(The test time is 120 minutes, full of 100 points)
August 2002
First, choose questions (1 point for each small question, a total of 60 points)
In the following questions a), b), c), d), only one option is correct, please write the correct option on the corresponding position in the answer sheet, and answer it on the test paper.
(1) The computer based on the principle of storage program is generally composed of five feature parts, which is
A) Commerce calculator, controller, memory, input device, and output devices
B) Commerce calculator, accumulator, register, external device and host
C) adder, controller, bus, register and external device
D) Commerce calculator, memory, controller, bus and outside
Equipment (2) Computer language is a class of computer-oriented man-language, which is a tool design, also known as programming language. Existing programming languages can generally be divided into three categories, which is a) Basic language, Fortran language and C language b) Chinese language, English language, and Latin language
C) UNIX, Windows and Linux
D) Machine language, assembly language and advanced language
(3) Which one is incorrect? The following describes the basic characteristics of the computer network.
A) Packet switching technology in a computer network
B) The main purpose of establishing a computer network is to achieve sharing of computer resources.
C) The interconnected computer is a "self-government" distributed in different geographical locations.
D) Communication between networking computers must follow common network protocols
(4) The main components of the Internet are
A) twisted pair, coaxial cable, fiber optic cable and wireless communication channel
B) Communication lines, routers, hosts and information resources
C) LAN, WAN, campus network and backbone network
D) LAN, WAN and Metropolitan Area Network
(5) Information security is to prevent illegal attacks and viruses from spreading to ensure the effectiveness of electronic information. Understand from the specific sense, what kind of content is needed?
I. Confidentiality
II. Integrity
III. Availability (AVAILABILITY)
IV. Controllability
A) I, II and IV B) I, II and III C) II, III and IV D) are
(6) Isolation is one of the measures for operating system security. Which one of the following is not safety isolation? A) Physical isolation B) Time isolation C) Timer isolation D) Which term below is related to the storage structure of the data? A) Queue b) Binary tree C) Hash table D) Which one is not the basic operation of the stack? A) Deleting a stack top element B) Deleting the bottom element C) Determined stack is empty D) Place the stack to a vacant (9) two-dimensional array a [0..8, 0..9], each element With 2 bytes, start from the first address 400, in order to store, the storage address of the element a [8, 5] is a) 570 b) 506 c) 410 d) 482 (10) if a bifurcation node The sequence sequence is A, B, C, and the rear sequences are C, B, A, and the symmetric sequence a) of the binary tree nodes must be A, B, CB) must be a, c, bc) must B, C, AD) cannot be determined (11) for a set of rights W = {10, 12, 16, 21, 30}, and the band-right external path of the expansion binary tree obtained by the Hoffman algorithm is A. 89 b) 189 c) 200 D) 300 (12) Set the number of nodes of the balance of binary sorting trees (AVL trees), the average retrieval length is a) O (1) b) o (log2n C) O (N) D) O (N LOG2N) (13) to (14), based on the following 5th-order B tree structure, the B tree is now 2.
(13) After inserting a critical code 72 in the B tree, the number of nodes of the second layer of the B tree is a) 6 b) 7 c) 8 D) 9 (14) Remove the key code 30 from the B tree Number of children with node a) 2 b) 3 c) 4 D) 5 (15) The key code sequence (16, 9, 4, 25, 15, 2, 13, 18, 17, 5, 8) , 24), to be sorted by the order of key code value, use direct selection ordering method, the result after the scan is a) (15, 2, 4, 18, 16, 5, 8, 24, 17, 9, 13, 25) B) (2, 9, 4, 25, 15, 16, 13, 18, 17, 5, 8, 24) C) (9, 4, 16, 15, 2, 13, 18, 17, 5, 8, 24, 25) D) (9, 16, 4, 25, 2, 15, 13, 18, 5, 17, 8, 24) (16) The following is not in the narrative of the operating system, which one is not correct? A) Operating system management system in the system B) Operating system should provide a good interface C) Operating system is a resource manager and arbiter D) operating system is an application in a computer system (17) The operating system has the function of process management, storage management, file management, and device management. Which one is incorrect in the following description? A) Process management is mainly to manage B) The main management of memory resources in the program c) file management can effectively support the operation of the file, resolve file sharing, confidentiality and protection issues D) Device management is in addition to the computer system All inputs other than CPU and memory, the management (18) of the output device (18), which is incorrect in the narrative of the forced interrupt event? A) The input and output interrupt is from the interrupt from channels or various external devices. The operating case for reflecting channels or devices B) Hardware fault interrupts are interrupts generated when the machine is erroneous, and the interrupt caused by the software clock D) Procedural interrupt is an interrupt (19) that is being consciously arranged in the program, which has been running conditions, but since the process of not obtaining the CPU and cannot run in a) Wait State B) Sleep State C) Ready state D) Hanging Status (20) In order to ensure that the storage unit can be properly accessed when the CPU executes the program command, it is necessary to convert the logical address in the user program to the physical address of the machine can be directly addressed by the machine. This process is called a) address assignment B. ) Address Calculation C) Address Map D) Address Query (21) In page storage management, the system provides a pair of hardware registers, which are a) base registers and limit registers B) Page Table Address Registers and page table length Register C) Upload Register and Down Register D)
