2025-04-06 08:00:54

≦ 1 ≧
7.1 考点辅导

第 7 章 专业英语
根据考试大纲,本章要求考生掌握以下知识点。 (1)正确阅读和理解本领域和英文资料
历年试题在本章的知识点分布如表 7-1 所示。
表 7-1 历年试题在本章的知识点分布
年度
内容
专业英语
上午分值小计 下午分值小计 合计
2005 年 66~70、71~75
10 10
2006 年 66~70、71~75
10 10
2007 年 71~75 5 5
2008 年 71~75 5 5
2009 年 71~75 5 5
软考专业英语的出题形式一般为完型填空,题材主要是计算机领域中的相关内容。涉及比较广泛,试题难度介于大学英语四六级考试之间。值得注意的是,从 2007 年开始电子商务设计师考试中将专业英语的试题比重从以前的 10 分降低到 5 分。软考其它专业,如软件设计师、系统分析师和项目管理师等试题中的专业英语也可以作为复习备考的参考资料。实际上,这些专业中的英语试题很多情况下和软件评测师考试试题是一样的。
考生可以通过阅读计算机专业的英文原版教材,以及计算机专业的英语时文、论文和技术材料来提高英语水平,重点是扩大专业词汇量并熟悉科技文献中的常用表达方式。同时需要关注计算机领域的新技术发展动向和有关热点话题,掌握相关背景知识有助于理解试题原文。
7.2 典型例题分析
例题 1(电子商务设计师 2009 年 11 月上午第 71~75 题)
Why is (1) fun? What delights may its practitioner expect as his reward? First is the sheer joy of making things. As the child delights in his mud pie, so the adult enjoys building things, especially things of his own design. Second is the pleasure of making things that are useful to other people. Third is the fascination of fashioning complex puzzle-like objects of interlocking moving parts and watching them work in subtle cycles, playing out the consequences of principles built in from the beginning. Fourth is the joy of always learning, which springs from the (2) nature of the task. In one way or another the problem is ever new, and its solver learns something: sometimes (3) , sometimes theoretical, and sometimes both. Finally, there is the delight of working in such a tractable medium. The (4) , like the poet, works only slightly removed from pure thought-stuff. Few media of creation are so flexible, so easy to polish and rework, so readily capable of realizing grand conceptual structures.

≦ 2 ≧
2
电子商务设计师考试试题分类精解
Yet the program (5) , unlike the poet’s words, is real in the sense that it moves and works, producing visible outputs separate from the construct itself. It prints results, draws pictures, produces sounds, moves arms. Programming then is fun because it gratifies creative longings built deep within us and delights sensibilities we have in common with all men.
(1) A. programming

C. working
(2) A. repeating

C. non-repeating
(3) A. semantic

C. lexical
(4) A. poet

C. doctor

(5) A. construct

C. size
例题 1 分析

本题涉及编程基础知识。

B. composing D. writing B. basic
D. advance B. practical
D. syntactical

B. architect D. programmer
B. code D. scale
编程为什么有趣?作为回报,其从业者期望得到什么样的快乐?首先是一种创建事物的纯粹快乐。如同小孩在玩泥巴时感到愉快一样,成年人喜欢创建事物,特别是自己进行设计。其次,快乐来自于开发对其他人有用的东西。第三是整个过程体现出魔术般的力量—将相互啮合的零部件组装在一起,看到它们精妙地运行,得到预先所希望的结果。第四是学习的乐趣,来自于这项工作的非重复特性。人们所面临的问题,在某个或其他方面总有些不同,因而解决问题的人可以从中学习新的事物:有时是实践上的,有时是理论上的,或者兼而有之。最后,乐趣还来自于工作在如此易于驾驭的介质上。程序员,就像诗人一样,几乎仅仅工作在单纯的思考中,凭空地运用自己的想像来建造自己的“城堡”。很少有这样的介质—创造的方式如此灵活,如此易于精炼和重建,如此容易地实现概念上的设想。
然而程序毕竟同诗歌不同,它是实实在在的东西;可以移动和运行,能独立产生可见的输出;能打印结果,绘制图形,发出声音,移动支架。编程非常有趣,在于它不仅满足了我们内心深处进行创造的渴望,而且还愉悦了每个人内在的情感。
例题 1 答案
(1)A
(2)C
(3)B
(4)D (5)A
例题 2(电子商务设计师 2008 年 11 月上午第 71~75 题)
It should go without saying that the focus of UML is modeling.However, what that means, exactly, can be an open-ended question. ( 6 ) is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains.Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey.In general, a UML model is made up of one or more (7) . A diagram graphically represents things, and the relationships between these things.These (8) can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects.It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled.UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (9) are used

