欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    2022年上海软件水平考试考试考前冲刺卷(8).docx

    • 资源ID:20841751       资源大小:23.82KB        全文页数:31页
    • 资源格式: DOCX        下载积分:20金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要20金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    2022年上海软件水平考试考试考前冲刺卷(8).docx

    2022年上海软件水平考试考试考前冲刺卷(8)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.某幅图像具有640×480个像素点,若每个像素具有8位的颜色深度,则可以表示 (61) 种不同的颜色,经5:1压缩后,其图像数据需占用 (62) (Byte)的存储空间。A8B256C512D10242.某计算机数据总线为16位,内存按字节编址,地址从B4000H到DBFFFH,共有 (59) 字节。若用存储容量为16KX 16bit的存储器芯片构成该内存,至少需要 (60) 片。A80KB96KC160KD192K3.Extreme Programming (XP) is a discipline of software development with (71) of simplicity, communication, feedback and courage. Successful software development is a team effort-not just the development team, but the larger team consisting of customer, management and developers. XP is a simple process that brings these people together and helps them to succeed together. XP is aimed primarily at object-oriented projects using teams of a dozen or fewer programmers in one location. The principles of XP apply to any (72) project that needs to deliver quality software rapidly and flexibly.An XP project needs a(an) (73) customer to provide guidance. Customers, programmers, managers, are all working (74) to build the system that’s needeDCustomers-those who have software that needs to be developed-willleam simple, effective ways to (75) what they need, to be sure that they are getting what they need, and to steer the project to success.(71)()AimportanceBkeysCrolesDvalues4.TCP是互联网中的 (68) 协议,使用 (69) 次握手协议建立连接。A1B2C3D45.某计算机数据总线为16位,内存按字节编址,地址从B4000H到DBFFFH,共有 (59) 字节。若用存储容量为16KX 16bit的存储器芯片构成该内存,至少需要 (60) 片。A2B5C8D106.A类网络是很大的网络,每个A类网络中可以有 (66) 个网络地址。实际使用中必须把A类网络划分为子网,如果指定的子网掩码为255.255.192.0,则该网络被划分为 (67) 个子网。A128B256C1024D20487.某幅图像具有640×480个像素点,若每个像素具有8位的颜色深度,则可以表示 (61) 种不同的颜色,经5:1压缩后,其图像数据需占用 (62) (Byte)的存储空间。A61440B307200C384000D30720008.Extreme Programming (XP) is a discipline of software development with (71) of simplicity, communication, feedback and courage. Successful software development is a team effort-not just the development team, but the larger team consisting of customer, management and developers. XP is a simple process that brings these people together and helps them to succeed together. XP is aimed primarily at object-oriented projects using teams of a dozen or fewer programmers in one location. The principles of XP apply to any (72) project that needs to deliver quality software rapidly and flexibly.An XP project needs a(an) (73) customer to provide guidance. Customers, programmers, managers, are all working (74) to build the system that’s needeDCustomers-those who have software that needs to be developed-willleam simple, effective ways to (75) what they need, to be sure that they are getting what they need, and to steer the project to success.(72)()Asmall-sizedBmoderately-sizedClarge-sizedDhuge-sized9.Extreme Programming (XP) is a discipline of software development with (71) of simplicity, communication, feedback and courage. Successful software development is a team effort-not just the development team, but the larger team consisting of customer, management and developers. XP is a simple process that brings these people together and helps them to succeed together. XP is aimed primarily at object-oriented projects using teams of a dozen or fewer programmers in one location. The principles of XP apply to any (72) project that needs to deliver quality software rapidly and flexibly.An XP project needs a(an) (73) customer to provide guidance. Customers, programmers, managers, are all working (74) to build the system that’s needeDCustomers-those who have software that needs to be developed-willleam simple, effective ways to (75) what they need, to be sure that they are getting what they need, and to steer the project to success.