欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    2022贵州软件水平考试考试模拟卷(6).docx

    • 资源ID:21891612       资源大小:27.38KB        全文页数:33页
    • 资源格式: DOCX        下载积分:20金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要20金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    2022贵州软件水平考试考试模拟卷(6).docx

    2022贵州软件水平考试考试模拟卷(6)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.下列关于需求变更影响分析的做法中,_是错误的。A需求主管人员把需求变更的优先级分为5级B建立一个需求决策数据库,根据数据库内容指导变更决策C没有代价或不影响进度的变更可直接实施D变更分析流程需考虑涉及问题核对、影响软件元素核对、评估变更工时、评估工作值总和、任务顺序、变更对路径的影响、对进度成本的影响、优先级等 2.软件需求工程的活动可以划分为5个独立的阶段:需求获取、需求建模、形成需求规格、需求验证和需求管理。需求建模是_。A分析需求的正确性和可行性的过程B对需求的抽象描述C对生成需求模型构件的精确的形式化的描述D开发、捕获和修订用户的需求 3.关于大型项目人力资源管理的叙述中,_是正确的。A子项目人力资源管理的工作步骤中包括通过招聘增补员工B员工的业务提高和发展不由各子项目负责C大型项目人力资源具有被动性的特点D各个子项目确保优秀人才不外流到其他子项目 4.表示需求和别的系统元素之间的联系链的最普遍方式是使用需求跟踪能力矩阵。如果软件开发人员发现,有一个孤立的设计元素在需求跟踪能力矩阵中不能回溯到需求,但其表明一个正当的功能,则说明_。A需求规格说明书漏掉了一项需求B设计元素不满足用户需求C需求规格不满足用户需求D在需求跟踪能力矩阵中不需要建立用户需求与设计元素之间的联系 5.有关大型及复杂项目管理的说法中,_是错误的。A大型项目经理的日常职责更集中于管理职责B大型项目管理模式接近于直接管理模式C在大型项目中应明确大项目经理和子项目经理各自的职责D在大型项目中应建立统一的项目过程 6.为避免大型项目中多个项目之间出现资源冲突,较有效的做法是_。A项目开始实施时制定资源在项目之间的分配原则,统一管理所有的项目和资源B定期检查项目的执行情况,根据项目进展情况和整体绩效重新排列项目的优先顺序,从资源上优先支持进展好的项目C将关键的子项目外包,提高项目整体绩效D项目实施初期投入少量资源,随着项目的进展不断增加相关资源 7.由于大型项目团队构成比较复杂,因此在制定风险管理计划时,首先要考虑_。A组织及参与项目人员的风险态度和风险承受度B已识别风险清单C项目风险的相对排序或优先度清单D风险的应对策略 8.项目经理在进行大项目的WBS分解时,_是错误的。A按照项目的组织结构编制树形结构的WBSB按照项目的产品结构编制列表式的WBSC按照项目的生命周期编制鱼刺图式的WBSD按照项目风险分解结构编制树形结构的WBS 9.关于绩效评估的叙述中,_是错误的。A绩效评估是按照一定的评价标准来衡量、考核、评价项目的绩效水平B评估人员一般包括财会人员、管理人员、信息技术人员等C绩效评估主要是对项目做定性分析D评估实施过程中,需要归纳、分析、撰写评估报告 10.在供方选择过程中,对提供主要物资的新的供方,应要求其提供充分的质量证明文件,以证实其质量保证能力。_不属于质量证明。A供方多年供货业绩综合评价B供方质量管理体系对按要求如期提供稳定质量产品的保证能力C供方其他用户对其产品质量的反馈D供方绩效评估结果 11.某软件开发项目,预算为40万元,计划在40个工作日内完成。当项目进行到第30个工作日时,项目经理对项目进行了绩效评估,结果是:项目完成当期计划进度的70%,花费了23万元,按此绩效还需投入大约_万元才能完成该项目。A10B12C19D21 12.某项目计划工期为4年,投资总成本为800万元。在项目实施过程中,通过对成本的核算和有关成本与进度的记录得知,开工后两年末实际成本发生额为200万元,所完成工作的计划预算成本额为100万元,与项目预算成本比较可知,当工期过半时,项目的计划成本发生预算应该为400万元。该项目成本绩效指数CPI为_。A50%B25%C12.5%D10% 13.项目经理要为安全检查员(目前只有1人从事该岗位,必须每天进行现场巡视)配备备用人员,这说明_。A项目经理应用了“假设分析”识别技术,进行了风险识别B项目经理使用团队管理的技术和方法,进行了团队管理C项目经理应用团队建设的技术和方法,进行了团队建设D项目经理使用概率影响矩阵进行了风险的定量分析 14.企业为显著提高产品质量、工作效率和服务能力,并显著控制成本,对当前业务流程进行破坏性地重新设计称为业务流程重组(BPR)。下列_原则可以有效指导BPR项目实施。A尽量要那些提供流程输入的人来执行流程操作B将决策点放到基层活动中,减少对流程的控制C对地理上集中的资源看作是分散地来处理D组织机构设计要围绕企业的产出,而不是每项任务 15.业务流程管理信息化是将生产流程、业务流程、各类行政审批流程、人事处理流程、财务管理流程等需要多人协作实施的任务,全部或部分交由计算机处理的过程。对于企业来说,一般将业务流程分为4个层次,其中资源能力计划和相关预算属于_层次。A战略B计划C运作D生产流程 16.基线由一组配置项组成,这些配置项构成了一个相对稳定的逻辑实体,是一组经过_正式审查、批准,达成一致的范围或工作产品。A用户B配置管理员C配置管理委员会D专家组 17.项目_的结果一经管理层确认,将对项目的实际采购活动产生现实性的指导,是项目采购活动的准绳。A工作说明书B自制和外购分析C范围说明书D采购计划编制 18.下列围绕采购供应商选择的做法中,_是不恰当的。A采购部门根据历年供应商的供货情况建立了一个供应商数据库,根据数据库选择合格的供应商B首先进行供应商调查,满足标准要求后可纳入合格供应商名单C为保持采购的公开透明,采购均采取招标形式选择合格供应商D把采购物品分为3个等级,最低一级供应企业可以没通过ISO 9001认证 19.根据配置版本号规则,某个配置项的版本号是1.0,说明_。A目前配置项处于第一次“正在修改”状态B目前配置项处于第一次“正在发布”状态C目前配置项处于“草稿”状态D目前配置项处于“不可变更”状态 20.Each machine in the internet is assigned a unique network address, called _, that is used to identify the machine for communication purposes.AMAC addressBIP addressChostaddressDdomain name address 21.某企业计划研发甲、乙、丙、丁4种产品。每种产品必须依次由设计部门、制造部门和检验部门进行设计、制造和检验,而每个部门必须按同样的顺序处理这几种产品。各种产品各项工作所需的时间如表所示。只要适当安排好产品研发顺序,企业最快可以在()天全部完成这4种产品的研发。A84B86C91D9322.Information, its most restricted technical sense, is a sequence of symbols that can be interpreted as a message. Information can be recorded as signs, or transmitted as _.AsymbolsBmessageCsignalsDwave 23.The uncertainty of an event is measured by its probability of occurrence and is inversely proportional to that. The more uncertain an event is, the more information is required to resolve uncertainty of that event. The amount of information is measured in _.ApossibilityBbitsCbpsDprobability 24.某饲养场饲养了某种动物,每只动物每天至少需要蛋白质200克、矿物质4克、维生素5克。市场上销售的甲、乙两种饲料每公斤的营养成分及单价如表所示。因此,饲养每只动物每天至少需要饲料成本()元。