首页
试卷库
试题库
当前位置:
X题卡
>
所有题目
>
题目详情
阅读下列说明,回答问题1至问题3,将解答填入对应栏内。 [说明] 希赛公司供应各种标准的营养套餐。假设菜单上共有n项食物m1,m2,…,mn,每项食物mi的营养价值为vi,价格为pi,其...
查看本题答案
包含此试题的试卷
中级软件设计师《填空集》真题及答案
点击查看
你可能感兴趣的试题
试题三 阅读以下说明回答问题1至问题5将解答填入答题纸对应的解答栏内 【说明】 在
试题二阅读以下说明回答问题1至问题3将解答填入答题纸对应的解答栏内 Linux服务器中DH
阅读下列说明回答问题1至问题5将解答填入对应栏内 【说明】在WindowsServer2008上完
阅读下列说明回答问题1至问题2将解答填入对应栏内 【说明】利用WindowsServer 200
阅读下列说明回答问题1至问题5将解答填入对应栏内 【说明】在WindowsServer2008上完
阅读下列说明回答问题1至问题4将解答填入对应栏内 【说明】WindowsServer2008是基于
阅读以下说明和交换机的配置信息回答问题1至问题3将解答填入对应栏内 某公司下设三个部门为了便于管理
阅读下列说明回答问题1至问题3将解答填入答题纸的对应栏内【说明】下表是某项目的工程数据根据各个
阅读下列说明回答问题1至问题3将解答填入答题纸的对应栏内【说明】下表是某项目的工程数据根据各个
试题三 阅读以下说明回答问题1至问题5将解答填入答题纸对应的解答栏内 【说明】 在
阅读下列说明回答问题1至问题5将解答填入对应栏内 【说明】 建立企业的Internet时经常遇到
阅读下列说明回答问题1至问题2将解答填入对应栏内 【说明】利用WindowsServer 200
试题四共20分阅读下列说明回答问题1至问题5将解答填入答题纸的对应栏内[说明]某公司准备开发一
阅读下列说明回答问题1至问题4将解答填入对应栏内 【说明】WindowsServer2008是基于
阅读下列说明回答问题1至问题2将解答填入对应栏内 【说明】利用WindowsServer 200
试题三 阅读以下说明回答问题1至问题5将解答填入答题纸对应的解答栏内 若局域网所
试题三 阅读以下说明回答问题1至问题5将解答填入答题纸对应的解答栏内 【说明】 在
试题三 阅读以下说明回答问题1至问题5将解答填入答题纸对应的解答栏内 【说明】 在
试题三 阅读以下说明回答问题1至问题5将解答填入答题纸对应的解答栏内 【说明】 在
阅读下列说明回答问题1至问题3将解答填入答题纸的对应栏内【说明】下表是某项目的工程数据根据各个
热门试题
更多
NAC’sNetworkAccessControlroleistorestrictnetworkaccesstoonlycompliantendpointsand81users.HoweverNACisnotacompleteLAN82solution;additionalproactiveand83securitymeasuresmustbeimplemented.NevisisthefirstandonlycomprehensiveLANsecuritysolutionthatcombinesdeepsecurityprocessingofeverypacketat100Gbpsensuringahighlevelofsecurityplusapplicationavailabilityandperformance.NevisintegratesNACasthefirstlineofLANsecurity84InadditiontoNACenterprisesneedtoimplementrole-basednetworkaccesscontrolaswellascriticalproactivesecuritymeasures-real-timemultilevel85inspectionandmicrosecondthreatcontainment.
Networkscanbeinterconnectedbydifferentdevices.Inthephysicallayernetworkscanbeconnectedby41orhubswhichjustmovethebitsfromonenetworktoanidenticalnetwork.Onelayerupwefindbridgesandswitcheswhichoperateatdatalinklayer.Theycanaccept42examinetheMACaddressandforwardtheframestoadifferentnetworkwhiledoingminorprotocoltranslationintheprocess.Inthenetworklayerwehaveroutersthatcanconnecttwonetworks.Iftwonetworkshave43networklayertheroutermaybeabletotranslatebetweenthepacketformats.Inthetransportlayerwefindtransportgatewaywhichcaninterfacebetweentwotransportconnections.Finallyintheapplicationlayerapplicationgatewaystranslatemessage44.AsanexamplegatewaysbetweenInternetE-mailandX.400E-mailmust45theE-mailmessageandchangevariousheaderfields.