≦ 3 ≧
第 7 章 专业英语
to capture the physical organization of the things in your system, i.e., how one object relates to another. (10) focus on the behavior of elements in a system.For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements.
(6)A.Programming
C.Designing (7)A.views C.user views (8)A.things C.languages

(9)A.Activity diagrams C.Structural diagrams

(10)A.Activity diagrams

C.Structural diagrams
例题 2 分析

B.Analyzing D.Modeling B.diagrams

D.structure pictures
B.pictures D.diagrams

B.Use-case diagrams D.Behavioral diagrams B.Use-case diagrams D.Behavioral diagrams
本题涉及的是 UML(统一建模语言)相关知识,参考译文如下。
不要说 UML 的核心就是建模,准确地说,这是一个永不休止的争论问题。建模就是指用一种定义好的符号来捕获思想、关系、决策和需求,且这些符号可以应用到很多不同的领域。建模不仅对不同的人意味着不同的事物,而且能够使用 UML 的不同功能,这取决于你想表达什么。一般来说,一个 UML 模型是用一个或多个图形来设计的。图形用来描述事物及它们之间的关系,这些事物可以代表真实世界的对象、纯软件构件,或者是描述其他对象的行为。对单一的事物,一般可以画多个图形,每个图形代表一个 被建模事物的特殊侧面或视图。UML 2.0 的图形可以分为两类,分别是结构图和行为图,其中结构图用来捕获系统中的事物的物理结构,行为图关注系统元素的行为。例如,你可以使用行为图来捕获需求、操作和元素的内部状态转换。
例题 2 答案
(6)D
(7)B
(8)A (9)C
(10)D
例题 3(电子商务设计师 2007 年 11 月上午第 71~75 题)
TCP/IP (11) layer protocols provide services to the application (12) running on a computer. The application layer does not define the application itself, but rather it defines (13) that applications need—like the ability to transfer a file in the case of HTTP. In short, the application layer provides an (14) between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (15) layer consists of two main protocol options—the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).
(11)A. application
(12)A. hardware (13)A. services (14)A. iteration

(15)A. application
B. transport C. link
B. software B. processes B. object B. session

C. packet

D. network D. equipment
C. applications D. address
C. interface C. physical

D. activity D. transport
3

≦ 4 ≧
4
电子商务设计师考试试题分类精解
例题 3 分析
本题考查网络的 TCP/IP 协议及应用。
TCP/IP 应用层协议为运行在计算机上的应用软件提供相关服务。应用层没有定义自身的应用程序,但是定义了像通过 HTTP 进行文件传输能力的必要的应用。简而言之,应用层为运行在计算机上的软件和计算机网络提供了一个应用能力。TCP/IP 应用层包括大量相关的协议,例如 HTTP。TCP/IP 传输层由 TCP 和 UDP 这 2 个主要协议构成。
例题 3 答案
(11)A
(12)B (13)A (14)C (15)D
例题 4(电子商务设计师 2006 年 11 月上午第 66~70 题)
NAC’s(Network Access Control)role is to restrict network access to only compliant endpoints and (16) users. However, NAC is not a complete LAN (17)solution; additional proactive and (18) security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security (19) . In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures — real-time, multilevel (20) inspection and microsecond threat containment.
(16)A. automated
(17)A. crisis

