2023年上海软件水平考试考试考前冲刺卷(3).docx

上传人:l**** 文档编号:75629158 上传时间:2023-03-03 格式:DOCX 页数:43 大小:23.47KB
返回 下载 相关 举报
2023年上海软件水平考试考试考前冲刺卷(3).docx_第1页
第1页 / 共43页
2023年上海软件水平考试考试考前冲刺卷(3).docx_第2页
第2页 / 共43页
点击查看更多>>
资源描述

《2023年上海软件水平考试考试考前冲刺卷(3).docx》由会员分享,可在线阅读,更多相关《2023年上海软件水平考试考试考前冲刺卷(3).docx(43页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、2023年上海软件水平考试考试考前冲刺卷(3)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.XML是互联网联合组织创建的一组规范,XML是开放的,是_标准。XML主要有_等三个要素,为了增强XML文件结构化要求,一般要使用XML的辅助技术_。ACORBABTHMLCSGMLDDTD 2.在软件项目估算时,将代码行LOC和功能点FP数据在两个方面使用:一是作为一个估算变量,度量软件每一个_的大小;一是联合使用从过去的项目中收集到的_和其它估算变量,进行成本和_估算。A时间B数据C分量D工作量

2、 3.计算机性能评测分为评估和测试两种方法,其中评估是基于一些原始数据进行推算。_用于评价同一厂商生产的同一计算机系统的定点运算速度比较正确;_可用于比较和评价在同一系统上求解同一问题的不同算法的性能;_是美国用来限制计算机出口的系统性能指标估算方法。AMFLOPSBPDRCMIPSDCTP 4.在软件的开发过程中常用图作为描述工具。如DFD就是面向_分析方法的描述工具。在一套分层DFD中,如果某一张图中有N个加工(Process),则这张图允许有_张子图。在一张DFD图中,任意两个加工之间_。在画分层DFD时,应注意保持_之间的平衡。DFD中从系统的输入流到系统的输出流的一连串连续变换形成一

3、种信息流,这种信息流可分为_。A父图与其子图B同一父图的所有子图C不同父图的所有子图D同一予图的所有直接父图 5.在软件的开发过程中常用图作为描述工具。如DFD就是面向_分析方法的描述工具。在一套分层DFD中,如果某一张图中有N个加工(Process),则这张图允许有_张子图。在一张DFD图中,任意两个加工之间_。在画分层DFD时,应注意保持_之间的平衡。DFD中从系统的输入流到系统的输出流的一连串连续变换形成一种信息流,这种信息流可分为_。A控制流和变换流B变换流和事务流C事务流和事件流D事件流和控制流 6.DOM is a platform- and language- (66) API

4、that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back int

5、o the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for pro

6、cessing.AspecificBneutralCcontainedDrelated 7.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document

7、can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be use

8、d to process very large (70) documents that do not fit into the memory available for processing.AtextBImageCPageDgraphic 8.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definit

9、ions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while process

10、ing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for processing.AtableBtreeCcontrolDevent 9.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access an

11、d update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to docume

12、nts, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for processing.AdocumentBprocessorCdiscDmemory 10.TCP/IP (71) la

13、yer protocols provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need like the ability to transfer a file in the case of HTTE In short, the application layer provides an (74) betwe

14、en software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options the Transmission Control Protocol (TCP) and the User Datagram Protoco

15、l (UDP).AapplicationBtransportClinkDnetwork 11.Virtual reality (or VR (1) ) is kind of a buzzword these days in computer graphics.VR is artificial reality created by a computer that is so enveloping that it is perceived by the mind as being truly real.VR exists in many (2) .A traditional view of vir

16、tual reality uses headsets and data gloves.The headset serves as the eyes and ears to your virtual world,projecting sights and sounds generated by the computer.The data glove becomes your hand,enabling you to interact with this (3) world.As you move your head around,the computer will track your moti

17、on and display the right image.VR is the most demanding (4) for computer graphics,requiring hardware and software capable of supporting realtime 3D (5) .Afor certainBfor any sakeCfor allDfor short 12.Originally introduced by Netscape Communications, (66) are a general mechanism which HTTP Server sid

18、e applications, such as CGI (67) , can use to both store and retrieve information on the HTTP (68) side of the connection. Basically, Cookies can be used to compensate for the (69) nature of HTTE The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-ba

19、sed (70) .ABrowsersBCookiesCConnectionsDScripts 13.WebSQL is a SQL-like (71) language for extracting information from the web. Its capabilities for performing navigation of web (72) make it a useful tool for automating several web-related tasks that require the systematic processing of either all th

20、e links in a (73) , all the pages that can be reached from a given URL through (74) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (75) Interface.AqueryBtransactionCcommunicationDprogramming 14.Melissa and L

