五邑大学计算机科学概论习题与答案_第1页
五邑大学计算机科学概论习题与答案_第2页
五邑大学计算机科学概论习题与答案_第3页
五邑大学计算机科学概论习题与答案_第4页
五邑大学计算机科学概论习题与答案_第5页
已阅读5页,还剩17页未读 继续免费阅读

付费下载

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Chapter 3. Operating SystemsMultiple Choice Questions1. Which of the following components of an operating system maintains the directory system?A. Device drivers B. File manager C. Memory manager ANSWER: B2. Which of the following components of an operating system handles the details associated with particular peripheral equipment?下列哪个组件的一个操作系统处理与特定的外围设备相关联的细节吗?A. Device drivers 设备驱动程序 B. File manager C. Memory managerANSWER: A3. Which of the following components of an operating system is not part of the kernel?A. Shell B. File manager C. Scheduler 调度器ANSWER: A4. Multitasking in a computer with only one CPU is accomplished by a technique called .多任务在计算机只有一个 CPU 通过一种技术被称为A. Bootstrapping 自助法B. Batch processing 成批处理 C. Multiprogramming 多道程序设计ANSWER: C5. Execution of an operating system is initiated by a program called the .A. Window manager B. Scheduler C. Bootstrap 引导程序ANSWER: C6. The end of a time slice is indicted by the occurrence of a signal called .时间片结束时发生的一个信号A. An interrupt B. A semaphore 一个信号量 C. A login 一个登录ANSWER: A7. A set of instructions that should be executed by only one process at a time is called .一组指令,应执行一次只有一个进程A. Utility 实用 B. Critical region 临界区 C. Privileged instruction 特权指令ANSWER: B8. Which of the following is not an attempt to provide security?A. Passwords 密码 B. Privilege instructions C. Multitasking 多重任务处理ANSWER: C9. Which of the following events is harmful to an operating systems performance?A. Deadlock B. Interrupt C. Booting 引导 启动ANSWER: A10. Which of the following is a technique for controlling access to a critical region?下列哪个技术控制访问临界区?A. Spooling 假脱机 B. Time sharing C. Semaphore 信号;旗语 D. BootingANSWER: C11. Which of the following is not involved in a process switch?A. Interrupt B. Process table C. Dispatcher 调度程序 D. ShellANSWER: D12. Which of the following is a task that is not performed by the kernel of an operating system?下列哪个是一个任务,并不是由一个操作系统的内核?A. Communicate with the user B. Schedule processes 调度进程C. Allocate resources 分配资源 D. Avoid deadlockANSWER: A13. Which of the following components of an operating system is executed to handle an interrupt signal?A. Dispatcher B. Memory manager C. File managerANSWER: AFill-in-the-blank/Short-answer Questions1. In contrast to early batch processing techniques, _A_ allows the user to communicate with the computer while the users application is being executed. In turn, this type of processing requires that the computers responses to its environment be performed in a timely manner, a requirement known as _B_.与早期的批处理技术相比,便利允许用户与计算机进行通信,用户的应用程序被执行。反过来,这种类型的处理要求计算机的反应环境及时执行,称为_B_要求ANSWER: A. Interactive processing 交互式处理 B. Real-time processing 实时处理2. Fill in the blanks below with the part on the operating system (file manager, memory manager, device drivers, window manager, scheduler, dispatcher) that performs the activity described.A. _ maintains a record of what is displayed on the computers screenB. _ performs the switching from one process to another 执行切换从一个过程到另一个C. _ maintains the directory system 维护系统的目录D. _ creates virtual memory 创建虚拟内存E. _ places new entries in the process table 在这个过程中地方新条目表F. _ performs the actual communication with I/O units 与 I / O 单元执行实际的沟通ANSWER: A. Window manager B. Dispatcher C. File manager D. Memory managerE. Scheduler F. Device drivers 3. A _A_ is a set of instructions. In contrast, a _B_ is the activity of executing those instructions.ANSWER: A. program B. processChapter 4 Networks and the InternetMultiple Choice Questions1. Which of the following is not a way of classifying networks?