(18)A. constructive
(19)A. defense
(20)A. port 例题 4 分析

B. distinguished
B. security B. reductive B. intrusion

B. connection
本题考查对网络访问控制的了解。
C. authenticated
C. favorable C. reactive C. inbreak C. threat

D. destructed D. excellent D. productive D. protection D. insurance
NAC(网络访问控制)的任务就是只允许那些仅被允许的终端和被授权的用户进行网络访问。然而,NAC 不是一个完整的局域网安全解决方案,还必须采取预防性的、具有反应性的额外安全措施。Nevis 是最早的也是唯一全面的局域网安全解决方案,它富有远见地兼顾考虑了将来以 10Gbps 的速率传输数据包时的安全问题,以确保高水平安全度的同时有较好的应用性和性能。Nevis 整合了 NAC 作为局域网安全防护的第一道防线。除 NAC 之外,企业既要采取基于角色控制网络访问的策略,也要采取关键性的安全预防措施——实时的多级别威胁检测和微秒级的威胁遏制。
restrict … to 的意思是将某某限制在某范围内,第一句中最后那个 to 跟 restrict 搭配,不是跟 access 搭配。
第三句中的 deep,表示考虑很深远,考虑到未来,富有远见。 例题 4 答案
(16)C
(17)B (18)C (19)A (20)C
例题 5(电子商务设计师 2006 年 11 月上午第 71~75 题)
Virtualization is an approach to IT that pools and shares (21) so that utilization is optimized

≦ 5 ≧
第 7 章 专业英语
and supplies automatically meet demand. Traditional IT environments are often silos, where both technology and human (22) are aligned around an application or business function. With a virtualized (23) , people, processes, and technology are focused on meeting service levels, (24) is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexible. We offer a broad spectrum of virtualization (25) that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources.
(21)A. advantages
(22)A. profits (23)A. system (24)A. content (25)A. solutions 例题 5 分析

B. resources
B. costs

B. infrastructure
B. position B. networks

C. benefits C. resources C. hardware C. power C. interfaces
本题考查涉及虚拟化的相关知识,参考译文如下。
D. precedents D. powers D. link D. capacity D. connections
虚拟化是 IT 行业缓存和共享资源的一种方法,通过这种方法可以更好地利用资源,并且自动提供资源以满足需求。传统的 IT 环境通常是一个竖井,技术和人力资源都是围绕应用或商业功能来安排的。利用虚拟化的架构,人员、过程和技术都集中于满足服务的程度。使得生产量被动态地分配,资源得到优化。而且整个架构得以简化,变得很灵活。我们提供了广泛的虚拟化解决方案,允许客户为其 IT 资源的基础架构选择最适用的路线和优化的重点。
例题 5 答案
(21)B
(22)C (23)B (24)D (25)A
例题 6(电子商务设计师 2005 年 11 月上午第 66~70 题)
MIDI enables people to use (26) computers and electronic musical instruments. There are actually three components to MIDI, the communications ” (27) “, the Hardware Interface and a distribution (28) called “Standard MIDI Files”. In the context of the WWW, the most interesting component is the (29) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (30) are stored in MIDI files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use of MIDI today.
(26)A. personal (27)A. device (28)A. format (29)A. Video (30)A. messages 例题 6 分析

B. electronic B. protocol
B. text

B. Faxmail B. packets

C. multimedia
C. Network C. Wave C. Graphic C. Frame
本题考查涉及多媒体的相关知识,参考译文如下。

D. network D. controller D. center D. Audio
D. information
MIDI 使得人们能够使用多媒体计算机和电子乐器,实际上它有 3 种元素,即通信协议、硬件接口和称为“标准 MIDI 文件”的发布格式。在 WWW 环境中,最重要的元素是音频格式。在原理上,MIDI 文件包含 MIDI 协议报文序列。然而将 MIDI 协议报文保存在 MIDI 文件中时事件都添加了时间戳,以便于按照适当的顺序回放。由 MIDI 文件提供的音乐是 MIDI 当前最通常的应用。

5

≦ 6 ≧
6
电子商务设计师考试试题分类精解
例题 6 答案
(26)C
(27)B (28)A (29)D (30)A
例题 7(电子商务设计师 2005 年 11 月上午第 71~75 题)
Certificates are (31) documents attesting to the (32) of a public key to an individual or other entity. They allow verification of the claim that a given public key does in fact belong to a given individual. Certificates help prevent someone from using a phony key to (33) someone else. In their simplest form, Certificates contain a public key and a name. As commonly used, a certificate also contains an (34) date, the name of the CA that issued the certificate, a serial number, and perhaps other information. Most importantly, it contains the digital (35) of the certificate issuer. The most widely accepted format for certificates is X.509 , thus, Certificates can be read or written by any application complying with X.509.
(31)A. text

