程序员考试试题英语部分:.doc_第1页
程序员考试试题英语部分:.doc_第2页
程序员考试试题英语部分:.doc_第3页
程序员考试试题英语部分:.doc_第4页
程序员考试试题英语部分:.doc_第5页
已阅读5页,还剩16页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

程序员考试试题英语部分:试题1 从供选择的答案中,选出应填人下面叙述中。内的最确切的解答,把相应编号写在答卷的对应栏内。 You should beAof developing your program,using something better than the methodthat uses the philosophy:writeBdown and then try to get it workingSurprisingly,this method is wide used to day with result that an average programmer on an average job _C_ out only between five to ten lines of correct code per day. We hope your _D_ will be greaterBut toimprove requires that you apply some discipline to the _E_ of creating programs供选择的答案 A: available capable useful valuable B:anything nothing something thing C:does looks turns runs D: activity code productivity program E: process experience habit idea试题2 从供选择的答案中,选出应填人下面叙述中内的最确切的解答,把相应编号写在答卷的对应栏内。An anti-virus program A a virus by searching code recognized as that of one of the thousands of viruses known to afflict computer systems. An anti-virus Program also can be used to create a checksum for _B_ files on your disk, save the checksums in a special file, and then use the checksums to _C whether files have been modified perhaps by a new virus Special terminate and stay resident (TSR) programs can check for unusual _D_ to access vital disk areas and system files, and check files you copy into memory to be sure they are not _E_.供选择的答案 A: declares deducts defeats detects B: valuable variable voluble vulnerable C: calculate determine run write D: attempts objects deprograms routines E: copied effected infected injected试题3Applications put computers to practical business _A_, but below the _B_ its the heart of an operating system-the kernel-that provides the technical wizardry to juggle multiple program, connect to networks and store _C_.A traditional kernal provides all the functions for applications. The kernal _D_ memory, I/O devices and parcels out processor time.The kernel also supports security and fault _E_, which is the ability to recover automatically when parts of the system fail.供选择的答案A: (1)used (2)use (3)apply (4)appliedB: (1)earth (2)bottom (3)table (4)surfaceC: (1)graphics (2)data (3)text (4)imageD: (1)manages (2)manage (3)managed (4)managingE: (1)error (2)question (3)tolerance (4)problemanswer:A2 B4 C2 D1 E3试题4By using MP3,a 600M-byte music CD can be _A_ to 50M bytes or less. It can be streamed (downloaded in chunks) so that you can begin listening to the opening bars while the _B_ of the life arrives in the background. And, most important, MP3 music files retain good listening _C_ that _D_ compression schemes lacked. That _E_ of features makes accessing and distributing music on the Web practical for the first time.供选择的答案A: (1)pressed (2)compressed (3)compress (4)pressB: (1)past (2)next (3)rest (4)hostC: (1)amount (2)mass (3)quantity (4)qualityD: (1)earlier (2)front (3)later (4)backwardE: (1)addition (2)combination (3)difference (4)condition Answer: A2 B3 C4 D1 E2试题5从供选择的答案中,选出应填入下面叙述中_?_内的最确切的解答,把相应编号写在答卷的对应栏内。Because Web servers are platform and application _A_ , they can send or request data from legacy or external applications including databases. All replies, once converted into _B_ mark-up language, can then be transmitted to a _C_.Used in this way, Intranets can _D_ lower desktop support costs, easy links with legacy applications and databases and, _E_ all, ease of use.供选择的答案:(1)coupled (2)dependent (3)independent (4)related:(1)ciphertext (2)hypertext (3)plaintext (4)supertext:(1)browser (2)repeater (3)router (4)server:(1)off (2)offer (3)office (4)officer :(1)abort (2)about (3)above (4)aroundAnswer: A3 B2 C1 D2 E3试题6从供选择的答案中,选出应填入下面叙述中_?_内的最确切的解答,把相应编号写在答卷的对应栏内。Software quality assurance is now an _A_ sub-discipline of software engineering. As Buckly and Oston point out, _B_ software quality assurance is likely to lead to an ultimate _C_ of software costs. However, the major hurdle in the path of software management in this area is the lack of _D_ software standards. The development of accepted and generally applicable standards should be one of the principal goals of _E_ in software engineering.