3.13 专业英语

课程内容提要 #

    1. 历年真题

1 2009年 #

  • 原文

  An architectural style defines as a family of such systems in terms of a ( 1 ) of structural organization. More specifically, an architectural style defines a vocabulary of ( 2 ) and connector types, and a set of ( 3 ) on how they can be combined. For many styles there may also exist one or more ( 4 ) that specify how to determine a system’s overall properties from the properties of its parts.Many of architectural styles have been developed over the years. The best-known examples of ( 5 ) architectures are programs written in the Unix shell.

(1)  A.pattern  B.data flow  C.business process  D.position level

(2)  A.metadata  B.components  C.models  D.entities

(3)  A.functions  B.code segments  C.interfaces  D.constraints

(4)  A.semantic models  B.weak entities  C.data schemas  D.business models

(5)  A.event-based  B.object-oriented  C.pipe-and-filter  D.Layered

2 2010年 #

  • 原文

  The software architecture is a set of software components, subsystems, relationships, interactions, the properties of each of these elements, and the set of guiding principles that together constitute the fundamental properties and constraints of a software system or set of systems. ( 1 ) defines a general set of element types and their interactions. The examples include Pipes and Filters, Model-View-Controller, and Reflection. A ( 2 ) in software architecture is a representation used to understand or document one or more aspects of a problem or solution. Architecture is usually used in conjunction with many adjunct terms. The ( 3 ) defines the key strategies, organization, goals and related processes of the enterprise. At the enterprise level, the ( 4 ) may be more of a set of guidelines on how the various software architectures should be constructed consistently across the enterprise. The ( 5 ), which describes the high-level set of elements involved in application from a particular domain along with their Interactions, is often used to focus on subsystem definition rather than application process level definition.

(1) A.Architectural pattern  B.Architectural description  C.Architectural view  D.Architectural viewpoint

(2) A.model  B.domain  C.component  D.subsystem

(3) A.enterprise architecture  B.technical architecture  C.infrastructure architecture  D.business architecture

(4) A.enterprise architecture  B.data architecture  C.application architecture  D.information architecture

(5) A.product-line architecture  B.reference architecture  C.technology architecture  D.infrastructure architecture

3 2011年 #

  • 原文

  Information systems design is defined as those tasks that focus on the specification of a detailed computer-based solution. Typically, there are four systems design tasks for in-house development.

  1) The first task is to specify ( 1 ), which defines the technologies to be used by one, more, or all information systems in terms of their data, processes, interfaces, and network components. This task is accomplished by analyzing the data models and process models that are initially created during requirements analys16.

  2) The next systems design task is to develop the ( 2 ). The purpose of this task is to prepare technical design specifications for a database that will be adaptable to future requirements and expansion.

  3) Once the database prototype has been built, the systems designer can work closely with system users to develop input, output and dialogue specifications. The ( 3 ) must be specified to ensure that the outputs are not lost, misrouted, misused, or incomplete.

  4) The fourth design task involves packaging all the specifications from the previous design tasks into a set of specifications that will guide the ( 4 ) activities during the following phases of the systems development methodology. Finally, we should( 5 ) and update the project plan accordingly. The key deliverable should include a detailed plan for the construction phase that should follow.

(1) A. an application architecture B. a distributed system C. a system scope D. a system physical model

(2) A. database design specifications  B. database organization decisions  C. data structure specifications D. data distribution decisions

(3) A. format and layout B. transaction details C. additional instructions D. internal controls

(4) A. system administrator’s B. system analyst’s C. computer programmer’s D. system designer’s

(5) A. adjust the project schedule B. reevaluate project feasibility C. evaluate vendor proposals D. select the best vendor proposal

4 2012年 #

  • 原文

  An application architecture specifies the technologies to be used to implement one or more information systems. It serves as an outline for detailed design, construction, and implementation. Given the models and details, include( 1 ), we can distribute data and processes to create a general design of application architecture. The design will normally be constrained by architecture standards, project objectives, and ( 2 ). The first physical DFD to be drawn is the( 3 ). The next step is to distribute data stores to different processors. Data( 4 ) are two types of distributed data which most RDBMSs support. There are many distribution options used in data distribution. In the case of ( 5 ) we should record each table as a data store on the physical DFD and connect each to the appropriate server.

