一起答

2013年下半年《软件评测师》上午试题真题试卷(参考答案+解析版)

  • 卷面总分:75分
  • 浏览次数:0
  • 测试费用:免费
  • 答案解析:是
  • 练习次数:77次
  • 作答时间:150分钟
试卷简介
2013年下半年软件水平考试(中级)软件评测师上午(基础知识)试题真题试卷(参考答案+解析版),本试卷总分75分;共有1类型题目
部分试题预览
  1. (75)

    • A.worth
    • B.value
    • C.cost
    • D.invaluable
  2. (72)

    • A.alternative
    • B.need
    • C.possibility
    • D.solution
  3. (73)

    • A.design
    • B.redesign
    • C.plan
    • D.build
  4. (74)

    • A.throwaway
    • B.system
    • C.software
    • D.product
  5. There is nothing in this world constant butinconstancy. —SWIFT Project after project designs a set of algorithms and thenplunges into construction of customer-deliverable software on a schedule thatdemands delivery of the first thing built.?

    In most projects, the first system built is(71)usable. Itmay be too slow, too big, awkward to use, or all three. There is no(72)but to startagain, smarting but smarter, and build a redesigned version in which theseproblems are solved. The discard and(73)may be done in one lump, or it may be done piece-by-piece. But alllarge-system experience shows that it will be done. Where a new system conceptor new technology is used, one has to build a system to throw away, for eventhe best planning is not so omniscient(全知的)as to get it right the first time.

    The management question, therefore, is notwhether to build a pilot system and throw it away. You will do that. The onlyquestion is whether to plan in advance to build a(74), or topromise to deliver the throwaway to customers. Seen this way, the answer ismuch clearer. Delivering that throwaway to customers buys time, but it does soonly at the(75)of agony(极大痛苦)for the user, distraction for the builders while they do theredesign, and a bad reputation for the product that the best redesign will findhard to live down.

    Hence plan to throw one away; you will,anyhow.

    (71)

    • A.almost
    • B.often
    • C.usually
    • D.barely
  6. 软件系统的安全性是信息安全的一个重要组成部分,针对程序和数据的安全性测 试与评估是软件安全性测试的重要内容,(69)不属于安全性测试与评估的基本内容。

    • A.用户认证机制
    • B.加密机制
    • C.系统能承受的并发用户量
    • D.数据备份与恢复手段
  7. 对一段信息生成消息摘要是防止信息在网络传输及存储过程中被篡改的基本手 段,(68)不属于生成消息摘要的基本算法。

    • A.MD5
    • B.RSA
    • C.SHA-1
    • D.SHA-256
  8. 以下关于集成测试的叙述中,不确的是(67)

    • A.在完成软件的概要设计后,即开始制定集成测试计划
    • B.实施集成测试时需要设计所需驱动和桩
    • C.桩函数是所测函数的主程序,它接收测试数据并把数据传送给所测试函数
    • D.常见的集成测试方法包括自顶向下、自底向上、Big-Bang等
  9. 以下属于静态测试方法的是(66)

    • A.分支覆盖率分析
    • B.复杂度分析
    • C.系统压力测试
    • D.路径覆盖分析
  10. 测试过程中,正确的测试顺序应该是(65)。①单元测试 ②集成测试 ③系统测试

    • A.①②③
    • B.③①②
    • C.②③①
    • D.③②①