April 2000 National Computer Level 3 (b) written test paper (on) (120 minutes, full range of 100 points) First, choose questions (1 point for each small question, a total of 60 points) The following questions a), B ), C), d), only one option is correct, please write the correct option on the corresponding position of the answer card, and answer not score on the test paper. (1) The storage amount is approximately equal to, a) 1000kb b) 100 kb c) 1000000kb (2) to reduce the storage space accounted for multimedia data, the storage buffer technology B) compression / decompression technology C) Multi-channel technology D) Tailing wire technology (3) Microsoft launched a software and operating system Windows 98 bundled sales, causing a lawsuit with market monopoly, this is a) Microsoft Word B) Microsoft Excel C) Microsoft Excel C) Microsoft Excel C) PowerPoint D) Internet Explore (4) Outlook Express software is a) word processing B) Image processing C) exchange email D) Statistics Report Application (5) Which software is the following software? A) Slideshow Making b) Database Management C) Teaching D) What multimedia files in the game (6) are. Wav? A) Audio B) Musical instrument digital c) Digital Video (7) at the Internet URL www.microsoft. COM is a) Access Type B) Access Text File C) Access Commercial Website D) Access Graphics Files (8) In Computer Hardware System, Cache is a) Read-only Memory B) Programmable Read-only memory C ) Erasable Reprogrammable Read-only Memory D) The cache memory (9) is below the narrative of the chain storage structure which is incorrect? A) Nonpoint includes a pointer domain in addition to its own information, so storage density Small than the sequential storage structure B) Logical adjacent node physically does not have to be adjacent C) can be calculated directly to directly determine the memory address D of the i-th s node, easy to remove, and no need to move the node (10). One is not a stack of basic operations? A) Deleting Stack Top Elements B) Deleting Stack Land Elements C) Determined Stack Is Empty D) The Stack is set to empty stack (11) About the description of the general meter, correct A) The generalized form is a limited sequence b) of 0 or more single elements or subcons. B) The generalized table has at least one element is a sub-table C) The generalized table can not be a self-table D) a generalized form cannot be empty (12) If the sequence of a binary nodes is A, B, C, the rear sequences are C, B, A, the symmetric sequence sequence A) of the binary nodes must be A, B, and C. B) A, C, B C) must be B, C, AD), cannot be determined (13) as follows is a summary of the minimum tree of each border as follows) 14 b) 19 c 21 d) 26 (14) In the sequence table (3, 6, 8, 10, 12, 10, 10, 11, 11, 25, 30), use two-point method to find the key code value 11, the required key code The number of comparisons is a) 2 b) 3 c) 4 D) 5 (15) The storage space size of the tester is 19, the hash function used is h (key) = key mod 19, and the collision is solved with an open address linear exploration method. .
The current state of the hash table is as follows: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 190 193 208 Some key code value 75 is now inserted into the hash table, and its address should Is a) 1 b) 11 c) 5 d) 15 (16) - (18) questions based on the following Pascal code: for i: = 2 to n DO begin x: = a [i]; j: = i- 1; While (j> 0) AND (a [j]> x) Do Begin a [j 1]: = a [j]; j: = j-1 end; a [j 1]: = x end (16) Sorting method described in this section is referred to as a) Insert Sort B) Bubble Sort C) Select Sort D) The average execution time of the sorting method described in this section of this section is a) O (log2n) b) O (n) c) o (n log2n) d) o (n2) (18) Assuming that this code starts to execute, the elements in the array A have been placed in the order of the value, then The execution time of this code is a) O (LOG2N) B) O (N) C) O (N LOG2N) D) O (N2) (19) The following interrupts, which one is not a forced interrupt? A) device Error B) Power-off C) Time Slices D) Execute the PRINT statement (20) - (21) The title is based on the following description: Introducing concurrency in the operating system, increasing system efficiency. If there are two programs A and B, the work made by the A procedural execution requires CPU: 10 seconds, DEV1: 5 seconds; CPU: 5 seconds; DEV2: 10 seconds; CPU: 10 seconds. The work made when the B program is executed, in order, DEV1: 10 seconds; CPU: 10 seconds; DEV2: 5 seconds; CPU: 5 seconds; DEV2: 10 seconds. (20) If the two programs of A, B are executed in sequential environments, the utilization rate of CPU is a) 30% B) 40% C) 50% D) 60% (21) If the A, B is executed in the concurrent environment Procedure, assuming that the A program is executed first, then the Utilization of the CPU is a) 99% b) 89% c) 79% D) 69% (22) The main task of job management includes job input, job processing, and job output. Among them, the operation of the operation is I. Job Scheduling II. Job Control III. Work Reserve A) Only I B) Only II C) I and II D) are (23) In the virtual page storage management scheme, which part below Complete the work of transferring the page? A) Workset process c) Workset Model App for Page Page Interrupt D) Tightening Technology Utilization (24) System To manage files, set a special data structure ---- file Control block (FCB). The FCB is created when performing which system call? A) create b) open c) READ D) WRITE (25) About the narrative of the channel, the correct is I. Channel is equivalent to a functionally simple processor II Channel completion of data input and output work III. Channel and CPU sharing a memory a) I and II B) I and III C) II and III D) are (26) interoperability refers to applications in different environments Interoperability, exchange information. It is possible to understand each other between various computers that use different data formats, this function is implemented by which layer is achieved? A) Application layer B) Representation layer C) Conference layer D) Transport layer (27) in DOS In the system, the data structure for recording and managing disk data area usage is a) Bit Chart B) Empty Block Table C) File Allocation Table D) File Control Block (28) In UNIX's shell program, location variables can be used .