(32)A. connecting (33)A. impersonate
B. data

B. binding B. personate

(34)A. communication B. Computation
(35)A. signature 例题 7 分析

B. Mark

C. digital

C. composing
C. damage

C. Expectation
C. Stamp
本题考查涉及数字证书的相关知识,参考译文如下。

D. structured D. conducting D. control D. expiration D. hypertext
证书是一种数字文档,用于表明把一个公钥绑定到一个人或其他实体,用其可以验证一个给定的公钥确实属于某一个人,以可以防止某些人使用假冒的密钥冒充他人。最简单的证书包含一个公钥和一个名称,通常使用的证书也包含超时日期、发行证书的 CA 的名字、一个序列号,以及其他信息。最重要的是,它包含了证书发行者的数字签名。被广泛接受的证书格式是 X.509,这样的证书可以被任何服从 X.509 标准的应用读或写。
例题 7 答案
(31)C

(32)B
(33)A
(34)D
(35)A
例题 8(软件设计师 2008 年 5 月上午第 71 题~75 题)
Object-oriented analysis (OOA) is a semiformal specification technique for the object-oriented paradigm. Object-oriented analysis consists of three steps. The first step is (36). It determines how the various results are computed by the product and presents this information in the form of a (37) and associated scenarios. The second is (38) , which determines the classes and their attributes, then determines the interrelationships and interaction among the classes. The last step is (39) , which determines the actions performed by or to each class or subclass and presents this information in the form of (40).
(6)A. use-case modeling

C. dynamic modeling

(7)A. collaboration diagram

C. use-case diagram
(8)A. use-case modeling

C. dynamic modeling
(9)A. use-case modeling

B. class modeling

D. behavioral modeling
B. sequence diagram D. activity diagram
B. class modeling

D. behavioral modeling
B. class modeling

≦ 7 ≧

C. dynamic modeling
(10)A. activity diagram

C. sequence diagram
例题 8 分析

D. behavioral modeling B. component diagram D. state diagram
第 7 章 专业英语
本题涉及的是面向对象分析(OOA)与建模相关知识,参考译文如下。
面向对象的分析是一种面向对象范型的半形式化描述技术,它包括 3 个步骤,一是用例建模,它决定了如何由产品得到各项计算结果并以用例图和相关场景的方式展现;二是类建模,它决定了类及其属性,然后确定类之间的关系和交互;三是动态建模,它决定了类或每个子类的行为并以状态图的形式表示。
例题 8 答案
(36)A

(37)C
(38)B
(39)C
(40)D
例题 9(软件评测师 2007 年 5 月上午第 71 题~75 题)
(41) analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems. Ultimately, the system models become the (42) for designing and constructing an improved system. (43) is such a technique. The emphasis in this technique is process-centered. Systems analysts draw a series of process models called (44) .
(45)is another such technique
that integrates data and process concerns into constructs called objects.
(41)A. Prototyping

C. Model-driven
(42)A. image

C. layout

(43)A. Structured analysis

C. Discovery Prototyping
(44)A. PERT

C. ERD

(45)A. Structured analysis

C. Discovery Prototyping
例题 9 分析

B. Accelerated D. Iterative
B. picture D. blueprint

B. Information Engineering D. Object-Oriented analysis
B. DFD D. UML

B. Information Engineering D. Object-Oriented analysis
本题涉及的是系统分析的相关知识,参考译文如下。
模型驱动的分析强调绘制图形化的系统模型来记录和验证现有系统和/或建议的系统,最终该系统模型将成为设计和构建一个改进系统的蓝图。结构化分析是这样一种技术,它强调以过程为中心,系统分析员画出一系列的过程模型称为“数据流图”(DFD)。面向对象的分析是另一种分析技术,它集成了数据和过程相关的内容到所谓对象。
例题 9 答案
(41)C

(42)D
(43)A
(44)B
(45)D
例题 10(软件评测师 2005 年 5 月上午第 66 题~70 题)
DOM is a platform-and language- (46) API that allows programs and scripts to dynamically
7