Thepurposeoftherequirementsdefinitionphaseistoproduceaclearcompleteconsistentandtestable46ofthetechnicalrequirementsforthesoftwareproduct.Duringtherequirementsdefinitionphasetherequirementsdefinitionteamusesaniterativeprocesstoexpandabroadstatementofthesystemrequirementsintoacompleteanddetailedspecificationofeachfunctionthatthesoftwaremustperformandeach47thatitmustmeet.Thestartingpointisusuallyasetofhigh-levelrequirementsfromthe48thatdescribetheprojectorproblem.Ineithercasetherequirementsdefinitionteamformulatesanoverallconceptforthesystemandthendefines49showinghowthesystemwillbeoperatedpublishesthesystemandoperationsconceptdocumentandconductsasystemconceptreviewSCR.FollowingtheSCRtheteamderives50requirementsforthesystemfromthehigh-levelrequirementsandthesystemandoperationsconcept.Usingstructuredorobject-orientedanalysistheteamspecifiesthesoftwarefunctionsandalgorithmsneededtosatisfyeachdetailedrequirement.
Certificatesare66documentsattestingtothe67ofapublickeytoanindividualorotherentity.Theyallowverificationoftheclaimthatagivenpublickeydoesinfactbelongtoagivenindividual.Certificateshelppreventsomeonefromusingaphonykeyto68someoneelse.IntheirsimplestformCertificatescontainapublickeyandaname.Ascommonlyusedacertificatealsocontainsan69datethenameoftheCAthatissuedthecertificateaserialnumberandperhapsotherinformation.Mostimportantlyitcontainsthedigital70ofthecertificateissuer.ThemostwidelyacceptedformatforcertificatesisX.509thusCertificatescanbereadorwrittenbyanyapplicationcomplyingwithX.509.
WebSQLisaSQL-like76languageforextractinginformationfromtheweb.Itscapabilitiesforperformingnavigationofweb77makeitausefultoolforautomatingseveralweb-relatedtasksthatrequirethesystematicprocessingofeitherailthefinksina78allthepagesthatcanbereachedfromagivenURLthrough79thatmatchapatternoracombinationofboth.WebSQLalsoprovidestransparentaccesstoindexserversthatcanbequeriedviatheCommon80Interface.
Traditionalstructuredanalysistechniquesfocusupontheflowof36withinasystem.Object-orientedanalysisemphasizesthebuildingofreal-worldmodels.Itexaminesrequirementsfromtheperspectiveoftheclassesandobjectsfoundinthevocabularyofthe37domain.Traditionalsystemdesignmethodemphasizestheproperandeffectivestructureofacomplexsystem.Object-orienteddesignmethodencompassestheprocessofobject-orienteddecompositionanda38fordepictingbothlogicalandphysicalaswellasstaticanddynamicmodelsofthesystemunderdesign.Object-orientedprogrammingisamethodofimplementationinwhichprogramsareorganizedascooperativecollectionsofobjectseachofwhichrepresentsan39ofsomeclassandwhoseclassesareallmembersofahierarchyofclassesunitedvia40relationships.
31dataeffectivelyiscrucialforsuccessintoday’scompetitiveenvironment.Managersmustknowhowtouseavarietyoftools.Integrateddatatakesinformationfromdifferentsourcesandputsittogetherinameaningfulandusefulway.Oneofthedifficultiesofthisisthe32inhardwareandsoftware.33integrationusesabasedocumentthatcontainscopiesofotherobjects.34integrationusesabasedocumentthatcontainsthecurrentormostrecentversionofthesourcedocumentitcontains.35providesanoverviewoftheprogramwritteninplainEnglishwithoutthecomputersyntax.