(1) A.logical DFDs and ERD B.ideal object model and analysis class model C.use case models and interface prototypes D.physical DFDs and database schema

(2) A.the database management system B.the feasibility of techniques used C.the network topology and technology D.the user interface and process methods

(3) A.context DFD B.system DFD C.network architecture DFD D.event-response DFD

(4) A.vertical partitioning and horizontal replication B.vertical replication and horizontal partitioning C.integration and distribution D.partitioning and replication

(5) A.storing all data on a single server B.storing specific tables on different servers C.storing subsets of specific tables on different servers D.duplicating specific tables or subsets on different servers

5 2013年 #

  • 原文

  A system’s architecture is a representation of a system in which there is a mapping of( 1 ) onto hardware and software components, a mapping of the ( 2 ) onto the hardware architecture. and a concern for the human interaction with these components. That is, system architecture is concerned with a total system, including hardware. software, and humans. Software architectural structures can be divided into three major categories, depending on the broad nature of the elements they show.

 I):( 3 ) embody decisions as a set of code or data units that have to be constructed or procured.

 II): ( 4 ) embody decisions as to how the system is to be structured as set of elements that have runtime behavior and interactions.

 III): ( 5 ) embody decisions as to how the system will relate to nonsoftware structures in its environment(such as CPUs, file systems, networks, development teams, etc.).

(1) A.attributes B.constraint C.functionality D.requirements

(2) A.physical components B.network architecture C.software architecture D.interface architecture

(3) A.Service structures B.Module structures C.Deployment structures D.Work assignment structures

(4) A.Decompostion structures B.Layer structures C.Implementation structures D.Component-and-connector structures

(5) A.Allocation structures B.Class structures C.Concurrency structures D.Uses structures

6 2014年 #

  • 原文

  Software architecture reconstruction is an interpretive, jnteractive, and iterative process including many activities. ( 1 ) involves analyzing a system’s existing design and implementation artifacts to construct a model of it. The result is used in the following activities to construct(结构) a view of the system. The database construction activity converts the ( 2 ) contained in the view into a standard format for storage in a database. The ( 3 ) activity involves defining and manipulating( 控 制 ) the information stored( 存 储 的 ) in database to reconcile, augment(增强), and establish(建立) connections between the elements. Reconstruction consists of two primary activities: ( 4 ) and ( 5 ). The former provides a mechanism for the user to manipulate architectural elements, and the latter provides facilities for architecture reconstruction.

(1) A.Reverse engineering B.Information extraction C.Requirements analysis D.Source code analysis

(2) A.actors and use cases B.processes and data C.elements and relations D.schemas and tables

(3) A.database normalization B.schema definition C.database optimization D.view fusion

(4) A.architecture analysis and design B.domain analysis and static modeling C.visualization and interaction D.user requirements modeling

(5) A.pattern definition and recognition B.architecture design and implementation C.system architecture modeling D.dynamic modeling and reconstruction

7 2015年 #

  • 原文

  The objective of ( 1 ) is to determine what parts of the application software will be assigned to what hardware.The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is( 2 ). Most information systems require data to be stored and retrieved,whether a small file,such as a memo produced by a word processor,or a large database,such as one that stores an organization’s accounting records. The second function is the ( 3 ),the processing required to access data,which often means database queries in Structured Query Language. The third function is the ( 4 ),which is the logic documented in the DFDs,use cases,and functional requirements.The fourth function is the presentation logic,the display of information to the user and the acceptance of the user’s commands.The three primary hardware components of a system are ( 5 ). (1) A.architecture design  B.modular design  C.physical design  D.distribution design

