高级系统分析师相同项单选集考试卷^模拟考试题_第1页
高级系统分析师相同项单选集考试卷^模拟考试题_第2页
高级系统分析师相同项单选集考试卷^模拟考试题_第3页
高级系统分析师相同项单选集考试卷^模拟考试题_第4页
已阅读5页,还剩21页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、姓名:_ 班级:_ 学号:_-密-封 -线- 标签:标题考试时间:120分钟 考试总分:100分题号一二三四五总分分数遵守考场纪律,维护知识尊严,杜绝违纪行为,确保考试结果公正。1、most ip layer-based proxy mechanisms, such as network address translation (nat), only support uni-directional proxy, from the internal network to external network (the internet). the proxy establishes the comm

2、unication channel by(86)ip addresses. the ip addresses must be(87). these proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. ip layer-based proxy mechanisms need additional software(88)for each appli

3、cation that uses(89)channels. socks identifies communication targets through domain names, overcoming the restriction of using private ip addresses. socks can use domain names to establish communication between separate lans, with(90)ip addresses.(86)是( )a.manufacturingb.manipulatingc.conductd.imple

4、ment2、most ip layer-based proxy mechanisms, such as network address translation (nat), only support uni-directional proxy, from the internal network to external network (the internet). the proxy establishes the communication channel by(86)ip addresses. the ip addresses must be(87). these proxy mecha

5、nisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. ip layer-based proxy mechanisms need additional software(88)for each application that uses(89)channels. socks identifies communication targets through domain n

6、ames, overcoming the restriction of using private ip addresses. socks can use domain names to establish communication between separate lans, with(90)ip addresses.(87)是( )a.routableb.locatablec.path-selectedd.road-defined3、most ip layer-based proxy mechanisms, such as network address translation (nat

7、), only support uni-directional proxy, from the internal network to external network (the internet). the proxy establishes the communication channel by(86)ip addresses. the ip addresses must be(87). these proxy mechanisms prevent applications that must establish return data channels from establishin

8、g their data channels, such as, multimedia applications. ip layer-based proxy mechanisms need additional software(88)for each application that uses(89)channels. socks identifies communication targets through domain names, overcoming the restriction of using private ip addresses. socks can use domain

9、 names to establish communication between separate lans, with(90)ip addresses.(88)是( )a.groupsb.blocksc.modelsd.modules4、most ip layer-based proxy mechanisms, such as network address translation (nat), only support uni-directional proxy, from the internal network to external network (the internet).

10、the proxy establishes the communication channel by(86)ip addresses. the ip addresses must be(87). these proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. ip layer-based proxy mechanisms need additio

11、nal software(88)for each application that uses(89)channels. socks identifies communication targets through domain names, overcoming the restriction of using private ip addresses. socks can use domain names to establish communication between separate lans, with(90)ip addresses.(89)是( )a.plentyb.manyc

12、.multipled.more5、most ip layer-based proxy mechanisms, such as network address translation (nat), only support uni-directional proxy, from the internal network to external network (the internet). the proxy establishes the communication channel by(86)ip addresses. the ip addresses must be(87). these

13、proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. ip layer-based proxy mechanisms need additional software(88)for each application that uses(89)channels. socks identifies communication targets throu

14、gh domain names, overcoming the restriction of using private ip addresses. socks can use domain names to establish communication between separate lans, with(90)ip addresses.(90)是( )a.duplicatingb.crossingc.overlappingd.repeating6、the primary advantages of a client/server system arise from splitting

15、the processing between the client system and the database server. since the bulk of the database processing is done on the back-end, the speed of the dbms isnt tied to the speed of the(31).the major disadvantage of client/server system is the increased cost of(32)and support personnel who maintain t

16、he database server. there is also the issue of(33)with so many parts comprising the entire c/s system; murphys law can kick in-the more pieces that compose the system, the more pieces that can fail. its also harder to track down problems when the system(34). and it can initially take longer to get a

17、ll the components set up and working together. all this is compounded by the general lack of experience and expertise of potential support personnel and programmers, due to the relative newness of the technology. as c/s system become more common, this problem should abate.therefore the c/s system is

18、 more(35).(31)是( )a.networkb.operating systemc.personal computerd.workstation7、the primary advantages of a client/server system arise from splitting the processing between the client system and the database server. since the bulk of the database processing is done on the back-end, the speed of the d

19、bms isnt tied to the speed of the(31).the major disadvantage of client/server system is the increased cost of(32)and support personnel who maintain the database server. there is also the issue of(33)with so many parts comprising the entire c/s system; murphys law can kick in-the more pieces that com

