《2021福建软件水平考试考试考前冲刺卷(6).docx》由会员分享,可在线阅读,更多相关《2021福建软件水平考试考试考前冲刺卷(6).docx(53页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、2021福建软件水平考试考试考前冲刺卷(6)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.The approach we propose is a system-oriented methodology for knowledge acquisition, this orientation emphasizes ongoing documentation throughout each cycle and technique applied. Program-wide documentat
2、ion is suggested, both for the purpose of internal (91) and for later verification and (92) efforts. The documentation system we propose includes a central knowledge acquisition (93) which is (94) to reflect knowledge acquisition plans, session nodes, and domain expert participation. Specifically, (
3、95) within the database system include knowledge acquisition forms, which document plans for, and notes from, knowledge acquisition session, domain expert file, and rule content forms.AtemplatesBsamplesCexamplesDtemper 2.Across a wide variety of fields, data are being collected and accumulated at a
4、dramatic pace. There is an urgent need for a new generation of computational theories and tools to assist humans in (96) useful information (knowledge) from the rapidly growing (97) of digital data. These theories and tools are the subject of the emerging field of knowledge discovery in database (KD
5、D). At an abstract level, the KDD field is concerned with the development of methods and techniques for making (98) of data. The basic problem addressed by the KDD process is one of mapping low-level data(which are typically too voluminous to understand and digest easily) into other forms that might
6、 be more (99) (for example, a short report), more (100) (for example, a descriptive approximation or model of the process that generated the data), or more useful (for example, a predictive model for estimating the value of future cases). At the core of the process is the application of specific dat
7、a-mining methods for pattern discovery and extraction.AreasonBsenseCspecificationDsummary 3.Most IP layer-based proxy mechanisms, such as network address translation (NAT), only support uni-directional proxy, from the internal network to external network (the Internet). The proxy establishes the com
8、munication channel by (86) IP addresses. The IP addresses must be (87) . These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. IP layer-based proxy mechanisms need additional software (88) for eac
9、h application that uses (89) channels. SOCKS identifies communication targets through domain names, overcoming the restriction of using private IP addresses. SOCKS can use domain names to establish communication between separate LANs, with (90) IP addresses.AplentyBmanyCmultipleDmore 4.Prior to the
10、UML, there was no clear leading (111) language. Users had to choose from among many similar modeling languages with minor differences in overall (112) power. Most of the modeling languages shared a set of commonly accepted concepts that are expressed slightly differently in various languages. This l
11、ack of (113) discouraged new users from entering the OO market and from doing OO modeling, without greatly expanding the power of modeling. Users longed for the industry to adopt one, or a very few, broadly supported modeling languages suitable for (114) usage. Some vendors were discouraged from ent
12、ering the OO modeling area because of the need to support many similar, but slightly different, modeling languages. In particular, the supply of add-on tools has been depressed because small vendors cannot afford to support many different formats from many different (115) modeling tools. It is impor
13、tant to the entire O0 industry to encourage broadly based tools and vendors, as well as niche products that cater to the needs of specialized groups.AagreementBunderstandingCcharacteristicDdiversity 5.During the past years, intelligent technology has evolved (116) three generations. The first was ch
14、aracterized by tools such as prolog and OPS. prolog is a simple backward-chaining environment, and OPS is a simple forward-chaining environment. This led to the second generation of knowledge-engineering environments. Its goal was to model, prototype and construct (117) systems. All three generation
15、s were oriented toward generic (118) and represented generalized implementation environments for the construction of expert systems. knowledge bases and AI applications. Some of the solution-oriented products are also seamlessly integrated with generic knowledge-engineering environments, permitting
16、end users to add (119) rules and objects, as well as predefined knowledge-based logic to address problems in manufacturing simulation. Marketplace orientation is rapidly (120) toward solution-oriented intelligent product environments. the fourth generation represents a new line of thinking and devel
17、op-merit by commercial fu-ms. will reduce the cost risk and development time associated with problem solving.AcustomBknowledgeCthroughDproblem solving 6.Public Key Infrastructure (PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet,
18、Virtual Private Network (VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of transactions. eToken enables the users of PKI systems to generate and store (101) and digital certificates inside the token, crea
19、ting a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip (102) operations, ensuring that users keys axe never exposed to the PC environment, eToken eliminates the need to store (103) and keys on a hard disk or browser file, or to
20、transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications. A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee (104) of various transactions. The str
21、ength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken. The most secure use of authen
22、tication involves enclosing at least one certificate with every signed message. The message (105) verifies the certificate using the CAs public key. If the senders public key is legitimate, the recipient verifies the messages signature. Digital signatures created with a private key are verified with
23、 the digital certificate containing the public key.AconformanceBconferenceCnon-repudiationDsecrecy 7.You want to use the Web to let (76) users or your customers look (77) corporate information. But you want to keep installation at the user end (78) and you dont want just. (79) to get (80) your datab
24、ases. That may be where an application server enters the picture. For more user machine independent, these software packages, typically written in the (81) programming language for use on Windows (82) -based systems, act as go-betweens (83) browser-equipped end users to the databases that (84) the i