供选择的答案:(1)emerging (2)emergent (3)engaging (4)evolve:(1)effective (2)effortless (3)light (4)week:(1)balance (2)growth (3)production (4)reduction D:(1)usable (2)usage (3)useless (4)useness:(1)management(2)planning (3)production (4)research Answer: A1 B1 C2 D1 E4试题7An instruction is made up of operations that _A_ the function to be performed and operands that represent the data to be operated on .For example ,if an instruction is to perform the operation of _B_ two numbers ,it must know _C_ the two numbers are .The processors job is to _D_ instructions and operands from memory and to perform each operation .Having done that ,it signals memory to send it _E_ instruction.A. 1) skip2) smile3) smoke4)specifyB. 1)add2)added3) adding4)additionC. 1) when2) where3) which4) whoD. 1) get2) make3) push4) putE. 1) ant2) last3) next4) secondAnswer : A4 B3 C2 D1 E3试题8software design is a _A_ process .It requires a certain _B_ of f1air on the part of the designer. Design can not be learned from a book .It must be practiced and learnt by experience and study of existing systems .A well _C_ software system is straightforward to implement and maintain ,easily _D_ and reliable .Badly designed software systems ,although they may work are _E_ to be expensive to maintain ,difficult to test and unreliable.A. 1)create2) created 3) creating4) creativeB. 1)amount2) amounted3) mount 4) mountedC. 1)design2) designed3) designing4) designsD. 1)understand 2) understands 3) understanding4) understoodE: 1) like 2) likely 3)unlike4) unlikelyAnswer: A4 B1 C2 D4 E2试题9l In C language, one method of communicating data between functions is by (1) 。(1) A、arguments B、variables C、messages D、constants In C program,all variables must be (2 ) before use, usually at the beginning of the function before any (3) statements。(2) A、stated B、instructed C、illustrated D、declared(3) A、operative B、active C、executable D、processing When a string constant is written in C program, the compiler creates (4) of characters containing the characters of the string, and terminating it with “0”.(4) A、a group B、an array C、a set D、a series In C language, (5) variables have to be defined outside function, this (6) actual storage for it.(5) A、internal B、output C、export D、external(6) A、locates B、allocates C、finds D、looks forIn C language, the increment and decrement (7) can only be applied to variables, so an expression like x=(i+j)+ is illegal.(7) A、operation B、operate C、operator D、operand In C program, it is convenient to use a (8) to exit from a loop.(8) A、end B、break C、stop D、quit In C language, (9) is a collection of one or more variables, possibly of different types, grouped together under a single name for convenient handling.(9) A、a structure B、a file C、an array D、a string In C language, the usual expression statements are (10) or function calls.(10) A、I/Os B、assignments C、operations D、evaluationsAnswer: 1A 2D 3C 4B 5D 6B 7A 8A 9C 10D试题10:从供选择的答案中,选出应填人下面叙述中_?_内的最确切的解答,把相应编号写在答卷的对应栏内。 Many word processing programs include spell checker It checks the spelling of every word in a _A_ by looking up each word in its dictionary If the word does not appear in the dictionary the user is _B_ to a possible misspelling and possible corrections are often _C_ Spell checker dies not recognize unusual people names or specialized terms, but it wi11 often allow you to create your own personal dictionary of specialized words you often useSpell checker is valuable aids to proofreading, but it can not catch the _D_ of one correctly spe11ed word for another ( such as form for from ) Thus it does not _E_ a document is free of spelling errors 供选择的答案 A:documentequipment program statement B,C:alertedalternate guessed guided Suggestedsurprised D:additionconditionnotationsubstitution E:committee correct guarantee prove 试题11从供选择的答案中,选出应填人下面叙述中_?_内的最确切的解答,把相应编号写在答卷的对应栏内。 