"Five years college entrance examination three years of simulation" equivalent to the entrance examination "Martial arts Cheats" in the "Nine Yin Canon." A large amount of the question bank, the real problem of detailed analysis, the teachers and students sought after. Can be seen, the real problem is to deal with the examination of good information, the following Greek soft Test college for you to organize the first half of 2016 years of database Systems Engineering Test real problem of the morning, help you cultivate a "stunt" For the next year 's Database Systems Engineering Exam .
2016 first half database Systems Engineering exam morning test (1-24)
VLIW is the abbreviation of ().
(1) A. Complex instruction System Computer
B Large scale integrated circuit
C Single instruction stream multi-data stream
D Extra Long Instruction Word
Main memory and the cache address mapping mode, () mode can be implemented any block of main memory into the cache anywhere, only fill the need to replace.
(2) A. Fully connected
B Direct mapping
C Group-linked
D Series-Parallel
If the "2X" complement is "90H", then the truth of X is ()
(3) A. 72
B -56
C 56
D 111
The operation result of the () instruction in the shift instruction is equivalent to multiplying the operand by 2.
(4) A. Arithmetic left shift
B Logical Right Shift
C Arithmetic Right Shift
D Left shift with carry loop
Memory is byte-addressable, and the storage capacity of the zone from a1000h to B13ffh is () KB.
(5) A. 32
B 34
C 65
D 67
The following is a description of the bus, which is incorrect ()
(6) A. Parallel bus for high-speed data transmission at close range
B Serial bus for long-distance data transmission
C Single bus architecture adapts to different types of devices on one bus, simple design and high performance
D The dedicated bus is designed to optimally match the connected device
The following is a description of the network hierarchy and the main device correspondence, pairing is correct ()
(7) A. Network Layer--hub
B Data Link layer--Network bridge
C Transport Layer--router
D Session Layer--firewall
The protocol used to transmit SSL-encrypted Web pages is ().
(8) A.http
B.https
C.s-http
D.http-s
In order to attack remote hosts, it is common to use () technology to detect remote host State.
(9) A. Virus Avira
B Port scan
C QQ Chat
D Identity verification
A software company involved in the development of management system software programmer Zhang, resigned to another company to serve, so the project owner of the management system software on the developer's signature changed to Lee (after a job). The behavior of the project owner ().
(Ten) A. Infringement of a developer's identity rights (attribution rights)
B Does not constitute infringement because the programmer Zhang is not a software copyright owner
C Just exercising the rights of the manager does not constitute infringement
D Does not constitute infringement because the programmer Zhang is now not a member of the project team
A company in the United States talks with a Chinese company about technical cooperation, and the contract deals with the use of 1 U.S. patents (which are approved and within its validity period) that are not patented in China and other countries. Products manufactured in accordance with the patent (s) are required to pay US companies a license fee for the U.S. patent.
(one) A. Sales in China, Chinese companies
B If sold to the United States, Chinese companies do not
C Sales in other countries, Chinese companies
D Sales in China, Chinese companies do not
In the following media file format, () is the video file format.
(A.wav)
B.bmp
C.mp3
D.mov
The software that belongs to the image editing processing tool in the following software products is ()
(A.powerpoint)
B.photoshop
C.premiere
D.acrobat
Scan a 3x4 inch color photo with 150DPI scanning resolution to get the data amount of the original 24-bit true color image is () Byte.
(a.1800)
b.90000
c.270000
d.810000
The activity diagram for a software project is shown, where the vertex represents the project milestone, the edge of the connection vertex represents the activity, and the number on the edge indicates the duration of the activity (days), the minimum time to complete the project is () days. Activity BD can start () days up to a later day without affecting the overall progress of the project.
650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-15/ 463f1e05-737d-4d41-8ec9-aa8c45532980.png "alt=" on Database 1.png "/>
(a.15)
B 21st
C 22
D 24
(a.0)
B.2
C.3
D.5
In structured analysis, a flow graph is used to describe (). When a library management system is analyzed using a streaming diagram, () is an external entity.
(+) A. Relationships between data objects that are used to model data
B How data is transferred or transformed in the system, and how to transform the data stream into functions or sub-functions for modeling functions
C How the system responds to external events, how actions are used to model behavior
D The various components of the streaming diagram
(b) A. Readers
B Books
C Borrowing documentary
D Borrowing
During the software development process, the output of the requirements analysis phase does not include ().
(+) A. Streaming chart
B Entity Contact diagram
C Data dictionary
D Software Architecture diagram
The following is a description of how the Advanced programming language implementation is compiled and interpreted, correctly ().
(A). The compiler does not participate in the operation control of the user program, while the interpreter participates in
B Compilers can be written in high-level languages, and interpreters can only be written in assembly language
C Compile-time processing of the source program without optimization bu. The surface interpretation method is optimized
D The compiler does not generate a target program for the source program, and the interpretation method generates
The following is a description of the scripting language, which is correct ().
(+) A. Scripting language is a universal programming language
B scripting language is more suitable for application in system-level program development
C The scripting language is mainly implemented by means of explanation
D function and call function cannot be defined in scripting language
Translating a high-level language source into an intermediate code is a common way of dealing with modern compilers. The commonly used intermediate code has suffix, (), syntax tree and so on.
A. Prefix code
B. Three address code
C. Symbol table
D. Complement and shift codes
When a user enters an application through a keyboard or mouse, the () program is usually the first to get the keyboard or mouse input information.
(at) A. Command explanation
B Interrupt Handling
C User Login
D System calls
In the Windows operating system, when the user double-clicks the "img-20160122-103.jpg" file name, the system automatically determines what program to use to open the image file by establishing the ().
(A). File
B File associations
C File directory
D Temporary files
2016 first half database systems engineering teacher morning test (1-24)