《2021河北软件水平考试考试考前冲刺卷.docx》由会员分享,可在线阅读,更多相关《2021河北软件水平考试考试考前冲刺卷.docx(25页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、2021河北软件水平考试考试考前冲刺卷本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.静态图像压缩标准JPEG2000中使用的是()算法。AK-L变换B离散正弦变换C离散余弦变换D离散小波变换2.一个局域网中某台主机的IP 地址为176.68.160.12,使用22 位作为网络地址,那么该局域网的子网掩码为_(61)_,最多可以连接的主机数为_(62)_。(61)处填()。A255.255.255.0B255.255.248.0C255.255.252.0D255.255.0.03.一个局域
2、网中某台主机的IP 地址为176.68.160.12,使用22 位作为网络地址,那么该局域网的子网掩码为_(61)_,最多可以连接的主机数为_(62)_。(62)处填()。A254B512C1022D10244.以下选项中,可以用于Internet信息服务器远程管理的是()。ATelnetBRASCFTPDSMTP5.在TCP/IP网络中,为各种公共服务保留的端口号范围是()。A1255B11023C11024D14655356.在以下网络应用中,要求带宽最高的应用是()。A可视电话B数字电视C拨号上网D收发邮件7.DOM is a platform-and language-_(66)_AP
3、I that allows programs and scriptsto dynamically access and update the content, structure and style of WWW documents(currently,definitions for HTML and XML documents are part of the specification).Thedocument can be further processed and the results of that processing can beincoporporated back into
4、the presented _(67)_.DOM is a _(68)_-based API todocuments ,which requires the whole document to be represented in _(69)_whileprocessing it .A simpler alternative to DOM is the event –based SAX,which can beused to process very large _(70)_documents that do not fit info the memoryavailable for
5、processing.(66)处填()。AspecificBneutralCcontainedDrelated8.DOM is a platform-and language-_(66)_API that allows programs and scriptsto dynamically access and update the content, structure and style of WWW documents(currently,definitions for HTML and XML documents are part of the specification).Thedocu
6、ment can be further processed and the results of that processing can beincoporporated back into the presented _(67)_.DOM is a _(68)_-based API todocuments ,which requires the whole document to be represented in _(69)_whileprocessing it .A simpler alternative to DOM is the event –based SAX,whic
7、h can beused to process very large _(70)_documents that do not fit info the memoryavailable for processing.(67)处填()。AtextBimageCpageDgraphic9.DOM is a platform-and language-_(66)_API that allows programs and scriptsto dynamically access and update the content, structure and style of WWW documents(cu
8、rrently,definitions for HTML and XML documents are part of the specification).Thedocument can be further processed and the results of that processing can beincoporporated back into the presented _(67)_.DOM is a _(68)_-based API todocuments ,which requires the whole document to be represented in _(69
9、)_whileprocessing it .A simpler alternative to DOM is the event –based SAX,which can beused to process very large _(70)_documents that do not fit info the memoryavailable for processing.(68)处填()。AtableBtreeCcontrolDevent10.DOM is a platform-and language-_(66)_API that allows programs and scrip
10、tsto dynamically access and update the content, structure and style of WWW documents(currently,definitions for HTML and XML documents are part of the specification).Thedocument can be further processed and the results of that processing can beincoporporated back into the presented _(67)_.DOM is a _(
11、68)_-based API todocuments ,which requires the whole document to be represented in _(69)_whileprocessing it .A simpler alternative to DOM is the event –based SAX,which can beused to process very large _(70)_documents that do not fit info the memoryavailable for processing.(69)处填()。AdocumentBpr
12、ocessorCdiscDmemory11.DOM is a platform-and language-_(66)_API that allows programs and scriptsto dynamically access and update the content, structure and style of WWW documents(currently,definitions for HTML and XML documents are part of the specification).Thedocument can be further processed and t
13、he results of that processing can beincoporporated back into the presented _(67)_.DOM is a _(68)_-based API todocuments ,which requires the whole document to be represented in _(69)_whileprocessing it .A simpler alternative to DOM is the event –based SAX,which can beused to process very large
14、_(70)_documents that do not fit info the memoryavailable for processing.(70)处填()。AXMLBHTMLCscriptDWeb12.Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine receiving an _(71)_from a friend who asks you to open it.This is what happens with Melissa and sever
15、al other similar email _(72)_.Uponrunning ,such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages_(73)_.As administrators seek to block dangerous email attachments through the recognition of well-known _(74)_,virus writers
16、use other extensions to circumvent such protection.Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,
17、which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the _(75)_access to your network.(71)处填()。AattachmentBpacketCdatagramDmessage13.Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine
18、 receiving an _(71)_from a friend who asks you to open it.This is what happens with Melissa and several other similar email _(72)_.Uponrunning ,such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages_(73)_.As administrators
19、seek to block dangerous email attachments through the recognition of well-known _(74)_,virus writers use other extensions to circumvent such protection.Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.F
20、requently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the _(75)_access to your network.(72)处填()。AvirtualBvirusCwormsDbacteria14.
