2022上海软件水平考试考试考前冲刺卷(9).docx

上传人:w**** 文档编号:22370766 上传时间:2022-06-24 格式:DOCX 页数:33 大小:24.53KB
返回 下载 相关 举报
2022上海软件水平考试考试考前冲刺卷(9).docx_第1页
第1页 / 共33页
2022上海软件水平考试考试考前冲刺卷(9).docx_第2页
第2页 / 共33页
点击查看更多>>
资源描述

《2022上海软件水平考试考试考前冲刺卷(9).docx》由会员分享,可在线阅读,更多相关《2022上海软件水平考试考试考前冲刺卷(9).docx(33页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、2022上海软件水平考试考试考前冲刺卷(9)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.网络设备按其主要用途可以分为接入设备、网络互联设备和网络服务设备。下列设备中,属于网络服务设备的是 (21) 。网络设备按工作层次可以分为物理层、数据链路层和网络层设备。下列设备中,工作在物理层的是 (22) ,工作在网络层的是 (23) 。网桥工作在 (24) ,采用 (25) 设备可以将以太网和令牌环网连接起来。ATBBSRBCSRTDTBR 2.HTTP是WWW的核心,它是一个 (16) 协议,

2、当访问一个URL为 (17) 请求解析http:/www.csai.crdindex.htm的IP地址。获得解析的IP地址后,浏览器通过 (18) 端口与服务器建立 (19) 连接。随后浏览器发送“取文件”命令 (20) 。服务器响应并将文件index.htm发送给浏览器,最后释放连接。AGETBPOSTCREQUSTDSET 3.FTP是基于 (36) 实现的文件传输协议,使用此协议进行文件传输时,FTP客户和服务器之间建立的连接是 (37) ,用于传输文件的是 (38) 连接。TFTP是基于UDP实现的简单文件传输协议,它共有五种协议数据单元PDU,其中数据PDU一次可以携带的数据最多为

3、(39) 位,当传输的文件长度恰好是其整数倍时,则文件传输完毕后,还必须在最后发送一个 (40) 。A确认PDUB应答PDUC请求PDUD无数据的数据PDU 4.Internet协议第4版(IPv4)为整个Internet提供了基本的通信机制,但随着应用的发展,迫切需要对IPv4进行更新,新一代的IP协议已被正式命名为IPv6。在IPv6中,每个地址有 (1) 个八位组,为方便网络管理人员阅读、管理,采用 (2) 进制加冒号来表示。IPv6有三种基本地址类型,分别为单播(Unicast)地址、集群(Cluster)地址和组播(Multicast)地址。其中, (3) 是指目的站共享一个网络地址

4、的计算机的集合。IP数据包选择一条最短路径到达该组,传递给该组最近的一个成员。 与IPv4相比,IPv6作了较大的修改,使用了更多的地址空间,修改了IPv4的数据报格式。在一系列的修改中, (4) 是为了满足IP协议能够适应低层网络硬件的改变和各种新应用的需求而进行的:同时IPv6用固定格式的报头取代IPv4可变长度的选项字段,采用了扩展技术,这一技术的主要作用是 (5) 。通过这些改进,IPv6更加适应新一代Internet的发展。A格式清晰B减小了数据冗余C提高了传输效率D增大了传输的可靠性 5.传输层上的TCP协议是面向对象 (46) 的协议,TCP提供的是 (47) 数据传输。为了保证

5、数据传输的可靠性,TCP采用了三次握手机制,当向远程主机发出连接请求时,TCP首部的同步比特和确认比特应为 (48) 。TCP协议采用了 (49) 协议来提高数据传输效率。该协议的核心思想是 (50) 。A比特流B字节流C帧D数据段 6.在基于TCP/IP的互联网服务中,传输层的UDP协议提供进程之间 (6) 报文传输服务,TCP协议提供进程之间 (7) 报文传送服务。TCP使用三次握手协议建立连接、传输报文,使用修改的三次握手协议来关闭连接。关闭连接时,设甲乙两方发送报文的序号分别为X和Y,甲方发送 (8) 的报文给乙方,乙方先发送一个 (9) 确认报文给甲方,并通知应用指示后再发送一个 (

