全國(guó)計(jì)算機(jī)等級(jí)考試四級(jí)筆試試題五(下)

字號(hào):

45)在重疊寄存器窗口技術(shù)中,如果窗口數(shù)目偏少就會(huì)限制過(guò)程嵌套的深度. 在伯克利的設(shè)計(jì)中,所用窗口數(shù)為_(kāi)____。(2分)
     A) 4 B) 8 C) 12 D) 16
     (46)在存儲(chǔ)保護(hù)模式中,可分為:
     Ⅰ.執(zhí)行級(jí)(Executive),用E表示;
     Ⅱ.管理級(jí)(Supervisor),用S表示;
     Ⅲ.核心級(jí)(Kernel),用K表示;
     Ⅳ.用戶(hù)級(jí)(User),用U表示
     其優(yōu)先級(jí)從高到低的次序?yàn)開(kāi)____。
     A)SKEU B)SEUK C)KSEU D)KESU
     (47)在Cache塊替換算法中,下述哪種說(shuō)法是錯(cuò)誤的?_____。
     A)直接映射產(chǎn)生塊失效時(shí),無(wú)需進(jìn)行選擇即可直接替換
     B)全相聯(lián)映射產(chǎn)生塊失效時(shí),可使用隨機(jī)算法
     C)組相聯(lián)映射產(chǎn)生塊失效時(shí),也可使用隨機(jī)算法
     D)全相聯(lián)和組相聯(lián)解決失效時(shí)都不能采用隨機(jī)算法
     (48)視頻電子學(xué)標(biāo)準(zhǔn)協(xié)會(huì)制定的局部總線(xiàn)稱(chēng)為_(kāi)____。
     A)VESA B)VISA C)PCI D)EISA
     (49)在相聯(lián)處理機(jī)的特點(diǎn)中,下述哪種說(shuō)法是不下確的? _____。(2分)
     A)相聯(lián)處理機(jī)的核心是采用了相聯(lián)存儲(chǔ)器
     B)相聯(lián)存儲(chǔ)器的特點(diǎn)是每個(gè)存儲(chǔ)單元都必須有一個(gè)處理單元
     C)相聯(lián)存儲(chǔ)設(shè)有若干個(gè)寄存器如比較數(shù)寄存器、屏蔽寄存器等
     D)因此,相聯(lián)處理機(jī)不再需要中央處理部件
     (50)我國(guó)研制的銀河Ⅲ型超級(jí)計(jì)算機(jī)通過(guò)基準(zhǔn)程序的測(cè)試,其峰值速度是_____。
     A)80億次 B)100億次 C)130億次 D)150億次
     (51)在PSK調(diào)制方式中,如果一種modem的調(diào)制速率為9600baud,采用的是8相調(diào)制,那么這種modem的數(shù)據(jù)傳輸速率可達(dá)到_____。
     A)14.4Kbps B)28.8Kbps C)64Kbps D)9600bps
     (52)誤碼率是描述數(shù)據(jù)通信系統(tǒng)質(zhì)量的重要參數(shù)之一. 對(duì)誤碼率人們提出了以下四種看法,請(qǐng)指出哪一種看法是正確的?_____。
     A)誤碼率是衡量數(shù)據(jù)通信系統(tǒng)正常工作狀態(tài)下傳輸可靠性的參數(shù)
     B)當(dāng)用戶(hù)一次傳輸1Kbyte的文件時(shí),沒(méi)有發(fā)現(xiàn)傳輸錯(cuò)誤,那么該數(shù)據(jù)傳輸系統(tǒng)的誤碼率為0
     C)當(dāng)一個(gè)數(shù)據(jù)傳輸系統(tǒng)采用CRC校驗(yàn)技術(shù)后,這個(gè)數(shù)據(jù)傳輸系統(tǒng)的誤碼率可以減少為0
     D)采用光纖作為傳輸介質(zhì)的數(shù)據(jù)傳輸系統(tǒng)的誤碼率為0
     (53)數(shù)據(jù)通信中曼徹斯特編碼的波形如下圖所示:
     請(qǐng)指出它所表示的二進(jìn)制比特序列的值_____。
     A)1011001101 B)1101110110 C)1001100010 D)1101001110
     (54)XMODEM與Kermit協(xié)議共同之處是定義了多種類(lèi)型的信息包來(lái)控制通信,過(guò)程,如采用ASCII碼字符SOH表示數(shù)據(jù)包的開(kāi)始、EOT表示文件傳輸結(jié)束等.根據(jù)數(shù)據(jù)鏈路層協(xié)議的分類(lèi)方法,它們應(yīng)屬于_____。
     A)面向字符型通信協(xié)議 B)面向比特型通信協(xié)議
     C)隨機(jī)爭(zhēng)用型通信協(xié)議 D)網(wǎng)絡(luò)層協(xié)議
     (55)在HDLC協(xié)議執(zhí)行過(guò)程中,數(shù)據(jù)鏈路被置為正常響應(yīng)模式NRM. 如果主站發(fā)送的數(shù)據(jù)幀中,N(S)=2、P=0、
     N(R)=3;從站正確接收了該幀,并有一個(gè)數(shù)據(jù)幀需要發(fā)送. 那么,從站能否立即向主站發(fā)送這個(gè)數(shù)據(jù)幀?
