码迷,mamicode.com
首页 > 其他好文 > 详细

全国计算机技术与软件专业技术资格(水平)考试【软件评测师】-考试内容总结(十八)专业英语

时间:2016-11-29 14:16:54      阅读:277      评论:0      收藏:0      [点我收藏+]

标签:存储   register   his   hacker   mem   documents   use   缓存   virtual   

18.专业英语

18.1例题分析一

 

DOM is a platform-and language- (66) API that allows programs and scripts to dynamically access and update the content,structure and style of WWW documents(currently, definitions for HTML and XML documents are part of the specification).The document can be further processed and the results of that processing can be incorporated back into the presented  (67). DOM is a (68)-based API to documents,which requires the whole document to be represented in (69) while processing it.A simpler alternative to DOM is the event-based SAX,which can be used to process very large (70) documents that do not fit info the memory available for processing.
  (66)A.specific   B.neutral    C.contained     D.related
  (67)A.text      B.image     C.page        D.graphic
  (68)A.table     B.tree     C.control      D.event
  (69)A.document    B.processor   C.disc        D.memory
  (70)A.XML       B.HTML      C.script       D.web

参考译文
  DOM是一种与平台和语言无关的应用程序接口(API),它可以动态地访问程序和脚本,更新其内容、结构和WWW文档的风格(目前,HTML和XML文档是通过说明部分定义的)。文档可以进一步被处理,处理的结果可以加入到当前的页面。DOM是一种基于树的API文档,它要求在处理过程中整个文档都表示在存储器中。另外一种简单的API是基于事件的SAX,它可以用于处理很大的XML文档,由于大,所以不适合全部放在存储器中处理。

参考答案
  (66)B (67)C (68)B (69)D (70)A

 

18.2例题分析二


    Melissa and LoveLetter made use of the trust that exists between friends or colleagues.Imagine receiving an (71) from a friend who asks you to open it.This is what happens with Melissa and several other similar email (72). Upon running,such worms usually proceed to send themselves out to email addresses from the victim’s address book,previous emails,web pages (73).
  As administrators seek to block dangerous email attachments through the recognition of well-known (74), virus writers use other extensions to circumvent such protection.Executable (.exe)files are renamed to .bat and.cmd plus a whole list of other extensions and will still run and successfully infect target users.
  Frequently,hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation,simultaneously runs commands in the background to steal your passwords and give the (75) access to your network.
  (71)A.attachment  B.packet    C.datagram    D.message
  (72)A.virtual    B.virus    C.worms     D.bacteria
  (73)A.memory    B.caches    C.ports     D.registers
  (74)A.names     B.cookies    C.software   D.extensions
  (75)A.cracker    B.user     C.customer   D.client

参考译文
  Melissa和LoveLetter利用了朋友和同事之间的信任。设想你收到了一个附件,朋友要求你打开它。这就是Melissa和其他类似的电子邮件蠕虫危害的方式。一旦被运行,这种蠕虫常常就从被害人的地址簿、以前的电子邮件、Web页面缓存区等地方发现邮件地址,并且把它们发送出去。
  在管理人员通过识别众所周知的扩展名企图阻挡危险的email附件时,病毒的作者们则使用了其他的扩展名来破坏这种保护。可执行文件(.exe)被重新命名为.bat和.cmd,再加上其他的扩展名,而且仍然可以运行,成功地危害目标用户。
  黑客们经常试图穿透网络发送一种像是flash影像的附件,当这种flash演示引人入胜的动画时,同时就在后台运行命令来偷窃你的口令,给了那些解密高手访问你的网络的机会。

参考答案
  (71)A (72)C (73)B (74)D (75)A

 

全国计算机技术与软件专业技术资格(水平)考试【软件评测师】-考试内容总结(十八)专业英语

标签:存储   register   his   hacker   mem   documents   use   缓存   virtual   

原文地址:http://www.cnblogs.com/linyuchen2008/p/6113123.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!