全國電腦技術與軟體專業技術資格(水平)考試【軟體評測師】-考試內容總結(十八)專業英語

來源:互聯網
上載者:User

標籤:儲存   register   his   hacker   mem   documents   use   緩衝   virtual   

18.專業英語18.1例題分析一

 

DOM is a platform-and language- (66) API that allows programs and scripts to dynamically access and update the content,structure and style of WWW documents(currently, definitions for HTML and XML documents are part of the specification).The document can be further processed and the results of that processing can be incorporated back into the presented  (67). DOM is a (68)-based API to documents,which requires the whole document to be represented in (69) while processing it.A simpler alternative to DOM is the event-based SAX,which can be used to process very large (70) documents that do not fit info the memory available for processing.
  (66)A.specific   B.neutral   C.contained     D.related
  (67)A.text      B.image    C.page       D.graphic
  (68)A.table    B.tree     C.control     D.event
  (69)A.document    B.processor  C.disc       D.memory
  (70)A.XML      B.HTML      C.script      D.web

參考譯文
  DOM是一種與平台和語言無關的應用程式介面(API),它可以動態地訪問程式和指令碼,更新其內容、結構和WWW文檔的風格(目前,HTML和XML文檔是通過說明部分定義的)。文檔可以進一步被處理,處理的結果可以加入到當前的頁面。DOM是一種基於樹的API文檔,它要求在處理過程中整個文檔都表示在儲存空間中。另外一種簡單的API是基於事件的SAX,它可以用於處理很大的XML文檔,由於大,所以不適合全部放在儲存空間中處理。

參考答案
  (66)B(67)C(68)B(69)D(70)A

 

18.2例題分析二


    Melissa and LoveLetter made use of the trust that exists betweenfriends or colleagues.Imagine receiving an (71) from a friend who asks you to open it.Thisis what happens with Melissa and several other similar email (72).Upon running,such worms usually proceed to sendthemselves out to email addresses from the victim’s address book,previousemails,web pages (73).
  As administrators seek to blockdangerous email attachments through the recognition of well-known (74),virus writers use other extensions to circumvent such protection.Executable (.exe)filesare renamed to .bat and.cmd plus a whole list of other extensions and willstill run and successfully infect target users.
  Frequently,hackers try topenetrate networks by sending an attachment that looks like a flash movie,which, while displaying some cute animation,simultaneously runs commands in thebackground to steal your passwords and give the (75) access to your network.
  (71)A.attachment  B.packet   C.datagram    D.message
  (72)A.virtual   B.virus    C.worms    D.bacteria
  (73)A.memory    B.caches   C.ports     D.registers
  (74)A.names     B.cookies   C.software   D.extensions
  (75)A.cracker   B.user     C.customer   D.client

參考譯文
  Melissa和LoveLetter利用了朋友和同事之間的信任。設想你收到了一個附件,朋友要求你開啟它。這就是Melissa和其他類似的電子郵件蠕蟲危害的方式。一旦被運行,這種蠕蟲常常就從被害人的地址簿、以前的電子郵件、Web頁面緩衝區等地方發現郵件地址,並且把它們發送出去。
  在管理員通過識別眾所周知的副檔名企圖阻擋危險的email附件時,病毒的作者們則使用了其他的副檔名來破壞這種保護。可執行檔(.exe)被重新命名為.bat和.cmd,再加上其他的副檔名,而且仍然可以運行,成功地危害目標使用者。
  駭客們經常試圖穿透網路發送一種像是flash影像的附件,當這種flash示範引人入勝的動畫時,同時就在後台運行命令來偷竊你的口令,給了那些解密高手訪問你的網路的機會。

參考答案
  (71)A(72)C(73)B(74)D(75)A

 

全國電腦技術與軟體專業技術資格(水平)考試【軟體評測師】-考試內容總結(十八)專業英語

相關文章

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.