[语言类考试复习资料大全]中级软件设计师上午试题分类模拟21_第1页
[语言类考试复习资料大全]中级软件设计师上午试题分类模拟21_第2页
[语言类考试复习资料大全]中级软件设计师上午试题分类模拟21_第3页
[语言类考试复习资料大全]中级软件设计师上午试题分类模拟21_第4页
[语言类考试复习资料大全]中级软件设计师上午试题分类模拟21_第5页
已阅读5页,还剩26页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、书山有路勤为径,学海无涯苦作舟。祝愿天下莘莘学子:学业有成,金榜题名!语言类考试复习资料大全中级软件设计师上午试题分类模拟21中级软件设计师上午试题分类模拟21单项选择题 Should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question. _ is a means to capture ideas, relationships, decisions, and requirements in a well-defi

2、ned notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more _. A diagram graphically represents thin

3、gs, and the relationships between these things. These _ can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest,

4、 or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. _ are used to capture the physical organization of the things in your system, i.e., how one object relates to another. _ focus on the behavior of elements in a system. For

5、 example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements. 1.A.ProgrammingB.AnalyzingC.DesigningD.Modeling答案:D2.A.viewsB.diagramsC.user viewsD.structure pictures答案:B3.A.thingsB.picturesC.languagesD.diagrams答案:A4.A.Activity diagramsB.Use-ca

6、se diagramsC.Structural diagramsD.Behavioral diagrams答案:C5.A.Activity diagramsB.Use-case diagramsC.Structural diagramsD.Behavioral答案:D Object-oriented analysis (OOA) is a semiformal specification technique for the object-oriented paradigm. Object-oriented analysis consists of three steps. The first

7、step is _. It determines how the various results are computed by the product and presents this information in the form of a _ and associated scenarios. The second is _, which determines the classes and their attributes, then determines the interrelationships and interaction among the classes. The la

8、st step is _, which determines the actions performed by or to each class or subclass and presents this information in the form of _. 6.A.use-case modelingB.class modelingC.dynamic modelingD.behavioral modeling答案:B7.A.collaboration diagramB.sequence diagramC.use-case diagramD.activity diagram答案:C8.A.

9、use-case modelingB.class modelingC.dynamic modelingD.behavioral modeling答案:D9.A.use-case modelingB.class modelingC.dynamic modelingD.behavioral modeling答案:C10.A.activity diagramB.component diagramC.sequence diagramD.state diagram答案:C The Rational Unified Process (RUP) is a software engineering proce

10、ss, which captures many of best practices in modern software development. The notions of _ and scenarios have been proven to be an excellent way to capture function requirements. RUP can be described in two dimensions - time and content. In the time dimension, the software lifecycle is broken into c

11、ycles. Each cycle is divided into four consecutive _ which is concluded with a well-defined _ and can be further broken down into _ - a complete development loop resulting in a release of an executable product, a subset of the final product under development, which grows incrementally to become the

12、final system. The content structure refers to the disciplines, which group _ logically by nature. 11.A.artifactsB.use-casesC.actorsD.workers答案:B12.A.orientationsB.viewsC.aspectsD.phases答案:D13.A.milestoneB.end-markC.measureD.criteria答案:A14.A.roundsB.loopsC.iterationsD.circularities答案:C15.A.functionsB

13、.workflowsC.actionsD.activities答案:D _ analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems. Ultimately, the system models become the _ for designing and constructing an improved system. _ is such a technique. The emphasis in this t

14、echnique is process-centered. Systems analysts draw a series of process models called _. _ is another such technique that integrates data and process concerns into constructs called objects. 16.A.PrototypingB.AcceleratedC.Model-drivenD.Iterative答案:C17.A.imageB.pictureC.layoutD.blueprint答案:D18.A.Stru

15、ctured analysisB.Information EngineeringC.Discovery PrototypingD.Object-Oriented analysis答案:A19.A.PERTB.DFDC.ERDD.UML答案:B20.A.Structured analysisB.Information EngineeringC.Discovery PrototypingD.Object-Oriented analysis答案:D NACs(Network Access Control) role is to restrict network access to only comp

16、liant endpoints and _ users. However, NAC is not a complete LAN _ solution; additional proactive and _ security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of sec

17、urity plus application availability and performance. Nevis integrates NAC as the first line of LAN security _ In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measuresreal-time, multilevel _ inspection and microsecond threat c

18、ontainment. 21.A.automatedB.distinguishedC.authenticatedD.destructed答案:C22.A.crisisB.securityC.favorableD.excellent答案:B23.A.constructiveB.reductiveC.reactiveD.productive答案:C24.A.defenseB.intrusionC.in breakD.protection答案:A25.A.portB.connectionC.threatD.insurance答案:C Virtualization is an approach to

19、IT that pools and shares _ so that utilization is optimized and supplies automatically meet demand. Traditional IT environments are often silos, where both technology and human _ are aligned around an application or business function. With a virtualized _, people, processes, and technology are focus

20、ed on meeting service levels, _ is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexible. We offer a broad spectrum of virtualization _ that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure reso

21、urces. 26.A.advantagesB.resourcesC.benefitsD.precedents答案:B27.A.profitsB.costsC.resourcesD.powers答案:C28.A.systemB.infrastructureC.hardwareD.link答案:B29.A.contentB.positionC.powerD.capacity答案:D30.A.solutionsB.networksC.interfacesD.connections答案:A Originally introduced by Netscape Communications. _ are