Direct address register and indirect address register (22) files are determined by the nature of the file and the case of the user, generally have two access methods, which are a) direct access and indirect access B ) Sequential access and random access C) read-only access and read and write access D) The access method of sequential access and link access (23) files is related to the physical structure of the file, and may have the following file physical structure. : I. Sequential structure II. Linear structure III. Link structure IV. The common file physical structure of index structure is A) I, II and III B) I, III and IVC) I, III and IV D) I, II and IV D) I, II and IV (24) Which is incorrect? A) Equipment management enables users to easily use device B) Equipment B) Equipment B) Equipment B) Equipment Management uses various techniques to improve the parallel work capability between CPU and equipment, equipment and equipment C) operating system. Detail D of the specific device I / O operation D) Operating system Try to provide a variety of different interfaces (25), which (some) do not have a dedicated software to data in the three stages of the data management technology listed below. Manage? I. Artificial Management Stage II. Document System Phase III. Database Phase 1 A) Only II C) I and II D) II and III (26) In the data model listed below, which is a concept data model ? A) Relationship model B) Layer model C) Net model D) Entity, contact model (27) In the relational database, table (TABLE) is a) A) mode B) mode c) Mode C) Storage mode in the three-level mode structure D) In the entry listed below, which is the composition of the database system? I. Operating System II. Database Management System III. User IV. Database Administrator V. Database A) II, III, IV and V B) II, IV and Vc) I, II, IV and V D) are (29 The data model indicating the entity and between the entities and the physical formation of the entity is referred to as (1) a (2) d (3) a (4) b (5) d (6) c (7) c (8) b) C (8) B. 9) A (10) D (11) C (12) B (13) C (14) B (15) B (16) D (17) A (18) D (19) C (20) C (21) B (22) B (23) C (24) D (25) A (26) D (27) B (28) D (29) C (30) D
A) Network model B) Hierarchy Model C) Relation Model D) Object-Oriented Model (30) to (32) The title is based on the following two relationships, wherein the employee information table relationship EMP is employee number, department information table relationship. The primary key of DEPT is the department number (30) If the operation below is executed, which operation cannot be executed successfully? A) Delete the line from the EMP ('010', 'Wang Hanta', '01', 1200) B) inserted into the EMP ('102', 'Zhao Min', '01', 1500) C) in EMP The salary of employee = '056' is changed to 1600 yuan D) Change the department number = '101' of EMP to '05' (31) If the operation listed below, which operation cannot be executed successfully? (31) A (32) D (33) A (34) B (35) D (36) C (37) C (38) B (39) A (40) D (41) C (42) B (43) ) C (44) B (45) B (46) D (47) A (48) D (49) C (50) C (51) B (52) B (53) C (54) D (55) A (56) D (57) B (58) D (59) C (60) D (61) (62) (63) (64) (65) a) Remove the department number = '03 'from DEPT B ) Insert a row in DEPT ('06', 'Program,' No. 6 ") C) Changed to '10'D to' 10'D in the depth gate number = '02 ' 01 '' address is changed to 'No. 5 Building' (32) In the employee information table relationship EMP, which attribute is foreign key (Foreign Key)? A) Employee number b) Employee name c) department number d) wage (33) In the SQL language SELECT statement, which clause is realized? A) SELECT B) WHERE D) Grou BY (34) Features R (A, B, C) and S (C, D). The relationship algebraic expression is a) σr.c = sc (πa, b, d (r × s)) b) b) πa, b, D (σR, C = SC (R × S)) C) σr.c = SC ((πa, br) × (πDS)) D) σR, C = SC (πd (πa, br) × S) ( 35) In the entry listed below, which is incorrect? A) View is the external mode B) View is the virtual table C) Use the view to speed up the execution of the query statement. View can simplify the writing of query statements (36) SQL language set data query, data manipulation, data definition, and data control functions, statement INSERT, DELETE, UPDATE which type of function? A) Data Query B) Data Control C) Data Definition D) Data Control (37) The number of elements R and the relationship S is 3 and 4, respectively, the relationship T is the brigadier card of R and S, namely: t = R × S, the element T is a) 7 b) 9 c) 12 d) 16 (38) The relationship R and the relationship S have the same element, and the corresponding attributes are taken from the same domain. The set {t / t∈r ∧t∈s} tag is a) R∪sb) RS C) R × SD) R × SD) R × SD) R × SD) R × SD) R × SD) R × SD) R × SD) R × SD) R × SD) R × SD) R × SD) R × SD) R × SD) Rs (39) Setting Attribute A is the primary attribute of the relational R, then the attribute A cannot be empty Value (NULL).