(2) A.data access components  B.database management system  C.data storage D.data entities

(3) A.data persistence B.data access objects C.database connection D.dataaccess logic

(4) A.system requirements B.system architecture C.application logic D.application program

(5) A.computers,cables and network B.clients,servers,and network C.CPUs,memories and I/O devices D.CPUs,hard disks and I/O devices

8 2016年 #

  • 原文

The objective of ( 1 ) is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is ( 2 ). Most information systems require data to be stored and retrieved, whether a small file,such as a memo produced by a word processor, or a large database, such as one that stores an organization’s accounting records.The second function is the ( 3 ), the processing required to access data, which often means database queries in Structured Query Language. The third function is the ( 4 ),which is the logic documented in the DFDs, use cases,and functional requirements.The fourth function is the presentation logic,the display of information to the user and the acceptance of the user’s commands.The three primary hardware components of a system are ( 5 ).

(1) A.architecture design B.modular design C.physical design D.distribution design

(2) A.data access components B.database management system C.data storage D.data entities

(3) A.data persistence B.data access objects C.database connection D.data access logic

(4) A.system requirements B.system architecture C.application logic D.application program

(5) A.computers,cables and network B.clients,servers,and network C.CPUs,memories and I/O devices D.CPUs,hard disks and I/O devices

9 2017年 #

  • 原文

  The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the ( 1 ) into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a ( 2 ), one also has to decide whether to use a two-tier,three-tier,or n-tier architecture. Then the requirements and the architecture design are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. ( 3 ) specify the operating environment(s) in which the system must perform and how those may change over time. ( 4 ) focus on the nonfunctional requirements issues such as response time, capacity, and reliability. ( 5 ) are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used.

(1) A. functional requirements B. nonfunctional requirements C. system constraint D. system operational environment

(2) A. client-based architecture B. server-based architecture C. network architecture D. client-server architecture

(3) A. Operational requirements B. Speed requirement C. Access control requirements D. Customization requirements

(4) A. Environment requirements B. Maintainability requirements C. Performance requirements D. Virus control requirements

(5) A. Safety requirements B. Security requirements C. Data management requirements D. System requirements

10 2018年 #

  • 原文

  Designing the data storage architecture is an important activity in system design. There are two main types of data storage formats: files and databases. Files are electronic of data that have been optimized to perform a particular transaction. There are several types of files that differ in the way they are used to support an application.(71)store core information that is important to the business and , more specifically , to the application , such as order information or customer mailing information . (72)contain static values , such as a list of valid codes or the names of cities . Typically, the list is used for validation. A database is a collection of groupings of information that are related to each other in some way. There are many different types of databases that exist on the market today.(73)is given to those databases which are based on older , sometimes outdated technology that is seldom used to develop new applications . (74)are collections of records that are related to each other through pointers In relational database , (75)can be used in ensuring that values linking the tables together through the primary and foreign keys are valid and correctly synchronized.

(71) A.Master files B.Look-up files. C.Transaction files  D.History files

(72) A.Master files B.Look-up files C.Audit files D.History files

(73) A.Legacy database B.Backup database C. Multidimensional database D. Workgroup database

(74) A.Hierarchical database B. Workgroup database C. Linked table database D. Network database

(75) A.identifying relationships B. normalization C.referential integrity D.store procedure

11 2019年 #

  • 原文

  During the systems analysis phase , you must decide how data will be organized, stored.and manage D. A( 1 )is a framework for organizing, storing, and managing datEach file or table contains data about people, places, things, or events. One of the potentiaproblems existing in a file processing environment is ( 2 ), which means that data common totwo or more information systems is stored in several places.In a DBMS, the linked tables form a unified data structure that greatly improves dataquality and access. A(n) ( 3 ) is a model that shows the logical relationships and interactionamong system entities . It provides an overall view of the system and a blueprint for creatingthe physical data structures. ( 4 ) is the process of creating table designs by assigning specificfields or attributes to each table in the database. A table design specifies the fields andidentifies the primary key in a particular table or file. The three normal forms constitute aprogression in which( 5 )represents the best design. Most business-related databases must bedesigned in that form