A6B8C10D1225.A _ is a type of bar chart that illustrates a project schedule. It illustrates the start and finish dates of the terminal elements and summary elements of a project.AGantt chartBproject histogramCmilestone chartDproject flowchart 26.某工厂生产D、E两种产品,每种产品均经过3道工序加工而成。假定每生产1立方米D种产品需用A种机器加工7小时,用B种机器加工3小时,用C种机器加工4小时;而每生产1立方米E种产品需用A种机器加工2.8小时,用B种机器加工9小时,用C种机器加工4小时。又已知每生产1立方米D种产品可盈利500元,每生产1立方米E种产品可盈利800元。现设一个月中A种机器工作时间不得超过560小时,B种机器工作时间不得超过460小时,C种机器工作时间不得超过336小时。为了获取最大盈利每月应该生产D产品约()立方米,E产品约()立方米。A33B35C49D5127.某部委邀请55位专家对5个项目A、B、C、D、E进行投票评选,要求按某种常用的规则从中选出优秀项目(可以有若干个项目并列优秀)。每个专家经过独立仔细研究,在自己的心目中都对这5个项目进行了优选排序(如表所示)。例如,有18位专家对项目的优选排序都是ADECB,依此类推。常用的五条选优规则如下。规则甲:只进行一轮投票,选出得票最多的项目。规则乙:进行两轮投票,第一轮投票先选出得票最多和次多的两个(或多个)项目,再在这些项目之间让全体专家进行第二轮投票,选出得票最多的项目。规则丙:进行多轮投票,每一轮投票淘汰得票最少的项目。规则丁:进行多次两项目对决投票,分别对所有各对(两个)项目进行选优投票,最后胜选次数最多的项目就作为优秀项目。根据该规则,选出了项目E。规则戊:每位专家对每个项目进行评分,分别以5、4、3、2、1分别评给自己心目中优选出来的第1、2、3、4、5个项目上,最后汇总统计各个项目的得分总和,选出最高得分的项目。该部委依据上述各个规则,组织专家进行项目评选,假设各位专家都完全按自己心目中的项目优选排序进行选择投票,并且没有弃权情况,则针对评选结果,()结论正确。A按规则甲和乙,都选出了项目AB按规则丙,选出了项目BC按规则丁和戊选出了项目ED按这五条规则分别选出了不同的项目28.某工厂生产D、E两种产品,每种产品均经过3道工序加工而成。假定每生产1立方米D种产品需用A种机器加工7小时,用B种机器加工3小时,用C种机器加工4小时;而每生产1立方米E种产品需用A种机器加工2.8小时,用B种机器加工9小时,用C种机器加工4小时。又已知每生产1立方米D种产品可盈利500元,每生产1立方米E种产品可盈利800元。现设一个月中A种机器工作时间不得超过560小时,B种机器工作时间不得超过460小时,C种机器工作时间不得超过336小时。为了获取最大盈利每月应该生产D产品约_立方米,E产品约_立方米。A33B35C49D51 29.The intention of the _ is to schedule,organize and control all activities to achieve the project goal eventually. No matter how difficult it is and what kind of risks are there.Aproject work breakdownBproject security authenticationCproject managementDproject flowchart 30.(31) data effectively is crucial for success in today’s competitive environment. Managers must know how to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration uses a base document that contains copies of other objects. (34) integration uses a base document that contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in plain English, without the computer syntax.(31)处是()A.GeneralizingB.SharingC.General-usingD.Globalizing31.A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the browser knows how to deal with (26) , and that it has a mechanism for (27) graphical files. Display text, display graphics, and (28) hyperlinks-there’s 99 percent of the (29) value. That’s not to say that the manufacturers didn’t go all-out to attach a hyperactive efflorescence of useless capabilities onto their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you can’t wait to delete from your favorites of bookmarks menu Remember when client-side Java applets were supposed to become the preferred (30) for application development Remember frames and all their nasty side effects(26)处是()A.superlinksB.linksC.hyperlinksD.connections32.Certificates are (66) documents attesting to the (67) of a public key to an individual or other entity. They allow verification of the claim that a given public key does in fact belong to a given individual. Certificates help prevent someone from using a phony key to (68) someone else. In their simplest form, Certificates contain a public key and a name. As commonly used, a certificate also contains an (69) date, the name, of the CA that issued the certificate, a serial number, and perhaps other information. Most importantly, it contains the digital (70) of the certificate issuer. The most widely accepted format for certificates is X.509, thus, Certificates can be read or written by any application complying with X.509.