2023年广东软件水平考试考试模拟卷(6).docx
《2023年广东软件水平考试考试模拟卷(6).docx》由会员分享,可在线阅读,更多相关《2023年广东软件水平考试考试模拟卷(6).docx(39页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、2023年广东软件水平考试考试模拟卷(6)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.协作图主要描述对象间的交互与连接,它 (52) 。A能够表示消息的顺序和嵌套关系B能够表示消息的顺序关系,但不能表示消息的嵌套关系C能够表示消息的嵌套关系,但不能表示消息的顺序关系D既不能表示消息的顺序关系,也不能表示消息的嵌套关系 2.已知3个类O、P和Q,类O中定义了一个私有方法F1、一个公有方法 F2和一个受保护的方法F3:类P和类Q为类O的派生类,其继承方式如下所不: class P:prote
2、cted O. class Q;public O 在关于方法F1的描述中正确的是 (54) 。在关千方法F2的描述中正确的是 (55) 。在关于方法F3的描述中正确的是 (56) 。A方法F1无法被访问B只有在类O内才能访问方法nC只有在类P内才能访问方法F1D只有在类Q内才能访问方法F1 3.回调(Call back)函数是面向过程的程序设计语言中常用的一种机制,而设计模式中的 (62) 模式就是回调机制的一个面向对象的替代品。该模式的意图是 (63) 。AStrategy(策略)BAdapter(适配器)CCommand(命令)DObserver(观察者) 4.根据图10-5所示的UML类
3、图可知,类Car和类Boat中的move()方法 (59) 。A引用了类Transport的move()方法B重置了类Transport的move()方法C是类Transport的move()方法的聚集D是类Transport的move()方法的泛化 5.在一个客户信息系统中存在两种类型的客户:个人客户和集团客户。对于个人客户,系统中保存了其客户标识和基本信息(包括姓名、住宅电话和 Email) 对于集团客户,系统中保存了其客户标识,以及与该集团客户相关的若干个联系人的信息(联系人的信息包括姓名、住宅电话、email、办公电话和职位)。 根据上述描述,得到了如图10-4所示的UML类图,其中类
4、“客户”的属性有 (57) ;类“人”的属性有 (58) 。A客户标识B姓名、住宅电话、emailC姓名、住宅电话、办公电话、email、职位D客户标识、办公电话、职位 6.在UML的通用机制中, (60) 用于把元素组织成组; (61) 是系统中遵从一组接口规范且付诸实现的物理的、可替换的软件模块。A包B类C接口D构件 7.已知3个类O、P和Q,类O中定义了一个私有方法F1、一个公有方法 F2和一个受保护的方法F3:类P和类Q为类O的派生类,其继承方式如下所不: class P:protected O. class Q;public O 在关于方法F1的描述中正确的是 (54) 。在关千方法
5、F2的描述中正确的是 (55) 。在关于方法F3的描述中正确的是 (56) 。A类O、P和Q的对象都可以访问方法F2B类P和Q的对象都可以访问方法F2C类O和Q的对象都可以访问方法F2D只有在类P内才能访问方法F2 8.回调(Call back)函数是面向过程的程序设计语言中常用的一种机制,而设计模式中的 (62) 模式就是回调机制的一个面向对象的替代品。该模式的意图是 (63) 。A使原本由于接口不兼容而不能一起工作的那些类可以一起工作B将一个请求封装为一个对象,从而可用不同的请求对客户进行参数化,将请求排队或记录请求日志,支持可撤消的操作C定义对象间的一种一对多的依赖关系,当一个对象的状态
6、发生改变时,所有依赖于它的对象都得到通知并被自动更新D使算法可独立于使用它的客户而变化 9.在UML的通用机制中, (60) 用于把元素组织成组; (61) 是系统中遵从一组接口规范且付诸实现的物理的、可替换的软件模块。A包B类C接口D构件 10.在一个客户信息系统中存在两种类型的客户:个人客户和集团客户。对于个人客户,系统中保存了其客户标识和基本信息(包括姓名、住宅电话和 Email) 对于集团客户,系统中保存了其客户标识,以及与该集团客户相关的若干个联系人的信息(联系人的信息包括姓名、住宅电话、email、办公电话和职位)。 根据上述描述,得到了如图10-4所示的UML类图,其中类“客户”
7、的属性有 (57) ;类“人”的属性有 (58) 。A客户标识B姓名、住宅电话、emailC姓名、住宅电户、办公电话、email、职位D客户标识、办公电话、职位 11.已知3个类O、P和Q,类O中定义了一个私有方法F1、一个公有方法 F2和一个受保护的方法F3:类P和类Q为类O的派生类,其继承方式如下所不: class P:protected O. class Q;public O 在关于方法F1的描述中正确的是 (54) 。在关千方法F2的描述中正确的是 (55) 。在关于方法F3的描述中正确的是 (56) 。A类O、P和Q的对象都可以访问方法F3B类O、P和Q的对象都不可以访问方法F3C类
8、O的对象可以访问方法F3,但类P的对象不能访问方法F3D类P的对象可以访问方法F3,但类Q的对象不能访问方法F3 12.用例从用户角度描述系统的行为。用例之间可以存在一定的关系。在“某图书馆管理系统”用例模型中,所有用户使用系统之前必须通过“身份验证”,“身份验证”可以有“密码验证”和“智能卡验证”两种方式,则“身份验证”与“密码验证”和“智能卡验证”之间是 (65) 关系。A关联B包含C扩展D泛化 13.在UML的动态建模机制中, (66) 描述了对象之间动态的交互关系,还描述了交互的对象之间的静态链接关系,即同时反映系统的动态和静态牲。A状态图B序列图C协作图D活动图 14.对OO系统的技
9、术度量的识别特征,Berard定义了导致特殊度量的特征。其中 (64) 抑制程序构件的操作细节,只有对访问构件必须的信息被提供给其他希望访问的构件。A局部化B封装C信息隐藏D继承 15.In (85) software, one question of near-universal interest is how rapidly Windows NT, which began shipping last summer, will be (86) in the marketplace and for what uses. For the most part, observers are (87)
10、 about the operating system’s long term prospects, but expect it to remain on (88) rather than desktops during 1994, saying that it won’t become a mainstream product until (89) PCs typically have 16 to 24 MB of RAM, which is unlikely to happen next year.(85)是()A.applicationsB.acceptedC.c
11、lientsD.enthusiasticE.serversF.desktopG.systemsH.replaced16.Object-oriented DBMS integrated a variety of (81) data types-such as business procedures, graphics, pictures, voice and annotated text.Object orientation also makes a (82) to application development efficiency. It makes the data, functions,