下列哪个不是一种分类方式网络吗?A. WAN versus LAN B. Closed versus openC. Router versus bridge D. Star versus busANSWER: C2. Ethernet is a means of implementing which of the following network topologies?以太网是一种实现以下网络拓扑?A. Star B. WiFi C. Bus ANSWER: C3. Which of the following connects existing networks to form an internet?下列哪个连接现有的网络形成一个互联网?A. Bridge B. Router C. Switch 开关 D. Repeater 中继器ANSWER: B4. Which of the following is a protocol for controlling the right to transmit a message in a network?下面哪个是正确的传输控制协议消息在网络?A. UDP 用户数据报协议 B. CSMA/CD 带有冲突检测的载波侦听多路存取 C. TCP 传输控制协议 D. FTP 文件传输协议ANSWER: B5. Which of the following is not a means of performing inter-process communication over a network?下列哪个不是通过网络执行进程间通信的一种手段?A. Client/server 客户/服务器 B. ICANN 互联网名称与数字地址分配机构 C. Peer-to-peer 对等网络ANSWER: B6. Which of the following provides individual user access to the Internet?下列提供的个人用户访问互联网?A. Tier-1 ISPs 一级互联网服务提供商 B. Tier-2 ISPs 二级网络服务商 C. Access ISPs 访问互联网服务提供商 D. ICANN 互联网名称与数字地址分配机构 ANSWER: C7. Which of the following is not an application of the Internet?下列哪个不是一个应用程序的网络吗?A. FTP B. Email C. Telnet D. CERT 字符出错率测试器ANSWER: D8. Which of the following is not designed to enhance the security?A. ICANN B. Firewall 防火墙 C. Encryption 加密 D. CERTANSWER: A9. Which of the following is used to translate between IP addresses and mnemonic addresses?下列哪个是用来翻译之间的 IP 地址和助记符地址?A. File server 文件服务器 B. Mail server 电子邮件服务器 C. Name server 名称服务器 D. FTP server 文件传输服务器ANSWER: C10. Which of the following is not a means of connecting networks?下列哪个不是一种连接网络吗A. Switch B. Server C. Router D. BridgeANSWER: B11. Which layer of the internet software actually transmits a message?实际上互联网软件传送消息的哪一层?A. Application 应用程序 B. Transport C. Network D. LinkANSWER: D12. Which layer of the internet software chops messages into units whose size is compatible with the Internet?互联网软件的哪一层消息排到单位的大小是兼容网络吗?A. Application B. Transport 运输机 C. Network D. LinkANSWER: B13. Which layer of the internet software decides the direction in which message segments are transferred across the Internet?互联网软件决定的哪一层的方向信息在互联网上传输段?A. Application B. Transport C. Network 网络 D. LinkANSWER: C14. Which layer of the internet software presents incoming messages to the computer user?A. Application B. Transport C. Network D. LinkANSWER: A15. Which of the following identifies the application to which a message arriving from the Internet should be given?下列哪个标识消息的应用程序从互联网应该给吗?A. Protocol 协议 B. Port number 端口号 C. Domain 域名 D. InterruptANSWER: BFill-in-the-blank/Short-answer Questions1. List two network topologies: A. _ B. _ANSWER: A. star B. bus2. What are two protocols for implementing the transport level in the TCP/IP protocol suite?什么是两个实现的传输层协议 TCP / IP 协议套件?A. _ B. _ANSWER: A. TCP B. UDP3. According to the URL below, the directory containing the file being access is A , the protocol that should be used when accessing the file is B , and the file name is C .根据下面的 URL,该目录包含文件被访问 ,访问文件时应该使用的协议是 B,和文件的名字是 C。/heroes/superheroes/batpage.htmlANSWER: A. superheroes B. http C. batpage.html4. According to the email address “F”, the “person” who should receive the message should be A and the location of the mail server that handles the mail for that person is B .ANSWER: A. Fido B. 5. The main purpose of _A_ and _B_ ISPs is to provide a system of high-speed routers as the Internets communication backbone, whereas _C_ ISPs concentrate on providing Internet access to the Internets users._A_和_B_ isp 的主要目的是提供一个系统的高速路由器作为互联网的通信骨干, 而_C_ isp 专注于提供互联网接入互联网的用户。ANSWER: A. Tier-1 B. tier-2 C. access6. The term A and B in the following HTML document are linked to other documents.