软考程序员英语试题市公开课获奖课件百校联赛一等奖课件_第1页
软考程序员英语试题市公开课获奖课件百校联赛一等奖课件_第2页
软考程序员英语试题市公开课获奖课件百校联赛一等奖课件_第3页
软考程序员英语试题市公开课获奖课件百校联赛一等奖课件_第4页
软考程序员英语试题市公开课获奖课件百校联赛一等奖课件_第5页
已阅读5页,还剩46页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

h165.()canhelporganizationstobetterunderstandtheinformationcontainedwithinthedataandwillalsohelpidentifythedatathatismostimportanttothebusinessandfuturebusinessdecisions.A.Dataprocessingsystem B.BigDataanalyticsC.Cloudcomputing D.Databasemanagement66.Afteranalyzingthesourcecode,()generatesmachineinstructionsthatwillcarryoutthemeaningoftheprogramatalatertime.aninterpreter B.alinkerC.acompiler D.aconverter67.()algorithmspecifiesthewaytoarrangedatainaparticularorder.Search B.Random C.Sorting D.Merge68.Aseachapplicationmoduleiscompleted,itundergoes()toensurethatitoperatescorrectlyandreliably.A.unittesting B.integrationtesting C.systemtesting D.acceptancetesting69.()istheprocessoftransforminginformationsoitisunintelligibletoanyonebuttheintendedrecipient.Encryption B.Decryption C.Security D.Protectionh271.()isanintermediaterepositoryofdata.A.UniversalSerialBus B.Buffer C.Datarecord D.Database72.Becauseobjects()dataandimplementation,theuserofanobjectcanviewtheobjectasablackboxthatprovidesservices.encapsulate

B.inherit C.connect D.refer73.()isastandardwayofspecifyingthelocationofanobject,typicallyawebpageontheInternet.A.URL B.TCP/IP C.HTML D.www74.Theterm“software()"isusedtodescribethesoftwareengineeringactivitiesthatoccurfollowingdeliveryofasoftwareproducttothecustomer.A.analysis B.design C.implementation D.maintenance75.Information()meansprotectinginformationandinformationsystemsfromunauthorizedaccess,use,disclosure,disruption,modification,ordestruction.A.integrity

B.availability C.security D.consistencyh163.Theterm“software()”isusedtodescribethesoftwareengineeringactivitiesthatoccurfollowingdeliveryofasoftwareproducttothecustomerA.Analysis B.maintenanceC.Design D.implementation64.()testingensuresthatasoftwaremoduleoperatescorrectlyandreliably.A.ApplicationB.IntegrationC.SystemD.Unit65.()referstotherangeofcomputerhardwareandOSplatformsonwhichthesourcecodeofaprogramcanbecompiledandrun.Usability B.PortabilityC.Reliability D.Maintainability66.Acomputer()isaprogramthatmaliciouslycausesunwantedbehavioronacomputer.A.softwareB.applicationC.virusD.process67.()makescomputersabletodojobswhichtillnow,onlyhumanbrainscando.A.Artificialintelligence B.BigdataC.Cloudcomputing D.Internetofthingsh271.Almostall()havebuilt-indigitalcamerascapableoftakingimagesandvideo.A.smart-phones B.scannersC.Computers D.printers72.()isamassivevolumeofstructuredandunstructureddatasolargeitisdifficulttoprocessusingtraditionaldatabaseorsoftwaretechnique.A.DataProcessingsystem B.BigDataC.Datawarehouse D.DBMS73The()structuredescribesaprocessthatmayberepeatedaslongasacertainremainstrue.A.logic B.sequentialC.selection D.loop74Whiteboxtestingistheresponsibilityofthe()A.user B.projectmanagerC.programmer D.systemtestengineer75.Thepurposeofanetwork()istoprovideashellaroundthenetworkwhichwillprotectthesystemconnectedtothenetworkfromvariousthreatsA.firewall B.switchC.router D.gatewayh171()acceptsdocumentsconsistingoftextand/orimagesandconvertsthemtomachine-readableform.A.Aprinter B.AscannerC.Amouse D.Akeyboard72operatingsystemsareusedforhandhelddevicessuchassmart-phones.Mobile

B.Desktop C.Network D.Timesharing73Apushoperationaddsanitemtothetopofa().A.queue

B.treeC.stack

D.datestructure74aresmallpicturesthatrepresentsuchitemssaacomputerprogramordocument.A.Menus

B.IconsC.Hyperlinks D.DialogBoxes75Thegoalof()istoprovideeasy,scalableaccesstocomputingresourcesandITservices.

