专业信息系统管理工程师网站|服务平台|服务商(加客服微信:cnitpm或QQ:947530340进信息系统管理工程师学霸群)

软题库 学习课程
当前位置:信管网 >> 信息系统管理工程师 >> 每日一练 >> 文章内容
信息系统管理工程师每日一练试题(2026/2/17)

信息系统管理工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=30

往期信息系统管理工程师每日一练试题汇总:www.cnitpm.com/class/27/e30_1.html

信息系统管理工程师每日一练试题(2026/2/17)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

点击查看:更多信息系统管理工程师习题与指导

信息系统管理工程师每日一练试题内容(2026/2/17)

  • 试题1

    知识螺旋(SECI)模型将知识创新活动分为( )4种模式。
    A. 社会化、整合、共享化、同化
    B. 外化、内化、共享化、同化
    C. 整合、共享化、外化、内化
    D. 社会化、整合、外化、内化

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题2

    《数据安全法》延续了《网络安全法》生效以来的“( )”的监管体系,通过多方共同参与实现各地方、各部门对工作集中收集和产生数据的安全管理。
    A. 一轴两翼多级
    B. 三位一体
    C. 三级四层
    D. 双轨分级

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题3

    数据总结的主要目的是( )
    A.找出数据库中隐藏的关联网
    B.对数据进行浓缩,给出其总体综合描述
    C.将数据分派到不同的组中,并预测新数据的归属
    D.检测数据库中的异常记录

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题4

    数据战略规划的内容不包括( )
    A.识别利益相关者
    B.数据战略制定
    C.数据战略修订
    D.建立保障计划

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题5

    Murphy's Law suggests, "If anything can go wrong, it will." Murphy has motivated numerous pearls of wisdom about projects; machines, people, and why things go wrong. A project is a [temporary] sequence of unique, complex, and connected ( 1 ) having one goal or purpose and that must be completed by a specific time, within budget, and according to ( 2 ).Project management is the ( 3 ) of scoping, planning, staffing, organizing, directing, and controlling the development of an acceptable information system at a minimum cost within a specified time frame. Project management is a cross life cycle activity because it overlaps all phases of any systems development methodology.
    For any systems development project, effective project management is necessary to ensure that the project meets the deadline, is developed within a (an) ( 4 ) budget, and fulfills customer expectations and specifications.
    Corporate rightsizing has changed the structure and culture of most organizations, and hence, project management. More flexible and temporary interdepartmental(不同部门间)teams that are given greater responsibility and authority for the success of organizations have replaced rigid hierarchical command structures and permanent teams. Contemporary system development methodologies depend on having teams that include both technical and nontechnical users, managers, and information technologists all directed to the project goal. These ( 5 ) teams require leadership and project management.
    (1) A.activities
    B.tasks
    C.services
    D.software
    (2)A.document
    B.order
    C.specification
    D.authority
    (3)A.process
    B.activity
    C.step
    D.task
    (4) A.predefined
    B.acceptable
    C.rigid
    D.Strict
    (5)A.invariable
    B.fixed
    C.permanent
    D.dynamic

    查看答案

    试题参考答案:A、C、A、B、D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题6

    在应用系统的安全管理中,漏洞管理的核心目的是( )
    A.提高系统性能
    B.保障系统安全性和稳定性
    C.优化用户体验
    D.降低运维成本

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题7

    在Windows操作环境中,采用( ) 命令来查看本机IP 地址及网卡MAC 地址。
    A.ping
    B.tracert
    C.ipconfig

    D.nslookup

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题8

    Models drawn by the system analysts during the process of the structured analysis are  ( ) .
    A.PERTs
    B.ERDs
    C.UMLs
    D.DFDs

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题9

    WebSQL is a SQL­like (1)language for extracting information from the web.Its capabilities for performing navigation of web (2)make it a useful tool for automating several web­relate dtasks that require the systematic processing of either all the links in a (3), all the pages that can be reached from a given URL through (4)that match a pattern, or a combination of both.WebSQL also provides transparent access to index servers that can be queried via the Common(5)Interface.
    (1)A.query
    B.transaction
    C.communication
    D.programming
    (2)A.browsers
    B.servers
    C.hypertexts
    D.clients
    (3)A.hypertext
    B.page
    C.protocol
    D.operation
    (4)A.paths
    B.chips
    C.tools
    D.directories
    (5)A.Router
    B.Device
    C.Computer
    D.Gateway

    查看答案

    试题参考答案:A、C、B、A、D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题10

    关于应用漏洞管理的描述,不正确的是( )
    A.需确保所有漏洞都能够被发现,并得到有效处理。
    B.采用安全扫描工具对系统进行定期扫描,发现潜在的漏洞和安全问题,及时进行处理。
    C.定期检查系统补丁的更新情况,及时更新补丁以修补已知的漏洞和安全问题。
    D.明确漏洞的归属部门,防止出现漏洞无人认领的局面。

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

信管网订阅号

信管网视频号

信管网抖音号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,教材和资料参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

发表评论  查看完整评论  

推荐文章

精选

课程

提问

评论

收藏