(73)()Apart-timeBcasualCseldomDfull-time10.Extreme Programming (XP) is a discipline of software development with (71) of simplicity, communication, feedback and courage. Successful software development is a team effort-not just the development team, but the larger team consisting of customer, management and developers. XP is a simple process that brings these people together and helps them to succeed together. XP is aimed primarily at object-oriented projects using teams of a dozen or fewer programmers in one location. The principles of XP apply to any (72) project that needs to deliver quality software rapidly and flexibly.An XP project needs a(an) (73) customer to provide guidance. Customers, programmers, managers, are all working (74) to build the system that’s needeDCustomers-those who have software that needs to be developed-willleam simple, effective ways to (75) what they need, to be sure that they are getting what they need, and to steer the project to success.(74)()AtogetherBbythemselvesCseparatelyDalone11.Extreme Programming (XP) is a discipline of software development with (71) of simplicity, communication, feedback and courage. Successful software development is a team effort-not just the development team, but the larger team consisting of customer, management and developers. XP is a simple process that brings these people together and helps them to succeed together. XP is aimed primarily at object-oriented projects using teams of a dozen or fewer programmers in one location. The principles of XP apply to any (72) project that needs to deliver quality software rapidly and flexibly.An XP project needs a(an) (73) customer to provide guidance. Customers, programmers, managers, are all working (74) to build the system that’s needeDCustomers-those who have software that needs to be developed-willleam simple, effective ways to (75) what they need, to be sure that they are getting what they need, and to steer the project to success.(75)()AtellBknowCcommunicateDfeedback12.应用MPLS VPN时,针对每个VPN地址规划应满足的条件是 (1) 。不同的VPN信息通过MPLS骨干网(或核心网)时通过 (2) 进行区分。1()A每个VPN都是独立的,可以使用任何地址,只要保证在VPN内部合法正确即可BVPN之间的地址不能相互重叠CVPN内只能使用公网IP地址DVPN内只能使用私网IP地址13.在采用公开密钥密码体制的数字签名方案中,每个用户有一个私钥,可用它进行 (1) ;同时每个用户还有一个公钥,可用于 (2) 。1()A解密和验证B解密和签名C加密和签名D加密和验证14.应用MPLS VPN时,针对每个VPN地址规划应满足的条件是 (1) 。不同的VPN信息通过MPLS骨干网(或核心网)时通过 (2) 进行区分。2()AIP地址+AS号BIP地址+子网掩码CVPN标识符DVPN标识符+IP地址15.在采用公开密钥密码体制的数字签名方案中,每个用户有一个私钥,可用它进行 (1) ;同时每个用户还有一个公钥,可用于 (2) 。2()A解密和验证B解密和签名C加密和签名D加密和验证16.网络安全应用协议SSL协议工作在 (1) ,HTTPS协议工作在 (2) 。1()A数据链路层B网络层C传输层D应用层17.用IPSec机制实现VPN时,如果企业内部网使用了私用IP地址,应该采用 (1) 技术,IPSec该采用 (2) 模式。1()ANAT技术B加密技术C消息鉴别技术D数字签名技术18.A glue that holds the whole Internet together is the network layer protocol, (1) .Unlike most older network layer protocols, it was designed from the beginning with internetworking in mind. Its job is to provide a (2) way to transport data grams from source to destination, without regard to whether these machines are on the same network or whether there are other networks in between them.Communication in the Internet works as follows. The (3) layer takes data streams and breaks them up into data grams. Each datagram is transmitted through the Internet, possibly being fragmented into smaller units as it goes. When all the pieces finally get to the destination machine, they are reassembled by the (4) layer into the original datagram. This datagram is then handed to the transport layer, which inserts it into the receiving process’ input stream.An IP datagram consists of a header part and a text part. The header has a (5) part and a variable length optional part.1()AIP (Internet Protocol)BIP (Interworking Protocol)CTCP (Transport Control Protocol)DTCP (Transfer Communication Protocol)19.