This is a) Entity Integrity Rule B) Reference Integrity Rule C) User Defined Integrity Rule D) Domain Integrity Rules (40) In the entries listed below, which are the basic functions of the database management system? I. Database Definition II. Database Establishment and Maintenance III. Data Inventory IV. Communication A) I and II B) I, II and III C) II and III D) II and III D) II and III D) II and III D) III. ) In the database management system, which module below is not a functional module for data inventory? A) Transaction Management Module B) Data Update Module C) Interactive Program Query Module D) Query Processor Module (42) In the hierarchy of the database management system, the order of advanced to lower hierarchy is a) application layer , Data access layer, data storage layer, language translation processing layer B) application layer, data storage layer, data access layer, language translation processing layer C) application layer, data storage layer, language translation processing layer, data access layer D) Products, Language Translation Processing Layers, Data Access Layers, Data Supply Layers (43) Oracle Database Management System's Internet Solutions of Oracle Self-Care Webserver, which is not this product below, which does not belong to this product ? A) Oracle WebListener B) Oracle WebAgentc) Oracle OLAP D) Oracle7 Server (44) Which is the main characteristics of database technology? I. Structured II. Data Redundancy Small III. Higher data independence IV. Standardization of procedures A) I, II and III B) I and II C) I, II and IV D) are (45) When the database system fails, the log can be restored based on the log. In the entries listed below, which are the contents of logging? I. Transaction Benefits II. Update Information III. Submit Information IV. Transaction Stop Information A) I, II and IV B) I, II and IV C) II, III and IV D) are (46) About Database System Which one is correct in the narrative of log-based recovery? A) Undo can perform UNDO with the update log record, using the correct value in the update log record can be used to use the update log record can be used to make UNDO, using the update log record in the update log record Undo can be performed using the update log record can be performed in UNDO, using the correct value in the update log record can be used to use the update log record can be used to make UNDO, using the update log record The latter value can be used in the entry listed below, which is the main problem that may occur in transaction and execution? I. Lost Update II. Depending on the Unexpected Update III. A) I and II B) II and III C) I and III D) are (48) in concurrent control technology, most commonly used Blocking method. For shared locks (s) and row lock (X), which is incorrect in the compatibility relationships listed below? A) X / x: True B) S / S: TRUEC) S / X: FALSE D) X / S: FALSE (49) Which one below is not due to improper design of relational mode? A) Data redundancy B) Lost modification C) Insert anomalous D) Update exception (50) About the description of the function-dependent description, is incorrect is a) If x → y, x → z, then x → yzb) If xy → z, then x → z, y → zc) If x → y, y → z, then x → y, y 'y, then x → y' (51) set u is a collection of all attributes , X, y, and z are the subset of u, and z = uxy.