12、 attributes, and relationships an integral part of the (83) . In this way, objects can be reused and replicated.Some leading RDBMS vendors support the concept of integrating object management capabilities with their current line of relational products. That capability enable users to the development
13、 cycle, since integrity logic and business roles no longer need to be programmed (84) each application.(81)是()A.toolB.inC.ideaD.contributionE.jokeF.shortG.objectH.theoreticalI.extentJ.shortenK.real-worldL.into17.A local-area network (LAN) is a communications network that (125) a variety of devices a
14、nd provides a (126) for information exchange among those devices. The scope of the LAN is small typically a single building or a cluster (丛) of buildings. The LAN is usually owned by the same organization that owns the (127) devices. The internal data rate of LAN is at least several Mb/s.The basic o
15、f LAN communication is broadcasting. At each station, there is a transmitter/receiver that communicates over a (128) shared, By other stations. A transmission from any one station is (129) to and received by all other stations.(125)是()A.broadcastB.cableC.controlD.interconnectsE.internetF.meanderG.me
16、ansH.mediumI.modemJ.output switch relay18.Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (16) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (17) . Upon running, such worms usually
17、 proceed to send themselves out to email addresses from the victims address book, previous emails, web pages (18) .A. attachment B. packet C. datagram D. messageAs administrators seek to block dangerous email attachments through the recognition of well-known (19) , virus writers use other extensions
18、 to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displa
19、ying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (20) access to your network.19.Network managers have long (140) practical voice-over-IP (VOIP) solutions. VOIP (141) ease network management and decreases costs by converging a company&rsquo
20、;s telephony and data infrastructures into one network. And a VOIP solution implemented at a company’s head-quarters with far-reaching branch offices can (142) tremendous amounts of (143) in long distance phone bills, provided that solution delivers POTS-like voice (144) over the Internet.(140
21、)是()A.awaitB.awaitedC.awaitingD.awaits20.(31) analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems. Ultimately, the system models become the (32) for designing and constructing an improved system. (33) is such a technique. The emph
22、asis in this technique is process-centered. Systems analysts draw a series of process models called (34) . (35) is another such technique that integrates data and process concerns into constructs called objects.(31)是()A.PrototypingB.AcceleratedC.Model-drivenD.Iterative21.While most recent attention
23、in the AI field has been focused on expert system software, AI (66) has also seen dramatic advances. Activity in the past years was characterized by new low-cost, powerful Lisp machines, the introduction of AI workstations, Lisp compilers becoming available for all major professional and engineering
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2023 广东 软件 水平 考试 模拟
限制150内