2023年浙江软件水平考试考试模拟卷(7)

上传人:人*** 文档编号:486223409 上传时间:2022-07-31 格式:DOCX 页数:31 大小:19.95KB
返回 下载 相关 举报
2023年浙江软件水平考试考试模拟卷(7)_第1页
第1页 / 共31页
2023年浙江软件水平考试考试模拟卷(7)_第2页
第2页 / 共31页
2023年浙江软件水平考试考试模拟卷(7)_第3页
第3页 / 共31页
2023年浙江软件水平考试考试模拟卷(7)_第4页
第4页 / 共31页
2023年浙江软件水平考试考试模拟卷(7)_第5页
第5页 / 共31页
点击查看更多>>
资源描述

《2023年浙江软件水平考试考试模拟卷(7)》由会员分享,可在线阅读,更多相关《2023年浙江软件水平考试考试模拟卷(7)(31页珍藏版)》请在金锄头文库上搜索。

1、2023年浙江软件水平考试考试模拟卷(7)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.Even though current technologies make the ultimate segmented network impractical, new technologies and products hold the promise of making the concept a reality. Most important of all these new technolog

2、ies are () . The ultimate switched LAN, which is technically possible, now, exhibits the following characteristics:1. High-speed yet cost-effective switching devices can be implemented on a wide scale, providing dedicated connections for individual users and supporting the aggregate () of all networ

3、ked users.2. The ability to deploy switching capabilities incrementally into the () base. Switching implementations support switching of individual users or groups so that existing users of shared media modules can continue to use the existing equipment until they can justify moving to dedicate swit

4、ched LAN connections.3. Support and enhancement of existing routed environments. Switching () routint, but rather can be introduced into the network without making any changes to the existing routing equipment or configuration. () play a critical role in the integration of switching into existing ne

5、tworks.providing dedicated connections for individual users and supporting the aggregate () of all networked users.A.specific requirementsB.bandwidth requirementsC.permanent requirementsD.security requirements2.Windows NT或Windows 2000是当前流行的一类操作系统,()是WindowsNT真正的中心,它提供了一组操作系统原语和机制。Windows NT采用线程机制来提高

6、系统的()。NT采用基于()的方案选定线程执行的次序。NT采用基于()的方案选定线程执行的次序。A先来先服务B时间片轮转C随机选择D优先级3.设有员工实体Employee(employeeID,name,sex,age,tel,department),其中employeeID为员工号,name为员工姓名,sex为员工性别,age为员工年龄,tel为员工电话(要求记录该员工的手机号码和办公室电话),departID为员工所在部门号(要求参照另一部门实体Deparxment的主码depmtID)。Employee实体中存在的派生属性及其原因是();Employee实体中还存在多值属性,该属性及其该

7、属性的处理为();对属性depaitmentID的约束是()。对属性depaitmentID的约束是()。APrimary Key NOTNULLBPIimary,KeyCForeign KeyDCandidate Key4.System analysis is traditionally done top-down using structured analysis based on () Object-oriented analysis focuses on creation of modelsThe three types of the analysis model are () The

8、re are two substages of object-oriented analysis () focuses on real-world things whose semantics the application capturesThe object constructed in the requirement analysis shows the () of the real-world system and organizes it into workable pieces () addresses the computer aspects ofthe application

9、that are visible to usersThe objects are those which can be expected to vary from time to time quite rapidlySystem analysis is traditionally done top-down using structured analysis based on ()Afunctional decompositionBobject abstractionCdata inheritanceDinformation generalization5.The ARPANET () ( t

10、he rules of syntax that enable computers to communicate on a network) were originally designed for openness and flexibility, not for () The ARPA researchers needed to share information easily, so everyone needed to be an unrestricted insider on the network. Although the approach was appropriate at t

11、he time, it is not one that lends itself to today’s commercial and government use.As more locations with computers (known as () in Internet parlance)joined the ARPANET, the usefulness of the network grew. The ARPANET consisted primarily of university and government computers, and the applicati

12、ons supported on this network were simple: electronic mail ( E - mail), electronic news groups, and () connection to other computers. By 1971, the Internet linked about two dozen research and government sites, and researchers had begun to use it to exchange () not directly related to the ARPANET its

13、elf. The network was becoming an important tool for collaborative research.not for () The ARPA researchers needed to share information easily.A.safetyB.guardC.attachmentD.security6.Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting use

14、rs to () fraudulent Web sites without their knowledge or consent. Pharming has been called phishing without a lure.In phishing, the perpetrator sends out legitimate- () looking e-malls, appearing to come from some of the Web’s most popular sites, in an effort to obtain personal and financial i

15、nformation from individual recipients. But in pharming, larger numbers of computer users can be () victimized because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form of pharming attack, code sent in an e-mail modifies lo

16、cal host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected () bookmark entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 高等教育 > 习题/试题

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号