● 下列的描述中,(60) 不是项目特点。
(60)A.项目具有生命周期,它经历项目的开始阶段、项目的实施阶段和项目的结束阶段
B.项目具有特定的目标,项目实施的目的是为了达到项目的目标
C.项目组的成员面临着比企业中其他成员更多的冲突
D.项目的实施具有周而复始的循环性,类似于企业的运作
● 监理工程师在实施阶段进行进度控制的依据是(61)实施进度计划。
(61)A.承建单位编制并批准的
B.建设单位编制并批准的
C.监理单位制定并由承建单位认可的
D.承建单位提交并经建设单位批准的
● 工程质量控制应坚持以人为核心的原则,重点控制(62) 。
(62)A.人的行为 B.人的作业能力 C.人的管理能力 D.人的控制能力
● 监理工程师在审核参与投标企业近期承建工程的情况时,在全面了解的基础上, 应重点考核(63) 。
(63)A.建设优质工程的情况 B.在工程建设中是否具有良好的信誉
C.质量保证措施的落实情况 D.与拟建工程相似或接近的工程
● 对照①~⑤的描述,质量控制图(如下图所示)的用途是(64) 。
①过程分析 ②过程控制 ③分析判断质量分布状态
④寻找影响质量的主次因素 ⑤评价过程能力
(64)A.①、② B.①、②、③ C.①、③、④ D.①、②、③、④、⑤
● 若投标单位(65),招标单位可视其为严重违约行为,没收其投标保证金。
(65)A.通过资格预审后不投标 B.不参加开标会议
C.不参加现场考察 D.开标后要求撤回投标书
● Every valid character in a computer that uses even (66) must always have an even number of 1 bits.
(66)A. parity B. check C. test D. compare
● The maximum number of data that can be expressed by 8 bits is (67) .
(67)A. 64 B. 128 C. 255 D. 256
● Integration (68) is the process of verifying that the components of a system work together as described in the program design and system design specifications.
(68)A. trying B. testing C. checking D. coding
● GIF files are limited to a maximum of 8 bits/pixel, it simply means that no more than 256 colors are allowed in (69) .
(69)A. an image B. a file C. a window D. a page
● Computer (70) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.
(70)A. storage B. device C. processor D. network
● NAC’s(Network Access Control) role is to restrict network access to only compliant endpoints and (71) users. However, NAC is not a complete LAN (72) solution; additional proactive and (73) security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security (74) . In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures— real-time, multilevel (75)inspection and microsecond threat containment.
(71)A. automated B. distinguished C. authenticated D. destructed
(72)A. crisis B. security C. favorable D. excellent
(73)A. constructive B. reductive C. reactive D. productive
(74)A. defense B. intrusion C. inbreak D. protection
(75)A. port B. connection C. threat D. insurance
责任编辑:小草