Including question and answer questions and the choice of two parts, 第1-30 problem should not be counted in C # category. It should be considered as a network programmer after the written 31 questions,. Try, how many questions can you answer, could you pass Yahoo's exam?
Question 1. (radio)
In computer network, the index of data transmission reliability is
1. Transmission rate
2. ber
3. Information capacity
4. Frequency band Utilization
Question 2. (radio)
Which of the following statements about a chained storage structure is incorrect?
1. Nodes include pointer fields in addition to their own information, so storage density is less than sequential storage structure
2. Logically adjacent nodes are not physically contiguous
3. Can be calculated directly to determine the first node of the storage address
4. Inserts, deletes the operation to operate conveniently, does not have to move the knot point
Question 3. (radio)
Which of the following is not a basic operation of the stack
1. Delete Stack top element
2. Delete Stack bottom elements
3. Determine whether the stack is empty
4. Put the stack as an empty stack
Question 4. (radio)
The following statement about the generalized table, the correct one is
1. A generalized table is a finite sequence consisting of 0 or more single elements or a child table.
2. A generalized table has at least one element that is a child table
3. The generalized table can not be its own child table
4. The generalized table cannot be empty table
Question 5. (radio)
If the ordinal sequence of a binary tree node is a, B, C, and the sequence is C, B and A, then the symmetric sequence of the two-fork tree node
1. Must be a, B, C
2. Must be a, C, B
3. Must be B, C, A
4. Not sure
Question 6. (radio)
In the virtual-page storage management scenario, which part of the following completes the process of paging the page into memory?
1. Page Break processing
2. Page elimination process
3. Working Set model application
4. Tightening technology use
Question 7. (radio)
In DOS systems, data structures used to record and manage the use of disk data areas
1. Bit chart
2. Free Block table
3. File Allocation table
4. File control block
Question 8. (radio)
A relationship R (S,d,m) is provided with a function dependency set f={s→d,d→m}. The relationship R is at most satisfied
1.1NF
2.2NF
3.3NF
4. BCNF
Question 9. (radio)
In database logic design, when the E-R diagram is converted into relational mode, which one of the following is incorrect?
1. An entity type is converted to a relational pattern
2. A contact type is converted to a relational pattern
3. The primary key of the relational schema converted by the entity type is the primary key of the entity type
4. The properties of the relational schema converted by the contact type are all of the attributes of the entity types associated with the contact type.
Question 10. (radio)
The computer network is classified according to the geographical range covered, and can be divided into wide area network, LAN and
The difference between computer network system and distributed system is mainly
1. System Physical Structure
2. System High-level software
3. Transmission Media Type
4. Server type
Question 20. (radio)
The main goal of Frame Relay system design is to interconnect multiple
1. Wide Area Network
2. Telephone network
3. Local Area Network
4.0) Atim Net
Question 21. (radio)
The ATM network adopts the data of fixed long mansion, and the length of the signal is
1.1024B
2.53B
3.128B
4.64B
Question 22. (radio)
Hosts in the TCP/IP Reference Model-the network layer corresponds to the
1. Network layer
2. Physical Layer
3. Data Link Layer
4. Physical layer and Data link layer
Question 23. (radio)
The most prominent advantages of computer networks are:
1. High computational Accuracy
2. Large Memory capacity
3. Fast operation speed
4. Networking computers can share resources with each other
Question 24. (radio)
The computer network divides into the local area network, the metropolitan area net and the WAN, its classification basis is:
1. Media used for data transmission
2. Range of functions of the network
3. Control mode of the network
4. Topological structure of the network
Question 25. (radio)
In order to find a linear table with a length of 10 and a row, how many times does it need to be compared when looking for unsuccessful?
1.5
2.2
3.4
4.1
Question 26. (radio)
The higher the degree of cohesion in the module, the more the components of the module are combined with each other.
1. Loose
2. Close
3. Inability to judge
4. The same
Question 27. (radio)
The output of software requirements analysis phase is mainly
1. Demand specification
2. Development plan
3. Feasibility report
4. Design Manual
Question 28. (radio)
The following options are not the responsibility of the project manager?
1. Demand Analysis
2. The plan
3. Planning and Tracking
4. Quality Management
Question 29. (radio)
When is the unit test usually performed?
1. After the completion of the code
2. Before system test
3. After the test case writing is completed
4. After integration test
Question 30. (Multiple selection)
What is the role of configuration management as follows?
