全國計(jì)算機(jī)等級考試四級筆試試題六(下)

字號:

(51) 計(jì)算機(jī)網(wǎng)絡(luò)共享的計(jì)算機(jī)資源主要指計(jì)算機(jī)硬件、軟件與_____。
     A) 物理網(wǎng)絡(luò) B) 路由器 C) 數(shù)據(jù) D) 服務(wù)器
     (52) 分布式計(jì)算機(jī)系統(tǒng)與計(jì)算機(jī)網(wǎng)絡(luò)不同之處在于:分布式計(jì)算機(jī)系統(tǒng)存著一個(gè)能夠以全局方式自動管理資源的_____。
     A) 網(wǎng)絡(luò)協(xié)議 B) 網(wǎng)絡(luò)操作系統(tǒng) C) 路由器 D) 體系結(jié)構(gòu)
     (53) 計(jì)算機(jī)網(wǎng)絡(luò)從組網(wǎng)設(shè)備的功能上,可以分為通信子網(wǎng)與_____。
     A) 服務(wù)器 B) 局域網(wǎng) C) 數(shù)據(jù)通信網(wǎng) D) 資源子網(wǎng)
     (54) 網(wǎng)絡(luò)拓?fù)浞从吵鼍W(wǎng)絡(luò)中各實(shí)體之間的結(jié)構(gòu)關(guān)系,它影響著網(wǎng)絡(luò)的性能、系統(tǒng)可靠性與_____。
     A) 網(wǎng)絡(luò)應(yīng)用軟件 B) 體系結(jié)構(gòu) C) 網(wǎng)絡(luò)協(xié)議 D) 通信費(fèi)用
     (55) 計(jì)算機(jī)網(wǎng)絡(luò)從網(wǎng)絡(luò)覆蓋范圍上,可以分為局域網(wǎng)、廣域網(wǎng)與_____。
     A) 物理網(wǎng) B) 城域網(wǎng) C) 分組交換網(wǎng) D) 高速網(wǎng)
     (56) 在有隨機(jī)熱噪聲的通信信道上傳輸數(shù)據(jù)信號時(shí),信道的數(shù)據(jù)傳輸速率決定于信 道帶寬與_____。
     A) 信號強(qiáng)度 B) 噪聲強(qiáng)度
     C) 信號噪聲功率比 D) 信號波形
     (57) 如果調(diào)制解調(diào)器的調(diào)制速率為4800baud,采用8相調(diào)制,那么該調(diào)制解調(diào)器的數(shù)據(jù) 傳輸速率為_____。
     A) 14400bps B) 2400bps C) 28800bps D) 600bps
     (58) 與傳統(tǒng)Ethernet采用相同的介質(zhì)訪問控制方法與幀結(jié)構(gòu),而只是將它的每個(gè)比特 的發(fā)送時(shí)間降低到10ns,這種局域網(wǎng)叫做_____。 (2分)
     A) ATM B) Fast Ethernet
     C) Gigabit Ethernet D) Switched Ethernet
     (59) 如果互連的局域網(wǎng)高層分別采用SPX/IPX 協(xié)議與TCP/IP 協(xié)議,那么我們可以選擇 的互連設(shè)備應(yīng)該是_____。 (2分)
     A) 中繼器 B) 透明網(wǎng)橋
     C) 自適應(yīng)網(wǎng)卡 D) 多協(xié)議路由器
     (60) 局域網(wǎng)交換機(jī)增加帶寬的方法是在交換機(jī)的多個(gè)端口之間建立_____。 (2分)
     A) 全連接 B) 并發(fā)連接 C) 會話連接 D) 數(shù)據(jù)連接
     (61) The range of an 8bit fixed point integer numbert(no signs) is_____.