术语 A 和 B 在以下 HTML 文档链接到其他文档。This is the titleFavorite AnimalsOf all the animals in the world, thepig is perhaps the most charming.However, thehippopotamus is also cute.ANSWER: A. pig B. hippopotamus7. Identify two protocols used in networks to determine the right to transmit an original message.确定两个协议中使用网络来确定正确的传输原始消息A. _ B. _ANSWER: A. CSMA/CD 带有冲突检测的载波侦听多路存取 B. CSMA/CA 载波感测多元存取8. In each blank below write the HTML tag that performs the indication function.在每个空白编写 HTML 标记, 执行以下指示功能。A. _ Begins the part that describes what will appear on the computer screen 开始的部分描述了将出现在电脑屏幕上B. _ Marks the end of the HTML document 标志着结束的 HTML 文档C. _ Marks the beginning of a paragraph 标志着一个段落的开始D. _ Marks the end of a term that is linked to another document 是一个术语,与另一个文档ANSWER: A. B. C. D. Chapter 5. AlgorithmsMultiple Choice Questions1. Which of the following is an activity?A. Algorithm B. Program C. ProcessANSWER: C2. Which of the following is not a means of repeating a block of instructions?下列哪个不是一种重复一块指令?A. Pretest loop 预测试回路 B. Posttest loop 后判断循环C. Recursion 递归 D. Assignment statement 赋值语句ANSWER: D3. When searching within the list:Lewis, Maurice, Nathan, Oliver, Pat, Quincy, Roger, Stan, Tom,which of the following entries will be found most quickly using the sequential search algorithm?A. Lewis B. Pat C. TomANSWER: A4. When searching within the list:Lewis, Maurice, Nathan, Oliver, Pat, Quincy, Roger, Stan, Tom,which of the following entries will be found most quickly using the binary search algorithm?A. Lewis B. Pat C. TomANSWER: B5. If X is integer, which of the following is the termination condition for the following loop?如果 X 是整数,它的下面是以下循环终止条件 ?while (X 4 C. X 4 C. X 5 ANSWER: A7. If N is integer, which of the following is the termination condition in the following recursive procedure?procedure xxx (N)if (N 4 C. N 6) ANSWER: C9. Which of the following is not a way of representing algorithms?A. Stepwise refinement 逐步求精 B. Pseudocode 伪代码C. Flowchart 流程图 D. Programming language 编程语言ANSWER: A10. Which algorithms would find the name Kelly more quickly in the list: John, Kelly, Lewis, Maurice, Nathan, Oliver, Pat, Quincy, Roger, Stan, Tom?A. sequential search B. binary searchANSWER: AFill-in-the-blank/Short-answer Questions1. An ordered collection of unambiguous, executable steps that defines a terminating process is called A , and the representation of an algorithm is B . The action of executing a program is C 有序集合的明确的、可执行的步骤, 定义了一个终止过程被称为 ,B 和算法的表示。执行一个程序是 C 的作用.ANSWER: A.Algorithm B. Program C. Process2. What sequence of values will be printed when the following instructions are executed?X 5;if (X 7) then (print the value 6;Y 6)else (print the value 4;Y 4)if (Y 5) then (print the value 3)else (print the value 2)_ANSWER: 6, 23. What sequence of values would be printed if the procedure xxx described below were executed with N = 9?procedure xxx (N)if (N 4) then (print the value of N;apply the procedure yyy to the value 7)else (apply the procedure yyy to the value 2;print the value of N)procedure yyy (N)if (N 5) then (print the value of N;apply the procedure zzz to the value 6)else (apply the procedure zzz to the value 5)procedure zzz (N)if (N = 5) then (print the value 7)else (print the value 8)_ANSWER: 2, 8, 94. When using binary search algorithm to search for the letter X within the list: R, S, T, U, V, W, Z. How many entries will be checked before discovering that the letter is not in the list? _ANSWER: 35. When using sequential search algorithm to search for the letter X within the list:

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论