欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    [计算机类试卷]软件水平考试(中级)数据库系统工程师上午(基础知识)试题章节练习试卷22及答案与解析.doc

    • 资源ID:506843       资源大小:395KB        全文页数:105页
    • 资源格式: DOC        下载积分:2000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要2000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    [计算机类试卷]软件水平考试(中级)数据库系统工程师上午(基础知识)试题章节练习试卷22及答案与解析.doc

    1、软件水平考试(中级)数据库系统工程师上午(基础知识)试题章节练习试卷 22 及答案与解析 1 单个磁头在向盘片的磁性涂料层上写入数据时,是以 (3)方式写入的。 ( A)并行 ( B)并一串行 ( C)串行 ( D)串一并行 2 如果主存容量为 16M字节,且按字节编址,表示该主存地址至少应需要 (6)位。 ( A) 16 ( B) 20 ( C) 24 ( D) 32 3 在计算机系统中,构成虚拟存储器 (11)。 ( A)只需要一定的硬件资源便可实现 ( B)只需要一定的软件即可实现 ( C)既需要软件也需要硬 件方可实现 ( D)既不需要软件也不需要硬件 4 页式存储系统的逻辑地址由页号

    2、和页内地址两部分组成。假定页面的大小为4K,地址变换过程如图 2-1所示,图中逻辑地址用十进制表示。 图 2-1中有效地址经过变换后,十进制物理地址 a应为 (12)。 ( A) 33220 ( B) 8644 ( C) 4548 ( D) 2500 5 在 CPU与主存之间设置高速缓冲存储器 Cache,其目的是为了 (15)。 ( A)扩大主存的存储容量 ( B)提高 CPU对主存的访问效率 ( C)既扩大主存容量又提高存取速度 ( D)提高 外存储器的速度 6 若内存地址区间为 4000H43FFH,每个存储单元可存储 16位二进制数,该内存区域由 4片存储器芯片构成,则构成该内存所用的

    3、存储器芯片的容量是 (16)。 ( A) 51216bit ( B) 2568bit ( C) 25616bit ( D) 10248bit 7 SCSI是一种通用的系统级标准输入 /输出接口,其中 (20)标准的数据宽度为 16位,数据传送率达 20Mb/s。 ( A) SCSI-I ( B) SCSI-II ( C) FASTSCSI-II ( D) FAST/WDE SCSI-II 8 虚存页面调度算法有多种, (47)调度算法不是页面调度算法。 ( A)后进先出 ( B)先进先出 ( C)最近最少使用 ( D)随机选择 9 实存的存储分配算法用来决定输入的程序和数据放到主存中的位置,采

    4、用 “总是把程序装入主存中最大的空闲区域 ”的算法称为 (48)。 ( A)最佳适应算法 ( B)最差适应算法 ( C)首次适应算法 ( D)循环首次适应算法 10 在文件存储设备管理中,有三类常用的空闲块管理方法,即位图向量法、空闲块链表链接法和 (49)。 ( A)一级目录法 ( B)多级目录法 ( C)分区法 ( D)索引法 11 假设某计算机系统的内存大小为 256KB,在某一时刻内存的使用情况表 2-4(a)所示。此时,若进程顺序请求 20KB, 10KB和 5KB的存储空间,系统采用 (53)算法为进程依次分配后的内存情况表 2-4(b)所示。( A)最佳适应 ( B)最差适应 (

    5、 C)首次适应 ( D)循环首次适应 12 某一非确定性有限自动机 (NFA)的状态转换图如图 6-1所示,该 NFA等价的正规式是 (1),与该 NFA等价的 DFA是 (2)。 ( A) 0*|(0|1)0 ( B) (0|10)* ( C) 0*(0|1)0)* ( D) 0*(10)* ( A) ( B) ( C) ( D) 14 某一确定性有限自动机 (DFA)的状态转换图如图 6-5所示,令 d=0|1|2|9 ,则以下字符串中,不能被该 DFA接受的是 (3),与该 DFA等价的正规式是 (4)。 (其中,表示空字符 ) 3857 1.2E+5 -123 .576E10 ( A)

