国开计算机专业英语答案,国开(吉林)00829-计算机专业英语-形成性考核四-辅导资料.docx...

253b171540df25e1b84436cbe50dfc72.gif国开(吉林)00829-计算机专业英语-形成性考核四-辅导资料.docx

计算机专业英语-形成性考核四-辅导资料说明如果课程题目是随机的,请按CTRLF在题库中逐一搜索每一道题的答案特殊说明请仔细课程的题目每学期都可能更换,所以请仔细核对是不是您需要的题目再下载第1题 a is a set of related programs located at a network gateway server.a. firewall b. fire c. gateway d. wall 正确答案是firewall 第2题 a firewall is often installed in a specially designated computer separate from the rest of the network so that can get directly at private network resources.a. questions b. introduction c. no incoming request d. request 正确答案是no incoming request 第3题 a is a network point that acts as an entrance to another network.a. firewall b. gateway c. mouse d. keyboard 正确答案是gateway 第4题 both the computers of internet users and the computers that serve pages to users are .a. gateway nodes b. host nodes c. nodes d. host 正确答案是host nodes 第5题 the computers that control traffic within your companys network or at your local internet service provider isp are .a. gateway nodes b. nodes c. host nodes d. host 正确答案是gateway nodes 第6题 a is a device or, in some cases, software in a computer that determines the next network point to which a packet should be forwarded toward its destination.a. firewall b. router c. node d. computer 正确答案是router 第7题 a is located at any gateway where one network meets another, including each point-of-presence on the internet.a. router b. computer c. node d. firewall 正确答案是router 第8题 an edge router is a router that interfaces with network.a. a Rational Unified Process RUP b. a XML Metadata Interchange XMI c. a Meta-Object Facility MOF d. an Asynchronous Transfer Mode ATM 正确答案是an Asynchronous Transfer Mode ATM第9题 a is a network bridge combined with a router.a. firewall b. gateway c. brouter d. node 正确答案是brouter第10题 the purpose of the is to define what a system should do and the constraints under which it must operate.a. requirements phase b. cutable computer code c. the supporting code d. the supporting program 正确答案是requirements phase 第11题 the first phase of the software testing process is developed by a single programmer.a. integration testing b. testing c. unit testing of software d. device 正确答案是unit testing of software 第12题 the process of rerunning test cases to ensure that no error has been introduced is called .a. test b. testing c. regression testing d. regression 正确答案是regression testing 第13题 systematic requirements analysis is also known as .a. requirements engineering b. correction c. adaptation d. requirements 正确答案是requirements engineering 第14题 sra stands for .a. requirements b. software c. analysis d. software requirements analysis 正确答案是software requirements analysis 第15题 the basic unit of testing is .a. the software case b. the word case c. the test case d. the ination case 正确答案是the test case 第16题 when software is changed to fix a bug or add an enhancement, is often introduced.a. a program b. a right answer c. a serious error d. a new level 正确答案是a serious error 第17题 the process of rerunning test cases to ensure that no error has been introduced is called .a. language testing b. regression testing c. old testing d. right testing 正确答案是regression testing 第18题 the purpose of this is to answer some of the questions that new users ask about computer viruses and trojan horse programs, and clean up some common misconceptions about viruses and e-mail.a. CPU b. FAQ c. FDISK d. CD-ROMs 正确答案是FAQ 第19题 a is a program designed to spread itself by first infecting cutable files or the system areas of hard and floppy disks, and then making copies of itself.a. file b. node c. program d. virus 正确答案是virus 第20题 when you cute program code thats infected by a virus, the will also run and try to infect other programs, either on the same computer or on other computers connected to it over a network.a. program b. virus code c. virus d. code 正确答案是virus code 第21题 some viruses are deliberately designed to files or otherwise interfere with your computers operation, while others dont do anything but try to spread themselves around.a. damage b. draw c. establish d. write 正确答案是damage 第22题 to reduce the chance of getting viruses from e-mail you should an cutable file attached to an e-mail unless you can positively verify what it is, who it came from, and why it was sent to you.a. change b. write c. accept d. delete 正确答案是delete第23题 viruses wont melt down your cpu, burn out your drive, cause your monitor to explode,etc.a. small b. soft c. hard d. every 正确答案是hard 第24题 warnings about viruses that will physically destroy your computer are usually , not legitimate virus warnings.a. truths b. right c. believable d. hoaxes 正确答案是hoaxes 第25题 viruses any new programs or other files that may contain cutable code before you run or open them, no matter where they come from.a. damage b. scan c. delete d. write 正确答案是scan 第26题 as a network product, a hub may include .a. a computer b. a gateway card for connections to a local area network c. a group of modem cards for dial-in users d. a connection to a line 正确答案是 a group of modem cards for dial-in users, a gateway card for connections to a local area network, a connection to a line第27题 some newer switches also .a. require examination b. per routing functions c. are sometimes called IP switches d. attack CPU 正确答案是 per routing functions, are sometimes called IP switches第28题 switches are found .a. at the subnetwork level where data is being forwarded close to its destination or origin b. at the same time c. at the backbone and gateway levels of a network where one network connects with another d. in unusual concatenations 正确答案是 at the backbone and gateway levels