discussion-羁旅
软件工程专业外语题库
第一章
一、Multiple
Choice(选择题)
Circle the letter or fill in the
correct answer.
1. A common term that
describes the combination of a smartphone and a
tablet is.
a. notebook computer
b.
handheld computer
c. tablet computer
d.
Phablet
2. Application-specific computers
are not including the
a. portable data
terminal
b. carputer
c. smartphones
d.
wearable computer
3. Which of the
following is not belonging to the features of
Mobile Computers?
a. portability
b. small
size
c. wireless communication
d. Data
4. Android OS, iOS, Windows Phone and
BlackBerry are all examples of
a. application
software
b. mobile operating systems
c.
browsers
d. desktop operating systems
5. Mobile apps were originally offered for
general productivity and information retrieval,
but don’t including .
a. microprocessor
b. calendar
c. E-Mail
d. weather
informations
6. Smartphones are mobile
phones with an advanced mobile operating system.
Which one
is not a smartphone?
a. iPhone
b. Xiaomi Mi4
c. iPad
d.
Samsung Galaxy S6
7. Which one is the
primary navigation and information “hub” on
Android devices?
a. Homescreen
b. widgets
c. icons
d. Status bar
8. The
four layers of Android architecture are not
including:
a. Linux kernel
b. libraries
c. application
d. hard disk
9.
The Services of Google Play does not includ
a.
Google Play Music and eBooks
b. Google Play
Worksheet and document
c. Google Play
Newsstand and games
d. Google Play Movies & TV
10. The lowest layer of Android
architecture, Linux kernel (version 2.6), provides
core
system services, such as .
a. Memory
management, process management, network stack,
security and driver
model
b. Activity
manager, windows manager, content providers and
the view system
c. Notification manager,
package manager, ttelephone manager and resource
manager
d. location manager and XMPP service.
二、TrueFalse Questions(判断题)
1.
Devices that are portable, but used while
stationary, are sometimes removed from the
group of mobile computing devices.
2. A
mobile operating system is an operating system(OS)
for smartphones, tablets, PDAs
and desktop
computers.
3. A typical mobile device will fit
in the average adult’s hand or pocket.
4. The
term “app” is a shortening of the term “system
software”.
5. GPS is the Global Positioning
System is a time-based navigation system that
provides
location and time information in all
weather conditions.
6. iPhone is a line of
smartphones designed and marketed by Apple Inc.
7. Redmi Note is a phablet and the second
smartphone in the Mi Series.
8. A
homescreen may be made up of several pages that
the user can swipe back and forth
between.
9. Apple’s applications are available through
Google Play either free of charge or at a cost.
10. Android runtime includes a set of core
libraries that provides most of the functionality
available in the core libraries of the Java
programming language.
三、Fill in the
Blanks(填空题)
1. A mobile computer, also
known as a , is
described
as a small, ,
computer and containing Internet
access.
2. Google Play offers an online
store with over 22 million songs.
3. Two major
CPU architectures dominate the mobile computers
market, they are ARM
Holdings’
architecture and Intel’s architecture.
4. iPhone is a line of smartphones designed
and marketed by Apple Inc. and runs Apple’s
mobile operating system.
5. Galaxy Note is
a series of Android-based high-end .
6. In Family Sharing, family members can share
purchased apps, music, movies, TV
shows, and
using the same credit card.
7. Android is a
currently developed by .
8. A
is a mobile phone with an advanced mobile
operating system which
combines features of a
personal compwter operating system with other
features useful for
mobile or handheld use.
9. communication is capable of
accessing the Internet through Bluetooth or
Wi-Fi networks.
10. The three types of
application-specific computers are: ,
portable data
terminal computers and wearable
computers.
四、Short-answer Questions(简答题)
1. What are the six types of mobile
computers?
2. Describe three types of
application-specific computers.
3. Describe
the CPU architectures of mobile computers.
4.
Define mobile operating system. List four common
types of mobile operating systems.
5. What are
Apps?
6. Describe mobile Apps.
7. Describe
the features of iPhone6.
8. Describe the
common features of iOS 9.
9. Describe three
types of Android smartphones.
10. Describe
Samsung Galaxy Note.
11. Describe the Redmi
Series of smartphones.
12. Describe how
the Android system started.
13. Describe
Android homescreen and status Bar.
14. List
and describe four layers of Android Architecture.
15. List and describe five of the most common
services of Google Play.
16. What are the four
features of mobile computers?
第2章
一、Multiple Choice(选择题)
Circle the
letter or fill in the correct answer.