    6、 、 、 ( B) 、 、 ( C) 、 、 ( D) 、 、 、 ( A) (-d|d)d*E(-d|d)d*|(-d|d)*.d*(|E(-d|d)d*) ( B) (-d|d)dd*(.|)d*|(|E(-d|d)d*) ( C) (-|d)dd*E(-|d)d*|(-d|d)dd*.d*(|E(-|d)d*) ( D) (-d|d)dd*E(-d|d)d*|(-d|d|)dd*.d*(|E(-dd*|dd*) 16 (7)是面向对象程序设计语言不同于其他语言的主要特点,是否建立了丰富的 (8)是衡量一个面向对象程序设计语言成熟与否的重要标志之一。 ( A)继承性 ( B)消息传递 (

    7、C)多态性 ( D)静态联编 ( A)函数库 ( B)类库 ( C)类型库 ( D)方法库 18 在过程式程序设计 ( )、数据抽象程序设计 ( )、面向对象程序设计 ( )、泛型(通用 )程序设计 ( )中, C+语言支持 (13), C语言支持 (14)。 ( A) ( B) ( C) ( D) ( A) ( B) ( C) ( D) 20 一个命题的可判定性是指:存在一种算法能给出该命题成立与否的结论。给定文法 G,只有当 G为 (26)时,命题 “L(G)是空集、有限集或无限集 ”才是可判定的,当给出两个不 同文法 G1和 G2,只有当 G1, G2都是 (27)时命题 “L(G1)L

    8、(G2)”才是可判定的。 ( A) 1型 ( B) 2型 ( C) 3型 ( D) 0型 ( E) 2型或 3型 ( A) 1型 ( B) 2型 ( C) 3型 ( D) 0型 ( E) 2型或 3型 22 有限状态自动机可用 5元组 (VT, Q, , q0, Qf)来描述,它可对应于 (28)。设有一有限状态自动机 M的定义如下: VT 0, 1, Q q0, q1, q2) 定义为: (q0, 0)=q1 (q1, 0)=q2 (q2, 1)=q2 (q2, 1)=q2 Qf=q2。 M是一个 (29)有限状态自动机,它所对应的状态转换图为 (30),它所能接受的语言可以用正则表达式表示

    9、为 (31),其含义为 (32)。 ( A) 0型文法 ( B) 1型文法 ( C) 2型文法 ( D) 3型文法 ( A)歧义的 ( B)非歧义的 ( C)确定的 ( D)非确定的 24 在某超市里有一个收银员,且同时最多允许有 n个顾客购物,我们可以将顾客和收银员看成是两类不同的进程,且工作流程如图 5-4所示。为了利用 P-V操作正确地协调这两类进程之间的工作,设置了三个信号量 S1、 S2和 Sn,且初 值分别为0, 0和 n。这样图中的口应填写 (46),图中的 b1, b2应分别填写 (47),图中的 c1,c2应分别填写 (48)。 ( A) P(S1) ( B) P(S2) (

    10、 C) P(Sn) ( D) P(Sn), P(S1) ( A) P(Sn), V(S2) ( B) P(Sn), V(S1) ( C) P(S2), V(S1) ( D) V(S1), P(S2) ( A) P(S1), V(S2) ( B) P(Sn), V(S1) ( C) P(S2), V(S1) ( D) V(S1), P(S2) 27 以太网遵循 IEEE 802.3标准,用粗缆组网时每段不能大于 (28)m。超过上述长度时,要分段,段间用 (29)相连。同时,整个网的总长度不能大于 (30)m。若总长度超过上述长度,则需分成两个网,网之间用 (31)相连。这是在 ISO/OSI模

