《2023年上海软件水平考试考试考前冲刺卷(3).docx》由会员分享,可在线阅读,更多相关《2023年上海软件水平考试考试考前冲刺卷(3).docx(43页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、2023年上海软件水平考试考试考前冲刺卷(3)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.XML是互联网联合组织创建的一组规范,XML是开放的,是_标准。XML主要有_等三个要素,为了增强XML文件结构化要求,一般要使用XML的辅助技术_。ACORBABTHMLCSGMLDDTD 2.在软件项目估算时,将代码行LOC和功能点FP数据在两个方面使用:一是作为一个估算变量,度量软件每一个_的大小;一是联合使用从过去的项目中收集到的_和其它估算变量,进行成本和_估算。A时间B数据C分量D工作量
2、 3.计算机性能评测分为评估和测试两种方法,其中评估是基于一些原始数据进行推算。_用于评价同一厂商生产的同一计算机系统的定点运算速度比较正确;_可用于比较和评价在同一系统上求解同一问题的不同算法的性能;_是美国用来限制计算机出口的系统性能指标估算方法。AMFLOPSBPDRCMIPSDCTP 4.在软件的开发过程中常用图作为描述工具。如DFD就是面向_分析方法的描述工具。在一套分层DFD中,如果某一张图中有N个加工(Process),则这张图允许有_张子图。在一张DFD图中,任意两个加工之间_。在画分层DFD时,应注意保持_之间的平衡。DFD中从系统的输入流到系统的输出流的一连串连续变换形成一
3、种信息流,这种信息流可分为_。A父图与其子图B同一父图的所有子图C不同父图的所有子图D同一予图的所有直接父图 5.在软件的开发过程中常用图作为描述工具。如DFD就是面向_分析方法的描述工具。在一套分层DFD中,如果某一张图中有N个加工(Process),则这张图允许有_张子图。在一张DFD图中,任意两个加工之间_。在画分层DFD时,应注意保持_之间的平衡。DFD中从系统的输入流到系统的输出流的一连串连续变换形成一种信息流,这种信息流可分为_。A控制流和变换流B变换流和事务流C事务流和事件流D事件流和控制流 6.DOM is a platform- and language- (66) API
4、that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back int
5、o the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for pro
6、cessing.AspecificBneutralCcontainedDrelated 7.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document
7、can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be use
8、d to process very large (70) documents that do not fit into the memory available for processing.AtextBImageCPageDgraphic 8.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definit
9、ions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while process
10、ing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for processing.AtableBtreeCcontrolDevent 9.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access an
11、d update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to docume
12、nts, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for processing.AdocumentBprocessorCdiscDmemory 10.TCP/IP (71) la
13、yer protocols provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need like the ability to transfer a file in the case of HTTE In short, the application layer provides an (74) betwe
14、en software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options the Transmission Control Protocol (TCP) and the User Datagram Protoco
15、l (UDP).AapplicationBtransportClinkDnetwork 11.Virtual reality (or VR (1) ) is kind of a buzzword these days in computer graphics.VR is artificial reality created by a computer that is so enveloping that it is perceived by the mind as being truly real.VR exists in many (2) .A traditional view of vir
16、tual reality uses headsets and data gloves.The headset serves as the eyes and ears to your virtual world,projecting sights and sounds generated by the computer.The data glove becomes your hand,enabling you to interact with this (3) world.As you move your head around,the computer will track your moti
17、on and display the right image.VR is the most demanding (4) for computer graphics,requiring hardware and software capable of supporting realtime 3D (5) .Afor certainBfor any sakeCfor allDfor short 12.Originally introduced by Netscape Communications, (66) are a general mechanism which HTTP Server sid
18、e applications, such as CGI (67) , can use to both store and retrieve information on the HTTP (68) side of the connection. Basically, Cookies can be used to compensate for the (69) nature of HTTE The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-ba
19、sed (70) .ABrowsersBCookiesCConnectionsDScripts 13.WebSQL is a SQL-like (71) language for extracting information from the web. Its capabilities for performing navigation of web (72) make it a useful tool for automating several web-related tasks that require the systematic processing of either all th
20、e links in a (73) , all the pages that can be reached from a given URL through (74) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (75) Interface.AqueryBtransactionCcommunicationDprogramming 14.Melissa and L
21、oveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (71) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (72) . Upon running, such worms usually proceed to send themselves out to email addresses from
22、 the victims address book, previous emails, web pages (73) . As administrators seek to block dangerous email attachments through the recognition of well-known (74) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole li
23、st of other extensions and will still run and successfully infect target users. Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords an
24、d give the (75) access to your network.AattachmentBpacketCdatagramDmessage 15.It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question. (71) is a means to capture ideas, relationships, decisions, and requirements in a well-define
25、d notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more (72) . A diagram graphically represents th
26、ings, and the relationships between these things. These (73) can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular inte