A.artificialintelligence

B.bigdata

C.cloudcomputing D.dataminingh271.Sincetabletcomputersandsmartphoneshave()interface,manypeoplebelievethatallhomeandbusinesscomputerswilleventuallyhavethiskindofinterfacetoo.A.CRT B.LED C.Touch-screen D.Largescreen72.()arespecializedprogramsthatassistyoulocatinginformationontheweb.A.OS B.BrowseC.DBMS D.Searchengines73.Program()describesprogram'sobjectives,desiredoutput,inputdatarequired,processingrequirement,anddocumentation.A.specification B.flowchartC.structure D.Address74.Agoodprogramshouldbe()byprogrammersotherthanthepersonwhowroteit.A.reliable B.understandableC.structured D.Blocked75.()referstotheprocessoftestingandtheneliminatingerrors.A.Debugging B.ProgrammingC.Analysis D.Maintenanceh171Theoperationofremovinganelementfromthestackissaidto()thestack.A.pop B.push C.store D.fetch72()productsoftenfeaturegameswithlearningembeddedintothem.A.Program B.DatabaseC.Software D.Multimedia73Whenanobjectreceivesa(),methodscontainedwithintheobjectrespond.A.parameter B.informationC.message D.data74Make()copiesofimportantfiles,andstorethemonseparatelocationstoprotectyourinformation.A.back B.back-upC.back-out D.background75()isaprocessthatconsumersgothroughtopurchaseproductsorservicesovertheInternet.A.E-learning B.E-governmentC.Onlineanalysis D.Onlineshoppingh271.Program()graphicallypresentthedetailedsequenceofstepsneededtosolveaprogrammingproblem.A.modules B.flowchartsC.structures D.functions72.()languagesenablenonprogrammertousecertaineasilyunderstoodcommandstosearchandgeneratereportsfromadatabase.A.Machine B.AssemblyC.High-level D.Query73.TodayitiscommontoaccesstheInternetfromavarietyof()deviceslikesmartphonesandtablets.A.mobile B.move C.moving D.shift74.Fordatatransmissiontobesuccessful,sendingandreceivingdevicesmustfollowasetofcommunicationrulesfortheexchangeofinformation.Theserulesareknownas()。A.

E-mail B.InternetC.network D.protocols75.Computer()focusesonprotectinginformation,hardware,andsoftware,andsoftwarefromunauthorizeduseanddamage.A.network B.virus C.security D.architectureh171.Thelineofcomputingjobswaitingtoberunmightbea

().Thesejobrequestsareservicedinorderoftheirarrival.A.array B.queue C.record D.stack72.()

isanimportantconceptsinceitallowsreuseofaclassdefinitionwithoutrequiringmajorcodechanges.A.Inheritance

B.Polymorphism C.Encapsulation D.Datahiding73.Software()activitiesinvolvemakingenhancementstosoftwareproducts,adaptingproductstonewenvironments,andcorrectingproblems.A.analysisB.designC.codingD.maintenance74.()isastyleofcomputinginwhichdynamicallyscalableandoffervirtualizedresourcesareprovidedasaserviceovertheInternet.Cloudcomputing B.Bigdata C.Socialmedia D.Mobilecomputing75.Theobjectiveofinformation()

includesprotectionofinformationandpropertyfromtheft,corruption,ornaturaldisaster,whileallowingtheinformationandpropertytoremainaccessibleandproductivetoitsintendedusers.concurrency B.integrityC.consistency D.securityh271.()

isalistofitemsthatareaccessibleatonlyoneendofthelist.A.Atree B.Anarray C.Astack D.Aqueue72.Statedmoreformally,anobjectissimply()

ofaclass.A.apart B.acomponent C.aninstance D.anexample73.Manycomputerlanguagesprovideamechanismtocall()providedbylibrariessuchasin.dlls.A.instructions B.functions C.subprograms D.subroutines74.()