20、pose the system, the more pieces that can fail. its also harder to track down problems when the system(34). and it can initially take longer to get all the components set up and working together. all this is compounded by the general lack of experience and expertise of potential support personnel an

21、d programmers, due to the relative newness of the technology. as c/s system become more common, this problem should abate.therefore the c/s system is more(35).(32)是( )a.administrativeb.bureaucraticc.managerd.official8、the primary advantages of a client/server system arise from splitting the processi

22、ng between the client system and the database server. since the bulk of the database processing is done on the back-end, the speed of the dbms isnt tied to the speed of the(31).the major disadvantage of client/server system is the increased cost of(32)and support personnel who maintain the database

23、server. there is also the issue of(33)with so many parts comprising the entire c/s system; murphys law can kick in-the more pieces that compose the system, the more pieces that can fail. its also harder to track down problems when the system(34). and it can initially take longer to get all the compo

24、nents set up and working together. all this is compounded by the general lack of experience and expertise of potential support personnel and programmers, due to the relative newness of the technology. as c/s system become more common, this problem should abate.therefore the c/s system is more(35).(3

25、3)是( )a.complexityb.possibilityc.simplicityd.variety9、the primary advantages of a client/server system arise from splitting the processing between the client system and the database server. since the bulk of the database processing is done on the back-end, the speed of the dbms isnt tied to the spee

26、d of the(31).the major disadvantage of client/server system is the increased cost of(32)and support personnel who maintain the database server. there is also the issue of(33)with so many parts comprising the entire c/s system; murphys law can kick in-the more pieces that compose the system, the more

27、 pieces that can fail. its also harder to track down problems when the system(34). and it can initially take longer to get all the components set up and working together. all this is compounded by the general lack of experience and expertise of potential support personnel and programmers, due to the

28、 relative newness of the technology. as c/s system become more common, this problem should abate.therefore the c/s system is more(35).(34)是( )a.burnsb.crashesc.runsd.uses10、the primary advantages of a client/server system arise from splitting the processing between the client system and the database

29、 server. since the bulk of the database processing is done on the back-end, the speed of the dbms isnt tied to the speed of the(31).the major disadvantage of client/server system is the increased cost of(32)and support personnel who maintain the database server. there is also the issue of(33)with so

30、 many parts comprising the entire c/s system; murphys law can kick in-the more pieces that compose the system, the more pieces that can fail. its also harder to track down problems when the system(34). and it can initially take longer to get all the components set up and working together. all this i

31、s compounded by the general lack of experience and expertise of potential support personnel and programmers, due to the relative newness of the technology. as c/s system become more common, this problem should abate.therefore the c/s system is more(35).(35)是( )a.efficient and easy to setupb.efficien

32、t and robustc.efficient but difficult to maintaind.robust but difficult to setup11、todays response to the data access dilemma eschews the traditional archival approach in favor of emerging standards for what are described as the documents of the future: compound documents. product users and develope

33、rs hope the latest standards effort-such as opendoc and microsoft corp.s object linking and embedding (ole) will(26)data accessibility.opendoc is a standards group(27)a common look and feel throughout documents, even though different applications are used.ole technologies allow microsoft to(28)its v

34、arious software products. microsoft creates, governs and distributes the ole capability, which is what most(29)it from the open opendoc approach. thus, users can assemble(30)of varying application to create compound documents. with ole users can, for example, embed an excel chart in a microsoft word

35、 report.(26)是( )a.getb.makec.ensured.take12、todays response to the data access dilemma eschews the traditional archival approach in favor of emerging standards for what are described as the documents of the future: compound documents. product users and developers hope the latest standards effort-suc

36、h as opendoc and microsoft corp.s object linking and embedding (ole) will(26)data accessibility.opendoc is a standards group(27)a common look and feel throughout documents, even though different applications are used.ole technologies allow microsoft to(28)its various software products. microsoft cre

37、ates, governs and distributes the ole capability, which is what most(29)it from the open opendoc approach. thus, users can assemble(30)of varying application to create compound documents. with ole users can, for example, embed an excel chart in a microsoft word report.(27)是( )a.seekingb.seekedc.seek

38、sd.seek13、todays response to the data access dilemma eschews the traditional archival approach in favor of emerging standards for what are described as the documents of the future: compound documents. product users and developers hope the latest standards effort-such as opendoc and microsoft corp.s

