zoukankan      html  css  js  c++  java
  • 全国计算机技术与软件专业技术资格(水平)考试【软件评测师】-考试内容总结(十八)专业英语

    18.专业英语

    18.1例题分析一

    DOM is a platform-and language- (66) API that allows programs and scripts to dynamically access and update the content,structure and style of WWW documents(currently, definitions for HTML and XML documents are part of the specification).The document can be further processed and the results of that processing can be incorporated back into the presented  (67). DOM is a (68)-based API to documents,which requires the whole document to be represented in (69) while processing it.A simpler alternative to DOM is the event-based SAX,which can be used to process very large (70) documents that do not fit info the memory available for processing.
      (66)A.specific   B.neutral    C.contained     D.related
      (67)A.text      B.image     C.page        D.graphic
      (68)A.table     B.tree     C.control      D.event
      (69)A.document    B.processor   C.disc        D.memory
      (70)A.XML       B.HTML      C.script       D.web

    参考译文
      DOM是一种与平台和语言无关的应用程序接口(API),它可以动态地访问程序和脚本,更新其内容、结构和WWW文档的风格(目前,HTML和XML文档是通过说明部分定义的)。文档可以进一步被处理,处理的结果可以加入到当前的页面。DOM是一种基于树的API文档,它要求在处理过程中整个文档都表示在存储器中。另外一种简单的API是基于事件的SAX,它可以用于处理很大的XML文档,由于大,所以不适合全部放在存储器中处理。

    参考答案
      (66)B (67)C (68)B (69)D (70)A

    18.2例题分析二


        Melissa and LoveLetter made use of the trust that exists between friends or colleagues.Imagine receiving an (71) from a friend who asks you to open it.This is what happens with Melissa and several other similar email (72). Upon running,such worms usually proceed to send themselves out to email addresses from the victim’s address book,previous emails,web pages (73).
      As administrators seek to block dangerous email attachments through the recognition of well-known (74), virus writers use other extensions to circumvent such protection.Executable (.exe)files are renamed to .bat and.cmd plus a whole list of other extensions and will still run and successfully infect target users.
      Frequently,hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation,simultaneously runs commands in the background to steal your passwords and give the (75) access to your network.
      (71)A.attachment  B.packet    C.datagram    D.message
      (72)A.virtual    B.virus    C.worms     D.bacteria
      (73)A.memory    B.caches    C.ports     D.registers
      (74)A.names     B.cookies    C.software   D.extensions
      (75)A.cracker    B.user     C.customer   D.client

    参考译文
      Melissa和LoveLetter利用了朋友和同事之间的信任。设想你收到了一个附件,朋友要求你打开它。这就是Melissa和其他类似的电子邮件蠕虫危害的方式。一旦被运行,这种蠕虫常常就从被害人的地址簿、以前的电子邮件、Web页面缓存区等地方发现邮件地址,并且把它们发送出去。
      在管理人员通过识别众所周知的扩展名企图阻挡危险的email附件时,病毒的作者们则使用了其他的扩展名来破坏这种保护。可执行文件(.exe)被重新命名为.bat和.cmd,再加上其他的扩展名,而且仍然可以运行,成功地危害目标用户。
      黑客们经常试图穿透网络发送一种像是flash影像的附件,当这种flash演示引人入胜的动画时,同时就在后台运行命令来偷窃你的口令,给了那些解密高手访问你的网络的机会。

    参考答案
      (71)A (72)C (73)B (74)D (75)A

  • 相关阅读:
    [译]HTML&CSS Lesson5: 定位
    Emscripten教程之入门指导
    html简单响应式滚动条置顶
    移动web开发问题和优化小结
    React+Webpack+ES6 兼容低版本浏览器(IE9)解决方案
    ECMAScript中有两种属性:数据属性和访问器属性。
    css写作建议和性能优化小结
    validator API文档
    HBase概念学习(九)HTablePool为何弃用?
    leetcode -day 15 Distinct Subsequences
  • 原文地址:https://www.cnblogs.com/linyuchen2008/p/6113123.html
Copyright © 2011-2022 走看看