isaveryimportanttaskinthesoftwaredevelopmentprocess,becauseanincorrectprogramcanhavesignificantconsequencesfortheusers.A.Debugging B.Research C.Installation D.Deployment75.Whenpayingonline,youshouldpayattentionto()yourpersonalandfinancialinformation.A.reading B.writingC.executing D.protectingh171.Thebasicunitofsoftwarethattheoperatingsystemdealswithinschedulingtheworkdonebytheprocessoris().A.aprogramorsubroutine B.amodularorafunctionC.aprocessorathreadD.adeviceorachip72.()isthenamegiventoa“secret”accessrouteintothesystem.A.Password B.Firewall C.Cryptography D.Backdoor73.Thelower-levelclasses(knownassubclassesorderivedclasses)()stateandbehaviorfromthehigher-levelclass(knownasasuperclassorbaseclass).A.requestB.inheritC.invokeD.accept74.()isexactlyanalogoustoamarketplaceontheInternet.A.E-Commerce B.E-CashC.E-Mail D.E-Consumer75.()aredatasetsthatgrowsolargethattheybecomeawkwardtoworkwithon-handdatabasemanagementtools.A.Datastructures B.RelationsC.Bigdata D.Metadatah271.Withrespecttoprogramvariables,()meansassigningabeginningvaluetoavariable.setup

B.startup C.initialization D.pre-compile72.A()translatesacomputerprogramwritteninahuman-readablecomputerlanguageintoaformthatacomputercanexecute.compiler

B.linker C.assembler D.application

73.Theidentificationandremovalofbugsinaprogramiscalled"()".checking B.debugging C.revision D.verification74.Theprocesswherebysoftwareisinstalledintoanoperationalenvironmentiscalled“()”.deployment B.development C.setup D.layup

75.A()applicationismadeupofdistinctcomponentsrunninginseparateruntimeenvironments,usuallyondifferentplatformsconnectedthroughanetwork.database B.analog C.high-level D.distributed

h171.InClanguage,()consistsofvariablesandconstantsconnectedbyoperators.anexpression B.asubroutine C.afunction D.aloop72.Weconsidera()successfulonlywhenanerrorisdiscovered.A.designB.programC.developmentD.test

73.()ofdatabasereferstotheprotectionofdataagainstunauthorizeddisclosure,alteration,ordestruction.Security B.AccessC.Backup D.Creation74.OneofthemajorfeaturesinC++()handling,whichisabetterwayofhandlingerrors.data B.pointerC.test D.exception75.()isamethodorprocedureforcarryingoutatask.Thought B.IdealityC.Algorithm D.Creation

h271.()hasmanyelements:text,audiosound,staticgraphicsimages,animations,andvideo.Multimedia

B.Database C.File D.Document72.A()isafilethatcontainsmetadata,thatis,dataaboutdate.document

B.Exceltable C.database D.datadictionary73.()isaquerylanguageformanipulatingdatainarelationaldatabase.Assemble

B.SQL C.C++ D.Fortran74.()Thedevelopmentprocessinthesoftware(74)involvesfourphases:analysis,design,implementation,andtesting.A.maintenance B.lifecycleC.programming D.upgrading

75.WWWisalargenetworkofInternetserversproviding()andotherservicestoterminalsrunningclientapplicationssuchasabrowser.A.modem

B.compression C.hypertext D.encode

h171.The()isacombinationofkeysthatallowstheusertoactivateaprogramfunctionwithoutclickingaseriesofmenusoptions.A.shortcut-key B.quick-keyC.fast-key D.rapid-key72.Incomputerscience,adata()isawayofstoringdatainacomputersothatitcanbeusedefficiently.A.record B.file C.structure D.pool73.A()isanamedmemoryblock.Byusingitsname,wecanrefertothedatastoredinthememoryblock.A.word B.record C.program D.variable74.Theterm,()loop,referstoaloopthatiscontainedwithinanotherloop.A.program B.nestedC.statement D.network75.The()isdesignedspecificallyasasecuritysystemforpreventingunauthorizedcommunicationsbetweenonecomputernetworkandanothercomputernetwork.A.firewall B.protocol C.hacker D.virush271.Ingeneral,atypical()modeiscomposedofseveralphases,suchasrequirementsanalysisphase,general/detaileddesignphase,implementationphase,systemacceptancetestingphase.A.wat

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论