     如果可以立即發(fā)送的話(huà), 那么這個(gè)數(shù)據(jù)幀的控制域參數(shù)N(S)、N(R)、P/F應(yīng)該是什么值?_____。(2分)
     A)從站不能立即向主站發(fā)送數(shù)據(jù)幀
     B)從站可以立即向主站發(fā)送數(shù)據(jù)幀,幀控制域參數(shù)N(S)=3,F=1,N(R)=3
     C)從站可以立即向主站發(fā)送數(shù)據(jù)幀,幀控制域參數(shù)N(S)=3,F=1,N(R)=2
     D)從站可以立即向主站發(fā)送數(shù)據(jù)幀,幀控制域參數(shù)N(S)=2,F=0,N(R)=3
     (56)典型的局域網(wǎng)操作系統(tǒng)的系統(tǒng)容錯(cuò)(SFT)分為三級(jí),一級(jí)系統(tǒng)容錯(cuò)采用_____。
     A)磁盤(pán)鏡像 B)磁盤(pán)雙工 C)服務(wù)器鏡像 D)網(wǎng)卡冗余
     (57)對(duì)于IEEE 802.3、802.4與802.5 三種類(lèi)型局域網(wǎng)互連的組合中,從802.3到802.3的網(wǎng)橋設(shè)計(jì)最簡(jiǎn)單,只有一種情況會(huì)產(chǎn)生問(wèn)題,那就是 _____。(2分)
     A)當(dāng)轉(zhuǎn)發(fā)的幀超過(guò)幀長(zhǎng)度時(shí),只能丟棄該幀
     B)*域網(wǎng)負(fù)載很重,待傳送的幀在網(wǎng)橋中堆積,超過(guò)了緩沖區(qū)空間時(shí), 只能 將幀丟棄
     C)如何設(shè)置幀優(yōu)先級(jí)
     D)如何設(shè)置數(shù)據(jù)傳輸速率
     (58)網(wǎng)絡(luò)文件訪(fǎng)問(wèn)是網(wǎng)絡(luò)系統(tǒng)的基本功能,TCP/IP、XNS與SNA 均有網(wǎng)絡(luò)文件訪(fǎng)問(wèn)協(xié)議.網(wǎng)絡(luò)文件訪(fǎng)問(wèn)包括兩種不同的形式:文件傳輸與文件訪(fǎng)問(wèn). 文件訪(fǎng)問(wèn)又叫做在線(xiàn)訪(fǎng)問(wèn)(on-lineaccess),它_____。(2分)
     A)要求用戶(hù)直接將遠(yuǎn)地文件全部拷貝到本地文件系統(tǒng)
     B)允許多個(gè)遠(yuǎn)地程序同時(shí)訪(fǎng)問(wèn)單個(gè)文件,在原文件上進(jìn)行操作,而沒(méi)有文件拷貝過(guò)程
     C)要求本地用戶(hù)連入局域網(wǎng)中
     D)要求用戶(hù)通過(guò)電子郵件方式交換信息
     (59)ATM是一種面向連接的快速分組交換技術(shù),它采用虛擬通道模式, 通道標(biāo)識(shí)基于兩種標(biāo)識(shí)符_____。
     A)(N)PDU、(N)IDU
     B)VPI、VCI
     C)CONNECT.reguest、CONNECT.indication
     D)(N)SAP、(N+1)SAP
     (60)在ISO“開(kāi)放系統(tǒng)互連管理框架”中,將網(wǎng)絡(luò)系統(tǒng)管理劃分為五個(gè)功能域。這五個(gè)功能域是:配置管理、故障管理、安全管理、性能管理與_____。
     A)設(shè)備管理 B)用戶(hù)注冊(cè)管理
     C)計(jì)費(fèi)管理 D)域名管理
     (61)What is the decimal value of the following 32-bit two’s complement number?_____.
     1111 1111 1111 1111 1111 1111 1100
     A) -8 B) -4 C) 4 D) 8
     (62)How many subsets does A have? _____.
     Let A={E,O,A,W,P,V,B}
     A) 12 B) 36 C) 64 D) 128
     (63)Suppose V1=,V2=,where R is the set of real numbres,+, and.are respectively addition and multiplication. Let f: R→R and f(x) = ex, which of the following propositions
     is true? _____.