21、Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine receiving an _(71)_from a friend who asks you to open it.This is what happens with Melissa and several other similar email _(72)_.Uponrunning ,such worms usually proceed to send themselves out to email ad
22、dresses from the victim's address book, previous emails, web pages_(73)_.As administrators seek to block dangerous email attachments through the recognition of well-known _(74)_,virus writers use other extensions to circumvent such protection.Executable (.exe) files are renamed to .bat and .cmd
23、plus a whole list of other extensions and will still run and successfully infect target users.Frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal you
24、r passwords and give the _(75)_access to your network.(73)处填()。AmemoryBcachesCportsDregisters15.Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine receiving an _(71)_from a friend who asks you to open it.This is what happens with Melissa and several other
25、 similar email _(72)_.Uponrunning ,such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages_(73)_.As administrators seek to block dangerous email attachments through the recognition of well-known _(74)_,virus writers use othe
26、r extensions to circumvent such protection.Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, w
27、hile displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the _(75)_access to your network.(74)处填()。AnamesBcookiesCsoftwareDextensions16.Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine receivin
28、g an _(71)_from a friend who asks you to open it.This is what happens with Melissa and several other similar email _(72)_.Uponrunning ,such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages_(73)_.As administrators seek to b
29、lock dangerous email attachments through the recognition of well-known _(74)_,virus writers use other extensions to circumvent such protection.Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently
30、 ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the _(75)_access to your network.(75)处填()。AcrackerBuserCcustomerDclient17.以下关于质量计划编
31、制的描述中,正确的是 (37) 。A在项目的执行阶段,不再考虑质量计划的编制B在整个项目的生命周期内,应当定期进行质量计划的编制工作C仅在编制项目计划时,进行质量计划的编制D编制质量计划是编制范围说明书的前提 18.根据中华人民共和国合同法的相关规定,合同标的不包括 (6) 。A货物B劳务C下程项目D价格 19.项目质量控制非常重要,但是进行质量控制也需要一定的成本。 (24) 可以降低质量控制的成本。A使用抽样统计B进行质量审计C对全程进行监督D进行过程分析 20.使用成本效益分析法对项目进行分析时,需要遵循除 (50) 之外的原则。A费用效益比原则B最有效原则C费用效益比值固定原则D最经济
32、原则 21.软件设计阶段的度量考虑了架构层次、构件层次和界面设计层次的问题,其中构件层次的设计度量集中于软件构件的内部特性, (31) 不属于构件层次设计度量。A模块内聚B模块耦合C布局恰当性D复杂度 22.在UML的通用机制中, (29) 用于说明类或构件的某种服务的操作集合,并定义了该服务的实现。A包B类C接口D构件 23.根据统计显示,80%的网络攻击源与内部网络,因此,必须加强对内部网络的安全控制和防范。下面的措施中,无助于提高同一局域网内安个性的措施是 (4) 。A使用防病毒软件B使用日忐审计系统C使用入侵检测系统D使用日防火墙防止内部攻击 24.软件风险是指在软件开发过程中面临的一