≦ 8 ≧
8
电子商务设计师考试试题分类精解
access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification).The document can be further processed and the results of that processing can be incorporated back into the presented (47) .DOM is a (48) -based API to documents ,which requires the whole document to be represented in (49) while processing it .A simpler alternative to DOM is the event –based SAX, which can be used to process very large (50) documents that do not fit into the memory available for processing.
(46)A.specific

(47)A.text (48)A.table (49)A.document (50)A.XML 例题 10 分析
B.neutral B.image

B.tree B.processor B.HTML
C.contained
C.page C.control

C.disc C.script
本题涉及 DOM 的相关知识,参考译文如下。
D.related D.graphic D.event D.memory D.web
DOM 是一种与平台和语言无关的 API(应用程序接口),它允许程序与脚本动态获取并更新WWW文档(目前,HTML 和 XML 的定义是 WWW 文档规范的一部分)的内容、结构和风格。这种文档可以被进一步处理,处理的结果可以被合并回当前页面中。DOM 是一种基于树的 API,它要求在处理时整个文档都加载进内存中。一种更简单并可以替代 DOM 的是基于事件的 SAX,它可以处理不适合加进内存中处理的非常大的 XML 文档。
例题 10 答案
(46)B
(47)C (48)B (49)D (50)A
7.3 同步练习
Originally introduced by Netscape Communications, (1)are a general mechanism
练习 1
which HTTP Server side applications,such as CGI (2), can use to both store and retrieve information on the HTTP (3) side of the connection. Basically, Cookies can be used to compensate for the (4) nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (5) .
(1)A.Browsers (2)A.graphics (3)A.Client (4)A.fixed (5)A.programs
B.Cookies B.processes B.Editor B.flexible B.applications
C.Connections
C.scripts C.Creator C.stable

C.frameworks

D.Scripts D.texts D.Server D.stateless D.constrains
练习 2
Melissa and LoveLetter made use of the trust that exists between friends or
colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7). Upon running, such worms usually proceed to send themselves out to email addresses from the vicitm’s address book, previous emails, web pages (8) .
As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.
Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash

≦ 9 ≧
第 7 章 专业英语
movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (10) access to your network.
(6) A.attachment (7) A.virtual (8) A.memory (9) A.names (10)A.cracker
B.packet C.datagram
D.message
B.virus C.worms D.bacteria
B.caches C.ports B.cookies C.software B.user C.customer
D.registers D.extensions D.client
练习 3
Networks can be interconnected by different devices. In the physical layer, networks
can be connected by (11) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches, which operate at data link layer. They can accept (12) ,examine the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (13) network layer, the router may be able to translate between the packer formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message _(14)_ .As an example, gateways between Internet e-mail and X.400 e-mail must _(15)_ the e-mail message and change various header fields.
(11)A.repeaters
(12)A.frames (13)A.special (14)A.syntax (15)A.analyze

B.relays B.packets

B.dependent B.semantics B.parse
C.packages
D.modems
C.packages D.cells
C.similar

D.dissimilar
C.language D.format
C.delete

D.create
练习 4
The purpose of the requirements definition phase is to produce a clear, complete,
consistent, and testable _(16)_ of the technical requirements for the software product.
During the requirements definition phase, the requirements definition team uses an iterative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each _(17)_ that it must meet. The starting point is usually a set of high level requirements from the _(18)_ that describe the project or problem.
In either case, the requirements definition team formulates an overall concept for the system and then defines _(19)_ showing how the system will be operated publishes the system and operations concept document and conducts a system concept review (SCR).
Following the SCR, the team derives _(20)_ requirements for the system from the high level requirements and the system and operations concept. Using structured or object-oriented analysis, the team specifies the software functions and algorithms needed to satisfy each detailed requirement.
(16)A.function

(17)A.criterion (18)A.producer
(19)A.rules

B.definition
B.standard

B.customer
C.specification
C.model

C.programmer
B.principles C.scenarios
(20)A.detailed B.outlined C.total

D.statement D.system D.analyser D.scenes D.complete
练习 5
The Rational Unified Process (RUP) is a software engineering process, which
captures many of best practices in modern software development. The notions of (21) and scenarios have been proven to be an excellent way to capture function requirements. RUP can be described in two dimensions – time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive (22) which is concluded with a