6、10) 的报文给甲方,最后甲方回送一个ACKY+1确认报文。AFIN=1,序号=YB序号=Y,ACKX+1CACKX+1DFIN=1,序号=Y,ACKX+1=1 7.基于TCP/IP的互联网服务中,IP协议提供主机之间的 (31) 分组传输服务。TCP协议提供端口之间的 (32) 报文传输服务 UDP属于 (33) 协议,从其下一层接收了数据以后,根据 (34) 将之分解成UDP数据报;应用层的 (35) 协议可以使用UDP或TCP协议传输数据。ASNMPBFTPCSMTPDSOCKET 8.IPv6的地址长度是 (26) ,它的基本首部长度固定为 (27) 。为了加快路由器处理数据报的速度,

7、IPv6首部取消了 (28) 字段,而通过数据链路层和运输层来完成差错检验功能。为了便于地址阅读,IPv6使用 (29) 记法。在IPv4向IPv6过渡的方案中,当IPv6数据报进入IPv4网络时,将IPv6数据报封装成为IPv4数据报进行传输的方案是 (30) 。A双协议站B多协议栈C协议路由器D隧道技术 9.TCP是一个面向连接的协议,它提供连接的功能是 (51) 的,采用 (52) 技术来实现可靠数据流的传送。为了提高效率,又引入了滑动窗口协议,协议规定重传 (53) 分组,这种分组的数量最多可为 (54) ,TCP协议采用滑动窗口协议解决了 (55) 。A全双工B单工C半双工D单方向

8、10.在缓解和解决IP地址耗尽问题的措施中, (56) 上可以把大的网络分成小的子网 (57) ,以实现本地地址和外部地址的转换。例如把子网掩码为255.255.0.0的网络61.31.0.0分为两个子网,假设第一个子网为61.31.0.0/17,则第二个子网为 (58) ;假设有1000台主机,如果分配一个网络号为202.31.64.0地址,则子网掩码为 (59) ;假设C类网络号为202.31.16.0202.31.31.0,则相应的子网掩码应为 (60) 。AVLSMBIPv6CCIDRDVPN 11.传输层上的TCP协议是面向对象 (46) 的协议,TCP提供的是 (47) 数据传输。

9、为了保证数据传输的可靠性,TCP采用了三次握手机制,当向远程主机发出连接请求时,TCP首部的同步比特和确认比特应为 (48) 。TCP协议采用了 (49) 协议来提高数据传输效率。该协议的核心思想是 (50) 。A可靠的、面向连接的B不可靠的、面向连接的C可靠的、无连接的D不可靠的、无连接的 12.TCP是一个面向连接的协议,它提供连接的功能是 (51) 的,采用 (52) 技术来实现可靠数据流的传送。为了提高效率,又引入了滑动窗口协议,协议规定重传 (53) 分组,这种分组的数量最多可为 (54) ,TCP协议采用滑动窗口协议解决了 (55) 。A超时重传B肯定确认(捎带一个分组的序号)C超

10、时重传和肯定确认(捎带一个分组的序号)D丢失重传和重复确认 13.在缓解和解决IP地址耗尽问题的措施中, (56) 上可以把大的网络分成小的子网 (57) ,以实现本地地址和外部地址的转换。例如把子网掩码为255.255.0.0的网络61.31.0.0分为两个子网,假设第一个子网为61.31.0.0/17,则第二个子网为 (58) ;假设有1000台主机,如果分配一个网络号为202.31.64.0地址,则子网掩码为 (59) ;假设C类网络号为202.31.16.0202.31.31.0,则相应的子网掩码应为 (60) 。ACIDRBVPNCNATDVLAN 14.传输层上的TCP协议是面向对