1. Version Management
2. Change Management
3. Demand management
4. Test Management
Question 31. (radio)
Based on the knowledge of thread safety, the following code is analyzed to see if i>10 will cause deadlocks when the test method is called?
public void Test (int i)
{
Lock (This)
{
if (i>10)
{
i--;
Test (i);
}
}
}
1. Will lock the dead
2. Will not lock the dead
Question 32. (radio)
The following description of the error is ()
1. Supports abstract classes in C + + and does not support abstract classes in C #.
2. C + + can declare a member of a class in a header file and define a member of a class in a CPP file, there is no header file in C # and a member of the class is declared and defined at the same place.
3. In C #, you can use the new modifier modifier explicitly to hide the members inherited from the base class.
4. A virtual function in C # to redefine a base class in a derived class must be preceded by a override.
Question 33. (radio)
Int[][] myarray3=new int[3][]{new int[3]{5,6,2},new int[5]{6,9,7,8,3},new int[2]{3,2}}; The value of myarray3[2][2] is ().
1.9
2.2
3.6
4. Cross-border
Question 34. (radio)
The general step in using sockets for network communication Programming in C # is to establish the socket listening, (), and to receive and send data using the socket.
1. Establish socket connection
2. Get the port number;
3. Obtain IP address;
4. Obtain the host name;
Question 35. (radio)
If you set Treeview1=new TreeView (), TreeNode node=new TreeNode ("root node"), TREEVIEW1.NODES.ADD (node) Returns a value of type ().
1. TreeNode;
2. int;
3. String;
4. TreeView;
Question 36. (radio)
Declares a delegate public delegate int mycallback (int x); The prototype of the callback method that is generated with the delegate should be
1. void mycallback (int x)
2. int receive (int num)
3. String receive (int x)
4. The uncertain
Question 37. (radio)
A description of the code-behind file in asp.net is correct
1. The logic of a Web Forms page's program is composed of code that is created to interact with the form. The programming logic is unique to a file that is different from the user interface. The file is said to be a "code-behind" file, and if created in C #, the file
2. The code-behind files for all Web Forms pages in the project are compiled into. exe files
3. The code-behind files for all Web Forms pages in the project are compiled into a project dynamic link library (. dll) file
4. None of the above is correct
Question 38. (radio)
What compiler switch creates an XML file to the XML comments in the "a assembly?
1./text
2./doc
3./xml
4./help
Question 39. (radio)
The following code implements what pattern is in design mode
public class A {
Private A instance;
Private A () {
}
public static A Instance {
Get
{
if (A = = null)
A = new A ();
return instance;
}
}
}
You are creating a asp.net application to run a Web site within the Allwin company that contains 50 pages. You want to configure the application so that it can display a custom error page to the user when an HTTP code error occurs. You want to spend the smallest amount of time accomplishing these goals, what should you do? (Multiple selection)
1. Create a Application_Error procedure in the Global.asax file of this application to handle asp.net code errors.
2. Create a applicationerror section in the Web.config file of this application to handle asp.net code errors.
3. Create a customerrors event in the Global.asax file of this application to handle HTTP errors.
4. Create a customerrors section in the Web.config file of this application to handle HTTP errors.
Question 44. (radio)
The results of the following programs are:
Public abstract class A
{
Public A ()
{
Console.WriteLine (' A ');
}
public virtual void Fun ()
{
Console.WriteLine ("A.fun ()");
}
}
public class B:a
{
Public B ()
{
Console.WriteLine (' B ');
}
Public new void Fun ()
{
Console.WriteLine ("B.fun ()");
}
public static void Main ()
{
A A = new B ();
A.fun ();
}
}
1. A B A.fun ()
2. A B B.fun ()
3. B A A.fun ()
4. B A B.fun ()
Question 45. (radio)
Which of these string definitions'll prevent escaping on backslashes in c#?*
1. String s = # "n Test string";
2. String s = "' n Test string";
3. String s = @ "n Test string";
4. String s = "n Test string";
Question 46. (radio)
Which of the following operations can you/not perform on a ado.net DataSet?
1. A DataSet can is synchronised with a RecordSet.
2. A DataSet can is synchronised with the database.
3. A DataSet can is converted to XML.
4. Can infer the schema from a DataSet
Question 47. (radio)
In Object oriented programming, how would do you describe encapsulation?
1. The conversion of one type of object to another.
2. The runtime resolution of method calls.
3. The exposition of data.
4. The separation of interface and implementation.
Question 48. (radio)
How do does assembly versioning in. NET prevent DLL Hell?
1. The runtime checks to the "only one version of" A assembly is on the machine in any one time.
2.. NET allows assemblies to specify the name and the version of any assemblies they to run.
3. The compiler offers compile time checking for backward compatibility.
4. It doesn ' t.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.