39、object linking and embedding (ole) will(26)data accessibility.opendoc is a standards group(27)a common look and feel throughout documents, even though different applications are used.ole technologies allow microsoft to(28)its various software products. microsoft creates, governs and distributes the

40、ole capability, which is what most(29)it from the open opendoc approach. thus, users can assemble(30)of varying application to create compound documents. with ole users can, for example, embed an excel chart in a microsoft word report.(28)是( )a.connectb.linkc.concatenated.contact14、todays response t

41、o the data access dilemma eschews the traditional archival approach in favor of emerging standards for what are described as the documents of the future: compound documents. product users and developers hope the latest standards effort-such as opendoc and microsoft corp.s object linking and embeddin

42、g (ole) will(26)data accessibility.opendoc is a standards group(27)a common look and feel throughout documents, even though different applications are used.ole technologies allow microsoft to(28)its various software products. microsoft creates, governs and distributes the ole capability, which is wh

43、at most(29)it from the open opendoc approach. thus, users can assemble(30)of varying application to create compound documents. with ole users can, for example, embed an excel chart in a microsoft word report.(29)是( )a.divideb.distinguishc.dividesd.distinguishes15、todays response to the data access d

44、ilemma eschews the traditional archival approach in favor of emerging standards for what are described as the documents of the future: compound documents. product users and developers hope the latest standards effort-such as opendoc and microsoft corp.s object linking and embedding (ole) will(26)dat

45、a accessibility.opendoc is a standards group(27)a common look and feel throughout documents, even though different applications are used.ole technologies allow microsoft to(28)its various software products. microsoft creates, governs and distributes the ole capability, which is what most(29)it from

46、the open opendoc approach. thus, users can assemble(30)of varying application to create compound documents. with ole users can, for example, embed an excel chart in a microsoft word report.(30)是( )a.piecesb.documentc.contentd.files16、across a wide variety of fields, data are being collected and accu

47、mulated at a dramatic pace. there is an urgent need for a new generation of computational theories and tools to assist humans in(96)useful information (knowledge) from the rapidly growing(97)of digital data. these theories and tools are the subject of the emerging field of knowledge discovery in dat

48、abase (kdd). at an abstract level, the kdd field is concerned with the development of methods and techniques for making(98)of data. the basic problem addressed by the kdd process is one of mapping low-level data(which are typically too voluminous to understand and digest easily) into other forms tha

49、t might be more(99)(for example, a short report), more(100)(for example, a descriptive approximation or model of the process that generated the data), or more useful (for example, a predictive model for estimating the value of future cases). at the core of the process is the application of specific

50、data-mining methods for pattern discovery and extraction.(96)是( )a.expiringb.examiningc.extractingd.extricating17、across a wide variety of fields, data are being collected and accumulated at a dramatic pace. there is an urgent need for a new generation of computational theories and tools to assist h

51、umans in(96)useful information (knowledge) from the rapidly growing(97)of digital data. these theories and tools are the subject of the emerging field of knowledge discovery in database (kdd). at an abstract level, the kdd field is concerned with the development of methods and techniques for making(

52、98)of data. the basic problem addressed by the kdd process is one of mapping low-level data(which are typically too voluminous to understand and digest easily) into other forms that might be more(99)(for example, a short report), more(100)(for example, a descriptive approximation or model of the pro

53、cess that generated the data), or more useful (for example, a predictive model for estimating the value of future cases). at the core of the process is the application of specific data-mining methods for pattern discovery and extraction.(97)是( )a.voiceb.volumesc.statesd.speed18、across a wide variety

54、 of fields, data are being collected and accumulated at a dramatic pace. there is an urgent need for a new generation of computational theories and tools to assist humans in(96)useful information (knowledge) from the rapidly growing(97)of digital data. these theories and tools are the subject of the

55、 emerging field of knowledge discovery in database (kdd). at an abstract level, the kdd field is concerned with the development of methods and techniques for making(98)of data. the basic problem addressed by the kdd process is one of mapping low-level data(which are typically too voluminous to under

56、stand and digest easily) into other forms that might be more(99)(for example, a short report), more(100)(for example, a descriptive approximation or model of the process that generated the data), or more useful (for example, a predictive model for estimating the value of future cases). at the core o

57、f the process is the application of specific data-mining methods for pattern discovery and extraction.(98)是( )a.reasonb.sensec.specificationd.summary19、across a wide variety of fields, data are being collected and accumulated at a dramatic pace. there is an urgent need for a new generation of computational theories and tools to assist humans in(96)useful information (knowledge) from the rapidly growing(97)of digital data. these theories and tools are the subject of the emerging field of knowl

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论