27、rest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (74) are u sed to capture the physical organization of the things in your system, i.e., how one object relates to another. (75) focus on the behavior of elements in a
28、 system. For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements.AProgrammingBAnalyzingCDesigningDModeling 16.The use of computer graphics (1) many diverse fields. Applications (2) from the production of charts and graphs, to the gene
29、ration of realistic images for television and motion pictures to the (3) design of mechanical parts.To encompass all these uses, we can adopt a simple definition:Computer graphics is concerned with all (4) of using a computer to generate images.We can classify applications of computer graphics into
30、four main areas:Display of information, Design, (5) ,User interfaces.ApervadesBpervasiveCperverseDpervert 17.WebSQL is a SQL-like (71) language for extracting information from the web. Its capabilities for performing navigation of web (72) make it a useful tool for automating several web-related tas
31、ks that require the systematic processing of either all the links in a (73) , all the pages that can be reached from a given URL through (74) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (75) Interface.Abr
32、owsersBserversChypertextsDclients 18.Originally introduced by Netscape Communications, (66) are a general mechanism which HTTP Server side applications, such as CGI (67) , can use to both store and retrieve information on the HTTP (68) side of the connection. Basically, Cookies can be used to compen
33、sate for the (69) nature of HTTE The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (70) .AgraphicsBprocessesCscriptsDtexts 19.Observe that for the programmer, as for the chef, the urgency of the patron (顾客) may govern the scheduled completion
34、 of the task, but it cannot govern the actual completion. An omelette (煎鸡蛋) , promised in two minutes, may appear to be progressing nicely. But when it has not set in two minutes, the customer has two choices-waits or eats it raw. Software customers have had (71) choices. Now I do not think software
35、 (72) have less inherent courage and firmness than chefs, nor than other engineering managers. But false (73) to match the patrons desired date is much more common in our discipline than elsewhere in engineering. It is very (74) to make a vigorous, plausible, and job risking defense of an estimate t
36、hat is derived by no quantitative method, supported by little data, and certified chiefly by the hunches of the managers. Clearly two solutions are needed. We need to develop and publicize productivity figures, bug-incidence figures, estimating rules, and so on. The whole profession can only profit
37、from (75) such data. Until estimating is on a sounder basis, individual managers will need to stiffen their backbones and defend their estimates with the assurance that their poor hunches are better than wish derived estimates.A.testers B constructors C. managers D. architects 20.DOM is a platform-
38、and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can b
39、e incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the m
40、emory available for processing.AXMLBHTMLCscriptDWeb 21.The use of computer graphics (1) many diverse fields. Applications (2) from the production of charts and graphs, to the generation of realistic images for television and motion pictures to the (3) design of mechanical parts.To encompass all thes
41、e uses, we can adopt a simple definition:Computer graphics is concerned with all (4) of using a computer to generate images.We can classify applications of computer graphics into four main areas:Display of information, Design, (5) ,User interfaces.AscopeBboundCrangeDarea 22.TCP/IP (71) layer protoco
42、ls provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need like the ability to transfer a file in the case of HTTE In short, the application layer provides an (74) between software
43、 running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).Aha
44、rdwareBsoftwareCpacketDequipment 23.Virtual reality (or VR (1) ) is kind of a buzzword these days in computer graphics.VR is artificial reality created by a computer that is so enveloping that it is perceived by the mind as being truly real.VR exists in many (2) .A traditional view of virtual realit
45、y uses headsets and data gloves.The headset serves as the eyes and ears to your virtual world,projecting sights and sounds generated by the computer.The data glove becomes your hand,enabling you to interact with this (3) world.As you move your head around,the computer will track your motion and disp
46、lay the right image.VR is the most demanding (4) for computer graphics,requiring hardware and software capable of supporting realtime 3D (5) .AformBformsCformatDshape 24.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (71) from a friend wh
47、o asks you to open it. This is what happens with Melissa and several other similar email (72) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (73) . As administrators seek to block dangerous email attachments through the recognition of well-