年江西软件水平考试考试真题卷(8)(28页珍藏版)》请在金锄头文库上搜索。

1、2023年江西软件水平考试考试真题卷(8)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.在软件开发中, (13) 不能用来描述项目开发的进度安排。在其他三种图中,可用 (14) 动态地反映项目开发进展情况。A甘特图BPEWT图CPERT/CPM图D鱼骨图2.常见的开发模型有瀑布模型、演化模型、螺旋模型、喷泉模型等。其中 (1) 适用于需求明确或很少变更的项目, (2) 模型主要用来描述面向对象的软件开发过程。A瀑布模型B演化模型C螺旋模型D喷泉模型3.一台PC通过调制解调器与另一台PC进行

2、数据通信,其中PC属于 (1) ,调制解调器属于 (2) 。调制解调器的数据传送方式为 (3) 。A频带传输B数字传输C基带传输DIP传输4.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon

3、running, such worms usually proceed to send themselves out to email addresses from the victim’s address book, previous emails, web pages (8) .As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent

4、 such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute

5、 animation, simultaneously runs commands in the background to steal your passwords and give the (10) access to your network.7()A.virtualB.virusC.wormsD.bacteria5.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks yo

6、u to open it. This is what happens with Melissa and several other similar email (7) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim’s address book, previous emails, web pages (8) .As administrators seek to block dangerous email attachments t

7、hrough the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate network

8、s by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (10) access to your network.8()A.memoryB.cachesC.portsD.registers6.Melissa and LoveLetter made use of the trust t

9、hat exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim’s address book, p

10、revious emails, web pages (8) .As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will

11、 still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (10) access to your n

12、etwork.9()A.namesB.cookiesC.softwareD.extensions7.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon running, such worms u

13、sually proceed to send themselves out to email addresses from the victim’s address book, previous emails, web pages (8) .As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Exe

14、cutable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultane

15、ously runs commands in the background to steal your passwords and give the (10) access to your network.10()A.crackerB.userC.customerD.client8.根据McCabe环路复杂性度量,如图8-4所示的程序图的复杂度是(3),对该程序进行路径覆盖测试,可得到的基本路径是(4)。(3)处填()。A2B3C4D59.斐波那契(Fibonacci)数列可以递归地定义为:用递归算法求解F(6)时需要执行(7)次+运算,该方法采用的算法策略是(8)。(7)处填()。A6B7C

16、12D1310.在一个单CPU的计算机系统中,有3台不同的外部设备R1、R2和R3,以及3个进程P1、P2和P3。系统CPU调度采用可剥夺式优先级的进程调度方案,3个进程的优先级、使用设备的先后顺序和占用设备时间如表8-2所示。假设操作系统的开销忽略不计,从3个进程同时投入运行到全部完成,CPU的利用率约为_(1)_%;R3的利用率约为(2)%。其中,设备的利用率是指该设备的使用时间与进程组全部完成所占用时间的比率。(1)处填()。A66.7B75C83.3D91.711.某软件公司欲开发一个图像浏览系统,要求该系统能够显示BMP、JPEG和GIF3种格式的文件,并且能够在Windows和Linux两

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 高等教育 > 习题/试题

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号