(1) A. data entity B. data structure C.file collection D. data definition

(2) A. data integrity B. the rigid data structure C.data redundancy D.the many-to-many relationship

(3) A. entity-relationship diagram B. data dictionary C. database schema D. physical database model

(4) A. Normalization B. Replication C. Partitioning D. Optimization

(5) A. standard notation form B. first normal form C. second normal form D. third normal form

12 2020年 #

  • 原文

  The purpose of systems design is to specify a(n) ( 1 ), which defines the technologies to be usedto build the proposed information systems. This task is accomplished by analyzing the datamodels and process models that were initially created during ( 2 ) . The ( 3 ) is used to establishphysical processes and data stores across a network. To complete this activity, the analyst mayinvolve a number of system designers and ( 4 ) , which may be involved in this activity to helpaddress business data, process, and location issues. The key inputs to this task are the facts,recommendations, and opinions that are solicited from various sources and the approved ( 5 ) fromthe decision analysis phase.

(1) A.physical model B.prototype system C.database schema D.application architecture

(2) A.requirements analysis B.problem analysis C.cause-effect analysis D.decision analysis

(3) A.entity-relationship diagram B.physical data flow diagram C.data flow diagram D.physical database model

(4) A.system users B.system analyst C.system owner D.project manager

(5) A.system architecture B.system proposal C.technical model D.business procedure

13 2021年 #

  • 原文

  The prevailing distributed computing model of the current era is called client/server computing. A( 1 )is a solution in which the presentation,presentation logic,applicatio nlogic,data manipulation and data layers are distributed between client PCs and one o r moreservers. A( 2 ) is a personal computer that does not have to be very powerfu lin terms ofprocessor speed and memory because it only presents the interface to th e user. A( 3 )is apersonal computer.notebook computer,or workstation that is typic ally more powerful interms of processor speed,memory,and storage capacity. A(n)( 4 )hosts one or more shareddatabase but also executes all database commands and s ervices for information systems. A(n) ( 5 ) hosts Internet or intranet Web sites,it co mmunicates with clients by returning tothem documents and data.

(1) A. Client/Server system B.Client-side C.Serve-sider D.Database

(2) A. Serve-sider B.Browser C. Fat client D.Thin client

(3) A. Cloud platform B. Cluster system C. Fat client D.Thin client

(4) A.Transaction server B. Database serverer C.Application server D.Message server

(5) A. Database server B.Message server C.Web server D.Application server

14 2022年 #

  • 原文

  Micro-service is a software development technology, which advocates dividing a single applicationinto a group of small services,which coordinates and cooperates with each other to provide ultimatevalue for users.The micro-service ( 1 ) has many important benefits.First, it solves the problem ofbusiness complexity.It decomposes the original huge single application into a group ofservices.Although the total amount of functions remains the same, the application has beendecomposed into manageable services.The development speed of a single service is much faster,and it is easier to understand and ( 2 ) Second.this architecture allows each service to be ( 3 ) independently by a team.Developers are free to choose any appropriate technology.Third,themicro-service architecture mode enables each service to be ( 4 )independently.Developers never needto coordinate the deployment of local changes to their services.These types of changes can bedeploved immediately after testing.Finally.the micro-service architecture enables each service to ( 5 ) independently.

(1) A、architecture B、software C、application D、technology

(2) A、develop B、maintain C、utilize D、deploy

(3) A、planned B、developed C、utilized D、deployed

(4) A、utilized B、developed C、tested D、deployed

(5) A、analyze B、use C、design D、expand

课后习题 #


todo 习题