2016 first half database systems engineering teacher morning test (1-24)

Source: Internet
Author: User
Tags arithmetic

"Five years college entrance examination three years of simulation" equivalent to the entrance examination "Martial arts Cheats" in the "Nine Yin Canon." A large amount of the question bank, the real problem of detailed analysis, the teachers and students sought after. Can be seen, the real problem is to deal with the examination of good information, the following Greek soft Test college for you to organize the first half of 2016 years of database Systems Engineering Test real problem of the morning, help you cultivate a "stunt" For the next year 's Database Systems Engineering Exam .


2016 first half database Systems Engineering exam morning test (1-24)

VLIW is the abbreviation of ().

(1) A. Complex instruction System Computer

B Large scale integrated circuit

C Single instruction stream multi-data stream

D Extra Long Instruction Word

Main memory and the cache address mapping mode, () mode can be implemented any block of main memory into the cache anywhere, only fill the need to replace.

(2) A. Fully connected

B Direct mapping

C Group-linked

D Series-Parallel

If the "2X" complement is "90H", then the truth of X is ()

(3) A. 72

B -56

C 56

D 111

The operation result of the () instruction in the shift instruction is equivalent to multiplying the operand by 2.

(4) A. Arithmetic left shift

B Logical Right Shift

C Arithmetic Right Shift

D Left shift with carry loop

Memory is byte-addressable, and the storage capacity of the zone from a1000h to B13ffh is () KB.

(5) A. 32

B 34

C 65

D 67

The following is a description of the bus, which is incorrect ()

(6) A. Parallel bus for high-speed data transmission at close range

B Serial bus for long-distance data transmission

C Single bus architecture adapts to different types of devices on one bus, simple design and high performance

D The dedicated bus is designed to optimally match the connected device

The following is a description of the network hierarchy and the main device correspondence, pairing is correct ()

(7) A. Network Layer--hub

B Data Link layer--Network bridge

C Transport Layer--router

D Session Layer--firewall

The protocol used to transmit SSL-encrypted Web pages is ().

(8) A.http

B.https

C.s-http

D.http-s

In order to attack remote hosts, it is common to use () technology to detect remote host State.

(9) A. Virus Avira

B Port scan

C QQ Chat

D Identity verification

A software company involved in the development of management system software programmer Zhang, resigned to another company to serve, so the project owner of the management system software on the developer's signature changed to Lee (after a job). The behavior of the project owner ().

(Ten) A. Infringement of a developer's identity rights (attribution rights)

B Does not constitute infringement because the programmer Zhang is not a software copyright owner

C Just exercising the rights of the manager does not constitute infringement

D Does not constitute infringement because the programmer Zhang is now not a member of the project team

A company in the United States talks with a Chinese company about technical cooperation, and the contract deals with the use of 1 U.S. patents (which are approved and within its validity period) that are not patented in China and other countries. Products manufactured in accordance with the patent (s) are required to pay US companies a license fee for the U.S. patent.

(one) A. Sales in China, Chinese companies

B If sold to the United States, Chinese companies do not

C Sales in other countries, Chinese companies

D Sales in China, Chinese companies do not

In the following media file format, () is the video file format.

(A.wav)

B.bmp

C.mp3

D.mov

The software that belongs to the image editing processing tool in the following software products is ()

(A.powerpoint)

B.photoshop

C.premiere

D.acrobat

Scan a 3x4 inch color photo with 150DPI scanning resolution to get the data amount of the original 24-bit true color image is () Byte.

(a.1800)

b.90000

c.270000

d.810000

The activity diagram for a software project is shown, where the vertex represents the project milestone, the edge of the connection vertex represents the activity, and the number on the edge indicates the duration of the activity (days), the minimum time to complete the project is () days. Activity BD can start () days up to a later day without affecting the overall progress of the project.

650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-15/ 463f1e05-737d-4d41-8ec9-aa8c45532980.png "alt=" on Database 1.png "/>

(a.15)

B 21st

C 22

D 24

(a.0)

B.2

C.3

D.5

In structured analysis, a flow graph is used to describe (). When a library management system is analyzed using a streaming diagram, () is an external entity.

(+) A. Relationships between data objects that are used to model data

B How data is transferred or transformed in the system, and how to transform the data stream into functions or sub-functions for modeling functions

C How the system responds to external events, how actions are used to model behavior

D The various components of the streaming diagram

(b) A. Readers

B Books

C Borrowing documentary

D Borrowing

During the software development process, the output of the requirements analysis phase does not include ().

(+) A. Streaming chart

B Entity Contact diagram

C Data dictionary

D Software Architecture diagram

The following is a description of how the Advanced programming language implementation is compiled and interpreted, correctly ().

(A). The compiler does not participate in the operation control of the user program, while the interpreter participates in

B Compilers can be written in high-level languages, and interpreters can only be written in assembly language

C Compile-time processing of the source program without optimization bu. The surface interpretation method is optimized

D The compiler does not generate a target program for the source program, and the interpretation method generates

The following is a description of the scripting language, which is correct ().

(+) A. Scripting language is a universal programming language

B scripting language is more suitable for application in system-level program development

C The scripting language is mainly implemented by means of explanation

D function and call function cannot be defined in scripting language

Translating a high-level language source into an intermediate code is a common way of dealing with modern compilers. The commonly used intermediate code has suffix, (), syntax tree and so on.

A. Prefix code

B. Three address code

C. Symbol table

D. Complement and shift codes

When a user enters an application through a keyboard or mouse, the () program is usually the first to get the keyboard or mouse input information.

(at) A. Command explanation

B Interrupt Handling

C User Login

D System calls

In the Windows operating system, when the user double-clicks the "img-20160122-103.jpg" file name, the system automatically determines what program to use to open the image file by establishing the ().

(A). File

B File associations

C File directory

D Temporary files

2016 first half database systems engineering teacher morning test (1-24)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.