1. ,
also known as the classic life cycle, is a
sequential development approach, in which
development is seen as flowing steadily
downwards through several phases.
a. The
incremental model
b. The waterfall model
c. The iterative model
d. The spiral
development
2. Any agile software process
must be—so as to manage unpredictability that
encountered in the
majority of software
projects.
a. unchanged
b. similar
c.
simple
d. Adaptable
3. The goal of is
to produce a list of requirements for a new or
revised information system.
a. the maintenance
phase
b. software design phase
c.
Reengineering
d. the system analysis phase
4. In the design phase , will be finished
for a new or revised information system.
a. a
project development plan
b. a requirements
report
c. application specifications
d.
Document
5. , is the examination and
alteration of a software system to reconstitute it
in a new form and the
subsequent
implementation of the new form.
a. System
analysis
b. Software design
c.
Reengineering
d. Maintenance
6. The
activities of reengineering generally include
inventory analysis, , forward engineering,
documentation restructuring, data
restructuring and data restructuring.
a.
implementation
b. reverse engineering
c.
Software test
d. Maintenance
7.
refers to analyzing an inventory of all
applications which every software organization
should
have.
a. System analysis
b.
Forward reengineering
c. Inventory analysis
d. Data analysis
8. generally
involves extracting design artifacts and building
or synthesizing abstractions that are
less
implementation-dependent.
a. Software
engineering
b. Reverse engineering
c.
Software reengineering
d. Software process
9. occurs at different levels of
abstraction and is often the first reengineering
task.
a. Reverse engineering of process
b.
Reverse engineering user interfaces
c. Reverse
engineering of data
d. Document restructuring
10. Before more detailed reverse
engineering work occurs, the overall of the
entire application system must be understood.
a. system requirements
b. system design
c. data structure
d. Functionality
二、TrueFalse Questions(判断题)
1. In
order to reduce the influences of software crises,
the computer scientists discussed
the software
crises problems at international conference at
German in 1960.
2. A software process
is a collection of activities, actions, and tasks
that are performed when
software is to be
built.
3. Processes and tools outweigh
individuals and interactions.
4. Working
software over comprehensive documentation.
5.
Producing a project development plan usually
occurs in the period of the analysis phase.
6.
Reengineering tasks are allowed to modify business
functionality.
7. Software migrations are also
reengineering efforts.
8. The term “reverse
engineering” originate from the analysis of
hardware.
9. Reverse engineering must start
from comparative high level of abstraction.
10. There are only two subareas of Reverse
engineering, redocumentation and design recovery.
三、
Fill in the Blanks(填空题)
1. There
are five phases in the software development life
cycle, in which encompasses
planning ,
, design, and maintenance phase.
2.
model is an evolutionary software process model
that couples the iterative
nature of
prototyping with the controlled and systematic
aspects of the waterfall model.
3. The goal of
the planning phase is to .
4.
During the implementation phase, the developers
should purchase and install hardware andor
software, create applications, ,
finalize documentation, , convert
data ,convert to new system.
5.
and are two historic reengineering
initiators that nearly no company
was able to
escape.
goals of reverse engineering are
and Creating representations of the system in
another form or at a higher level of
abstraction.
7. The core of reverse
engineering is an activity called .
8. refers to transforming a legacy
database according to new technical requirements,
while keeping the information contents
unchanged.
9. Reverse engineering to
understand processing begins with an attempt to
understand and then
extract
represented by the source code.
10. Before a
user interface can be rebuilt, should
occur.
四、Short-answer Questions(简答题)
1. What is software engineering?
2.
What is a software process model? Explain the role
of software process model in
development
activities.
3. How many software process
models have been discussed in this chapter?
4.
How many phases are there in the software
development life cycle? Describe the tasks
of
each phase.
5. What is software reengineering?
6. Discuss the two typical reengineering
problems.
7. What kinds of activities
are included in a software reengineering model?
8. Explain the main reasons that many
corporations need a pragmatic strategy for
software reengineering.
9. Discuss the
role of each activity included in a software
reengineering model.
10. Define reverse
engineering.
11. Describe the reverse
engineering process.
12. How many steps will
be taken to convert a legacy system to a modern
database
technology?
第三章
一、Multiple Choice(选择题)
Circle the
letter or fill in the correct answer.