MelissaandLoveLettermadeuseofthetrustthatexistsbetweenfriendsorcolleagues.Imaginereceivingan56fromafriendwhoasksyoutoopenit.ThisiswhathappenswithMelissaandseveralothersimilarEmail57.UponrunningsuchwormsusuallyproceedtosendthemselvesouttoEmailaddressesfromthevictim’saddressbookpreviousEmailsWebpages58AsadministratorsseektoblockdangerousEmailattachmentsthroughtherecognitionofwell-known59viruswritersuseotherextensionstocircumventsuchprotection.Executable.exefilesarerenamedto.batand.cmdplusawholelistofotherextensionsandwillstillrunandsuccessfullyinfecttargetusers.Frequentlyhackerstrytopenetratenetworksbysendinganattachmentthatlookslikeaflashmoviewhichwhiledisplayingsomecuteanimationsimultaneouslyrunscommandsinthebackgroundtostealyourpasswordsandgivethe60accesstoyournetwork.
DOMisaplatformandlanguage-51APIthatallowsprogramsandscriptstodynamicallyaccessandupdatethecontentstructureandstyleofWWWdocumentscurrentlydefinitionsforHTMLandXMLdocumentsarepartofthespecification.Thedocumentcanbefurtherprocessedandtheresultsofthatprocessingcanbeincorporatedbackintothepresented52.DOMisa53-basedAPItodocumentswhichrequiresthewholedocumenttoberepresentedin54whileprocessingit.AsimpleralternativetoDOMistheevent-basedSAXwhichcanbeusedtoprocessverylarge55documentsthatdonotfitinfothememoryavailableforprocessing.
MIDIenablespeopletouse61computersandelectronicmusicalinstruments.ThereareactuallythreecomponentstoM1DIthecommunications62theHardwareInterfaceandadistribution63calledStandardMIDIFiles.InthecontextoftheWWWthemostinterestingcomponentisthe64Format.InprincipleMIDIfilescontainsequencesofMIDIProtocolmessages.HoweverwhenMIDIProtocol65arestoredinMID!filestheeventsarealsotime-stampedforplaybackinthepropersequence.MusicdeliveredbyMIDIfilesisthemostcommonuseofMIDItoday.
31dataeffectivelyiscrucialforsuccessintoday’scompetitiveenvironment.Managersmustknowhowtouseavarietyoftools.Integrateddatatakesinformationfromdifferentsourcesandputsittogetherinameaningfulandusefulway.Oneofthedifficultiesofthisisthe32inhardwareandsoftware.33integrationusesabasedocumentthatcontainscopiesofotherobjects.34integrationusesabasedocumentthatcontainsthecurrentormostrecentversionofthesourcedocumentitcontains.35providesanoverviewoftheprogramwritteninplainEnglishwithoutthecomputersyntax.
WebSQLisaSQL-like76languageforextractinginformationfromtheweb.Itscapabilitiesforperformingnavigationofweb77makeitausefultoolforautomatingseveralweb-relatedtasksthatrequirethesystematicprocessingofeitherailthefinksina78allthepagesthatcanbereachedfromagivenURLthrough79thatmatchapatternoracombinationofboth.WebSQLalsoprovidestransparentaccesstoindexserversthatcanbequeriedviatheCommon80Interface.
NAC’sNetworkAccessControlroleistorestrictnetworkaccesstoonlycompliantendpointsand81users.HoweverNACisnotacompleteLAN82solution;additionalproactiveand83securitymeasuresmustbeimplemented.NevisisthefirstandonlycomprehensiveLANsecuritysolutionthatcombinesdeepsecurityprocessingofeverypacketat100Gbpsensuringahighlevelofsecurityplusapplicationavailabilityandperformance.NevisintegratesNACasthefirstlineofLANsecurity84InadditiontoNACenterprisesneedtoimplementrole-basednetworkaccesscontrolaswellascriticalproactivesecuritymeasures-real-timemultilevel85inspectionandmicrosecondthreatcontainment.