A local-area network ( LAN ) is a communications network that _A_ a variety of device and provides a _B_ for information exchange among those devices The scope of the LAN is small typically a single building or a cluster of buildings. The LAN is usually owned by the same organization that owns the _C_ devices The internal data rate of LAN is at least several MbpsThe basic Of LAN communication is broadcastingAt each station, there is a transmitterreceiver that communicates over a _D_ shared by other stations A transmits from any one station is _E_ to and received by all other stations 供选择的答案 A、 B、 D、 E:broadcastcable control interconnects internet meander means medium modem output switch relay C:adoptedattachedselectedunified 试题12从供选择的答案中,选出应填入下面叙述中的_?_内的最确切的解答,把相应编号写在答卷的对应栏内。All of these applications will enhance the _A_ of life and spur economic growth. Over half of the U.S. work force is now in jobs that are information _B_. The telecommunication and information sector of the U.s. economy now _C_ for 12 percent of the Gross Domestic Product, growing much faster than any other sector of the economy. Last year the _D_ in this sector exceeded 700 billion dollars. The U.S. exported over 48 billion dollars of telecommunication equipment _E_.供选择的答案:A:quantity quality mass amountB:based bassedbasesbaseC:looklooksaccountaccountsD:revenuesexpensesoutputslossE:amongalonesimplesingleAnswer: A2 B1 C4 D1 E2试题13从供选择的答案中,选出应填入下面叙述中的_?_内的最确切的解答,把相应编号写在答卷的对应栏内。The growth of switching has _A_ a new generation of network management tools that help _B_ cope with the challenges, _C_ them to correlate device alarms in order to _D_ pinpoint root causes, or to monitor service levels without depending on IP subnetting schemes. These new tools have become essential to coping with the primary _E_ effect of any treatment that significantly increases network flexibility: added complexity.供选择的答案:A:create createscreatedcreatingB:techniciansworkerssalesmenprofessorsC:enjoyingenablingengagingenrichingD:betterwellwellygoodE:backsidefrontlateralAnswer: A3 B1 C2 D1 E2试题14从供选择的答案中,选出应填入下面叙述中_?_内的最确切的解答,把相应编号写在答卷的对应栏内。Network managers have long _A_ practical voice-over-IP(VOIP) solutions. VOIP _B_ ease network management and decreases costs by converging a companys telephony and data infrastructures into one network. And a VOIP solution implemented at a companys head-quarters with far-reaching branch offices can _C_ tremendous amounts of _D_ in long distance phone bills, provided that solution delivers POTS-like voice _E_ over the Internet.供选择的答案:A:awaitawaitedawaitingawaitsB:promisepromisedpromisespromisingC:getputsavewasteD:cashmoneyspacetimeE:frequencylengthqualityquantityAnswer: A2 B3 C3 D2 E3试题15从供选择的答案中,选出应填入下面叙述中_?_内的最确切的解答,把相应编号写在答卷的对应栏内。Basically, a firewall is a _A_ process or a set of integrated processes that runs on a router or _B_ to control the flow of networked application traffic _C_ through it. Typically, firewalls are placed on the entry point to a _D_ network such as the Internet. They could be considered traffic cops. The firewalls _E_ is to ensure that all communication between an organizations network and the Internet conform to the organizations security policies.供选择的答案:A:dependentisolatedrelatedstandaloneB:browserclientrepeaterseverC:passpassedpassingpassesD:localnationalprivatepublicE:molepoleroleruleAnswer: A4 B4 C3 D4 E32001年高级程序员试题:l MIMD systems can be classified into _(66)_-oriented systems ,high-avai1ability systems and response-oriented systems. The goal of _(66)_ oriented multiprocess is to obtain h1gh _(66)_ _(67)_ minimal computing cost .The techniques employed by multiprocessor operating systems to achieve this goal take advantage of an inherent processing versus input/output balance in the workload to produce _(68)_ and_(69)_ loading of system _(70)_ .(66):A.thoughB.throughC.throughout D.throughput(67):A.atB.ofC.on D.to(68):A.balanceB.balanced C.balances D.balancing(69):A.uniformB.uniqueC.unit D.united(70):A resourceB.resources C.source D.sourcesl Soon, more of the information we received via the internet could come _(71)_ in digital wrappers.Wrappers are made up _(72)_ software code thats targeted to do specific things with the data _(73)_ within them , such as helping to define queries for search engines .They also keep _(74)_ from _(75)_ access to that code.