11、象 (46) 的协议,TCP提供的是 (47) 数据传输。为了保证数据传输的可靠性,TCP采用了三次握手机制,当向远程主机发出连接请求时,TCP首部的同步比特和确认比特应为 (48) 。TCP协议采用了 (49) 协议来提高数据传输效率。该协议的核心思想是 (50) 。ASYN=1,ACK=1BSYN=1,ACK=0CSYN=1,ACK无关DSYN=0,ACK=0 15.在缓解和解决IP地址耗尽问题的措施中, (56) 上可以把大的网络分成小的子网 (57) ,以实现本地地址和外部地址的转换。例如把子网掩码为255.255.0.0的网络61.31.0.0分为两个子网,假设第一个子网为61.31

12、.0.0/17,则第二个子网为 (58) ;假设有1000台主机,如果分配一个网络号为202.31.64.0地址,则子网掩码为 (59) ;假设C类网络号为202.31.16.0202.31.31.0,则相应的子网掩码应为 (60) 。A61.31.1.0/17B661.31.100.0/17C1.31.2.0/17D61.31.128.0/17 16.TCP是一个面向连接的协议,它提供连接的功能是 (51) 的,采用 (52) 技术来实现可靠数据流的传送。为了提高效率,又引入了滑动窗口协议,协议规定重传 (53) 分组,这种分组的数量最多可为 (54) ,TCP协议采用滑动窗口协议解决了 (

13、55) 。A未被确认及至窗口首端的所有B未被确认的C未被确认及至退回N值的所有D仅丢失的 17.传输层上的TCP协议是面向对象 (46) 的协议,TCP提供的是 (47) 数据传输。为了保证数据传输的可靠性,TCP采用了三次握手机制,当向远程主机发出连接请求时,TCP首部的同步比特和确认比特应为 (48) 。TCP协议采用了 (49) 协议来提高数据传输效率。该协议的核心思想是 (50) 。A等-停B超时传送C滑动窗口DGo-Back-N 18.TCP是一个面向连接的协议,它提供连接的功能是 (51) 的,采用 (52) 技术来实现可靠数据流的传送。为了提高效率,又引入了滑动窗口协议,协议规定

14、重传 (53) 分组,这种分组的数量最多可为 (54) ,TCP协议采用滑动窗口协议解决了 (55) 。A是任意的B1个C大于滑动窗口的大小D等于滑动窗口的大小 19.在缓解和解决IP地址耗尽问题的措施中, (56) 上可以把大的网络分成小的子网 (57) ,以实现本地地址和外部地址的转换。例如把子网掩码为255.255.0.0的网络61.31.0.0分为两个子网,假设第一个子网为61.31.0.0/17,则第二个子网为 (58) ;假设有1000台主机,如果分配一个网络号为202.31.64.0地址,则子网掩码为 (59) ;假设C类网络号为202.31.16.0202.31.31.0,则相

15、应的子网掩码应为 (60) 。A255.255.255.0B255.255.252.0C255.255.240.0D255.255.248.0 20.传输层上的TCP协议是面向对象 (46) 的协议,TCP提供的是 (47) 数据传输。为了保证数据传输的可靠性,TCP采用了三次握手机制,当向远程主机发出连接请求时,TCP首部的同步比特和确认比特应为 (48) 。TCP协议采用了 (49) 协议来提高数据传输效率。该协议的核心思想是 (50) 。A接收端控制发送端流量B接收端控制接收端流量C发送端控制接收端流量D发送端控制数据流量 21.在缓解和解决IP地址耗尽问题的措施中, (56) 上可以把

16、大的网络分成小的子网 (57) ,以实现本地地址和外部地址的转换。例如把子网掩码为255.255.0.0的网络61.31.0.0分为两个子网,假设第一个子网为61.31.0.0/17,则第二个子网为 (58) ;假设有1000台主机,如果分配一个网络号为202.31.64.0地址,则子网掩码为 (59) ;假设C类网络号为202.31.16.0202.31.31.0,则相应的子网掩码应为 (60) 。A255.255.255.0B255.255.248.0C255.255.250.0D255.255.240.0 22.TCP是一个面向连接的协议,它提供连接的功能是 (51) 的,采用 (52)

