2021上海软件水平考试考试考前冲刺卷(3).docx
《2021上海软件水平考试考试考前冲刺卷(3).docx》由会员分享,可在线阅读,更多相关《2021上海软件水平考试考试考前冲刺卷(3).docx(42页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、2021上海软件水平考试考试考前冲刺卷(3)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.XML是互联网联合组织创建的一组规范,XML是开放的,是_标准。XML主要有_等三个要素,为了增强XML文件结构化要求,一般要使用XML的辅助技术_。ACORBABTHMLCSGMLDDTD 2.在软件项目估算时,将代码行LOC和功能点FP数据在两个方面使用:一是作为一个估算变量,度量软件每一个_的大小;一是联合使用从过去的项目中收集到的_和其它估算变量,进行成本和_估算。A时间B数据C分量D工作量
2、3.计算机性能评测分为评估和测试两种方法,其中评估是基于一些原始数据进行推算。_用于评价同一厂商生产的同一计算机系统的定点运算速度比较正确;_可用于比较和评价在同一系统上求解同一问题的不同算法的性能;_是美国用来限制计算机出口的系统性能指标估算方法。AMFLOPSBPDRCMIPSDCTP 4.在软件的开发过程中常用图作为描述工具。如DFD就是面向_分析方法的描述工具。在一套分层DFD中,如果某一张图中有N个加工(Process),则这张图允许有_张子图。在一张DFD图中,任意两个加工之间_。在画分层DFD时,应注意保持_之间的平衡。DFD中从系统的输入流到系统的输出流的一连串连续变换形成一种
3、信息流,这种信息流可分为_。A父图与其子图B同一父图的所有子图C不同父图的所有子图D同一予图的所有直接父图 5.在软件的开发过程中常用图作为描述工具。如DFD就是面向_分析方法的描述工具。在一套分层DFD中,如果某一张图中有N个加工(Process),则这张图允许有_张子图。在一张DFD图中,任意两个加工之间_。在画分层DFD时,应注意保持_之间的平衡。DFD中从系统的输入流到系统的输出流的一连串连续变换形成一种信息流,这种信息流可分为_。A控制流和变换流B变换流和事务流C事务流和事件流D事件流和控制流 6.DOM is a platform- and language- (66) API t
4、hat allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into
5、 the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for proc
6、essing.AspecificBneutralCcontainedDrelated 7.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document c
7、an be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used
8、 to process very large (70) documents that do not fit into the memory available for processing.AtextBImageCPageDgraphic 8.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definiti
9、ons for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processi
10、ng it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for processing.AtableBtreeCcontrolDevent 9.DOM is a platform- and language- (66) API that allows programs and scripts to dynamically access and
11、 update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documen
12、ts, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (70) documents that do not fit into the memory available for processing.AdocumentBprocessorCdiscDmemory 10.TCP/IP (71) lay
13、er protocols provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need like the ability to transfer a file in the case of HTTE In short, the application layer provides an (74) betwee
14、n software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options the Transmission Control Protocol (TCP) and the User Datagram Protocol
15、 (UDP).AapplicationBtransportClinkDnetwork 11.Virtual reality (or VR (1) ) is kind of a buzzword these days in computer graphics.VR is artificial reality created by a computer that is so enveloping that it is perceived by the mind as being truly real.VR exists in many (2) .A traditional view of virt
16、ual reality uses headsets and data gloves.The headset serves as the eyes and ears to your virtual world,projecting sights and sounds generated by the computer.The data glove becomes your hand,enabling you to interact with this (3) world.As you move your head around,the computer will track your motio
17、n and display the right image.VR is the most demanding (4) for computer graphics,requiring hardware and software capable of supporting realtime 3D (5) .Afor certainBfor any sakeCfor allDfor short 12.Originally introduced by Netscape Communications, (66) are a general mechanism which HTTP Server side
18、 applications, such as CGI (67) , can use to both store and retrieve information on the HTTP (68) side of the connection. Basically, Cookies can be used to compensate for the (69) nature of HTTE The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-bas
19、ed (70) .ABrowsersBCookiesCConnectionsDScripts 13.WebSQL is a SQL-like (71) language for extracting information from the web. Its capabilities for performing navigation of web (72) make it a useful tool for automating several web-related tasks that require the systematic processing of either all the
20、 links in a (73) , all the pages that can be reached from a given URL through (74) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (75) Interface.AqueryBtransactionCcommunicationDprogramming 14.Melissa and Lo
21、veLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (71) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (72) . Upon running, such worms usually proceed to send themselves out to email addresses from
22、the victims address book, previous emails, web pages (73) . As administrators seek to block dangerous email attachments through the recognition of well-known (74) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole lis
23、t of other extensions and will still run and successfully infect target users. Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2021 上海 软件 水平 考试 考前 冲刺
限制150内