     A) 0-127 B) 0-128 C) 0-256 D) 0-255
     (62) Which set is a proper subset of E? _____.(2 points)
     E= {0,1,2,3}
     A) {x|x is a real number and x2=9}
     B) { x|x is a real number and x+3=0}
     C) { x|x is a real number and x2+5x+6=0}
     D) { x|x is a real number and x2=-9}
     (63) If p and q are statements,which of the following formulas is tautological?_____.
     A) ((p→q)∧p)→q B) (q∧(p→q))→p
     C) (p∨q)→p∧q D) ┐(p→q)∧q
     (64) What is the number of nonisomorphic spanning trees in the following graph? _____.
     A) 2 B) 3 C) 4 D) 5
     (65) A sequence d=(d1, d.2,….,dn) is graphic if there is a simple nondirected graph with d as its degree sequence.Which of the following sequences is graphic?_____.
     A) (2,3,3,4,4,5) B) (2,3,4,4,5)
     C) (2,3,3,4,4) D) (1,3,3,3)
     (66) Suppose a given binary tree has 10 leaf nodes, then the number of nodes with degree of 2 is_____.
     A) 12 B) 11 C) 9 D) Indeterminable
     (67) Suppose two dimensional array A[0..8, 0..9] (with element length o f 2 bytes) is stored using row major order, and the base address is 400.Then the address of element A[8, 5] is _____.(2 points)
     A) 570 B) 506 C) 410 D) 482
     (68) In the following kinds of graphs,which one's adjacency matrix is symmetric?_____. (2 points)
     A) Directed graph B) Undirected graph
     c) AOV network D) AOE network
     (69) To control and manage processes,which of the following data structures should be set up?_____.
     A) PCT B) PCB C) PCM D) PCL
     (70) In a tree directory of a file system, relative path nam can be used to find files for improving directory retrieval. To do this,which directory of the followings should be set up?_____. (2 points)
     A) parent directory B) child directory
     C) working directory D) home directory
     (71) Which of the following commands is not one for communication among users_____. (2 points)
     A) mail B) write C) telnet D) nice
     (72) Of the items listed below,which one(s) should be saved into the process control block?_____. (2 Points)
     Ⅰ.Process name and process number
     Ⅱ.Process running information
     Ⅲ.Current opened file information
     A) Ⅰ and Ⅱ B) Ⅰ and Ⅲ C) Ⅱ and Ⅲ D) Ⅰ,Ⅱ and Ⅲ
     (73) The DOS command which reads and changes properties of a file is_____.
     A) ATTRIB B) COMP C) SYS D) XCOPY
     (74) In the following statements about functional dependency, which one is incorrect?_____. (2 Points)
     A) If X→Y and Y→Z, then X→Z.
     B) If X→Y and Y'ìY, then X→Y'.
     C) If X→Y and X'ìX, then X'→Y.
     D) If X'ìX, then X→X'.
     (75) Which of the following is not responsibility of DBA(Data Base Administrator)?
    _____. A) Database management system design
     B) Database schema definition
     C) Database schema modification
     D) Integrity constraint specification
     (76) Which of the following is not among the basic features of a relational database?
    _____. A) It does not matter what order the rows are in.
     B) It does not matter what order the columns are in.
     C) Different columns should have different column names.
     D) Different columns should have different data types.
     (77) Which of the following statements about ORACLE is (are) correct?_____.
     Ⅰ. ORACLE follows SQL standard
     Ⅱ. ORACLE database defines two logical types: table and view
     A) Ⅰ only B) Ⅱ only C) Ⅰ and Ⅱ D) none of the above
     (78) The task of the general design stage in structured life circle method is, to build what kind of software system structure?_____.
     A) program structure B) general structure
     C) module structure D) function structure
     (79) The software structure is an expression of the relationship among software modules. In the following phrases, which are not the relation among software modules? _____.(2 Points)
     Ⅰ. calling relation
     Ⅱ. belonging relation
     Ⅲ. Execution relation
     Ⅳ. process relation
     A) Ⅰ and Ⅱ B) Ⅱ and Ⅲ C) Ⅲ and Ⅳ D) none
     (80) N-S diagram can used to substitute conventional program flow chart. In the following phrases, which does not belong to the basic control structures that contain?_____.
