收藏 分享(赏)

第九章(专业考试).ppt

上传人:11xg27ws 文档编号:7995091 上传时间:2019-06-03 格式:PPT 页数:13 大小:125KB
下载 相关 举报
第九章(专业考试).ppt_第1页
第1页 / 共13页
第九章(专业考试).ppt_第2页
第2页 / 共13页
第九章(专业考试).ppt_第3页
第3页 / 共13页
第九章(专业考试).ppt_第4页
第4页 / 共13页
第九章(专业考试).ppt_第5页
第5页 / 共13页
点击查看更多>>
资源描述

1、第9章 计算机专业英语试题汇编,9.1 计算机专业英语真题汇编 9.2 计算机专业英语模拟题汇编,同学们,计算机技术与软件专业技术资格(水平)考试(以下简称计算机软件考试)是原中国计算机软件专业技术资格和水平考试(简称软件考试)的完善与发展。这是由国家人事部和信息产业部领导下的国家级考试,其目的是,科学、公正地对全国计算机与软件专业技术人员进行职业资格、专业技术资格认定和专业技术水平测试。 原软件考试在全国范围内已经实施了十多年,截止2007年,累计参加考试的人数约有一百六十多万人。该考试由于其权威性和严肃性,得到了社会及用人单位的广泛认同,并为推动我国信息产业特别是软件产业的发展和提高各类I

2、T人才的素质做出了积极的贡献。 根据人事部、信息产业部文件(国人部发200339号),计算机与软件考试纳入全国专业技术人员职业资格证书制度的统一规划。通过考试获得证书的人员,表明其已具备从事相应专业岗位工作的水平和能力,用人单位可根据工作需要从获得证书的人员中择优聘任相应专业技术职务(技术员、助理工程师、工程师、高级工程师)。计算机专业技术资格(水平)实施全国统一考试后,不再进行计算机技术与软件相应专业和级别的专业技术职务任职资格评审工作。因此,这种考试既是职业资格考试,又是职称资格考试。 同时,这种考试还具有水平考试性质,报考任何级别不需要学历、资历条件,只要达到相应的技术水平就可以报考相应

3、的级别。部分级别的考试已与日本、韩国相应级别的考试互认,以后还将进一步扩大考试互认的级别以及互认的国家。 考试合格者将颁发由中华人民共和国人事部和中华人民共和国信息产业部用印的计算机技术与软件专业技术资格(水平)证书。,9.1 计算机专业英语真题汇编,9.1.1程序员试题真题汇编(计算机专业英语部分) 9.1.2软件设计师试题真题汇编(计算机专业英语部分),9.1.1程序员试题真题汇编,12007年下半年试题 (1)_ is a functional unit that interprets and carries out instructions.A. Memory B. Processor

4、 C. Storage D. Network (2)_ consists of the symbols, characters, and usage rules that permit people to communicate with computer.A. Programming language B. Network C. Keyboard D. Display (3)_ software, also called end-user program, includes database programs, word processors, spreadsheets etc.A. App

5、lication B. System C. Compiler D. Utility (4)In _ , the only element that can be deleted or removed is the one that was inserted most recently.A. a line B. a queue C. an array D. a stack (5)Most _ measures involve data encryption and password.A. security B. hardware C. display D. program,9.1.1程序员试题真

6、题汇编,22007年上半年试题 (1)Insufficient _ can cause a processor to work at 50% or even more below its performance potential.A. mouse B. I/O C. document D. memory (2)The _ in e-mail messages has affected almost every computer around the world and has caused the damage of up to US $1 billion in North America.