(66)是()A.textB.dataC.digitalD.structured33.It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question. (101) is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more (102) . A diagram graphically represents things, and the relationships between these things. These (103) can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (104) are used to capture the physical organization of the things in your system, i. e. , how one object relates to another. (105) focus on the behavior of elements in a system. For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements.(101)是()A. viewsB. diagramsC. user viewsD. structure pictures34.DOM is a platform and language- (51) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (52) . DOM is a (53) -based API to documents, which requires the whole document to be represented in (54) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (55) documents that do not fit info the memory available for processing.(51)是()A.specificB.neutralC.containedD.related35.(31) data effectively is crucial for success in today’s competitive environment. Managers must know how to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration uses a base document that contains copies of other objects. (34) integration uses a base document that contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in plain English, without the computer syntax.(32)是()A.similarityB.interoperabilityC.diversityD.interaction36.Most computer systems are (16) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (17) to an outsider attack by preventing.(18) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (19) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (20) by tools referred to as Intrusion Detection Systems.(16)是()A.vulnerableB.weekC.sensitivelyD.helpless37.Certificates are (66) documents attesting to the (67) of a public key to an individual or other entity. They allow verification of the claim that a given public key does in fact belong to a given individual. Certificates help prevent someone from using a phony key to (68) someone else. In their simplest form, Certificates contain a public key and a name. As commonly used, a certificate also contains an (69) date, the name, of the CA that issued the certificate, a serial number, and perhaps other information. Most importantly, it contains the digital (70) of the certificate issuer. The most widely accepted format for certificates is X.509, thus, Certificates can be read or written by any application complying with X.509.(67)是()A.connectingB.bindingC.composingD.conducting38.It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question. (101) is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more (102) . A diagram graphically represents things, and the relationships between these things. These (103) can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (104) are used to capture the physical organization of the things in your system, i. e. , how one object relates to another. (105) focus on the behavior of elements in a system. For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements.(102)是()A.ProgrammingB.AnalyzingC.DesigningD.Modeling39.(31) data effectively is crucial for success in today’s competitive environment. Managers must know how to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration uses a base document that contains copies of other objects. (34) integration uses a base document that contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in plain English, without the computer syntax.(33)是()A.SimulatedB.DuplicatedC.DynamicD.Static40.MIDI enables people to use (61) computers and electronic musical instruments. There are actually three components to M1DI, the communications (62) , the Hardware Interface and a distribution (63) called Standard MIDI Files. In the context of the WWW, the most interesting component is the (64) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (65)

    注意事项

    本文(2022贵州软件水平考试考试模拟卷(6).docx)为本站会员(w****)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开