    11、型中 (32)层的连接。 ( A) 50 ( B) 100 ( C) 185 ( D) 500 ( E) 1000 ( A)网络适配器 ( B)重发器 ( C)调制解调器 ( D)网桥 ( A) 50 ( B) 100 ( C) 185 ( D) 500 ( E) 1000 ( A)网络适配器 ( B)重发器 ( C)调制解 调器 ( D)网桥 ( A)物 ( B)数据链路 ( C)网络 ( D)运输 32 协议是一组 (33),它有助于 (34)之间的相互理解和正确通信。协议中有三个关键因素。其中 (35)定义数据的表示形式, (36)则能使数据管理所需的信息得到正确理解, (37)则规定了

    12、通信应答信号之间的间隔和先后关系。 ( A)软件 ( B)外部设备 ( C)通信实体 ( D)时钟 ( E)约定的规则 ( A)软件 ( B)外部设备 ( C)通信实体 ( D)时钟 ( E)约定的规则 ( A)媒体 ( B)语义 ( C)文本 ( D)语法 ( E)时序 ( A)媒体 ( B)语义 ( C)文本 ( D)语言 ( E)时序 ( A)媒体 ( B)语义 ( C)文本 ( D)语言 ( E)时序 37 国际标准化组织 (ISO)的开放系统互联 (OSI)参考模型共分七层。其中,处理系统之间用户信息的语法表达形式问题的是 (38)层;规定通信双方相互连接的机械、电气、功能和规程特性

    13、的是 (39)层;向用户提供各种直接服务,如文件传送、电子邮件、虚拟终端等的是 (40)层;通过校验和反馈、重发等方法将原始不可靠的物理连接改造成无差错的数据通道的 是 (41)层:负责通信子网中从源到目标路径选择的是 (42)层。 ( A)物理层 ( B)数据链路层 ( C)网络层 ( D)运输层 ( E)表示层 ( A)物理层 ( B)数据链路层 ( C)网络层 ( D)运输层 ( E)会话层 ( A)物理层 ( B)应用层 ( C)网络层 ( D)运输层 ( E)会话层 ( A)物理层 ( B)数据链路层 ( C)网络层 ( D)运输层 ( E)会话层 ( A)物理层 ( B)数据链路层

    14、 ( C)网络层 ( D)运输层 ( E)会话层 42 当网络用户通过网络与另 一台主机 X通信,发现响应太慢时,可运行 (43)程序,把一个分组发向主机 X,通过查看所返回的分组首部的 (44),发现问题的所在,并采取相应的措施。对于一个大中型网络,需要有一个网络管理系统进行管理。当前流行的各类网管平台软件都支持 (45)协议。驻留在 (46)上的网管平台软件可通过该协议软件调阅被管理的网络结点内的管理信息库中的内容。有若干常用的网络平台软件,但 (47)不是网管平台软件。 ( A) Browser ( B) Bitware ( C) Ping ( D) Handshaking ( A)地址

    15、 ( B)时戳 ( C)标志码 ( D)校验码 ( A) MAP ( B) SNMP ( C) MHS ( D) FTAM ( A)数据库服务器 ( B)通信服务器 ( C)主路由器 ( D)网络管理工作站 ( A) NetManager ( B) OpenView ( C) SunView ( D) NetView 47 计算机的发展已进入了网络计算的新时代。 Internet是目前世界范围内最大的互联网。如此多的各种计算机之所以能通过 Internet相互通信,是因为它们遵循了一套共同的 Internet协议。这套协议的核心是 (48),在其上建立的五连接的运输层协议是 (49),万维网

    16、WWW上超文本传输遵循 (50),电子邮件传输遵循 (51), Ethernet与 Internet连接时要用 (52)。 ( A) TCP ( B) IP ( C) EDIFACT ( D) HDLC ( E) ARP ( A) TCP ( B) IP ( C) EDIFACT ( D) HDLC ( E) UDP ( A) TCP ( B) IP ( C) EDIFACT ( D) HTTP ( E) ARP ( A) SMTP ( B) IP ( C) EDIFACT ( D) HDLC ( E) ARP ( A) TCP ( B) IP ( C) EDIFACT ( D) HDLC (

