1. ______ is a method used in Critical Path Methodology for constructing a project schedule network diagram that uses boxes or rectangles, referred to as nodes, to represent activities and connects them with arrows that show the logical relationships that exist between them.
5. A test case normally consists of a unique identifier, requirement references from a design specification, events, a series of steps to follow, input, output, actual result, and ______.
A.bug
B.expected resul
C.test report
D.traceability matrix
A B C D
B
6. The Systems Development Life Cycle (SDLC) is a process of creating or altering information systems, and the models and methodologies that people use to develop these systems. Sequential SDLC models, such as ______, focus on complete and correct planning to guide large projects and risks to successful and predictable results.
A.Waterfall
B.Extreme Programming
C.Spiral
D.Rapid Prototyping
A B C D
A
7. In software engineering and systems engineering, ______, is a description of a system's behavior as it responds to a request that originates from outside of that system.
A.black box
B.business rule
C.traceability matrix
D.use case
A B C D
D
8. Supervision will manage the implementation and the configuration of the different, types of project documents, not including ______.
A.compile
B.format
C.version
D.change
A B C D
A
9. The quality management plan should describe how the project management team will implement its quality ______.
A.improvement
B.control
C.policy
D.information
A B C D
C
10. Quality managemen ______.
A.is another name for careful inspections
B.is inversely related to productivity
C.is primarily the responsibility of management
D.is primarily the responsibility of the workers
A B C D
C
11. Adding 5 people to a 4 person team increases the communication channels by a factor of ______.
A.3 times
B.4 times
C.5 times
D.6 times
A B C D
D
12. The project budget has been finalize D. Additional work has been discovered that was not planned for in the budget or project scope. ______ could provide the fund to cover the newly discovered work item.
A.Contingency reserve
B.Project profit
C.Management reserve
D.Special fund
A B C D
C
13. Several risk response strategies are available. ______ the risk simply gives another party responsibility for its management, it does not eliminate risk.
A.Avoiding
B.Mitigating
C.Accepting
D.Transferring
A B C D
D
14. Schedule development can require the review and revision of duration estimates and resource estimates to create an approved ______ that can serve as a baseline to track progress.
A.scope statement
B.activity list
C.project charter
D.project
A B C D
D
15. ______ means that every project has a definite beginning and a definite end.
A.Project phase
B.Unique
C.Temporary
D.Closure
A B C D
C
[解析] 临时性是指每一个项目都有一个明确的开始时间和结束时间。
16. Which of the following would requirereal-time processing? ______
A.Playing a computer game
B.Executing a program that predicts the state of economy
C.Printing labels
D.Listening the music
A B C D
A
17. One tool that is useful during both analysis and design is the ______, which is a pictorial representation of the items of information (entities) within the system and the relationships between these pieces of information.
18. The connection between two networks to form an internet is handled by a machine known as a ______.
A.bridge
B.client
C.router
D.switch
A B C D
C
[解析] 路由器是用来链接两个网络,并使其实现互联的设备。
19. Configuration management is the process of managing change in hardware, software, firmware, documentation, measurements, etc. As change requires an initial state and next state, the marking of significant states within a series of several changes becomes important. The identification of significant states within the revision history of a configuration item is the central purpose of ______ identification.
21. Maintenance activities include ______. ① making enhancements to software products ② developing a new software product ③ correcting problems ④ adapting products to new environments
22. ______ operate by distributing a workload evenly over multiple back end nodes. Typically the cluster will be configured with multiple redundant load-balancing front ends.
25. ______ is the budgeted amount for the work actually completed on the schedule activity or WBS component during a given time perioD.
A.Planned value
B.Earned value
C.Actual cost
D.Cost variance
A B C D
B
[解析] 挣值是在给定时期内按进度活动或WBS部件所实际完成工作的预算值。
26. Since RAM is only active when the computer is on, your computer uses disk to store information even when the computer is off. Which of the following is true? ______
A.When your computer is on, only RAM is used to store information.
B.When your computer is on, only disk drives are used to store information.
C.When your computer is off, only RAM is used to store information.
D.When your computer is off, only disk drives are used to store information.
27. The basic unit of measure in a computer system is the ______. It is the smallest unit in computing. There are some other measures in a computer, such as Kilobyte, Megabyte, Gigabyte and so on.
A.KiloByte
B.bit
C.GigaByte
D.MegaByte
A B C D
B
[解析] 提问的是计算机系统中基本计量单位是什么,显然是bit。所以应该选择B。
28. A ______ infected computer may lose its data.
A.file
B.database
C.virus
D.program
A B C D
C
[解析] 感染病毒的计算机可能会丢失数据。
29. As an operating system repeatedly allocates and frees storage space, many physically separated unused areas appear. This phenomenon is called ______.
A.fragmentation
B.compaction
C.swapping
D.paging
A B C D
A
[解析] 随着操作系统反复分配与释放存储空间,就会出现许多不连续的未用物理区域,这种现象称为碎片。
30. When a bridge transmits an Ethernet frame, the Ethernet frame has ______.
A.the broadcast address for the its source address
B.the bridge's LAN address for its destination address