     A) sequence structure B) condition structure
     C) selection structure D) execution structure
     (81) M.Jackson suggested the data structure oriented software design method. Which of the following structure can be introduced by using input/data structure?_____. (2 points)
     A) algorithm structure B) procedure structure
     C) code structure D) program structure
     (82) Software testing is acomplicated procedure.In the following testing method,which is the basic test lf software testing?_____.
     A) system testing B) effective testing
     C) element testing D) integrated testing
     (83) Typical MISD (multiple-instruction single-datastream) computing mode is_____.
     A) Pentium Ⅱ B) Alpha C) Systolic D) Staran
     (84) Local bus can reduce the occupation time of CPU. For the PCI local bus, commonly the time can be reduced to_____.
     A) 46% B) 26% C) 16% D) 6%
     (85) There are many page replacement algorithms in page management.The most frequently used algorithm is_____.
     A) FIFO B) LRU C) OPT D) PPT
     (86) The technology for carrying out multiple processing by means of multiple pipeline is called _____.(2 points)
     A) Superscalar B) Superpipeline
     C) Multiple pipeline D) Very long instruction word
     (87) In most WANs ,the network contains numerous cables or telephone lines, each one connecting a pair of_____.
     A) hosts B) routers C) servers D) networks
     (88) Three concepts are central to the OSI model:Service,Interface and_____.
     A) Iayers B) Applications C) Protocols D) Networks
     (89) The underlying technology that makes B-ISDN is called_____.
     A) ATM B) Frame relay
     C) SDMS D) X.25 Networks
     (90) URLs have three parts: the DNS name of machine on which the page is located,then a local name uniquely indicating the specific page and_____. (2 points)
     A) protocol B) IP address
     C) Network name D) Server name
     二、論述題 (兩個(gè)論述題可任選其一,且只選其一,多選無效,滿分30分)
     論述題 1
     某周內(nèi),物理系17名學(xué)生合作完成3個(gè)試驗(yàn)。事后發(fā)現(xiàn),他們中的任何兩人都恰好同時(shí)做過同一個(gè)試驗(yàn)。根據(jù)以上事實(shí)解答或證明以下各題:
     ⑴ 用無向簡單圖描述以上事實(shí) (6分)
     ⑵ 證明:對于每個(gè)人都至少有另外6個(gè)人與他同時(shí)做的試驗(yàn)是同一個(gè)試驗(yàn)(9分)
     ⑶ 證明:存在3個(gè)人同時(shí)做過同一個(gè)試驗(yàn) (15分)
     論述題 2
     軟件測試是軟件質(zhì)量保證的重要措施。測試的目的是在軟件投入生產(chǎn)性運(yùn)行前,應(yīng)盡可能地發(fā)現(xiàn)并排除軟件中隱含的各種錯(cuò)誤。測試是對軟件規(guī)格說明、設(shè)計(jì)和編碼的全面和最后的審查。因此,軟件測試應(yīng)貫穿在整個(gè)軟件開發(fā)的全過程。
     ⑴ 試陳述軟件測試的基本任務(wù)和方法。 (6分)
     ⑵ 簡述黑箱測試和白箱測試的內(nèi)容和方法。 (10分)
     ⑶ 陳述軟件測試過程的基本組成,并介紹各種測試對象的測試內(nèi)容和方法(15分)
     選擇題答案:
     (01-05) BCABA(06-10) BCADC
     (11-15) CBCBC(16-20) DBDDC
     (21-25) CDBDD(26-30) CBACC
     (31-35) BADAD(36-40) BBCDB
     (41-45) DADBC(46-50) DBACA
     (51-55) CBDDB(56-60) CACDB
     (61-65) DDABC(66-70) CABBC
     (71-75) DDACA(76-80) DCBCD
     (81-85) DCCDB(86-90) ABCAA