     A) f is a surjective homomorphism from V1 to V2
     B) f is an injective homomorphism from V1 to V2
     C) f is an isomorphism from V1 to V2
     D) None of the above
     (64) P(n) is the predicate’if 4 divides n then 2 divides n’.What is the truth value of P(12)? _____.
     A) 10 B) F C) T D) None of the above
     (65) An algorithm to solve a given problem has time complexity
     T(n)=nlog2n-(n-1)
     Given that the algorithm takes 0.8 second for a problem in which n=1024,how long should it take for a problem in which n=4096?_____. (2 Points)
     A) 39 seconds B) 3.9 seconds C) 3.9 minutes D) 0.8 seconds
     (66) What is the definition of a Path? _____.
     A) A sequence of vertices and the edges formed by each successive pair of vertices.
     B) A walk with distinct vertices.
     C) A walk with distinct edges.
     D) None of the above
     (67) The figure below shows a record used for recording information about a named event. Which of the following statement is incorrect?_____. (2 Points)
     VAR r: record
     event:array[1..10] of char;
     place:array[1..20] o
     f record
     plname:array[1..15] of char;
     date: array[1..5] of record
     mo:1..12;
     day:1..31;
     year:integer
     end
     end
     end;
     A)This is a one-dimensional array of records,also called a table.
     B)This is so called record of arrays;
     C)The event can occur in up to 20 places and on up to 5 different dates in each place.
     D)A reference to r.place[i].date[j].mo will access the month of the jth occurrence, in the ith place,of the event named in r.event.
     (68)Which of the following statements is true regarding simple sort techniques? _____.(2 Points)
     A)Exchange sort is frequently referred to as a bubble sort.
     B)Exchange sort is the least expensive
     C)If random data are in an array that is to be sorted,an Insertion Sort will give the
     best performance for large elements with small sort items.
     D)Both Insertion Sort and Selection Sort require O(n)moves.
     (69) Which UNIX command creates a symbolic link named myfile in the current directory to the file/etc/hosts?_____.
     A) In -s /etc/hosts myfile B) In -s myfile /etc/hosts
     C) link -s /etc/hosts myfile D) link -s myfile /etc/hosts
     (70)Which MS-DOS command is correct? _____.
     A) DEL /s *.bat B) DEL *.exe/sp
     C) DEL *.obj >nul: D) DEL *.com *.sys
     (71)A virtual memory system has five virtual pages numbered zero through four and three page frames. All the page frames are initially empty. How many page faults are generated with the following access sequence using a FIFO replacement policy? _____.
     (2 Points)
     0 1 2 3 0 1 5 0 1 2 3 4
     A) 8 B) 9 C) 10 D) 11
     (72)Which element is NOT part of a microkernel? _____.(2 Points)
     A) basic I/O B) a file system
     C) IPC mechanisms D) memory management
     (73)Which is local to a thread instead of a process? _____.(2 Points)
     A) a stack B) an open file C) a semaphores D) an address space
     (74)What is a subselect statement?
     A)a select statement that selects a subset of fields in a table
     B)a select statement that returns a subset of the data in a table
     C)a select statement that appears within another select statement
     D)a select statement that returns a subset of the constraints on a field
     (75)In developing a hospital database,it is determined that on the average,each patient will have 6 treatments during a hospital stay. The averge length of a stay is three days.The hospital has 1000 beds.There are on the average 800 patientsoccupying bedseachday.The relationship between PATIENT and TREATMENT is l:M.The relationship between PATIENT and BED is 1: 1,conditional. If treatment record occurrences are archived as soon as a patient is discharded from the hospital, how many occurrences of the TREATMENT records will be stored in the TREATMENT database file on the average? _____.(2 Points)
     A) 6,000 B) 4,800 C) 18,000 D)1,600
     (76)Which of the following conditions will make a relation that is in first normal form to be in second normal form? _____.
     Ⅰ.every non-key attribute is functionally dependent on the full set of primary key
     attributes.
     Ⅱ.no non-key attributes exist in the relation.
     Ⅲ.the primary key consists of only one attribute.
     A) Ⅰ only B) Ⅰand Ⅱ only C) Ⅰand Ⅲ only D) any of them
     (77)The most commonly used locking level in implementing concurrency control is at which of the following levels? _____.
     A) database B) table C) record D)field
     (78)Which function is NOT served by building a prototype? _____.
     A) It takes the place of the final system.
     B) It assists in gathering software requirements
     C) It assists in estimating the cost of the project.
     D) It is used as the foundation of the larger projects.
     (79)Software document is an important part of software and a basis of software development phase.It also influnces software’s _____.(2 Points)
     A) Reusability B) Maintanence
     C) Expansibility D) Portability
     (80) Which phase of the software development requires the most development time? _____.