9

≦ 10 ≧
电子商务设计师考试试题分类精解
well-defined (23) and can be further broken down into (24) – a complete development loop resulting in a release of an executable product, a subset of the final product under development, which grows incrementally to become the final system. The content structure refers to the disciplines, which group (25) logically by nature.
(21)A. artifacts

(22)A. orientations (23)A. milestone
(24)A. rounds (25)A. functions

B. use-cases B. views B. end-mark B. loops

B. workflows
C. actors C. aspects C. measure C. iterations C. actions

D. workers D. phases D. criteria
D. circularities D. activities
Most computer systems are (26) to two different groups of attacks: Insider attacks
练习 6
and outsider attacks. A system that is known to be (27) to an outsider attack by preventing
(28) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (29) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (30) by tools referred to as Intrusion Detection Systems.
(26)A.vulnerable (27)A.reliable (28)A.visit (29)A.power (30)A.searched

B.week
B.secure B.access B.rights

B.checked
C.sensitively C.indestructible C.I/O C.authorized C.tested
D.helpless D.steady D.read/write D.common D.detected
Soon, more of the information we receive via the Internet could come (31) in
练习 7
digital wrappers.
Wrappers are made up (32) software code that’s targeted to do specific things with the data (33) within them, such as helping to define queries for search engines. They also keep (34) from (35) access to that code.
(31)A.package
(32)A.of

(33)A.close (34)A.insiders (35)A.gain

B.packaged
B.off

B.closed B.money B.gained

C.packages
C.on

C.enclose C.outsiders C.gains

D.packaging D.out
D.enclosed D.warehouse D.gaining
A typical (36) language contains an applicative sub-language which approximates
练习 8
the mathematical abstractions of ―timeless‖ functions applied to ―spaceless‖values, where the actual operation sequences and use of storage space during expression evaluation are organized behind the (37) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (38) results during expression evaluation stored at the discretion of the language implementation, and effecting parameter (39) and (40) operations through value copying.
(36)A.imperative (37)A.foreground (38)A.middle (39)A.transverse (40)A.assignment
10

B.mandatory B.background

B.intermediate B.transportation
B.design

C.compulsory D.voluntary C.screen D.scenes
C.previous C.transmission
C.value

D.final
D.translation D.dispatch

≦ 11 ≧
(1) (11) (21) (31)
(2) (12) (22) (32)
(3) (13) (23) (33)
(4) (14) (24) (34)
7.4 同步练习解析
请把答案填写在对应的栏目中
(5) (15) (25) (35)
(6) (16) (26) (36)
(7) (17) (27) (37)
(1)~(5)本题涉及的是 Cookies 相关知识。参考译文如下:
(8) (18) (28) (38)
第 7 章 专业英语
(9) (19) (29) (39)
(10)
(20)
(30)
(40)