To specify the number of the nearest background process, you can use the location variable a) $$ b) $! C) $ # d) $ - (29) Software life cycle generally includes: software development period and software running period, Which is not the content of software development period? A) Demand Analysis B) Structure Design C) Programming D) Performance Optimization (30) Software Engineering is generally considered to include: software development technology and software engineering management two parts Which of the following (some) is the content of software engineering management? I. People organize II. Schedule III. Quality assurance IV. Cost accounts A) I and II B) II and III C) III and IV D) are ( 31) Structured Life Cycle Law is a traditional software engineering method, the premise of this method and the dynamic definition of Dynamic definition B) demand early freeze C) Solid stage divided D) perfect development tool (32) Software development feasibility study, generally involving economic, technically, and operational feasibility, and the basic basis for feasibility study is the software A) system quality B) system performance (33) data for users. The flow chart is a process describing the data flow and transform in the software, and the definition of the elements contained in the data flow map is a) Data Storage B) Data Processing C) Data Dictionary D) Data Definition (34) In Software Development Among the Jackson method, the A) Mode Language B) Mode Logic C) Data Structure D) Pro Process Description (35) Software Review is an important technical means to ensure software quality, the main purpose and effect of review is A ) Earlier discovery program error b) Preparing for testing C) earlier discovery software defect D) Strictly implement engineering specifications (36) system testing combines software systems with hardware, peripherals, and other system elements, for the entire software system Testing, which is the content of the system test? A) Functional test B) Path Test c) Installation Test D) Safety Test (37) Factors affecting software maintenance generally include: staff factors, technical factors, and management factors, Self-technical factors, which generally does not affect maintenance work? A) Software size B) Software Software Software Structure D) Development Tools (38) Software Test and Running Nature is two types of interrelated and nature Different activities, which does not have a characteristic of a misfail activity? A) Modifying program b) Using reasoning and summary method C) Understanding program details D) The development of test instances (39) Data management technology is related to computer technology and The development of its application is related to the development of low to advanced development. Distributed Database, object-oriented database, etc., is the development stage? A) Artificial Management Phase B) File System Stage C) Database System Phase D) Advanced Database Technology Phase (40) In several languages listed below Which is the standard language of the relational database? A) CB) Fortran C) SQL D) PASCAL (41) Sets two relationships C and SCs as follows, their primary keys are C # and (S #, C #), divide attributes GRADE's data type is an integer, and the data type of other properties is characterized.
To perform the following insertion operation to the relationship SC? C sc ┌─┬───────────────────────────────── │C # │ CNAME │ Teacher │ │ S # │C # │GRADE │ ├─┼──────────────────────────────────────────────────────────────────────────────────── ─ ─ ─ ─ │ zhang │ 88 │ │ │ │ │ │ │ C2│Network │ LING │ │ │ │C3│ os │ │ │ │ 997345 │C2│78 │ └─┴────────────────────────────────── ─ │ 95 │ └─- ─ ┴─┴───┘ a) ('993001', 'C2', NULL) B) ('993089', 'C1', 83) C) ('994010', 'C4', 90) D) ( The '997345', 'C2', 65) (42) is provided with relations R, S and T as follows. What is the operation of relationship R and S? R ┌ - ┬─┬─┐ ST │A │B │C │ ┌─┬─┬─┐ ┌─┬─┬─┐ ├─┼─┼ ─ ┤ │ │B │ │ │ │B │C │ │ │ │ │3 │ ├─┼─┼─┤ ├─┼─┼─┤ │4 │1 │6 │ │ │1 │6 │ │ │ │ │ │ │ │ │4 │ │ │ │ │1 │ │ │ │2 │4 │ └─┴─┴─┘ └─┴─┴─┘ └─┴─┴─┘ A) R∪sb) R - SC) R × SD) R∞s (43) Features R (S, D, M), which is dependent on set f = {s → D, D → M}. Then the relationship R is mostly satisfied a) 1NF b) 2nf c) 3NF D) BCNF (44) In the database logic design, when the ER map is converted to a relational mode, which is not correct? A) an entity Type Conversion to a relational mode b) A contact type converted to a relational mode C) The primary key of the relationship mode converted by the entity type is the primary key D) of the entity type. The attribute of the relationship mode of the contact type converted is related to this connection. Type-related crimp type properties (45) S-Designer is a visual database design tool, which is Power-Designer, which has a strong database modeling function.