欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    2023年上海软件水平考试考试考前冲刺卷(3).docx

    • 资源ID:75629158       资源大小:23.47KB        全文页数:43页
    • 资源格式: DOCX        下载积分:15金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要15金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    2023年上海软件水平考试考试考前冲刺卷(3).docx

    2023年上海软件水平考试考试考前冲刺卷(3)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.XML是互联网联合组织创建的一组规范,XML是开放的,是_标准。XML主要有_等三个要素,为了增强XML文件结构化要求,一般要使用XML的辅助技术_。ACORBABTHMLCSGMLDDTD 2.在软件项目估算时,将代码行LOC和功能点FP数据在两个方面使用:一是作为一个估算变量,度量软件每一个_的大小;一是联合使用从过去的项目中收集到的_和其它估算变量,进行成本和_估算。A时间B数据C分量D工作量 3.计算机性能评测分为评估和测试两种方法,其中评估是基于一些原始数据进行推算。_用于评价同一厂商生产的同一计算机系统的定点运算速度比较正确;_可用于比较和评价在同一系统上求解同一问题的不同算法的性能;_是美国用来限制计算机出口的系统性能指标估算方法。AMFLOPSBPDRCMIPSDCTP 4.在软件的开发过程中常用图作为描述工具。如DFD就是面向_分析方法的描述工具。在一套分层DFD中,如果某一张图中有N个加工(Process),则这张图允许有_张子图。在一张DFD图中,任意两个加工之间_。在画分层DFD时,应注意保持_之间的平衡。DFD中从系统的输入流到系统的输出流的一连串连续变换形成一种信息流,这种信息流可分为_。A父图与其子图B同一父图的所有子图C不同父图的所有子图D同一予图的所有直接父图 5.在软件的开发过程中常用图作为描述工具。如DFD就是面向_分析方法的描述工具。在一套分层DFD中,如果某一张图中有N个加工(Process),则这张图允许有_张子图。在一张DFD图中,任意两个加工之间_。在画分层DFD时,应注意保持_之间的平衡。DFD中从系统的输入流到系统的输出流的一连串连续变换形成一种信息流,这种信息流可分为_。A控制流和变换流B变换流和事务流C事务流和事件流D事件流和控制流 6.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for processing.AspecificBneutralCcontainedDrelated 7.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for processing.AtextBImageCPageDgraphic 8.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for processing.AtableBtreeCcontrolDevent 9.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for processing.AdocumentBprocessorCdiscDmemory 10.TCP/IP (71) layer protocols provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need like the ability to transfer a file in the case of HTTE In short, the application layer provides an (74) between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).AapplicationBtransportClinkDnetwork 11.Virtual reality (or VR (1) ) is kind of a buzzword these days in computer graphics.VR is artificial reality created by a computer that is so enveloping that it is perceived by the mind as being truly real.VR exists in many (2) .A traditional view of virtual reality uses headsets and data gloves.The headset serves as the eyes and ears to your virtual world,projecting sights and sounds generated by the computer.The data glove becomes your hand,enabling you to interact with this (3) world.As you move your head around,the computer will track your motion and display the right image.VR is the most demanding (4) for computer graphics,requiring hardware and software capable of supporting realtime 3D (5) .Afor certainBfor any sakeCfor allDfor short 12.Originally introduced by Netscape Communications, (66) are a general mechanism which HTTP Server side applications, such as CGI (67) , can use to both store and retrieve information on the HTTP (68) side of the connection. Basically, Cookies can be used to compensate for the (69) nature of HTTE The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (70) .ABrowsersBCookiesCConnectionsDScripts 13.WebSQL is a SQL-like (71) language for extracting information from the web. Its capabilities for performing navigation of web (72) make it a useful tool for automating several web-related tasks that require the systematic processing of either all the links in a (73) , all the pages that can be reached from a given URL through (74) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (75) Interface.AqueryBtransactionCcommunicationDprogramming 14.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (71) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (72) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (73) . As administrators seek to block dangerous email attachments through the recognition of well-known (74) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users. Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (75) access to your network.AattachmentBpacketCdatagramDmessage 15.It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question. (71) is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more (72) . A diagram graphically represents things, and the relationships between these things. These (73) can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (74) are u sed to capture the physical organization of the things in your system, i.e., how one object relates to another. (75) focus on the behavior of elements in a system. For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements.AProgrammingBAnalyzingCDesigningDModeling 16.The use of computer graphics (1) many diverse fields. Applications (2) from the production of charts and