7、A. illness B. virus C. weakness D. attachment (3)One of the basic rules of computer security is to change your _ regularly.A. name B. computer C. device D. password (4)One of the greatest features of a home _ is the ability to share one Internet connection simultaneously over two or more computers.A

8、. computer B. device C. network D. work (5)The usual address for a Web site is the _ page address, although you can enter the address of any page and have that page sent to you.A. home B. main C. host D. house,9.1.1程序员试题真题汇编,32006年下半年试题 (1)_ : An error can be caused by attempting to divide by 0.A. I

9、nterrupt B. Default C. Underflow D. Overflow (2)_ : The process of identifying and correcting errors in a program.A. Debug B. Bug C. Fault D. Default (3)_ : A collection of related information, organized for easy retrieval.A. Data B. Database C. Buffer D. Stack (4)_ : A location where data can be te

10、mporarily stored.A. Area B. Disk C. Buffer D. File (5)_ : A graphical bar with buttons that perform some of the most common commands.A. Title bar B. Tool bar C. Status bar D. Scroll bar (6)Every valid character in a computer that uses even _ must always have an even number of 1 bits.A. parity B. che

11、ck C. test D. compare (7)The maximum number of data that can be expressed by 8 bits is _ .A. 64 B. 128 C. 255 D. 256 (8)Integration _ is the process of verifying that the components of a system work together as described in the program design and system design specifications.A. trying B. checking C.

12、 testing D. coding (9)GIF files are limited to a maximum of 8 bits/pixel, it simply means that no more than 256 colors are allowed in _ .A. an image B. a file C. a window D. a page (10)Computer _ is a complex consisting of two or more connected computing units, it is used for the purpose of data com

13、munication and resource sharing.A. storage B. device C. network D. processor,9.1.1程序员试题真题汇编,42006年上半年试题 (1)_ is a device that converts images to digital format.A. Copier B. Printer C. Scanner D. Display (2)In C language, a _ is a series of characters enclosed in double quotes.A. matrix B. string C.

14、program D. stream (3)_ are those programs that help find the information you are trying to locate on the WWW.A. Windows B. Search Engines C. Web Sites D. Web Pages (4)In C language, _ are used to create variables and are grouped at the top of a program block.A. declarations B. dimensions C. comments

15、 D. descriptions (5)An _ statement can perform a calculation and store the result in a variable so that it can be used later.A. executable B. input C. output D. assignment (6)Each program module is compiled separately and the resulting _ files are linked together to make an executable application.A.

16、 assembler B. source C. library D. object (7)_ is the conscious effort to make all jobs similar, routine, and interchangeable.A. WWW B. Informatization C. Computerization D. Standardization (8)A Web _ is one of many software applications that function as the interface between a user and the Internet

17、.A. display B. browser C. windows D. view (9)Firewall is a _ mechanism used by organizations to protect their LANs from the Internet.A. reliable B. stable C. peaceful D. security (10)A query is used to search through the database to locate a particular record or records, which conform to specified _

18、 .A. criteria B. standards C. methods D. conditions,9.1.2软件设计师试题真题汇编,12007年下半年试题 The Rational Unified Process (RUP) is a software engineering process, which captures many of best practices in modern software development. The notions of ( 1 ) and scenarios have been proven to be an excellent way to c

19、apture function requirements. RUP can be described in two dimensions-time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive ( 2 ) which is concluded with a well-defined ( 3) and can be further broken down into ( 4 ) -a compl

20、ete development loop resulting in a release of an executable product, a subset of the final product under development, which grows incrementally to become the final system. The content structure refers to the disciplines, which group ( 5 ) logically by nature. (1)A. artifacts B. use cases C. actors

21、D. workers (2)A. orientations B. views C. aspects D. phases (3)A. milestone B. end mark C. measure D. criteria (4)A. rounds B. loops C. iterations D. circularities (5)A. functions B. workflows C. actions D. activities,9.1.2软件设计师试题真题汇编,22007年上半年试题( 1 ) analysis emphasizes the drawing of pictorial sys

22、tem models to document and validate both existing and/or proposed systems. Ultimately, the system models become the ( 2 ) for designing and constructing an improved system. ( 3 ) is such a technique. The emphasis in this technique is process-centered. Systems analysts draw a series of process models

23、 called ( 4 ) . ( 5 ) is another such technique that integrates data and process concerns into constructs called objects. (1)A. Prototyping B. Accelerated C. Model-driven D. Iterative (2)A. image B. picture C. layout D. blueprint (3)A. Structured analysis B. Information EngineeringC. Discovery Proto