22、 a general mechanism which HTTP Server side applications, such as CGI _, can use to both store and retrieve information on the HTTP _ side of the connection. Basically, Cookies can be used to compensate for the _ nature of HTTP. The addition of a simple, persistent, client-side state significantly e

23、xtends the capabilities of WWW-based _. 31.A.BrowsersB.CookiesC.ConnectionsD.Scripts答案:B32.A.graphicsB.processesC.scriptsD.texts答案:C33.A.ClientB.EditorC.CreatorD.Server答案:A34.A.fixedB.flexibleC.stableD.stateless答案:D35.A.programsB.applicationsC.rameworksD.constrains答案:B WebSQL is a SQL-like _ languag

24、e for extracting information from the web. Its capabilities for performing navigation of web _ make it a useful tool for automating several web-related tasks that require the systematic processing of either all the links in a _, all the pages that can be reached from a given URL through _ that match

25、 a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common _ Interface. 36.A.queryB.transactionC.communicationD.programming答案:C37.A.browsersB.serversC.hypertextsD.clients答案:C38.A.hypertextB.pageC.protocolD.operation答案:B39.A.paths

26、B.chipsC.toolsD.directories答案:A40.A.RouterB.DeviceC.ComputerD.Gateway答案:D Should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question. _ is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation

27、 that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more _. A diagram graphically represents things, and the

28、relationships between these things. These _ can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of

29、 the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. _ are used to capture the physical organization of the things in your system, i.e., how one object relates to another. _ focus on the behavior of elements in a system. For example, yo

30、u can use behavioral diagrams to capture requirements, operations, and internal state changes for elements. 41.A.ProgrammingB.AnalyzingC.DesigningD.Modeling答案:D42.A.viewsB.diagramsC.user viewsD.structure pictures答案:B43.A.thingsB.picturesC.languagesD.diagrams答案:A44.A.Activity diagramsB.Use-case diagr

31、amsC.Structural diagramsD.Behavioral diagrams答案:C45.A.Activity diagramsB.Use-case diagramsC.Structural diagramsD.Behavioral答案:D Object-oriented analysis (OOA) is a semiformal specification technique for the object-oriented paradigm. Object-oriented analysis consists of three steps. The first step is

32、 _. It determines how the various results are computed by the product and presents this information in the form of a _ and associated scenarios. The second is _, which determines the classes and their attributes, then determines the interrelationships and interaction among the classes. The last step

33、 is _, which determines the actions performed by or to each class or subclass and presents this information in the form of _. 46.A.use-case modelingB.class modelingC.dynamic modelingD.behavioral modeling答案:B47.A.collaboration diagramB.sequence diagramC.use-case diagramD.activity diagram答案:C48.A.use-

34、case modelingB.class modelingC.dynamic modelingD.behavioral modeling答案:D49.A.use-case modelingB.class modelingC.dynamic modelingD.behavioral modeling答案:C50.A.activity diagramB.component diagramC.sequence diagramD.state diagram答案:C The Rational Unified Process (RUP) is a software engineering process,

35、 which captures many of best practices in modern software development. The notions of _ and scenarios have been proven to be an excellent way to capture function requirements. RUP can be described in two dimensions - time and content. In the time dimension, the software lifecycle is broken into cycl

36、es. Each cycle is divided into four consecutive _ which is concluded with a well-defined _ and can be further broken down into _ - a complete development loop resulting in a release of an executable product,a subset of the final product under development, which grows incrementally to become the fina

37、l system. The content structure refers to the disciplines, which group _ logically by nature. 51.A.artifactsB.use-casesC.actorsD.workers答案:B52.A.orientationsB.viewsC.aspectsD.phases答案:D53.A.milestoneB.end-markC.measureD.criteria答案:A54.A.roundsB.loopsC.iterationsD.circularities答案:C55.A.functionsB.wor

38、kflowsC.actionsD.activities答案:D _ analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems. Ultimately, the system models become the _ for designing and constructing an improved system. _ is such a technique. The emphasis in this techn

39、ique is process-centered. Systems analysts draw a series of process models called _. _ is another such technique that integrates data and process concerns into constructs called objects. 56.A.PrototypingB.AcceleratedC.Model-drivenD.Iterative答案:C57.A.imageB.pictureC.layoutD.blueprint答案:D58.A.Structur

40、ed analysisB.Information EngineeringC.Discovery PrototypingD.Object-Oriented analysis答案:A59.A.PERTB.DFDC.ERDD.UML答案:B60.A.Structured analysisB.Information EngineeringC.Discovery PrototypingD.Object-Oriented analysis答案:D NACs(Network Access Control) role is to restrict network access to only complian

41、t endpoints and _ users. However,NAC is not a complete LAN _ solution; additional proactive and _ security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security

42、 plus application availability and performance. Nevis integrates NAC as the first line of LAN security _ In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures real-time, multilevel _ inspection and microsecond threat conta

43、inment. 61.A.automatedB.distinguishedC.authenticatedD.destructed答案:C62.A.crisisB.securityC.favorableD.excellent答案:B63.A.constructiveB.reductiveC.reactiveD.productive答案:C64.A.defenseB.intrusionC.in breakD.protection答案:A65.A.portB.connectionC.threatD.insurance答案:C Virtualization is an approach to IT t

44、hat pools and shares _ so that utilization is optimized and supplies automatically meet demand. Traditional IT environments are often silos, where both technology and human _ are aligned around an application or business function. With a virtualized _, people, processes, and technology are focused o

45、n meeting service levels, _ is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexible. We offer a broad spectrum of virtualization _ that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources. 66.A.advantagesB.resourcesC.benefitsD.precedents答案:B67.A.profitsB.c

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论