MIDIenablespeopletouse61computersandelectronicmusicalinstruments.ThereareactuallythreecomponentstoM1DIthecommunications62theHardwareInterfaceandadistribution63calledStandardMIDIFiles.InthecontextoftheWWWthemostinterestingcomponentisthe64Format.InprincipleMIDIfilescontainsequencesofMIDIProtocolmessages.HoweverwhenMIDIProtocol65arestoredinMID!filestheeventsarealsotime-stampedforplaybackinthepropersequence.MusicdeliveredbyMIDIfilesisthemostcommonuseofMIDItoday.
AWebbrowserissimplyaterminalemulatordesignedtodisplaytextonascreen.ThetwoessentialdifferencesbetweenanordinaryterminalemulatorandaWebbrowserarethatthebrowserknowshowtodealwith26andthatithasamechanismfor27graphicalfiles.Displaytextdisplaygraphicsand28hyperlinks-there’s99percentofthe29value.That’snottosaythatthemanufacturersdidn’tgoall-outtoattachahyperactiveefflorescenceofuselesscapabilitiesontotheirbrowsers.Rememberwhenmediachannelsinthebrowserwereabigdealinsteadoftheclutteryoucan’twaittodeletefromyourfavoritesofbookmarksmenuRememberwhenclient-sideJavaappletsweresupposedtobecomethepreferred30forapplicationdevelopmentRememberframesandalltheirnastysideeffects
OriginallyintroducedbyNetscapeCommunications71areageneralmechanismwhichHTTPServersideapplicationssuchasCGI72canusetobothstoreandretrieveinformationontheHTTP73sideoftheconnection.BasicallyCookiescanbeusedtocompensateforthe74natureofHTTP.Theadditionofasimplepersistentclient-sidestatesignificantlyextendsthecapabilitiesofWWW-based75
Traditionalstructuredanalysistechniquesfocusupontheflowof36withinasystem.Object-orientedanalysisemphasizesthebuildingofreal-worldmodels.Itexaminesrequirementsfromtheperspectiveoftheclassesandobjectsfoundinthevocabularyofthe37domain.Traditionalsystemdesignmethodemphasizestheproperandeffectivestructureofacomplexsystem.Object-orienteddesignmethodencompassestheprocessofobject-orienteddecompositionanda38fordepictingbothlogicalandphysicalaswellasstaticanddynamicmodelsofthesystemunderdesign.Object-orientedprogrammingisamethodofimplementationinwhichprogramsareorganizedascooperativecollectionsofobjectseachofwhichrepresentsan39ofsomeclassandwhoseclassesareallmembersofahierarchyofclassesunitedvia40relationships.
31dataeffectivelyiscrucialforsuccessintoday’scompetitiveenvironment.Managersmustknowhowtouseavarietyoftools.Integrateddatatakesinformationfromdifferentsourcesandputsittogetherinameaningfulandusefulway.Oneofthedifficultiesofthisisthe32inhardwareandsoftware.33integrationusesabasedocumentthatcontainscopiesofotherobjects.34integrationusesabasedocumentthatcontainsthecurrentormostrecentversionofthesourcedocumentitcontains.35providesanoverviewoftheprogramwritteninplainEnglishwithoutthecomputersyntax.
MIDIenablespeopletouse61computersandelectronicmusicalinstruments.ThereareactuallythreecomponentstoM1DIthecommunications62theHardwareInterfaceandadistribution63calledStandardMIDIFiles.InthecontextoftheWWWthemostinterestingcomponentisthe64Format.InprincipleMIDIfilescontainsequencesofMIDIProtocolmessages.HoweverwhenMIDIProtocol65arestoredinMID!filestheeventsarealsotime-stampedforplaybackinthepropersequence.MusicdeliveredbyMIDIfilesisthemostcommonuseofMIDItoday.