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,他需要做的第一步工作通常是 (1) ;第二步通常是 (2) ;在成功入侵该公司网络某台主机并取得该主机的控制权后,通常所作的工作是 (3) ;在窃取到机密信息后,最后需要做的工作是 (4) ;为了预防黑客入侵的第一步,该公司网络应该采取的预防措施为 (5) ;针对第二步的预防措施为 (6) 。为了能及时发现上述入侵,该公司网络需要配备 (7) 。1()A收集目标网络的所在位置及流量信息B到网上去下载常用的一些攻击软件C捕获跳板主机,利用跳板主机准备入侵D通过端口扫描等软件收集目标网站的IP地址、开放端口和安装的软件版本等信息20.网络安全应用协议SSL协议工作在 (1) ,HTTPS协议工作在 (2) 。2()A数据链路层B网络层C传输层D应用层21.A glue that holds the whole Internet together is the network layer protocol, (1) .Unlike most older network layer protocols, it was designed from the beginning with internetworking in mind. Its job is to provide a (2) way to transport data grams from source to destination, without regard to whether these machines are on the same network or whether there are other networks in between them.Communication in the Internet works as follows. The (3) layer takes data streams and breaks them up into data grams. Each datagram is transmitted through the Internet, possibly being fragmented into smaller units as it goes. When all the pieces finally get to the destination machine, they are reassembled by the (4) layer into the original datagram. This datagram is then handed to the transport layer, which inserts it into the receiving process’ input stream.An IP datagram consists of a header part and a text part. The header has a (5) part and a variable length optional part.2()Abest-qualityBquality-guaranteedCconnection-orientedDbest-efforts22.用IPSec机制实现VPN时,如果企业内部网使用了私用IP地址,应该采用 (1) 技术,IPSec该采用 (2) 模式。2()A传输模式B隧道模式C传输和隧道混合模式D传输和隧道嵌套模式23.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,他需要做的第一步工作通常是 (1) ;第二步通常是 (2) ;在成功入侵该公司网络某台主机并取得该主机的控制权后,通常所作的工作是 (3) ;在窃取到机密信息后,最后需要做的工作是 (4) ;为了预防黑客入侵的第一步,该公司网络应该采取的预防措施为 (5) ;针对第二步的预防措施为 (6) 。为了能及时发现上述入侵,该公司网络需要配备 (7) 。2()A了解目标网络的所在位置的周围情况及流量规律,选择流量小的时间发起攻击B下载攻击软件,直接发起攻击C向目标网络发起拒绝服务攻击D根据收集的开放端口和安装的软件版本等信息,到网络查找相关的系统漏洞,下载相应的攻击工具软件24.A glue that holds the whole Internet together is the network layer protocol, (1) .Unlike most older network layer protocols, it was designed from the beginning with internetworking in mind. Its job is to provide a (2) way to transport data grams from source to destination, without regard to whether these machines are on the same network or whether there are other networks in between them.Communication in the Internet works as follows. The (3) layer takes data streams and breaks them up into data grams. Each datagram is transmitted through the Internet, possibly being fragmented into smaller units as it goes. When all the pieces finally get to the destination machine, they are reassembled by the (4) layer into the original datagram. This datagram is then handed to the transport layer, which inserts it into the receiving process’ input stream.An IP datagram consists of a header part and a text part. The header has a (5) part and a variable length optional part.3()Adata linkBtransportCnetworkDapplication25.A glue that holds the whole Internet together is the network layer protocol, (1) .Unlike most older network layer protocols, it was designed from the beginning with internetworking in mind. Its job is to provide a (2) way to transport data grams from source to destination, without regard to whether these machines are on the same network or whether there are other networks in between them.Communication in the Internet works as follows. The (3) layer takes data streams and breaks them up into data grams. Each datagram is transmitted through the Internet, possibly being fragmented into smaller units as it goes. When all the pieces finally get to the destination machine, they are reassembled by the (4) layer into the original datagram. This datagram is then handed to the transport layer, which inserts it into the receiving process’ input stream.An IP datagram consists of a header part and a text part. The header has a (5) part and a variable length optional part.4()Adata linkBtransportCnetworkDapplication26.