信管网每日一练
软件设计师 - 每日一练 导航

软件设计师每日一练试题(2024/8/4)

2024年08月05日来源:信管网 作者:cnitpm

软件设计师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=4

往期软件设计师每日一练试题汇总:www.cnitpm.com/class/27/e4_1.html

软件设计师每日一练试题(2024/8/4)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/8/4

点击查看:更多软件设计师习题与指导

软件设计师每日一练试题内容(2024/8/4)

  • 试题1


    A. A
    B. B
    C. C
    D. D

    查看答案

    试题参考答案:B、C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/8/4

  • 试题2

    根据下图所示的输出信息,可以确定的是:( )


    A.本地主机正在使用的端口号是公共端口号
    B.192.168.0.200正在与128.105.129. 30建立连接
    C.本地主机与202.100.112.12建立了安全连接
    D.本地主机正在与100.29.200.110建立连接

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/8/4

  • 试题3

    In a world where it seems we already have too much to do, and too many things to think about, it seems the last thing we need is something new that we have to learn.
    But use cases do solve a problem with requirements: with (1 ) declarative requirements it's hard to describle steps and sequences of events.
    Use cases, stated simply, allow description of sequences of events that, taken together, lead to a system doing something useful. As simple as this sounds, this is important. When confronted only with a pile of requiements, it's often(2 )to make sense of what the authors of the  requirements really wanted the system to do. In the preceding example, use cases reduce the ambiguity of the requirements by specifying exactly when and under what conditions certain behavior occurs; as such, the sequence of the behaviors can be regarded as a requirement. Use cases are particularly well suited to capture approaches. Although this may sound simple, the fact is that (3 ) requirement capture approaches, with their emphasis on declarative requirements and "shall" statements, completely fail to capture fail to capture the (4 ) of the system's behavior. Use cases are a simple yet powerful way to express the behavior of the system in way that all stakeholders can easily understand.
    But, like anything, use cases come with their own problems, and as useful as they are, they can be (5 ). The result is something that is as bad, if not worse, that the original problem. Therein it's important to utilize use cases effectively without creating a greater problem than the one you started with.
    (1)A.plenty
    B.loose
    C.extra
    D.strict
    (2)A.impossible
    B.possible
    C.sensible
    D.practical
    (3)A.modern
    B.conventional
    C.different
    D.formal
    (4)A.statics
    B.nature
    C.dynamics
    D.originals
    (5)A.misapplied
    B.applied
    C.used
    D.powerful

    查看答案

    试题参考答案:D、A、B、C、A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/8/4

  • 试题4

    网络配置如下图所示,其中使用了一台路由器、一台交换机和一台集线器,对于这种配置,下面的论断中正确的是()。



    A.2个广播域和2个冲突域
    B.1个广播域和2个冲突域
    C.2个广播域和5个冲突域
    D.1个广播域和8个冲突域

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/8/4

  • 试题5

    某文件系统采用链式存储管理方案,磁盘块的大小为 1024 字节。 文件 Myfile.doc 由 5 个逻辑记录组成,每个逻辑记录的大小与磁盘块的大小相等,并依次存放在 121、75、86、65 和 114 号磁盘块上。若需要存取文件的第 5120 逻辑字节处的信息,应该访问 ( ) 号磁盘块。
    A、75
    B、85
    C、65
    D、114

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/8/4

  • 试题6

    假设系统中有三类互斥资源 R1、R2 和 R3,可用资源数分别为 8、7 和 4。在 T0 时刻系统中有 P1、P2、P3、P4 和 P5 五个进程,这些进程对资源的最大需求量和已分配资源数如下表所示。在 T0时刻系统剩余的可用资源数分别为 (1) 。如果进程按 (2) 序 列执行,那么系统状态是安全的。

    (1)A、0、1 和 0
    B、0、1 和 1
    C、1、1 和 0
    D、1、1 和 1
    (2)A、P1→P2→P4→P5→P3
    B、P2→P1→P4→P5→P3
    C、P4→P2→P1→P5→P3
    D、P4→P2→P5→P1→P3

    查看答案

    试题参考答案:C、D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/8/4

  • 试题7

    UML中接口可用于()。
    A.提供构造型(stereotype)名称<<interface>>的具体类
    B.Java和C++程序设计中,而C#程序设计中不支持
    C.定义可以在多个类中重用的可执行逻辑
    D.声明对象类所需要的服务

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/8/4

  • 试题8

    主存与Cache的地址映射方式中,()方式可以实现主存任意一块装入Cache中任意位置,只有装满才需要替换。
    A. 全相联
    B. 直接映射
    C.组相联
    D.串并联

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/8/4

  • 试题9

    NAC’s(Network Access Control) role is to restrict network access to only compliant endpoints and (1) users. However, NAC is not a complete LAN (2) solution; additional proactive and (3) security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security (4) . In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures— real-time, multilevel (5)inspection and microsecond threat containment.
    (1)A、automated
    B、distinguished
    C、authenticated
    D、destructed
    (2)A、risis
    B、security
    C、favorable
    D、excellent
    (3)A、constructive
    B、reductive
    C、reactive
    D、productive
    (4)A、defense
    B、intrusion
    C、inbreak
    D、protection
    (5)A、port
    B、connection
    C、threat
    D、insurance

    查看答案

    试题参考答案:C、B、C、A、C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/8/4

  • 试题10

    若给定的关系模式为R<U,F>,U={A,B,C},F={AB→C,C→B>,则关系R( )。
    A.有2个候选关键字AC和BC,并且有3个主属性
    B.有2个候选关键字AC和AB,并且有3个属性
    C.只有一个候选关键字AC,并且有1个非主属性和2个主属性
    D.只有一个候选关键字AB,并且有1个非主属性和2个主属性

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2024/8/4

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习