of a network where one network connects with another, at the subnetwork level where data is being forwarded close to its destination or origin第29题 a software system consists of needed to manufacture, use, and maintain the code.a. the supporting documents b. cutable computer code c. the supporting program d. the supporting code 正确答案是 cutable computer code, the supporting documents第30题 there are many aspects to consider in the design of a piece of software. some of these aspects are .a. compatibility and modularity b. security and maintainability c. extensibility and robustness d. reliability and fault-tolerance 正确答案是 extensibility and robustness, reliability and fault-tolerance, security and maintainability, compatibility and modularity第31题 high-level languages can be categorized as .a. C language b. functional languages c. declarative languages d. imperative languages 正确答案是 functional languages, declarative languages, imperative languages第32题 maintenance consists of three activities .a. adaptation b. regression c. enhancement d. correction 正确答案是 adaptation, correction, enhancement第33题 requirements must be , related to identified business needs or opportunities, and defined to a level of detail sufficient for system design.a. testing b. testable c. actionable d. measurable 正确答案是 actionable, measurable, testable第34题 since virus code must be cuted to have any effect, graphics and sound files such as , etc., as well as plain text in .txt files.a. .wav b. .mp3 c. .gif d. .jpg 正确答案是 .gif, .jpg, .mp3, .wav第35题 the virus code has to be in a , such as which the computer will actually try to cute.a. a .wav file b. a Word .doc file c. an . program file d. a .mp3 file 正确答案是 an . program file, a Word .doc file第36题 some viruses, known as multipartite viruses, can spread both by .a. and by infecting the boot areas of floppy disks b. infecting hardwares c. infecting files d. and by infecting CPU 正确答案是 infecting files, and by infecting the boot areas of floppy disks第37题 if your e-mail or news software has the ability to automatically cute , i strongly recommend that you disable this feature.a. JavaScript b. Wordmacros c. sound files d. or other cutable code contained in or attached to a message 正确答案是 JavaScript, Wordmacros, or other cutable code contained in or attached to a message第38题 ideally, you should back up your entire system on a regular basis. if this isnt practical, at least backup files that you cant afford to lose or that would be difficult to replace , etc.a. bookmark files b. address books c. documents d. important E-mail 正确答案是 documents, bookmark files, address books, important E-mail第39题 a number of companies make firewall products. features include at given thresholds of attack, and a graphical user interface for controlling the firewall.a. automatic alarms b. logging c. attacking d. reporting 正确答案是 logging, reporting, automatic alarms第40题 in the network for an enterprise, a computer server acting as a gateway node is often also acting as .a. a digital clock b. a game c. a firewall server d. a proxy server 正确答案是 a proxy server, a firewall server第41题 an enterprise with an intranet installs a firewall to prevent outsiders from accessing its own private data resources.对 错 正确的答案是“对”。第42题 in the simplest networks, a switch is not required for messages that are sent and received within the network.对 错 正确的答案是“对”。第43题 in telecommunication networks, a bridge is a product that connects one local area network to another which can use different protocols.对 错 正确的答案是“错”。第44题 the job of a bridge is to examine each message on a lan, pass those known to be within the same lan, and forward those known to be on the other interconnected lan or lans.对 错 正确的答案是“对”。第45题 since computer or node addresses have no specific relationship to location in bridging networks, messages are sent out to every address on the network and accepted only by the intended destination node.对 错 正确的答案是“对”。第46题 a brouter is a product which combines a bridge with a router.对 错 正确的答案是“对”。第47题 the switch is the place where data comes together and the hub is what determines how and where data is forwarded from the place where data comes together.对 错 正确的答案是“错”。第48题 software engineering is the process of manufacturing software systems.对 错 正确的答案是“对”。第49题 all coding today is done in one of the higher-level languages.对 错 正确的答案是“错”。第50题 a programmer typically writes the code using a text editor.对 错 正确的答案是“对”。第51题 testing is the process of examining a software product to find errors.对 错 正确的答案是“对”。第52题 a test case type consists of the values for the test.对 错 正确的答案是“错”。第53题 large software systems are static.对 错 正确的答案是“错”。第54题 the maintenance phase may cost more than all of the others combined.对 错 正确的答案是“对”。第55题 a virus can infect any type of cutive code, including files that are called program files.对 错 正确的答案是“对”。第56题 pure data files are safe and they are not infected by a virus.对 错 正确的答案是“对”。第57题 viruses can do damage to software as well as hardware.对 错 正确的答案是“错”。第58题 a trojan horse program is not a virus, but simply a program often harmful that pretends to be something else.对 错 正确的答案是“对”。第59题 downloading a file to your computer will activate a virus or trojan horse.对 错 正确的答案是“错”。第60题 if you read a plain-text e-mail message or usenet post, your computer will not be infected by a virus.对 错 正确的答案是“对”。

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
ava实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),可运行高分资源 Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现的毕业设计&&课程设计(包含运行文档+数据库+前后端代码),Java实现

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值