First half of 2016 software designer exam questions morning Roll (1-25 questions)

Source: Internet
Author: User

Get martial arts cheats, repair a good kung fu, you can walk in the lake. Get the soft test real problem , get the direction of the proposition, successfully passed the exam. The Following is the first half of a 2016-year software designer exam for you to help you prepare for the test.


first half of 2016 software designer exam questions morning Roll (1-25 questions)

VLIW is the abbreviation for (1).

A Complex instruction System Computer

B Large scale integrated circuit

C Single instruction stream multi-data stream

D Extra Long Instruction Word

Main memory and the cache address mapping mode, (2) can be implemented in the main memory any block into the cache anywhere, only fill to need to replace.

A Fully connected

B Direct mapping

C Group-linked

D Series-Parallel

If the "2X" complement is "90H", then the truth of X is (3).

A 72

B -56

C 56

D 1 1 1

The operation result of the (4) instruction in the shift instruction is equivalent to a multiply 2 operation on the operand.

A Arithmetic left shift

B Logical Right Shift

C Arithmetic Right Shift

D Left shift with carry loop

Memory is byte-addressable and the storage capacity of the region from a1000h to B13ffh is (5) KB.

A 32

B 34

C 65

D 67

The following is a description of the bus, which is incorrect (6).

A Parallel bus for high-speed data transmission at close range

B Serial bus for long-distance data transmission

C Single bus architecture adapts to different types of devices on one bus, simple design and high performance

D The dedicated bus is designed to optimally match the connected device

The following is a description of the corresponding relationship between the network hierarchy and the main equipment, paired correctly (7).

A Network Layer--hub

B Data Link layer--Network bridge

C Transport Layer--router

D Session Layer--firewall

The protocol used to transmit SSL-encrypted Web pages is (8).

A HTTP

B HTTPS

C S-http

D Http-s

In order to attack a remote host, the remote master state is typically detected using (9) technology.

A Virus Avira

B Port scan

C QQ Chat

D Identity verification

A software company involved in the development of management system software programmer Zhang, resigned to another company to serve, so the project owner of the management system software on the developer's signature changed to Lee (after a job). Conduct of the project owner (10).

A Infringement of a developer's identity rights (attribution rights)

B Does not constitute infringement because the programmer Zhang is not a software copyright owner

C Just exercising the rights of the manager does not constitute infringement

D Does not constitute infringement because the programmer Zhang is now not a member of the project team

A company in the United States and a Chinese enterprise on technical cooperation, the contract agreed to the use of L-U.S. patents (approved and within the validity period), the technology is not in China and other countries to apply for patents. Products manufactured in accordance with the patent (11) are required to pay US companies a license fee for the U.S. patent.

A Sales in China, Chinese companies

B If sold to the United States, Chinese companies do not

C Sales in other countries, Chinese companies

D Sales in China, Chinese companies do not

In the following media file format, (12) is the video file format.

A Wav

B Bmp

C MP3

D MOV

In the following software products, the software that belongs to the image editing processing tool is (13).

A Powerpoint

B Photoshop

C Premiere

D Acrobat

Scan a 3x4-inch color photo with 150DPI scanning resolution, and get the original 24-bit true color image with the data amount of Byte.

A 1800

B 90000

C 270000

D 810000

The activity diagram for a software project is shown, where the vertex represents the project milestone, the edge of the connection vertex represents the containing activity, the number on the edge indicates the duration of the activity (days), and the minimum time to complete the project is (15) days. Activity BD can start (16) days later without affecting the overall progress of the project.

650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-16/ 6481f377-d1b1-439e-acc0-54f6ef76495c.png "alt=" soft set on 1.png "/>

A 15

B 21st

C 22

D 24

(b) A. 0

B 2

C 3

D 5

In structured analysis, a dataflow diagram is used to describe (17). When a library management system is analyzed using a streaming diagram, (18) is an external entity.

(+) A. Relationships between data objects that are used to model data

B How data is transferred or transformed in the system, and how to transform the data stream into functions or sub-functions for modeling functions

C How the system responds to external events, how actions are used to model behavior

D The various components of the streaming diagram

(b) A. Readers

B Books

C Borrowing documentary

D Borrowing

During the software development process, the output of the requirements analysis phase does not include (19).

A Streaming chart

B Entity Contact diagram

C Data dictionary

D Software Architecture diagram

The following is a description of how the Advanced programming language implementation is compiled and interpreted, correctly (20).

A The compiler does not participate in the operation control of the user program, while the interpreter participates in

B Compilers can be written in high-level languages, and interpreters can only be written in assembly language

C Compilation is not optimized when processing the source program, while the interpretation is optimized

D The compiler does not generate a target program for the source program, and the interpretation method generates

The following is a description of the scripting language, which is correct (21).

Scripting language is a universal programming language

B scripting language is more suitable for application in system-level program development

C The scripting language is mainly implemented by means of explanation

D function and call function cannot be defined in scripting language

Translating a high-level language source into an intermediate code is a common way of dealing with modern compilers. The commonly used intermediate code has suffix, (22), tree and so on.

Prefix code

Three address codes

Symbol table

Complement and Shift code

When a user enters an application through a keyboard or mouse, the (23) program is usually the first to get the keyboard or mouse input information.

A Command explanation

B Interrupt Handling

C User Login

D System calls

In the Windows operating system, when the user double-clicks the "img_20160122_103.jpg" file name, the system automatically determines what program to use to open the image file by setting up (24).

A File

B File associations

C File directory

D Temporary files

A disk has 100 tracks, and it takes 6ms for the head to move from one track to another. Files are stored on disk, the average distance of logically contiguous data blocks is 10 tracks, each block of rotation delay time and transmission time is 100ms and 20ms respectively, then read a 100 block of files required (MS).

A 12060

B 12600

C 18000

D 186000

First half of 2016 software designer exam questions morning Roll (1-25 questions)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.