OriginallyintroducedbyNetscapeCommunications71areageneralmechanismwhichHTTPServersideapplicationssuchasCGI72canusetobothstoreandretrieveinformationontheHTTP73sideoftheconnection.BasicallyCookiescanbeusedtocompensateforthe74natureofHTTP.Theadditionofasimplepersistentclient-sidestatesignificantlyextendsthecapabilitiesofWWW-based75
NAC’sNetworkAccessControlroleistorestrictnetworkaccesstoonlycompliantendpointsand81users.HoweverNACisnotacompleteLAN82solution;additionalproactiveand83securitymeasuresmustbeimplemented.NevisisthefirstandonlycomprehensiveLANsecuritysolutionthatcombinesdeepsecurityprocessingofeverypacketat100Gbpsensuringahighlevelofsecurityplusapplicationavailabilityandperformance.NevisintegratesNACasthefirstlineofLANsecurity84InadditiontoNACenterprisesneedtoimplementrole-basednetworkaccesscontrolaswellascriticalproactivesecuritymeasures-real-timemultilevel85inspectionandmicrosecondthreatcontainment.
Networkscanbeinterconnectedbydifferentdevices.Inthephysicallayernetworkscanbeconnectedby41orhubswhichjustmovethebitsfromonenetworktoanidenticalnetwork.Onelayerupwefindbridgesandswitcheswhichoperateatdatalinklayer.Theycanaccept42examinetheMACaddressandforwardtheframestoadifferentnetworkwhiledoingminorprotocoltranslationintheprocess.Inthenetworklayerwehaveroutersthatcanconnecttwonetworks.Iftwonetworkshave43networklayertheroutermaybeabletotranslatebetweenthepacketformats.Inthetransportlayerwefindtransportgatewaywhichcaninterfacebetweentwotransportconnections.Finallyintheapplicationlayerapplicationgatewaystranslatemessage44.AsanexamplegatewaysbetweenInternetE-mailandX.400E-mailmust45theE-mailmessageandchangevariousheaderfields.
Networkscanbeinterconnectedbydifferentdevices.Inthephysicallayernetworkscanbeconnectedby41orhubswhichjustmovethebitsfromonenetworktoanidenticalnetwork.Onelayerupwefindbridgesandswitcheswhichoperateatdatalinklayer.Theycanaccept42examinetheMACaddressandforwardtheframestoadifferentnetworkwhiledoingminorprotocoltranslationintheprocess.Inthenetworklayerwehaveroutersthatcanconnecttwonetworks.Iftwonetworkshave43networklayertheroutermaybeabletotranslatebetweenthepacketformats.Inthetransportlayerwefindtransportgatewaywhichcaninterfacebetweentwotransportconnections.Finallyintheapplicationlayerapplicationgatewaystranslatemessage44.AsanexamplegatewaysbetweenInternetE-mailandX.400E-mailmust45theE-mailmessageandchangevariousheaderfields.
DOMisaplatformandlanguage-51APIthatallowsprogramsandscriptstodynamicallyaccessandupdatethecontentstructureandstyleofWWWdocumentscurrentlydefinitionsforHTMLandXMLdocumentsarepartofthespecification.Thedocumentcanbefurtherprocessedandtheresultsofthatprocessingcanbeincorporatedbackintothepresented52.DOMisa53-basedAPItodocumentswhichrequiresthewholedocumenttoberepresentedin54whileprocessingit.AsimpleralternativetoDOMistheevent-basedSAXwhichcanbeusedtoprocessverylarge55documentsthatdonotfitinfothememoryavailableforprocessing.
VirtualizationisanapproachtoITthatpoolsandshares86sothatutilizationisoptimizedandsuppliesautomaticallymeetdemand.TraditionalITenvironmentsareoftensiloswherebothtechnologyandhuman87.arealignedaroundanapplicationorbusinessfunction.Withavirtualized88peopleprocessesandtechnologyarefocusedonmeetingservicelevels89isallocateddynamicallyresourcesareoptimizedandtheentireinfrastructureissimplifiedandflexible.Weofferabroadspectrumofvirtualization90thatallowscustomerstochoosethemostappropriatepathandoptimizationfocusfortheirITinfrastructureresources.