     A) the design phase B) the testing phase
     C) the maintenance phase D) the development phase
     (81) Which of the following statements is correct?_____. (2 Points)
     A)The definition phase results in the Software Requirements Specification.
     B)Testing is optional in software life cycle.
     C)CASE tools can only aid in the design phase of a software life cycle.
     D)A change during a later phase does not require the documentation of all earlierphases to be updated.
     (82)Black-box and white-box testing method are often used in software testing phase,in which,the white-box is mainly used to test software's_____.
     A)reasonableness of structure B)correctness of a program
     C)external function of a program D)internal logic of a program
     (83) How does Booth's Algorithm improve binary multiplication?_____.
     A) It prevents overflow. B) It prevents underflow.
     C) It preserves the sign of the multiplication operation.
     D) It enhances the speed of the operation significantly.
     (84) A cache has 64 blocks; each block is 16 bytes.Which block does byte 1200 map to ?_____.
     A) 25 B) 60 C) 75 D)100
     (85) Which is NOT a characteristic of an RISC processor?_____.
     A) a high clock speed
     B) a highly optimized pipeline
     C) a few general-purpose registers
     D) a limited amount of small instructions
     (86)You are performing two sums: the first is a sum of two scalar variables and the second is a matrix sum of a pair of two-dimensional arrays-size 1000 by 1000. What speedup is achieved when the calculations are performed on size 1000 processors? _____.(2 Points)
     A) 50 B) 100 C) 999 D) none of the above
     (87)According to Shannon's equation,what is the channel capacity of an analog voice-grade phone line with a bandwidth of 3100 Hz and a signal-to-noise ratio or 30dB?_____.(2 Points)
     A) 9.1 Kbps B) 9.3 Kbps C) 30.9 Kbps D) 30.17 Kbps
     (88)The X.25 standard specifies three layers of functionality. Which layers of the OSI
     model correspond to the X.25 layers?_____.
     A) th e Physical,Network,and Session Layers
     B) the Physical,Data Link,and Network Layers
     C) the Physical,Data Link,and Transport Layers
     D) the Physical,Session,and Presentation layers
     (89)Which routing algorithm is described below?It is a mechanism in which the setding station determines the route the frame will follow and includes the routing information with the frame; bridges read the routing information to determine if they should forward the frame._____.
     A) Fixed Routing B) Spanning Tree
     C) Source Routing D) Frame Forwarding
     (90) Which OSI layer does a bridge operate at?_____.
     A) the Physical Layer B) the Network Layer
     C) the Transport Layer D) the Data Link Layer
     二、論述題(兩個(gè)論述題可任選其一,并只選其一,多選無(wú)效,滿(mǎn)分30分)
     論述題 1
     在計(jì)算機(jī)指令集的設(shè)計(jì)與實(shí)現(xiàn)過(guò)程中,出現(xiàn)了兩種對(duì)立的技術(shù)路線(xiàn)或風(fēng)格,即CISC 與RISC.
     (1) 指出 CISC 的主要弊病.(8分)
     (2) 概述 RISC 技術(shù)的基本要點(diǎn).(12分)
     (3) Intel X86 系列屬于哪一種風(fēng)格,當(dāng)前它采用的是怎樣的技術(shù)路線(xiàn).(10分)
     論述題 2
     人們?cè)诠芾韺?shí)踐中發(fā)現(xiàn),數(shù)據(jù)庫(kù)技術(shù)是信息資源的整理、保存、 管理和使用的的手段。數(shù)據(jù)庫(kù)按其數(shù)據(jù)結(jié)構(gòu)模型分類(lèi),通??煞譃閷哟涡蛿?shù)據(jù)庫(kù)、網(wǎng)絡(luò)型數(shù)據(jù)庫(kù)、關(guān)系型數(shù)據(jù)庫(kù)和面向?qū)ο笮蛿?shù)據(jù)庫(kù),各種類(lèi)型的數(shù)據(jù)模型都有自身的特點(diǎn)。試從關(guān)系數(shù)據(jù)模型的優(yōu)點(diǎn)和弱點(diǎn)論述:
     (1)為什么人們?cè)陂_(kāi)發(fā)以事務(wù)處理為主的信息系統(tǒng)(例如管理信息系統(tǒng))時(shí), 大多選用關(guān)系型數(shù)據(jù)庫(kù)作為開(kāi)發(fā)環(huán)境?(18分)
     (2)在許多含有復(fù)雜數(shù)據(jù)結(jié)構(gòu)或豐富語(yǔ)義的實(shí)際應(yīng)用領(lǐng)域中, 為什么要選用面向?qū)ο髷?shù)據(jù)庫(kù)或要對(duì)關(guān)系型數(shù)據(jù)庫(kù)作某些擴(kuò)充和修改?(12分)