25、nformation they need to (85) .AlinkBlinkageClinkingDlinks 8.One study conducted by a psychologist (121) of interviewing workers before and after the installation of a robot. The robot was used to control a matching process of stamping and assembling metal parts. Prior to installation, much of the wo
26、rk done by skilled machinists. After installation, the robot did the work, but the workers controlled the robot through the robot through a control panel. The results of the study indicated that the workers praised the robot (122) eliminating the physical labor and fatigue (123) the manual operation
27、, but complained of more and continued stress. Prior to installation of the robot, there was time for talking or short periods of relaxation between jobs. Now, however, because of the speed of the robot, there was a need for constant scanning and monitoring of the operation (124) performed by the ro
28、bot has the installation of the robot created a better work environment Has the change from physical labor to mental stress resulted in an improved (125) of life Much additional research is necessary.AOfBconsistedCforDbeing 9.Developing reliable software on time and within (106) represents a difficu
29、lt endeavor for many organizations. Usually business solutions have three main aspects: people, (107) , and technology. The main reason for failing software projects has little to do with .technology and tools, and much to do with lack of process (108) . Experience has shown that introducing new tec
30、hnology and tools in an immature or undisciplined environment is likely to increase the chaos. CASE tools are not enough. A fool with a tool is still a fool! Structured method was the first wave of the software industry. This was the beginning of transforming software development from a (109) indust
31、ry to mass production. Software process movement if the second wave in the software industry. The process maturity movement prepares the way for the third wave of the software industry: software industrialization. Software development will become like an assembly and manufacturing process. A critica
32、l enabling factor is a disciplined software engineering process with predictable quality, (110) and functionality.AcollegeBfamilyCworkshopDcottage 10.Most IP layer-based proxy mechanisms, such as network address translation (NAT), only support uni-directional proxy, from the internal network to exte
33、rnal network (the Internet). The proxy establishes the communication channel by (86) IP addresses. The IP addresses must be (87) . These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. IP layer-ba
34、sed proxy mechanisms need additional software (88) for each application that uses (89) channels. SOCKS identifies communication targets through domain names, overcoming the restriction of using private IP addresses. SOCKS can use domain names to establish communication between separate LANs, with (9
35、0) IP addresses.AduplicatingBcrossingCoverlappingDrepeating 11.Prior to the UML, there was no clear leading (111) language. Users had to choose from among many similar modeling languages with minor differences in overall (112) power. Most of the modeling languages shared a set of commonly accepted c
36、oncepts that are expressed slightly differently in various languages. This lack of (113) discouraged new users from entering the OO market and from doing OO modeling, without greatly expanding the power of modeling. Users longed for the industry to adopt one, or a very few, broadly supported modelin
37、g languages suitable for (114) usage. Some vendors were discouraged from entering the OO modeling area because of the need to support many similar, but slightly different, modeling languages. In particular, the supply of add-on tools has been depressed because small vendors cannot afford to support
38、many different formats from many different (115) modeling tools. It is important to the entire O0 industry to encourage broadly based tools and vendors, as well as niche products that cater to the needs of specialized groups.AdistinctiveBspecial-purposeCseparateDgeneral-purpose 12.Public Key Infrast
39、ructure (PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network (VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation of
40、transactions. eToken enables the users of PKI systems to generate and store (101) and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip (102) operations, ensuring that users keys a
41、xe never exposed to the PC environment, eToken eliminates the need to store (103) and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications. A digital signature is created using the private key of an
42、individual to ensure the Validity of his request. This technology can be used to guarantee (104) of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of secu
43、rity, since it enables the use of the private key for signing and authenticating inside the eToken. The most secure use of authentication involves enclosing at least one certificate with every signed message. The message (105) verifies the certificate using the CAs public key. If the senders public
44、key is legitimate, the recipient verifies the messages signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.ArecipientBwriterCsenderDbrowser 13.Activity Based Costing (ABC) is an (126) technique that allows an organization to de
45、termine the actual (127) associated with each product and service produced by the organization without regard to the organizational structure. This chapter explains some of the uses and benefits of Activity Based Costing. We use IDEFO (128) modeling in conjunction with ABC to enable more effective b
46、usiness (129) design decisions. In order to achieve the major goals of business process improvement, process simplification and improvement, FAA managers need to fully understand the cost, time, and quality of activities performed by employees or machines throughout an entire organization. ABC metho
47、ds enable (130) to cost out measurements to business simplification and process improvement.AcomputingBcampaigningCprogrammingDaccounting 14.Across a wide variety of fields, data are being collected and accumulated at a dramatic pace. There is an urgent need for a new generation of computational the
48、ories and tools to assist humans in (96) useful information (knowledge) from the rapidly growing (97) of digital data. These theories and tools are the subject of the emerging field of knowledge discovery in database (KDD). At an abstract level, the KDD field is concerned with the development of methods and techniques for making (98) of data. The basic problem addressed by the KDD process is one of mapping low-level data(which are typically too voluminous t