1. is a
database management system that primarily relies
on main memory for
computer data storage.
a. A disk resident database management system
b. DRAM
c. A main memory database system
d. Cache
2. In DRDBMSs, each data
access has to go to the to make sure data is still
in
main memory.
a. CPU
b. cache
manager
c. file manager
d. data manager
3. In DRDBMSs have traditionally been the
bottleneck.
a. CPU access
b. disk accesses
c. pointer access
d. cache access
4. To reduce the number of disk accesses,
caching is used, and special index structures,
like , were developed.
a. the B+ tree
c. the B tree
b. the T tree
d. the AVL
tree
5. In MMDBMSs the are used as
index structures.
a. B+ trees
b. T trees
c. B trees
d. AVL trees
6. The is
a binary search tree whose nodes contain more than
one item to reduce
the number of calls to the
main memory management and to reduce the amount of
memory
consumed by pointers.
a. B+ tree
b. AVL tree
c. B tree
d. T tree
7. In MMDBs, one common mechanism is to
besides using backup copies of the
data, which
can protect data in case of a failure.
a.
logging to disk
b. checkpointing
c. B tree
d. cache access
8. can optimize the
cache performance to achieve an additional
speedup.
a. B+ tree
b. Cache-sensitive
search trees
c. B tree
d. T tree
9. One very expensive solution for a faster
response time and guarantee persistence is to
use .
a. flash ROM
b. hard disk
c.
solid-state disks
d. floppy disk
10.
One commonly used mechanism is ,which can keep the
time needed for a
database recovery short and
guarantee that the backup of database is kept up-
to-date.
a. checkpointing
c. committing
transactions
b. pointer
d. group
committing
二、TrueFalse
Questions(判断题)
1. In MMDBMSs the
situation is different: Since data is guaranteed
to stay present in main memory,
index
structures and all the other parts of the database
need to consider disk access
and can be tuned
for low computational cost.
2. In 1984, Witt
first put forward the concept of “Main memory
database” in his paper.
3. In the time
required for one single disk access, a processor
can perform up to several million
instructions.
4. DRDBMSs have an edge over
MMDBMSs in some respects since many
simplifications can be
used that reduce the
processing power required when data is guaranteed
to be in main memory.
5. The B+ tree, a
special index structures, was developed for
DRDBMSs.
6. A DRDBMS ron data being cached in
main memory.
7. MMDBMSs must not be able to
support the ACID properties known from
conventional atabase
systems.
8. A commit
in MMDB must be able to guarantee persistence.
9. A very small block size can be used in
MMDBs since small blocks can be written to disk
more
efficiently.
10. Data in main memory
is not lost after a failure of computer system and
during a simple restart of
the system.
三、Fill in the Blanks(填空题)
1. The key
difference is that in an MMDBMS .
2.
Both conventional disk resident database
management systems (DRDBMSs) and main memory
database management systems (MMDBMSs) process
data in , and both keep a (backup)
copy on .
3. The main memory
database characterize many excellent features,
such as, and
, parallel
processing power.
4. The development of MMDB
goes through the periods.
5. The most
important optimizations in disk-based systems are
to , to
prefer sequential access, and
to keep the processor busy while waiting for IO.
6. In MMDBMSs, performance is only determined
by used.
7. Main memory is
and is in case of a power failure.
8.
Another solution to guarantee persistence is by
using a distributed ,
fault-tolerant write
cache.
9. In order to reduce the response
time, and are used to solve this
problem.
10. To achieve maximum
parallelism, should be as small as
possible.
四、Short-answer Questions(简答题)
1. What is a main memory database?
2. Describe the differences between main
memory database and disk resident database.
3.
How many features do MMDBs have?
4. What is
the rudiment of MMDBs?
5. How many steps will
be taken to convert a legacy system to a modern
database
technology?
6. How many solutions
to guarantee persistence in main memory databases
do mention in
the chapter?
第4章
一、Multiple Choice(选择题)
Circle the letter
or fill in the correct answer.
1. Suppose a
computer wants to send a packet on Ethernet. what
does the computer first wait for?
a. Waits for
its scheduled time in the predetermined
transmission schedule.
b. Waits for the
central Ethernet controller to signal that
transmission is now permitted.
c. Waits for
the recipient computer to signal that it is ready.
d. Waits for the Ethernet wire to be quiet.
2. For transmission, the 50KB of the
image is divided into packets. The packet is the
natural unit of
transmission within
networking. In this case, say each packet is about
1500 bytes (a typical
Ethernet packet size),
then the bytes of the 50KB image could be divided
into about how many
packets.
a.36
b.32
c. 101
d. 120
3. Which one is not
the feature of Ethernet?
a. Shared
b.
Distributed and Collaborative.
c. Secure.
d. Performance degrades .
4. Which
one of the following is not a valid IP address?
a. 11.250.3.4
b. 1.2.3.4
c.
45.67.212.100
d. 42.257.99.11
大学生四六级成绩查询入口-feature
星期六的英文-民生凋敝
grad-计划书英文
视死如归的意思-see现在分词
宇航员的英语-读丑小鸭有感
upstair-不以为然的意思
siten-惊讶英语
家政妇是什么意思-六陈
-
上一篇:软件测试英语专业词汇
下一篇:单词速记软件对比