21、oveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (71) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (72) . Upon running, such worms usually proceed to send themselves out to email addresses from

22、 the victims address book, previous emails, web pages (73) . As administrators seek to block dangerous email attachments through the recognition of well-known (74) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole li

23、st of other extensions and will still run and successfully infect target users. Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords an

24、d give the (75) access to your network.AattachmentBpacketCdatagramDmessage 15.It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question. (71) is a means to capture ideas, relationships, decisions, and requirements in a well-define

25、d notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more (72) . A diagram graphically represents th

26、ings, and the relationships between these things. These (73) can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular inte

27、rest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (74) are u sed to capture the physical organization of the things in your system, i.e., how one object relates to another. (75) focus on the behavior of elements in a

28、 system. For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements.AProgrammingBAnalyzingCDesigningDModeling 16.The use of computer graphics (1) many diverse fields. Applications (2) from the production of charts and graphs, to the gene

29、ration of realistic images for television and motion pictures to the (3) design of mechanical parts.To encompass all these uses, we can adopt a simple definition:Computer graphics is concerned with all (4) of using a computer to generate images.We can classify applications of computer graphics into

30、four main areas:Display of information, Design, (5) ,User interfaces.ApervadesBpervasiveCperverseDpervert 17.WebSQL is a SQL-like (71) language for extracting information from the web. Its capabilities for performing navigation of web (72) make it a useful tool for automating several web-related tas

31、ks that require the systematic processing of either all the links in a (73) , all the pages that can be reached from a given URL through (74) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (75) Interface.Abr

32、owsersBserversChypertextsDclients 18.Originally introduced by Netscape Communications, (66) are a general mechanism which HTTP Server side applications, such as CGI (67) , can use to both store and retrieve information on the HTTP (68) side of the connection. Basically, Cookies can be used to compen

33、sate for the (69) nature of HTTE The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (70) .AgraphicsBprocessesCscriptsDtexts 19.Observe that for the programmer, as for the chef, the urgency of the patron (顾客) may govern the scheduled completion

34、 of the task, but it cannot govern the actual completion. An omelette (煎鸡蛋) , promised in two minutes, may appear to be progressing nicely. But when it has not set in two minutes, the customer has two choices-waits or eats it raw. Software customers have had (71) choices. Now I do not think software

35、 (72) have less inherent courage and firmness than chefs, nor than other engineering managers. But false (73) to match the patrons desired date is much more common in our discipline than elsewhere in engineering. It is very (74) to make a vigorous, plausible, and job risking defense of an estimate t

36、hat is derived by no quantitative method, supported by little data, and certified chiefly by the hunches of the managers. Clearly two solutions are needed. We need to develop and publicize productivity figures, bug-incidence figures, estimating rules, and so on. The whole profession can only profit

37、from (75) such data. Until estimating is on a sounder basis, individual managers will need to stiffen their backbones and defend their estimates with the assurance that their poor hunches are better than wish derived estimates.A.testers B constructors C. managers D. architects 20.DOM is a platform-

38、and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can b

39、e incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the m

40、emory available for processing.AXMLBHTMLCscriptDWeb 21.The use of computer graphics (1) many diverse fields. Applications (2) from the production of charts and graphs, to the generation of realistic images for television and motion pictures to the (3) design of mechanical parts.To encompass all thes

41、e uses, we can adopt a simple definition:Computer graphics is concerned with all (4) of using a computer to generate images.We can classify applications of computer graphics into four main areas:Display of information, Design, (5) ,User interfaces.AscopeBboundCrangeDarea 22.TCP/IP (71) layer protoco

42、ls provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need like the ability to transfer a file in the case of HTTE In short, the application layer provides an (74) between software

43、 running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).Aha

44、rdwareBsoftwareCpacketDequipment 23.Virtual reality (or VR (1) ) is kind of a buzzword these days in computer graphics.VR is artificial reality created by a computer that is so enveloping that it is perceived by the mind as being truly real.VR exists in many (2) .A traditional view of virtual realit

45、y uses headsets and data gloves.The headset serves as the eyes and ears to your virtual world,projecting sights and sounds generated by the computer.The data glove becomes your hand,enabling you to interact with this (3) world.As you move your head around,the computer will track your motion and disp

46、lay the right image.VR is the most demanding (4) for computer graphics,requiring hardware and software capable of supporting realtime 3D (5) .AformBformsCformatDshape 24.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (71) from a friend wh

47、o asks you to open it. This is what happens with Melissa and several other similar email (72) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (73) . As administrators seek to block dangerous email attachments through the recognition of well-

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 考试试题 > 事业单位考试

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