33、些不确定性和可能造成的损失。软件风险大致可以分为3类:项目风险、技术风险和商业风险。下列叙述中, (51) 属于商业风险。A软件的开发时间可能会超出预期时间B采用的开发技术过于先进,技术本身尚不稳定C软件开发过程中需求一直未能稳定下来D软件开发过程没有得到预算或人员上的保证 25.合同预期成本800万元,固定酬金10万元,酬金增减15万元,如果项目实际发生成本为820万元,按成本加浮动酬金计算,合同总价为 (54) 。A810万元B815万元C820万元D825万元 26.某公司采用的软件开发过程通过了CMM3认证,表明该公司 (19) 。A所有项目都采用根据实际情况修改后得到的标准软件过程来
34、发展和维护软件B对软件过程和产品质量建立了定量的质量目标C建立了基本的项目级管理制度和规程,可对项目的成本、进度进行跟踪和控制D可集中精力采用新技术、新方法,优化软件过程 27.GB/T19000-2000(idt ISO9000-2000)表示 (15) 国际标准。A参考采用B非等效采用C等效采用D等同采用 28.监理工程师对承建单位提交的总体技术方案进行质量审核应侧重于 (32) 。A技术、经济、环境等方面的分析和比较B各专业技术方案的实现是否符合国家或国际标准C承建单位的包括人员、成本和知识等资源投入能否保证实施任务完成D用户要求的使用功能和合同规定的质量要求是否得到满足 29.通常,变
35、更控制系统将对 (22) 执行自动批准。A客户提出的建议B突发事件的结果C项目发起人提出的建议D由新规则决定的命令 30.以下关于成本基准计划的描述,不正确的是 (38) 。A成本基准计划是项目管理计划的一个组成部分B成本基准计划是成本估算阶段的产物C对于大型及复杂项目,可以有多个成本基准,以便度量项目成本绩效的各个方面D开支计划、现金流预测是度量支出的成本基准之一 31.某商标注册人委托某印刷厂印制商标标识30万套,而印刷厂印制了36万套,该印刷厂多印制6万套商标标识的做法属 (13) 行为。A侵犯注册商标专用权B不侵犯注册商标专用权C合法扩大业务范围D伪造他人注册商标标识 32.在每次团队
36、会议上,项目经理都要求团队成员介绍其正在做的工作,然后给团队成员分配新任务。由于要分配很多不同的任务,使得这样的会议变得很长。不是导致这种情况发生的原因的是 (41) 。A缺少团队成员对项目计划编制的参与B缺少资源平衡C缺少责任矩阵DWBS制订得不完整 33.某商场推出分期付款方式购买家用电器活动。若某台空调的产品价格为1150元,购买时先支付了150元,以后每月都交付50元,并加付欠款利息,月利率为1%。购买后的第1个月为开始计算分期付款的第 1个月,则分期购买这台空调实际花费了 (63) 元。A1250B1255C1260D1265 34.需求分析活动建造了软件的数据领域、功能领域和行为领
37、域模型。模型的核心是数据字典,围绕着这个核心有3种不同的图,其中, (27) 描述数据对象间的关系,用于进行数据建模。A实体关系图B数据流图C状态变迁图D程序流图 35.利用ARP的协议漏洞,通过伪造IP地址和MAC地址发送大量虚假ARP报文,导致网络用户上网不稳定,甚至网络短时瘫痪。这种攻击行为属于 (2) 。A拒绝服务攻击B非服务攻击C漏洞入侵D缓冲区溢出漏洞攻击 36.有效的项目风险管理首先要求 (43) 。A所有项目风险已被确认B建立和贯彻项目风险管理方针C指派项目经理对确认的风险过程进行管理D为项目决策提供明晰的信息 37. (58) 是进度控制的一个重要内容。A决定是否对进度的偏差
38、采取纠正措施B定义为产生项目可交付成果所需的活动C评估范围定义是否足以支持进度计划D确保项目团队士气高昂,使团队成员能发挥他们的潜力 38.在某园区网网络工程项目监理过程中,监理方在7:程设计阶段对网络设计方案进行评审,监理工作过程中不包括 (18) 。A对方案设计内容进行知识产权保护监督B对工作周期与工作进度进行可行性确认C协助业主进行设计文件的评审D审核方案中主要设备、材料清单;参与主要设备、材料的选型工作 39.以下关厂体系结构风格和体系结构模式的描述中,错误的是 (36) 。A与体系结构模式一样,体系结构风格也对体系结构设计施加一种变换B相对于体系结构风格,模式涉及的范围要大一些,它更
39、关注体系结构的整体C体系结构模式在体系结构上施加规则,描述了软件是如何在基础设施层次上处理某些功能性方面的问题D体系结构模式倾向于在系统结构的环境中处理特定的行为问题 40.采购计划编制完成时, (55) 也应编制完成。A合同B工作说明书C招标文件D评标标准 41.信息安全策略的设计与实施步骤是 (5) 。A定义活动目录角色、确定组策略管理安全性、身份验证、访问控制和管理委派B确定标准性、规范性、可控性、整体性、最小影响、保密性原则,确定公钥基本结构C确定安全需求、制订可实现的安全日标、制订安全规划、制订系统的日常维护计划D确定安全需求、确定安全需求的范围、制订安全规划、制订系统的日常维护计划
40、 42.沟通效果较好、比较严肃、约束力强、易于保密的沟通方式是 (53) 。A双向沟通B正式沟通C上行沟通D平行交叉沟通 43.在进行项目风险定量分析时,可能会涉及到 (52) 。A风险数据质量评估B建立概率及影响矩阵C风险紧急度评估D风险信息访谈 44.在某项目中,项目经理采用德尔菲技术和鱼骨图对风险进行分析。其中,德尔菲法区别于其他专家预测法的明显特点是 (25) 。A至少经过4轮预测B引入了权重参数C专家之间互相取长补短D多次有控制的反馈 45.若项目变更导致己批准的成本基准计划也发生了变更,则下一步应该 (42) 。A估算范围变更的大小B以文件形式记录教训C实施批准的范围计划D进行预算
41、更新 46.某个负责PH高新企业园区网络工程建设的项目经理,正在估算该项目的成本,但尚未掌握项目的全部细节。项目经理应该首先采用的成本估算方法是 (59) 。A资源单价法B自下而上估算法C蒙特卡罗分析D类比估算法 47.某大型软件公司早期开发的字处理应用软件已被广泛使用。该公司为了获得更多的收益,已对外公布近期将有创新性的软件版本上市。面对这紧迫的开发期限,适合选择 (26) 过程开发模型。A瀑布B快速原型C增量D螺旋 48.人力资源风险、进度计划风险、费用风险和质量风险是管理项目时可能出现的4种风险。从客户的角度来看,如果没有管理好 (35) ,将会造成最长久的影响。A人力资源风险B质量风险C费用风险D进度计划风险 49.保护计算机网络设备免受环境事故的影响属于信息安全的 (3) 。A人员安全B物理安全C数据安全D操作安今 50.以下内容中, (30) 应写入操作手册。A说明系统升级时厂商提供的服务B描述系统对各种输入数据的处理方法C说明系统各部分之间的接口关系D描述系统处理过程的各个界面第25页 共25页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页