(71):A.package B.packaged C.packages D.packaging(72):A.of B.off C.on D.out(73):A.close B.closed C.enclose D.enclosed(74):A.insiders B.money C.outsiders D.warehouse(75):A.gain B.gained C.gains D.gainingAnswer:(66)D(67)A(68)B(69)A(70)B(71)B(72)A(73)D(74)C(75)D2002年高级程序员试题英语部分: A typical _(66)_ language contains an applicative sub-language which approximates the mathematical abstractions of timeless functions applied to spacelessvalues, where the actual operation sequences and use of storage space during expression evaluation are organized behind the _(67)_ .In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having _(68)_ results during expression evalution stored at the discretion of thelanguage implementation, and effecting parameter _(69)_ and _(70)_ operations through value copying. (66) A. imperativeB. mandatoryC. compulsoryD. voluntary(67) A. foregroundB. backgroundC. screenD. scenes(68) A. middleB. intermediateC. previousD. final(69) A. tranverseB. transportationC. transmmisionD. translation(70) A. assignmentB. designC. valueD. dispatch Most computer systems are _(71)_ to two different groups of attacks:Insider attacks and outsider attacks. A system that is known to be _(72)_ to an outsider attack by preventing _(73)_ from outside can still be vulnerable to the insider attacks accomplished by abusive usage of _(74)_ users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually _(75)_ by tools referred to as Intrusion Detection Systems. (71) A. vulnerableB. weekC. sensitivelyD. helpless(72) A. reliableB. secureC. indestructibleD. steady(73) A. visitB. accessC. I/OD. read/write(74) A. powerB. rightsC. authorizedD. common(75) A. searchedB. checkedC. testedD. detectedAnswer: (66)A (67)D (68)B (69)C (70)A (71)A (72)B (73)B (74)C (75)D 2001年网络程序员试题英语部分:Communication protocols are _(66)_ connection-oriented or connectionless,_(67)_ whether the sender of a message needs to contact and maintain a dialog with the recipient or _(68)_ send a message without any prior connect and with the hope that the recipient receives everything _(69)_ .These methods _(70)_ the two ways that communication is implemented on networks.(66):A.notB.neitherC.eitherD.all(67):A.fulledB. floodedC.dapending onD.defined by(68):A.immediatelyB.simplyC.accordinglyD.properly(69):A.in orderB.in arrayC.in seriesD.in queueing(70):A.make knownB.discloseC.revealD.discoverThe major problem with E-mail is that it is _(71)_ easy to use that people can become _(72)_ with messages. _(73)_ they can possibly answer in a day.In addition,mail boxes require some management to _(74)_ messages or archive those that might be required latersenders dont always know about your E-mail backlog and often send _(75)_ messages.(71):A.tooB.soC.veryD.much(72):A.fullB.lostC.inundatedD.filled(73):A. more thanB.thanC.thatD.which(74):A.mangeB.saveC.backupD.dispose of(75):A.too manyB.redundantC.longD.trivialAnswer: (66)C(67)C(68)B(69)A(70)C(71)B(72)C(73)A(74)D(75)B2002年网络程序员试题英语部分:In the following essay, each blank has four choices. Choose the most suitable one fromthe four choices and write down in the answer sheet. Heterogeneous network environments consist of computer systems from (66) vendors that run (67) operating systems and communication protocols. An organization that (68) its computer resources is usually (69) the task of integrating its heterogeneous systems. Typically, each department or division has defined its own network needs (70) OS, LAN topology, communication protocols, applications, and other components.(66): A. same B. similar C. different D. difference (67): A. same B. similar C. different D. difference (68): A. consolidates B. consists C. considerate D. consoles (69): A. faced on B. faced with C. faced about D. faced up to (70): A. in general B. in any te

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论