24、typing D. Object-Oriented analysis (4)A. PERT B. DFD C. ERD D. UML (5)A. Structured analysis B. Information EngineeringC. Discovery Prototyping D. Object-Oriented analysis,9.2 计算机专业英语模拟题汇编,1.程序员模拟题一 (1)Give the logical variables XY1,The value of X V Y(logical addition)is ( ).A.8 B.6 C.4 D.1 (2)Appli

25、cations put computers to practical business ( ) ,but below the ( ) its the heart of an operating system-the kernel-that provides the technical wizardry to juggle multiple program,connect to networks and store ( ) . A traditional kernel provides all the functions for applications. The kernel ( ) memo

26、ry,I/O devices and parcels out processor time. The kernel also supports security and fault ( ) ,which is the ability to recover automatically when parts of the system fail. A.used B.use C.apply D.applied A.earth B.bottom C.table D.surface A.graphics B.data C.text D.image A.manages B.manage C.managed

27、 D.managing A.error B.question C.tolerance D.problem,9.2 计算机专业英语模拟题汇编,(3)Which of the following methods is used to increase the number of processes sharing the CPU? ( ) .A.Interrupt B.Scheduler C.Working Set D.Swapping (4)Which of the following statements describe(s)the properties of a purely segmen

28、ted? memory system? ( ) . .It suffers from internal fragmentation .It permits implementation of virtual memory .It divides memory into units of equal size A. only B. only C. only D. and (5)In the WAN,when a point-to-point subnet is used,an important design issue is the roucer interconnection ( ) A.

29、B., C., D. and (6)when a string constant is written in C program,the compiler creates ( ) of characters containing the characters of the string,and terminating it with“0“.A. a group B. an array C. a set D. a series,9.2 计算机专业英语模拟题汇编,2.程序员模拟题二 (1)The prototyping method is a dynamic design processs,whi

30、ch requires people who use prototyping method to have the following capability of ( ) .A.Proficient program expertise B.immediately acquire requirementC.coordinate & organize eloquently D.handle tools smartly (2)Most frequently used algorithm for page replacement is ( ) .A.LRU B.FIFO C.OPT D.PPT (3)

31、Traversing a binary tree in preorder is equivalent to ( ) .A.Traversing the forest corresponding to the binary tree in root-first orderB.Traversing the forest corresponding to the binary tree in root-last orderC.Traversing the forest corresponding to the binary tree in breadth-first orderD.None of t

32、he above (4)As an important phase in software development,software design is the continuation of software requirement analysis phase. ( ) .software structure? .software document.software module? .software procedure Which of the following should be included in software design phase? A. and B. and C.,

33、 and D.All (5)TCP(Transmission Control Protocol)was specifically designed to provide a reliable end-to-end byte stream over a(n) ( ) .A.IP address B.reliable network C.socket D.unreliable internetwork (6)In the Ethernet LAN,an algorithm was chosen to dynarnically adapt to the number of stations tryi

34、ng to send. It is called ( ) .A.backward learning B.binary exponential back offC.spanning tree D.CRC,9.2 计算机专业英语模拟题汇编,(7)The principle for a stack memory to store data is ( ) .A.FIFO B.random C.FILO D.other way (8)Suppose we have the relation schema R(A,B,C,D)with functional dependencies;FAB,BC,CD,D

35、A,then R(A,B,C,D.at least is in ( ).A.1NF B.2NF C.3NF D.CNF (9)The construct cobegin Statement1; Statement2; coend means Statement1 and Statement2 are to be executed in parallel.The only two atomic actions in this construct are loading the value of a variable and storing into a variable.For the prog

36、ram segment x0;y0; cobegin x1; yx; y2; x3; coend Which of the following indicate(s)possible values for the variables when the segment finishes execution? ( ) . .x1,y2 .x1,y3 .x4,y6A. B., C., D. and (10)when a string constant is written in C program,the compiler creates ( )of characters containing the characters of the string,and terminating it with“0“.A.a group B.an array C.a set D.a series,

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 企业管理 > 管理学资料

本站链接:文库   一言   我酷   合作


客服QQ:2549714901微博号:道客多多官方知乎号:道客多多

经营许可证编号: 粤ICP备2021046453号世界地图

道客多多©版权所有2020-2025营业执照举报