信管网每日一练
软件设计师 - 每日一练 导航

软件设计师每日一练试题(2024/3/2)

2024年03月03日来源:信管网 作者:cnitpm

软件设计师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=4

往期软件设计师每日一练试题汇总:www.cnitpm.com/class/27/e4_1.html

软件设计师每日一练试题(2024/3/2)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/3/2

点击查看:更多软件设计师习题与指导

软件设计师每日一练试题内容(2024/3/2)

  • 试题1

    如下图所示,模块A和模块B都访问相同的全局变量和数据结构,则这两个模块之间的耦合类型为( )耦合。



    A. 公共
    B.控制
    C.标记
    D.数据

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/2533114690.html

  • 试题2

    Computers will become more advanced and they willalso become easier to use. Improved speed recognition will make the operationof a computer easier. Virtual reality (虚拟现实), the technology of (1)witha computer using all of the human senses, will also contribute to better humanand computer (2). Other, exotic (奇异的) models of computation arebeing developed, including biological computing that uses living organisms,molecular computing that uses molecules with particular (3), and computingthat uses DNA, the basic unit of heredity (遗传), to store data and carry outoperations. These are examples of possible future computational platforms that,so far, are limited in abilities or are strictly (4). Scientists investigatethem because of the physical limitations of miniaturizing circuits embedded insilicon. There are also (5)related to heat generated by even the tiniest oftransistors.

    (1)A. interact

    B. interacting  

    C. communicate

    D. using

    (2)A. interfaces  

    B. behavior

    C. similarities  

    D. comparison

    (3)A. software   

    B. properties   

    C. programs   

    D. hardware

    (4)A. empirical  

    B. real

    C. practical

    D. theoretical

    (5)A. developments  

    B. advantages  

    C.  limitations  

    D.improvements

    查看答案

    试题参考答案:B、A、B、D、C

    试题解析与讨论:www.cnitpm.com/st/2485228301.html

  • 试题3

    In the fields of physical security and information security, access contro lis the selective restriction of access to a place orothe rresource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization(授权).
    An access control mechanism(1) between a user (or a process executing on behalf of a user) and system resources, such as applications,operating systems,firewalls,routers,files,and databases.The system must first a uthenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(2 )to access the system at all. Then the access control function determines if the specific requested access by this user is permitteD. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(3 )access. An auditing function monitors and keeps a record of user accesses to system resources.
    In practice,a number of(4 )may cooperatively share the access control function. All operating systems have at least arudimentary(基本的),and in many cases aquite robust,access control component.Add-on security packages can add to the(5 )access control capabilities of the OS. Particular applications orutilities, such as a database management system, also incorporate access control functions. External devices,such as firewalls, can also provide access control services.
    (1)A.cooperates
    B.coordinates
    C.connects
    D.mediates
    (2)A.denied
    B.permitted
    C.prohibited
    D.rejected
    (3)A.open
    B.monitor
    C.grant
    D.seek
    (4)A.components
    B.users
    C.mechanisms
    D.algorithms
    (5)A.remote
    B.native
    C.controlled
    D.Automated

    查看答案

    试题参考答案:D、B、C、A、B

    试题解析与讨论:www.cnitpm.com/st/2536219449.html

  • 试题4

    以下关于防火墙功能特性的叙述中,不正确的是()。
    A.控制进出网络的数据包和数据流向
    B.提供流量信息的日志和审计
    C.隐藏内部IP以及网络结构细节
    D.提供漏洞扫描功能

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/3941814180.html

  • 试题5

     ()防火墙是内部网和外部网的隔离点,它可对应用层的通信数据流进行监控和过滤。
    A、包过滤
    B、应用级网关
    C、数据库
    D、WEB

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/4165924404.html

  • 试题6

    程序设计语言引入“类”的概念是为了解决数据保护问题。C++语言将类的成员封装在类体之中,使之具有一定的存取规则,这些规则规定了存取类的成员的权利,其中,对于用private说明的成员,它( )。
    A、既能被该类的成员函数访问,又能被外界直接访问 
    B、只能被该类的成员函数访问,外界不能直接访问 
    C、不能被该类的成员函数访问,只能被外界直接访问
    D、既不能被该类的成员函数访问,也不能被外界直接访问 

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/75762609.html

  • 试题7

    以下媒体中(1)是表示媒体,(2)是表现媒体。
    (1)A.声音
    B.声音编码
    C.超声波
    D.喇叭
    (2)A.声音
    B.声音编码
    C.超声波
    D.喇叭

    查看答案

    试题参考答案:B、D

    试题解析与讨论:www.cnitpm.com/st/2492812229.html

  • 试题8

    DMA工作方式下,在()之间建立了直接的数据通路。
    A.CPU与外设
    B.CPU与主存
    C.主存与外没
    D.外设与外设

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/248629685.html

  • 试题9

    设某二叉树采用二叉链表表示(即结点的两个指针分别指示左、右孩子)。当该二叉树包含 k 个节点时, 其二叉链表节点中必有( ) 个空的孩子指针。
    A. k-1
    B. k
    C. k+1
    D. 2k

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/3954527397.html

  • 试题10

    某软件系统限定:用户登录失败的次数不能超过3次。采用如所示的UML状态图对用户登录状态进行建模,假设活动状态是Logging in,那么当Valid Entry发生时,(1)。 其中,[tries<3]和tries+ +分别为(2)和(3)。

    (1)A、保持在Logging in状态
    B、若[tries<3]为true,则Logged in变为下一个活动状态
    C、Logged in立刻变为下一个活动状态
    D、若tries=3为true,则Logging Denied变为下一个活动状态
    (2)A、状态
    B、转换
    C、监护条件
    D、转换后效果
    (3)A、状态
    B、转换
    C、转换后效果
    D、监护条件

    查看答案

    试题参考答案:B、C、B

    试题解析与讨论:www.cnitpm.com/st/4593318180.html

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习

培训课程

0元畅享

考试题库

免费资料

客服咨询