2021江西软件水平考试考试真题卷(8).docx
《2021江西软件水平考试考试真题卷(8).docx》由会员分享,可在线阅读,更多相关《2021江西软件水平考试考试真题卷(8).docx(27页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、2021江西软件水平考试考试真题卷(8)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.在软件开发中, (13) 不能用来描述项目开发的进度安排。在其他三种图中,可用 (14) 动态地反映项目开发进展情况。A甘特图BPEWT图CPERT/CPM图D鱼骨图2.常见的开发模型有瀑布模型、演化模型、螺旋模型、喷泉模型等。其中 (1) 适用于需求明确或很少变更的项目, (2) 模型主要用来描述面向对象的软件开发过程。A瀑布模型B演化模型C螺旋模型D喷泉模型3.一台PC通过调制解调器与另一台PC进行数
2、据通信,其中PC属于 (1) ,调制解调器属于 (2) 。调制解调器的数据传送方式为 (3) 。A频带传输B数字传输C基带传输DIP传输4.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon r
3、unning, such worms usually proceed to send themselves out to email addresses from the victim’s address book, previous emails, web pages (8) .As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent
4、such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute
5、animation, simultaneously runs commands in the background to steal your passwords and give the (10) access to your network.7()A.virtualB.virusC.wormsD.bacteria5.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you
6、 to open it. This is what happens with Melissa and several other similar email (7) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim’s address book, previous emails, web pages (8) .As administrators seek to block dangerous email attachments th
7、rough the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks
8、 by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (10) access to your network.8()A.memoryB.cachesC.portsD.registers6.Melissa and LoveLetter made use of the trust th
9、at exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim’s address book, pr
10、evious emails, web pages (8) .As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will
11、still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (10) access to your ne
12、twork.9()A.namesB.cookiesC.softwareD.extensions7.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon running, such worms us
13、ually proceed to send themselves out to email addresses from the victim’s address book, previous emails, web pages (8) .As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Exec
14、utable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneo
15、usly runs commands in the background to steal your passwords and give the (10) access to your network.10()A.crackerB.userC.customerD.client8.根据McCabe环路复杂性度量,如图8-4所示的程序图的复杂度是(3),对该程序进行路径覆盖测试,可得到的基本路径是(4)。(3)处填()。A2B3C4D59.斐波那契(Fibonacci)数列可以递归地定义为:用递归算法求解F(6)时需要执行(7)次+运算,该方法采用的算法策略是(8)。(7)处填()。A6B7C1
16、2D1310.在一个单CPU的计算机系统中,有3台不同的外部设备R1、R2和R3,以及3个进程P1、P2和P3。系统CPU调度采用可剥夺式优先级的进程调度方案,3个进程的优先级、使用设备的先后顺序和占用设备时间如表8-2所示。假设操作系统的开销忽略不计,从3个进程同时投入运行到全部完成,CPU的利用率约为_(1)_%;R3的利用率约为(2)%。其中,设备的利用率是指该设备的使用时间与进程组全部完成所占用时间的比率。(1)处填()。A66.7B75C83.3D91.711.某软件公司欲开发一个图像浏览系统,要求该系统能够显示BMP、JPEG和GIF3种格式的文件,并且能够在Windows和Lin
17、ux两种操作系统上运行。系统首先将相关图片格式的文件解析为像素矩阵,然后将像素矩阵显示在屏幕上。为满足上述需求并减少所需生成的子类数目,采用(5)进行设计所得类图如图8-7所示。假设该系统需要支持8种格式的图像文件和4种操作系统,不考虑类Matrix,若采用该设计模式则至少需要设计(6)个类。(5)处填()。ABridge设计模式BDecorate设计模式CState设计模式DTemplate Method设计模式12.The traditional model for systems development was that an IT department used(1) which is
18、 a process-centered technique, and consulted users only when their input or approval was needed. Compared with traditional methods, many companies find that JAD allows(2) to participate effectively in the requirements modeling process. When properly used, JAD can result in a more accurate statement
19、of system requirements, a beret understanding of common goals, and a stronger commitment to the success of the new system. RAD is a(3) technique that speeds up information systems development and produces a functioning information system. While the end product of JAD is a(an) (4), the end product of
20、 RAD is the new information system. The RAD model consists of tour phases. During the (5), users interact with systems analysts and develop models and prototypes that represent all system processes, outputs, and inputs.(1)处填()。Aobject-oriented analysisBstructured analysisCprocess analysisDprototype
21、analysis13.斐波那契(Fibonacci)数列可以递归地定义为:用递归算法求解F(6)时需要执行(7)次+运算,该方法采用的算法策略是(8)。(8)处填()。A动态规划B分治C回溯D分支限界14.The traditional model for systems development was that an IT department used (1) which is a process-centered technique, and consulted users only when their input or approval was needed. Compared wi
22、th traditional methods, many companies find that JAD allows (2) to participate effectively in the requirements modeling process. When properly used, JAD can result in a more accurate statement of system requirements, a beret understanding of common goals, and a stronger commitment to the success of
23、the new system. RAD is a (3) technique that speeds up information systems development and produces a functioning information system. While the end product of JAD is a(an) (4), the end product of RAD is the new information system. The RAD model consists of tour phases. During the (5), users interact
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2021 江西 软件 水平 考试 真题卷
限制150内