资源预览内容
第1页 / 共31页
第2页 / 共31页
第3页 / 共31页
第4页 / 共31页
第5页 / 共31页
第6页 / 共31页
第7页 / 共31页
第8页 / 共31页
第9页 / 共31页
第10页 / 共31页
亲,该文档总共31页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述
2023年浙江软件水平考试考试模拟卷(7)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.Even though current technologies make the ultimate segmented network impractical, new technologies and products hold the promise of making the concept a reality. Most important of all these new technologies are () . The ultimate switched LAN, which is technically possible, now, exhibits the following characteristics:1. High-speed yet cost-effective switching devices can be implemented on a wide scale, providing dedicated connections for individual users and supporting the aggregate () of all networked users.2. The ability to deploy switching capabilities incrementally into the () base. Switching implementations support switching of individual users or groups so that existing users of shared media modules can continue to use the existing equipment until they can justify moving to dedicate switched LAN connections.3. Support and enhancement of existing routed environments. Switching () routint, but rather can be introduced into the network without making any changes to the existing routing equipment or configuration. () play a critical role in the integration of switching into existing networks.providing dedicated connections for individual users and supporting the aggregate () of all networked users.A.specific requirementsB.bandwidth requirementsC.permanent requirementsD.security requirements2.Windows NT或Windows 2000是当前流行的一类操作系统,()是WindowsNT真正的中心,它提供了一组操作系统原语和机制。Windows NT采用线程机制来提高系统的()。NT采用基于()的方案选定线程执行的次序。NT采用基于()的方案选定线程执行的次序。A先来先服务B时间片轮转C随机选择D优先级3.设有员工实体Employee(employeeID,name,sex,age,tel,department),其中employeeID为员工号,name为员工姓名,sex为员工性别,age为员工年龄,tel为员工电话(要求记录该员工的手机号码和办公室电话),departID为员工所在部门号(要求参照另一部门实体Deparxment的主码depmtID)。Employee实体中存在的派生属性及其原因是();Employee实体中还存在多值属性,该属性及其该属性的处理为();对属性depaitmentID的约束是()。对属性depaitmentID的约束是()。APrimary Key NOTNULLBPIimary,KeyCForeign KeyDCandidate Key4.System analysis is traditionally done top-down using structured analysis based on () Object-oriented analysis focuses on creation of modelsThe three types of the analysis model are () There are two substages of object-oriented analysis () focuses on real-world things whose semantics the application capturesThe object constructed in the requirement analysis shows the () of the real-world system and organizes it into workable pieces () addresses the computer aspects ofthe application that are visible to usersThe objects are those which can be expected to vary from time to time quite rapidlySystem analysis is traditionally done top-down using structured analysis based on ()Afunctional decompositionBobject abstractionCdata inheritanceDinformation generalization5.The ARPANET () ( the rules of syntax that enable computers to communicate on a network) were originally designed for openness and flexibility, not for () The ARPA researchers needed to share information easily, so everyone needed to be an unrestricted insider on the network. Although the approach was appropriate at the time, it is not one that lends itself to today’s commercial and government use.As more locations with computers (known as () in Internet parlance)joined the ARPANET, the usefulness of the network grew. The ARPANET consisted primarily of university and government computers, and the applications supported on this network were simple: electronic mail ( E - mail), electronic news groups, and () connection to other computers. By 1971, the Internet linked about two dozen research and government sites, and researchers had begun to use it to exchange () not directly related to the ARPANET itself. The network was becoming an important tool for collaborative research.not for () The ARPA researchers needed to share information easily.A.safetyB.guardC.attachmentD.security6.Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to () fraudulent Web sites without their knowledge or consent. Pharming has been called phishing without a lure.In phishing, the perpetrator sends out legitimate- () looking e-malls, appearing to come from some of the Web’s most popular sites, in an effort to obtain personal and financial information from individual recipients. But in pharming, larger numbers of computer users can be () victimized because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form of pharming attack, code sent in an e-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected () bookmark entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号