The following is in the multi-value dependent narrative, is incorrect is a) if x → → y, then x → → y, then x → → yc) If x → → y, and Y '? Y, Then x → → y 'd) If z = φ, the X → → Y, (52) to (54) is based on the following description: there is a relational mode A (C, T, H, R, S), and the group The meaning of each property is: C: Course T: Teacher H: Class Time R: Classroom S: Students have the following functions depending on semantic: f = {C → T, (h, r) → c, (h, t) → R, (h, s) → r} (52) relationship mode A code is a) Cb) (h, r) c) (h, t) d) (h, s) (53) relationship A The degree of normalization is up to a) 1NF b) 2nf c) 3NF D) BCNF (54) is now decomposed into two relational modes A1 (C, T), A2 (H, R, S), then A1 Standardization degree reaches a) 1NF b) 2nf c) 3NF D) BCNF (55) Which one below does not belong to the nature of the concept model? A) Rich semantic expression capability B) Easy to communicate and understand C) Easy to change D) The efficiency high (56) implemented in the computer (56) In the entries listed below, which (some) is the development trend of the current application development tool. ? I. Adopt triangular or multi-layer Client / Server Structure II. Supporting Web Application III. Support Open, component-type distributed computing environment A) I and II b) only II c) only III D) is (57) The following is the narrative of the enterprise-level application development platform Uniface, which is incorrect? A) UNIFACE uses model driver, component-type application constructing strategy B) Develop languages of UNIFACE) Uniface) Uniface Support WEB Application D) Uniface can be applied to construct large and complex business application systems (58) The tools listed below In, the tool cannot be used for database application system interface is a) Visual Basic B) Delphic) PowerDesigner D) Which of the following is the basic feature of the object-relational database? A) The level of standardization of the relationship is a higher B) The SQL environment provides support for the basic data type to support the support of the rule system D) SQL environment provides support (60) The entries listed below. Which is the basic characteristics of a data warehouse? I. Data warehouse is the topic II. Data warehouse data is integrated III. Data warehouse data is a relatively stable IV data warehouse data is a) I, II and III B) I, II and IVC) II, III and IV D) are two, fill in the blanks (2 points for each empty, a total of 40 points) Please write the answer in the answer sheet, the serial number is [1] to [20], answer Do not score on the test paper. 1. System for production process control is generally [1] system, which requires the ability to respond to input data in time (response). 2, WWW is based on hypertext labeling language, can provide information browsing system for Internet services, and the structure of the WWW system uses [2] mode. 3, the generalized form is the promotion of the linear table, which is a limited sequence composed of zero or more single elements or [3].
4, the height of the binary tree containing only the root node is 0, and the minimum node number of the binary tree of the height is [4]. 5. In the order of complete binary tree, if the node i has left children, the left child is the node [5]. 6. Some processes cooperate together to complete a task, and this direct collaborative work relationship between the process is called [6]. 7. In the file system, the logical structure of the file can be divided into two categories, which are [7] files and recording files. 8. When you find a file in a multi-level directory structure, you need to search by the path name. When the level is much more, it takes a lot of time to introduce [8]. 9. In the third-level mode architecture of the database, the image between the mode and the inner mode (mode / internal mode) implements [9] independence of the data. 10. Data model can be divided into concept data model and structural data model, and the hierarchical model is [10] data model. 11. Data models are usually composed of three parts, they are [11], data operations, and integrity constraints. 12. A SQL statement can be generated or handled in principle, and the primary language can only handle one record at a time, and two processing methods must be coordinated, which is solved by using the [12] mechanism. 13. The three relationships in the "Student-Elective - Curriculum" database are as follows: S (S #, SNAME, SEX, AGE), SC (S #, CNAME, TEACHER). Now find the student name and grade of the student of "Database Technology", you can use the following SQL statement: SELECT SNAME, GRADE from S, SC, C Where cname = 'database technology' and ss # = sc.s # And [13]. SC.C # = C.C # 14, in the hierarchy of the database management system, the object of the data access layer processing is a single [14]. It transforms the superfix operation of the upper layer into a single record operation. 15. Generally, the commercial database management system, such as Oracle, its products mainly include database server software, [15] software and connection software three categories. 16. PowerDesigner is the Case tool provided by Sybase, which contains multiple modules, where the module for the database concept data modeling (CDM) is [16]. 17. Transform the entities and contacts in the E-R diagram into a relationship in the relational model, which is the task of the [17] design phase during the database design. 18. During the standardization of the relational mode, if the decomposition retention function is required, then the mode decomposition must reach 3NF, but it is not necessarily [18]. 19. In the database management system, in order to ensure the correct implementation of the transaction, maintain the integrity of the database, require the database system to maintain the following transaction characteristics: [19], consistency, isolation, and persistence. 20. In the database concurrent control, two or more transactions are in the same way, called [20].