DOMisaplatformandlanguage-51APIthatallowsprogramsandscriptstodynamicallyaccessandupdatethecontentstructureandstyleofWWWdocumentscurrentlydefinitionsforHTMLandXMLdocumentsarepartofthespecification.Thedocumentcanbefurtherprocessedandtheresultsofthatprocessingcanbeincorporatedbackintothepresented52.DOMisa53-basedAPItodocumentswhichrequiresthewholedocumenttoberepresentedin54whileprocessingit.AsimpleralternativetoDOMistheevent-basedSAXwhichcanbeusedtoprocessverylarge55documentsthatdonotfitinfothememoryavailableforprocessing.
Thepurposeoftherequirementsdefinitionphaseistoproduceaclearcompleteconsistentandtestable46ofthetechnicalrequirementsforthesoftwareproduct.Duringtherequirementsdefinitionphasetherequirementsdefinitionteamusesaniterativeprocesstoexpandabroadstatementofthesystemrequirementsintoacompleteanddetailedspecificationofeachfunctionthatthesoftwaremustperformandeach47thatitmustmeet.Thestartingpointisusuallyasetofhigh-levelrequirementsfromthe48thatdescribetheprojectorproblem.Ineithercasetherequirementsdefinitionteamformulatesanoverallconceptforthesystemandthendefines49showinghowthesystemwillbeoperatedpublishesthesystemandoperationsconceptdocumentandconductsasystemconceptreviewSCR.FollowingtheSCRtheteamderives50requirementsforthesystemfromthehigh-levelrequirementsandthesystemandoperationsconcept.Usingstructuredorobject-orientedanalysistheteamspecifiesthesoftwarefunctionsandalgorithmsneededtosatisfyeachdetailedrequirement.
OriginallyintroducedbyNetscapeCommunications71areageneralmechanismwhichHTTPServersideapplicationssuchasCGI72canusetobothstoreandretrieveinformationontheHTTP73sideoftheconnection.BasicallyCookiescanbeusedtocompensateforthe74natureofHTTP.Theadditionofasimplepersistentclient-sidestatesignificantlyextendsthecapabilitiesofWWW-based75
MelissaandLoveLettermadeuseofthetrustthatexistsbetweenfriendsorcolleagues.Imaginereceivingan56fromafriendwhoasksyoutoopenit.ThisiswhathappenswithMelissaandseveralothersimilarEmail57.UponrunningsuchwormsusuallyproceedtosendthemselvesouttoEmailaddressesfromthevictim’saddressbookpreviousEmailsWebpages58AsadministratorsseektoblockdangerousEmailattachmentsthroughtherecognitionofwell-known59viruswritersuseotherextensionstocircumventsuchprotection.Executable.exefilesarerenamedto.batand.cmdplusawholelistofotherextensionsandwillstillrunandsuccessfullyinfecttargetusers.Frequentlyhackerstrytopenetratenetworksbysendinganattachmentthatlookslikeaflashmoviewhichwhiledisplayingsomecuteanimationsimultaneouslyrunscommandsinthebackgroundtostealyourpasswordsandgivethe60accesstoyournetwork.
Certificatesare66documentsattestingtothe67ofapublickeytoanindividualorotherentity.Theyallowverificationoftheclaimthatagivenpublickeydoesinfactbelongtoagivenindividual.Certificateshelppreventsomeonefromusingaphonykeyto68someoneelse.IntheirsimplestformCertificatescontainapublickeyandaname.Ascommonlyusedacertificatealsocontainsan69datethenameoftheCAthatissuedthecertificateaserialnumberandperhapsotherinformation.Mostimportantlyitcontainsthedigital70ofthecertificateissuer.ThemostwidelyacceptedformatforcertificatesisX.509thusCertificatescanbereadorwrittenbyanyapplicationcomplyingwithX.509.
热门题库
更多
中级软件设计师
初级网络管理员
初级信息处理技术员
中级数据库系统工程师
中级多媒体应用设计师
高级系统分析师
高级网络规划设计师
高级系统架构师
中级信息系统监理师
初级通信工程师
中级通信工程师
通信新技术、新业务知识
无线通信专业技术
移动通信专业技术
有线传输专业技术
电话交换专业技术