    17、 E) ARP 52 有多种设备可以实现不同网段或网络之间的互联,互联设备通常可按工作在OSI模型中的层次来划分。在物理层实现互联的称为 (53);在数据链路层实现互联的称为 (54);在网络层实现互联的称为 (55);在运输层及以上高层实现互联的设备称为网关或 (56)。 (57)也是一种用来构造局域网的常用设备,通常可以用双绞线把服务器与 PC客户机等连入 (58)。 ( A)集线器 ( B)协议转换器 ( C)网桥 ( D)路由器 ( E)转发器 ( A)集线器 ( B)协议转换器 ( C)网桥 ( D)路由器 ( E)网关 ( A)集线器 ( B)协议转换器 ( C)网桥 ( D)路由

    18、器 ( E)网关 ( A)集线器 ( B)协议转换器 ( C)网桥 ( D)路由器 ( E)网关 ( A)集线器 ( B)协议转换器 ( C)网桥 ( D)路由器 ( E)网关 57 Networks can be interconnected by different devices. In the physical layer, networks can be connected by(1)or hubs, which just move the bits from one network to an identical network. One layer up we find brid

    19、ges and switches, which operate at data link layer. They can accept(2), examine the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have(3)network la

    20、yer, the router may be able to translate between the packet formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message(4). As an example, gateways between Internet e-mail

    21、and X.400 e-mail must(5)the e-mail message and change various header fields. ( A) reapers ( B) relays ( C) connectors ( D) modems ( A) frames ( B) packets ( C) packages ( D) cells ( A) special ( B) dependent ( C) similar ( D) dissimilar ( A) syntax ( B) semantics ( C) language ( D) format ( A) analy

    22、ze ( B) parse ( C) delete ( D) create 62 The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable(6)of the technical requirements for the software product.During the requirements definition phase, the requirements definition team uses an iterative pr

    23、ocess to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each(7)that it must meet. The starting point is usually a set of high-level requirements from the(8)that describe the project or problem.In eith

    24、er case, the requirements definition team formulates an overall concept for the system and then defines(9)showing how the system will be operated, publishes the system and operations concept document, and conducts a system concept review(SCR).Following the SCR, the team derives(10)requirements for t

    25、he system from the high level requirements and the system and operations concept. Using structured or object-oriented analysis the team specifies the software functions and algorithms needed to, satisfy each detailed requirement. ( A) function ( B) definition ( C) specification ( D) statement ( A) c

    26、riterion ( B) standard ( C) model ( D) system ( A) producer ( B) customer ( C) programmer ( D) analyser ( A) rules ( B) principles ( C) scenarios ( D) scenes ( A) detailed ( B) outlined ( C) total ( D) complete 67 DOM is a platform-and language-(11)API that allows programs and scripts to dynamically

    27、 access and update the content, structure and style of WWW documents(currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented(12). DOM is a(13)-based API to d

    28、ocuments, which requires the whole document to be represented in(14)while processing, it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large(15)documents that do not fit info the memory available for processing. ( A) specific ( B) neutral ( C) contained ( D)

    29、 related ( A) text ( B) image ( C) page ( D) graphic ( A) table ( B) tree ( C) control ( D) event ( A) document ( B) processor ( C) disc ( D) memory ( A) XML ( B) HTML ( C) script ( D) web 72 Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an

    30、(16)from a friend who asks you to open it. This is what happens with Melissa and several other similar email(17). Upon running, such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages(18).As administrators seek to block dangerous

    31、 email attachments through the recognition of well-known(19), virus writers use other extensions to circumvent such protection. Executable(.exe)files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to

    32、penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the(20)access to your network. ( A) attachment ( B) packet ( C) datagram ( D) message ( A) virtual (

    33、 B) virus ( C) worms ( D) bacteria ( A) memory ( B) caches ( C) ports ( D) registers ( A) names ( B) cookies ( C) software ( D) extensions ( A) cracker ( B) user ( C) customer ( D) client 77 Originally introduced by Netscape Communications,(21)are a general mechanism which HTTP Server side applicati