17、 技术来实现可靠数据流的传送。为了提高效率,又引入了滑动窗口协议,协议规定重传 (53) 分组,这种分组的数量最多可为 (54) ,TCP协议采用滑动窗口协议解决了 (55) 。A端到端的流量控制B整个网络的拥塞控制C端到端的流量控制和整个网络的拥塞控制D整个网络的差错控制 23.风险分析在软件项目开发中具有重要作用,包括风险识别、风险预测、风险评估和风险控制等。“建立风险条目检查表”是 (8) 时的活动,“描述风险的结果”是 (9) 时的活动。A风险识别B风险预测C风险评估D风险控制24.原型化(Prototyping)方法是一类动态定义需求的方法, (1) 不是原型化方法所具有的特征。与结

18、构化方法相比,原型化方法更需要 (2) 。衡量原型开发人员能力的重要标准是 (3) 。A提供严格定义的文档B加快需求的确定C简化项目管理D加强用户参与和决策25.The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (16) of the technical requirements for the software product.During the requirements definition phase, the requir

19、ements definition team uses an iterative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each _( 17) that it must meet. The starting point is usually a set of high level requirements from th

20、e (18) that describe the project or problem.In either case, the requirements definition team formulates an overall concept for the system and then defines (19) showing how the system will be operated publishes the system and operations concept document and conducts a system concept review (SCR).Foll

21、owing the SCR, the team derives (20) requirements for the system from the high level requirements and the system and operations concept. Using structured or object-oriented analysis, the team specifies the software functions and algorithms needed to satisfy each detailed requirement.16()A.functionB.

22、definitionC.specificationD.statement26.风险分析在软件项目开发中具有重要作用,包括风险识别、风险预测、风险评估和风险控制等。“建立风险条目检查表”是 (8) 时的活动,“描述风险的结果”是 (9) 时的活动。A风险识别B风险预测C风险评估D风险控制27.原型化(Prototyping)方法是一类动态定义需求的方法, (1) 不是原型化方法所具有的特征。与结构化方法相比,原型化方法更需要 (2) 。衡量原型开发人员能力的重要标准是 (3) 。A熟练的开发人员B完整的生命周期C较长的开发时间D明确的需求定义28.The purpose of the requi

23、rements definition phase is to produce a clear, complete, consistent, and testable (16) of the technical requirements for the software product.During the requirements definition phase, the requirements definition team uses an iterative process to expand a broad statement of the system requirements i

24、nto a complete and detailed specification of each function that the software must perform and each _( 17) that it must meet. The starting point is usually a set of high level requirements from the (18) that describe the project or problem.In either case, the requirements definition team formulates a

25、n overall concept for the system and then defines (19) showing how the system will be operated publishes the system and operations concept document and conducts a system concept review (SCR).Following the SCR, the team derives (20) requirements for the system from the high level requirements and the

26、 system and operations concept. Using structured or object-oriented analysis, the team specifies the software functions and algorithms needed to satisfy each detailed requirement.17()A.criterionB.standardC.modelD.system29.原型化(Prototyping)方法是一类动态定义需求的方法, (1) 不是原型化方法所具有的特征。与结构化方法相比,原型化方法更需要 (2) 。衡量原型开

27、发人员能力的重要标准是 (3) 。A丰富的编程技巧B灵活使用开发工具C很强的协调组织能力D快速获取需求30.The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (16) of the technical requirements for the software product.During the requirements definition phase, the requirements definition team uses

28、 an iterative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each _( 17) that it must meet. The starting point is usually a set of high level requirements from the (18) that describe the pr

29、oject or problem.In either case, the requirements definition team formulates an overall concept for the system and then defines (19) showing how the system will be operated publishes the system and operations concept document and conducts a system concept review (SCR).Following the SCR, the team der

30、ives (20) requirements for the system from the high level requirements and the system and operations concept. Using structured or object-oriented analysis, the team specifies the software functions and algorithms needed to satisfy each detailed requirement.18()A.producerB.customerC.programmerD.analy

31、ser31.The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (16) of the technical requirements for the software product.During the requirements definition phase, the requirements definition team uses an iterative process to expand a broad statemen

32、t of the system requirements into a complete and detailed specification of each function that the software must perform and each _( 17) that it must meet. The starting point is usually a set of high level requirements from the (18) that describe the project or problem.In either case, the requirement