网景公司最初推出的 Cookies 是 HTTP 服务器侧的应用,如 CGI 脚本,用来保存和检索连接上它的 HTTP 客户端信息的一种通用机制。基本上,Cookies 可以被用来弥补 HTTP 协议的无状态特性。这个简单的、持续的、客户端的状态极大地扩展了基于 WWW 的应用的能力。 (6)~(10)本题涉及蠕虫病毒的相关知识,参考译文如下。
Melissa 和 LoveLetter 利用朋友或同事之间存在的信任,想象一下从朋友那里收到一个附件并要求你打开它,这是 Melissa 和一些其它电子邮件蠕虫病毒经常发生的事情。一旦运行,这种蠕虫病毒通常将自己发送到被感染者的地址簿、先前的电子邮件、网页缓存保存的邮件地址中。
由于管理员一般通过识别众所周知的扩展名来搜索和阻止危险的电子邮件附件,所以病毒作者使用其他扩展名来绕过这种保护。可执行文件(.exe)被重新命名为“bat”和“cmd”加上其它扩展名的整个列表,它仍将运行并成功地感染目标用户。
通常情况下,黑客通过发送看起来像 Flash 影片的附件来渗入网络,这些影片在展示一些
可爱的动画的同时在后台运行命令窃取你的密码使黑客访问你的网络。 (11)~(15)涉及是网络的相关知识,参考译文如下。
网络可以用不同的设备互联,在物理层用中继器或集线器互联,这些设备只是在相同的网络之间传送比特串;在上面的数据链路层可以使用网桥或交换机,这些设备接收数据帧,检查 MAC 地址。并可以实现少量的协议转换,把数据帧转发到不同的网络中;在网络层我们使用路由器连接两个网络,如果两个网络的网络层不同,路由器能够转换分组格式;在传输层我们使用传输网关,它可以在两个传输连接之间建立接口;最后在应用层应用网关实现消息语法之间的翻译。例如,在 Internet 邮件和 X.400 邮件之间的网关可以对邮件报文进行语义分析,并修改报文的各个报头字段。
(16)~(20)涉及软件工程的相关知识,参考译文如下。
需求定义阶段的作用是为软件产品产生一个清晰、完整、一致并可测试的技术需求规格说明。
在需求定义阶段需求定义团队通过迭代过程把有关系统需求宽泛的陈述扩展为系统必须实现的各个功能的完整且详细的规格说明,以及系统应该满足的各种准则,这个过程的起点通常是由用户提供的描述项目或问题的一组高级需求。
在任何情况下,需求定义团队应该阐明与系统有关的整体概念,并且设定一种能够显示系统如何运作的场景。发布有关系统和运行的概念文档,并进行系统概念的评审(SCR)。

11

≦ 12 ≧
12
电子商务设计师考试试题分类精解
在 SCR 之后,团队应该根据高级需求和系统运行概念导出详细的系统需求,通过结构化的或面向对象的分析技术,团队可以规范系统功能说明满足每一细节需求的算法。
(21)~(25)RUP(Rational Unified Process)是一种软件工程过程产品,它吸取了现代软件开发中许多成功的实践。事实证明,采用用例(use-cases)和剧情(scenarios)捕获目标系统的功能需求是一种较好的办法。可以采用二维模型来描述 RUP—时间和内容。从时间维来看,软件生存周期被划分为不同的周期(cycles)。每个周期又被划分为 4 个连续的阶段(phase),每个阶段都包含一个妥善定义的里程碑(milestone);每个阶段还可以被进一步划分为若干轮迭代(iterations)。一次迭代是一次完整的开发过程,每次迭代结束时会发布一个可执行的产品,这个产品是正在开发的软件系统的一个子集,它会逐渐扩展为最终系统。内容结构指的是一些将活动(activities)组织在一起的、天然存在的规则。
(26)~(30)大部分计算机系统都容易受到两种不同类型的攻击:来自内部的攻击和来自外部的攻击。系统可以通过禁止外部的访问保证免受外部攻击,但是仍然容易受到因用户权限滥用而引起的内部攻击。检测这样的权限滥用和来自外部的攻击,不仅提供了能评估损害的信息,而且也有助于防止以后再受到攻击。这些攻击通常用被称为入侵检测系统的工具检测出来。 (31)~(35)考查 Internet 基础知识。很快地,我们通过因特网接收更多的、以数据包裹的形式到达的信息。
这种包裹由软件代码组成。其目的是用封装在其中的数据完成一些特定的事情,例如帮助搜索引擎定义查询。它们还能让局外人无法访问那些软件代码。
(36)~(40)典型的强制型语言都包含一个应用型子语言,它类似于一种数学抽象,把不耗费时间的函数应用于无需空间的值。在表达式求值期间的实际操作序列和使用的存储空间都隐藏在计算现场之后。在这种假设之下,被传递的值只是少量的数据结构,通常只有几个计算机字长,甚至更少。这意味着不耗费空间的设想可以这样来实现:表达式求值过程中产生的中间结果可以根据语言的实现存储在任意位置,结果参数的传递和赋值操作都可以通过值的拷贝来实现。
参考答案
(1) B (11) A (21) B 31 B

(2) C (12) A (22) D 32 A
(3) A (13) D (23) A 33 D
(4) D (14) B (24) C 34 C
(5) B (15) B (25) D 35 D
(6) A (16) C (26) A 36 A
(7) C (17) A (27) B 37 D
(8) B (18) B (28) B 38 B
(9) D (19) C (29) C 39 C
(10) A (20) A (30) D 40 A