    34、ons, such as CGI(22), can use to both store and retrieve information on the HTTP(23)side of the connection. Basically, Cookies can be used to compensate for the(24)nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based(25). ( A) Br

    35、owsers ( B) Cookies ( C) Connections ( D) Scripts ( A) graphics ( B) processes ( C) scripts ( D) texts ( A) Client ( B) Editor ( C) Creator ( D) Server ( A) fixed ( B) flexible ( C) stable ( D) stateless ( A) programs ( B) applications ( C) frameworks ( D) constrains 82 WebSQL is a SQL-like(26)langu

    36、age for extracting information from the web. Its capabilities for performing navigation of web(27)make it a useful tool for automating several web-related tasks that require the systematic processing of either ail the links in a(28), all the pages that can be reached from a given URL through(29)that

    37、 match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common(30)Interface. ( A) query ( B) transaction ( C) communication ( D) programming ( A) browsers ( B) servers ( C) hypertexts ( D) clients ( A) hypertext ( B) page ( C)

    38、protocol ( D) operation ( A) paths ( B) chips ( C) tools ( D) directories ( A) Router ( B) Device ( C) Computer ( D) Gateway 87 (31)analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems. Ultimately, the system models become the(32)f

    39、or designing and constructing an improved system. (33)is such a technique. The emphasis in this technique is process-centered. Systems analysts draw a series of process models called(34). (35)is another such technique that integrates data and process concerns into constructs called objects. ( A) Pro

    40、totyping ( B) Accelerated ( C) Model-driven ( D) Iterative ( A) image ( B) picture ( C) layout ( D) blueprint ( A) Structured analysis ( B) Information Engineering ( C) Discovery Prototyping ( D) Object-Oriented analysis ( A) PERT ( B) DFD ( C) ERD ( D) UML ( A) Structured analysis ( B) Information

    41、Engineering ( C) Discovery Prototyping ( D) Object-Oriented analysis 92 The Rational Unified Process(RUP)is a software engineering process, which captures many of best practices in modem software development. The notions of(36)and scenarios have been proven to be an excellent way to capture function

    42、 requirements. RUP can be described in two dimensions - time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive(37)which is concluded with a well-defined(38)and can be further broken down into(39)-a complete development loop

    43、resulting in a release of an executable product, a subset of the final product under development, which grows incrementally to become the final system. The content structure refers to the disciplines, which group(40)logically by nature. ( A) artifacts ( B) use-cases ( C) actors ( D) workers ( A) ori

    44、entations ( B) views ( C) aspects ( D) phases ( A) milestone ( B) end-mark ( C) measure ( D) criteria ( A) rounds ( B) loops ( C) iterations ( D) circularities ( A) functions ( B) workflows ( C) actions ( D) activities 97 An expert system is a software that(41)specialist knowledge-about a particular

    45、 domain of(42)and is capable of making(43)decisions with in that domain. Although expert systems typically focus on a very narrow domain, they have achieved dramatic success with(44)problems, This has excited wide spread interest outside the research laboratories from which they emerged.Expert syste

    46、ms have given rise to a set of “knowledge engineering“ methods constituting a new approach to design of high performance software system. This new approach represents an(45)change with revolutionary consequences. ( A) develops ( B) directory ( C) effect ( D) encapsulates ( E) evolutionary ( A) develops ( B) expertise H. intelligent ( C) effect ( D) encapsulates ( E) evolutionary ( A) develops ( B) directory ( C) intelligent ( D) encapsulates ( E) evolutionary ( A) real-life ( B) directory ( C) effect ( D) encapsulates ( E) evolutionary ( A) develops ( B) directory ( C) effect


    注意事项

    本文([计算机类试卷]软件水平考试(中级)数据库系统工程师上午(基础知识)试题章节练习试卷22及答案与解析.doc)为本站会员(sofeeling205)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开