33、s definition team formulates an overall concept for the system and then defines (19) showing how the system will be operated publishes the system and operations concept document and conducts a system concept review (SCR).Following the SCR, the team derives (20) requirements for the system from the h

34、igh level requirements and the system and operations concept. Using structured or object-oriented analysis, the team specifies the software functions and algorithms needed to satisfy each detailed requirement.19()A.rulesB.principlesC.scenariosD.scenes32.The purpose of the requirements definition pha

35、se is to produce a clear, complete, consistent, and testable (16) of the technical requirements for the software product.During the requirements definition phase, the requirements definition team uses an iterative process to expand a broad statement of the system requirements into a complete and det

36、ailed specification of each function that the software must perform and each _( 17) that it must meet. The starting point is usually a set of high level requirements from the (18) that describe the project or problem.In either case, the requirements definition team formulates an overall concept for

37、the system and then defines (19) showing how the system will be operated publishes the system and operations concept document and conducts a system concept review (SCR).Following the SCR, the team derives (20) requirements for the system from the high level requirements and the system and operations

38、 concept. Using structured or object-oriented analysis, the team specifies the software functions and algorithms needed to satisfy each detailed requirement.20()A.detailedB.outlinedC.totalD.complete33.With hundreds of millions of electronic transactions taking place daily, businesses and organizatio

39、ns have a strong incentive to protect the (66) of the data exchanged in this manner, and to positively ensure the identities of those involved in the (67) . This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security (68) de

40、eply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security. (69) that can be incorporated in the hardware design of client computers. The princ

41、iple of encapsulating core security capabilities in (70) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.AoperationBcompletenessCintegrityDinterchange 34.在内部排序中,通常要对被排序数据序列进行多趟

42、扫描。各种排序方法有其不同的排序实施过程和(时间)复杂性。对给定的整数序列(541,132,984,746,518,181,946,314,205,827)进行从小到大的排序时,采用冒泡排序的第一趟扫描结果是 (61) 。设被排序数据序列有n个元素,冒泡排序算法的复杂性是 (62) 。A(541,132,827,746,518,181,946,314,205,984)B(205,132,314,181,518,746,946,984,541,827)C(541,132,984,746,827,181,946,314,205,518)D(132,541,746,518,181,946,314,2

43、05,827,984) 35.在内部排序中,通常要对被排序数据序列进行多趟扫描。各种排序方法有其不同的排序实施过程和(时间)复杂性。对给定的整数序列(541,132,984,746,518,181,946,314,205,827)进行从小到大的排序时,采用冒泡排序的第一趟扫描结果是 (61) 。设被排序数据序列有n个元素,冒泡排序算法的复杂性是 (62) 。AO(nlog2n)BO(n2)CO(log2n)2DO(n2log2n) 36.A typical application of this (71) is ADSL. It is emerging as the technology fo

44、r home-and small-office Internet connectivity. It provides either 1.5 Mb/s8 Mb/s from the network to the user and 64 kb/s512 kb/s in the reverse direction depending on the distance, 12000 or 18000 feet. The different speed for each direction gives it the (72) label. ADSL is designed to take advantag

45、e of the fact that video-on demand, telecommuting, and Internet access traffic are inherently asymmetrical. The user (73) a brief message up to the network and receives a ton of data coming back, either a movie or a piece of data download. Under such a scenario, low-speed traffic to the network is j

46、ust fine. ADSL .delivers high (74) where you need it and only uses a single copper pair. Through multiplexing, it also reserves (75) of the bandwidth for POTS.AFTTHBHFCCFTTCDHDSL 37.某计算机系统中,16位浮点数的表示格式如图6-1所示。其中阶码4位(含1位符号)为定点整数,尾数12位(含1位符号)为定点小数,设一个数机器码为1110001010000000。 若阶码为移码且尾数为原码,则其十进制数真值为 (2) ;若阶码为补码且尾数为补码,则其十进制数真值规格化后的机器码为 (3) 。 38.With hundreds of millions of electronic transactions taking place daily, businesses and organizations have a strong incentive to protect the (66) of the

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 考试试题 > 会计资格

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