Advanced programmer exam English test questions (2000 ~ 2002)

xiaoxiao2021-03-06  113

2002 66-70

A typical imperative language contains an applicative sub-language which approximate the mathematical abstractions of "timeless" function applied to "spaceless" values, where the acture operation sequences and use of storage space during expression evaluation are organized behind the scenes.

In this setting, values ​​are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having intermediate results during expression evaluation stored at the discretion of language implementation, and effecting parameter transmission and Assignment Operations Through value Copying.

vocabulary:

Imperative command, mandatory

Approximate approximation, approximate

Timeless is eternal, timeless

Spaceless space

SEQUENCE order, sequence

Scene scene, scenario

Illusion fantasy, illusion

Evaluation Valuation, assignment

Discretion judgment

At the discretion of sth / sb is / appointed

Implementation execution, (CODING) encoded

Assignment distribution, delegation, designated

Translation

Typical instruction type language itself has a corresponding lower-layer operation language, the lower language assignment in the background of the task and the spatial assignment in the expression evaluation process, so that from the upper layer, the program seems to be unlimited in the unlimited storage space. Operation.

In this case, numerical is generally organized as a underlying data structure consisting of several or fewer calculator characters. Implement an illusion that the upper layer seems to be space in the upper layer by means of a method of buffering intermediate results during the expression evaluation process, and other methods such as the value transfer and operation segmentation, such as parameter replication.

2002 71-75

Most computer systems are vulnerable to two different groups of attacks:. Insider attacks and outsider attacks A system that is known to be secure to an outsider attack by preventing access from outside can still be vulnerable to the insider attacks accomplished by abusive usage of authorized users . Detecting such abusive usage as well as attacks by outside not only provides information on damage assessment, but also helps to prevent future attacks These attacks are usually detected by tools referred to as Intrusion Detection Systems vocabulary:

Vulnerable fragile, vulnerable

Insider, internal personnel

Outsider outgoing line, external personnel

Abusive abuse, unmatched

Authorized is determined, authorized

Detect prevention, notice, detection

Assessment evaluation, estimation

Prevent Prevention

Intrusion invasion, intrusion

Translation:

Most calculator systems are fragile under two types of attacks: an interior person from the outside. Although some systems have good defense capabilities for external attacks, illegal operations of internal legitimate users will also cause destructive attacks on the system.

Testing the internal and external attacks of the system, not only the damage caused by the attack, but also prevents future attacks. These attacks can usually be detected by some tools, such as "intrusion detection system".

2001 29

MIMD system can be classified into throughput-oriented systems, high-availability systems and response-oriented systems. The goal of throughput-oriented multiprocessing is to obtain high throughput at minimal computing cost. The techniques employed by multiprocessor operating systems to achieve this goal take Advantage of An Inherent Processing Versus Input / Output Balance in The Workload To Produce Balance and Uniform Loading of System Resources.

vocabulary:

Throughput production volume, throughput

Orient orientation

Response response, answer

Employ hiring, placement

Take Advantage Of

Inherent is born, inherent

Versus comparison, comparison (abbreviated as VS, Exp China vs costa rica) Balance balance, smooth, balanced

Uniform uniform, uniform

Resource resources

Translation:

The MIDM system can be classified as a production system, facing high-performance systems and response systems. The purpose of the production amount of multiprocessor system is to consume minimal processing costs to obtain the highest production. The multiprocessor system uses such a technique to reach the above object: replacing the I / O balance mechanism with a fixed process to stabilize system resources and organized.

2001 30

Soon, More of the Information We Receive Via The Internet Could Come Package

Wrappers are made up of software code that's targeted to do specific things with the data enclosed within them, such as helping to define queries for search engines. They also keep outsiders from gaining access to that code.

vocabulary:

VIA via, pass, passage

Digital digital, digital

Wrapper packaging

Digital Wrapper Digital Package

Outsider outside

Translation:

Soon, more information we receive via the Internet will be delivered in the form of a digital package.

The digital package is composed of software code, the purpose is to use the data encapsulated to complete some specified tasks, such as defining query content for search engines. At the same time, they also refuse to access illegal access to internal data.

2000 14

Network managers have long awaited practical voice-over-IP (VOIP) solutions. VOIP promises ease network management and decreases costs by converging at a company's telephony and data infrastructures into one network. And a VOIP solution implemented at a company's headquarters with far-reaching BRANCH OFFICES CAN SAVE TREMENDOUS AMOUNTS OF Money In Long Distance Phone Bill, Provided That Solution Delivers Pots-Like Voice Quality over the Internet.

vocabulary:

Practical practical, practical, practical

Converging gathering, gathering

Infrastructure underground facilities, infrastructure

Implement implementation, implementation

Branch branch, branch

Translation:

转载请注明原文地址:https://www.9cbs.com/read-125084.html

New Post(0)