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,他需要做的第一步工作通常是 (1) ;第二步通常是 (2) ;在成功入侵该公司网络某台主机并取得该主机的控制权后,通常所作的工作是 (3) ;在窃取到机密信息后,最后需要做的工作是 (4) ;为了预防黑客入侵的第一步,该公司网络应该采取的预防措施为 (5) ;针对第二步的预防措施为 (6) 。为了能及时发现上述入侵,该公司网络需要配备 (7) 。4()A尽快把机密数据发送出去B在主机中留一份机密信息的副本,以后方便时来取C删除主机系统中的相关日志信息,以免被管理员发现D删除新建用户,尽快退出,以免被管理员发现27.A glue that holds the whole Internet together is the network layer protocol, (1) .Unlike most older network layer protocols, it was designed from the beginning with internetworking in mind. Its job is to provide a (2) way to transport data grams from source to destination, without regard to whether these machines are on the same network or whether there are other networks in between them.Communication in the Internet works as follows. The (3) layer takes data streams and breaks them up into data grams. Each datagram is transmitted through the Internet, possibly being fragmented into smaller units as it goes. When all the pieces finally get to the destination machine, they are reassembled by the (4) layer into the original datagram. This datagram is then handed to the transport layer, which inserts it into the receiving process’ input stream.An IP datagram consists of a header part and a text part. The header has a (5) part and a variable length optional part.5()A40-byte fixedB64-byte fixedC2064 bytes variableD20-byte fixed28.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,他需要做的第一步工作通常是 (1) ;第二步通常是 (2) ;在成功入侵该公司网络某台主机并取得该主机的控制权后,通常所作的工作是 (3) ;在窃取到机密信息后,最后需要做的工作是 (4) ;为了预防黑客入侵的第一步,该公司网络应该采取的预防措施为 (5) ;针对第二步的预防措施为 (6) 。为了能及时发现上述入侵,该公司网络需要配备 (7) 。5()A尽量保密公司网络的所在位置和流量信息B尽量减少公司网络对外的网络接口C尽量关闭主机系统上不需要的服务和端口D尽量降低公司网络对外的网络接口速率29.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,他需要做的第一步工作通常是 (1) ;第二步通常是 (2) ;在成功入侵该公司网络某台主机并取得该主机的控制权后,通常所作的工作是 (3) ;在窃取到机密信息后,最后需要做的工作是 (4) ;为了预防黑客入侵的第一步,该公司网络应该采取的预防措施为 (5) ;针对第二步的预防措施为 (6) 。为了能及时发现上述入侵,该公司网络需要配备 (7) 。6()A安装网络防病毒软件,防止病毒和木马的入侵B及时对网络内部的主机系统进行安全扫描并修补相关的系统漏洞C加大公司网络对外的网络接口速率D在公司网络中增加防火墙设备30.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,他需要做的第一步工作通常是 (1) ;第二步通常是 (2) ;在成功入侵该公司网络某台主机并取得该主机的控制权后,通常所作的工作是 (3) ;在窃取到机密信息后,最后需要做的工作是 (4) ;为了预防黑客入侵的第一步,该公司网络应该采取的预防措施为 (5) ;针对第二步的预防措施为 (6) 。为了能及时发现上述入侵,该公司网络需要配备 (7) 。7()A入侵检测系统BVPN系统C安全扫描系统D防火墙系统31.杀毒软件报告发现病毒Macro.Melissa,由该病毒名称可以推断病毒类型是(),这类病毒主要感染目标是()。杀毒软件报告发现病毒Macro.Melissa,由该病毒名称可以推断病毒类型是()A文件型B引导型C目录型D宏病毒32.杀毒软件报告发现病毒Macro.Melissa,由该病毒名称可以推断病毒类型是(),这类病毒主要感染目标是()。这类病毒主要感染目标是()。AEXE或COM可执行文件BWord或Excel文件CDLL系统文件D磁盘引导区33.进度安排的常用图形描述方法有Gantt图和PERT图。Gantt图不能清晰地描述();PERT图可以给出哪些任务完成后才能开始另一些任务。下图所示的PERT图中,事件6的最晚开始时刻是()。Gantt图不能清晰地描述()A每个任务从何时开始B每个任务到何时结束C每个任务的进展情况D各任务之间的依赖关系34.在ISO制定并发布的MPEG系列标准中,()的音、视频压缩编码技术被应用到VCD中,()标准中的音、视频压缩编码技术被应用到DVD中,()标准中不包含音、视频压缩编码技术。在ISO制定并发布的MPEG系列标准中,()的音、视频压缩编码技术被应用到VCD中。AMPEG-1BMPEG-2CMPEG-7DMPEG-2135.若关系R、S如下图所示,π1,3,7(σ36(R×S)=(),且结果集的元组列数和元组个数分别为(),R÷S=()。π1,3,7(σ36(R×S)=()AπA,C,E(σCD(R×S)BπA,R.C,E(σR.CS.D(R×S)CπA,S.C,S.E(σR.CS.D(R×S)DπR.A,R.C,R.E(σR.CS.D(R×S)36.对象关系数据库中,员工(工号,姓名,性别,联系电话)表中的联系电话为多值属性,则员工属于(),在SQL99标准中可以使用()来实现。对象关系数据库中,员工(工号,姓名,性别,联系电话)表中的联系电话为多值属性,则员工属于()A非1NF关系B1NF关系C2NF关系D3NF关系37.某进程有

    注意事项

    本文(2022年上海软件水平考试考试考前冲刺卷(8).docx)为本站会员(w****)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开