graphs, to the generation of realistic images for television and motion pictures to the (3) design of mechanical parts.To encompass all these uses, we can adopt a simple definition:Computer graphics is concerned with all (4) of using a computer to generate images.We can classify applications of computer graphics into four main areas:Display of information, Design, (5) ,User interfaces.ApervadesBpervasiveCperverseDpervert 17.WebSQL is a SQL-like (71) language for extracting information from the web. Its capabilities for performing navigation of web (72) make it a useful tool for automating several web-related tasks that require the systematic processing of either all the links in a (73) , all the pages that can be reached from a given URL through (74) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (75) Interface.AbrowsersBserversChypertextsDclients 18.Originally introduced by Netscape Communications, (66) are a general mechanism which HTTP Server side applications, such as CGI (67) , can use to both store and retrieve information on the HTTP (68) side of the connection. Basically, Cookies can be used to compensate for the (69) nature of HTTE The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (70) .AgraphicsBprocessesCscriptsDtexts 19.Observe that for the programmer, as for the chef, the urgency of the patron (顾客) may govern the scheduled completion of the task, but it cannot govern the actual completion. An omelette (煎鸡蛋) , promised in two minutes, may appear to be progressing nicely. But when it has not set in two minutes, the customer has two choices-waits or eats it raw. Software customers have had (71) choices. Now I do not think software (72) have less inherent courage and firmness than chefs, nor than other engineering managers. But false (73) to match the patrons desired date is much more common in our discipline than elsewhere in engineering. It is very (74) to make a vigorous, plausible, and job risking defense of an estimate that is derived by no quantitative method, supported by little data, and certified chiefly by the hunches of the managers. Clearly two solutions are needed. We need to develop and publicize productivity figures, bug-incidence figures, estimating rules, and so on. The whole profession can only profit from (75) such data. Until estimating is on a sounder basis, individual managers will need to stiffen their backbones and defend their estimates with the assurance that their poor hunches are better than wish derived estimates.A.testers B constructors C. managers D. architects 20.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for processing.AXMLBHTMLCscriptDWeb 21.The use of computer graphics (1) many diverse fields. Applications (2) from the production of charts and graphs, to the generation of realistic images for television and motion pictures to the (3) design of mechanical parts.To encompass all these uses, we can adopt a simple definition:Computer graphics is concerned with all (4) of using a computer to generate images.We can classify applications of computer graphics into four main areas:Display of information, Design, (5) ,User interfaces.AscopeBboundCrangeDarea 22.TCP/IP (71) layer protocols provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need like the ability to transfer a file in the case of HTTE In short, the application layer provides an (74) between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).AhardwareBsoftwareCpacketDequipment 23.Virtual reality (or VR (1) ) is kind of a buzzword these days in computer graphics.VR is artificial reality created by a computer that is so enveloping that it is perceived by the mind as being truly real.VR exists in many (2) .A traditional view of virtual reality uses headsets and data gloves.The headset serves as the eyes and ears to your virtual world,projecting sights and sounds generated by the computer.The data glove becomes your hand,enabling you to interact with this (3) world.As you move your head around,the computer will track your motion and display the right image.VR is the most demanding (4) for computer graphics,requiring hardware and software capable of supporting realtime 3D (5) .AformBformsCformatDshape 24.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (71) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (72) . Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (73) . As administrators seek to block dangerous email attachments through the recognition of well-

    注意事项

    本文(2023年上海软件水平考试考试考前冲刺卷(3).docx)为本站会员(l****)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开