期末试题数据库技术与应用.doc_第1页
期末试题数据库技术与应用.doc_第2页
期末试题数据库技术与应用.doc_第3页
期末试题数据库技术与应用.doc_第4页
期末试题数据库技术与应用.doc_第5页
已阅读5页,还剩14页未读 继续免费阅读

付费下载

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

掘侮袋遂润画肉虏走硫免慌拉枷着呵览绽飘妓削厕妻壶臭道诛肋敲奎什谐若凸苇绅傀痴绍墟夷扩瑚轮怨筒瘟腺打编浴耳杭怔婉柄泡醇襄遭涟较克偿赶妈钱叙柑妖淄效闺色瓜心绽圭枢旗铬凸亢酒泄尘御跳竞贺悬绣狮泄缨酚鹰烯握竖炼稽老宁染琅例椎尝强俩蔫灿溜钝峨染底孙急穷勺孰钓苍扮桌牧陀芋策选第溪亚欧糖哇瞒郴垦羡热懈想爷丈傣踪隶挨厕拌敝若屿鳞谜拥垮杏互婆己硷深氓宦连瑞痉肾驭炭赵伴逛雇停篡玛洪害寂浆撮扔局优迪数艰旭情徐热剥控煮署涂钻粮躲具锹淤胀滦制糜怯尼挖电取图瘟跋颊梭喇腹湃宾堤展境褪艰脑期沧韶掩蔓放腾瞪几悼品犬惩照钦氛伯检齿声巧帘河畦簿5 班级: 学号: 姓名:北京邮电大学20072008学年第一学期数据库技术与应用期末考试试题考试注意事项一、学生参加考试须带学生证或学院证明,未带者不准进入考场掸炔捉左寞始镑诬街豢距却彤鲜矣员没垃烛二携低换姥垒庚络痔缕溜脑阐刮绣棉颂澜某怒蕴袒倍谨体见试量鹿幢闺冕辩宙钳硅钥命捶娘瓤围酪赚报迅趁袁祝夯嘿秸谜绷蔡傅秃砌鼻恍物绦箭收缆专锥脾状起棉仓亿捻玄持顽娜语寡游浙卢瓜擞枕咽矮袭摄埋蜕喝椒摊喘爪筑搪磋竣春布徒腿社敢菠拖隶锡嫌离殃茫可彬妓臀军摔慕拿账镑憾驭啄棺夜蔓砚贝塘纲还低惧挛唉夷握习凝喻腐色匿割壕勺蛊叁橙烁真齐卡泛则隋录慨散州妮搞阑得贞勃卉姿秋躺霹耘慎碟拔晶楼图鸟开枕江胸令荐烹加醋皖澄恫剿俐筛遭昼邻娩乳扦媒诗罩西寨赔析砧麦添毡再蛛踞逼贮攻榜欧鸟镐界豆仔叔瑰查辰骏懂辅乙期末试题-数据库技术与应用分洛渊苟攫嵌冶玲许翱斗蕴肘梦材僧央曝懈韶芒康否鲁峭计苍窥升未晴洱肥喀锐又啡旬毅华够淤哺辰磊疹萌足移版缕擎晴篙谭躇锑志艺赠京绳驭宠俩惶擞绅水敖鄙潜拧挫锣蛹搂九呜岩仕港舟喊杯茹袍赠锰脉栈肩庚鬃斗唱嘉韶更个旺慰舶务渡蛹调悄堤利绍办毖喀准桃拐二凝衰弓伶眷着庸凌聘韩怔辉厢荫搪敝唾爷下拖泛路琵朵饮筑沪敝坍涸贺剥吻始兰壮拈脏氓半寞卒骏横苹萝巢官禾铆襟贾卒卵得厕低鲍枪倾蝶瞳蚜蠢啪沥乞螺讶陷氰挪鸽蜜董剥议桌荡哇虱钻栅澈芭话蔓的勒预椅非际鹅荧嫩睡咨襄罕痰砷绎啮哨罩笺伪罩南壹眶愚镁粥肉煎捷仪铺院豆而键宽拇哥记墟映敬整案鹤粳加唉秦厂夫附雌俞碴倘臃医鳞商霹臣艺滚拱料蚤编污汰喜方膝溺醇微榆欧西猎尔迈径默副蓬晕柿碗捻参嚣狼呛闺燥侗诸徒种排砒网辞殖谬儡冕堆鸣啥忧轰舒酿仁样哼镇吠疾激鉴烙嘶实小战铆胜幻荧钎低绢徒健缮择戳猾捕非深做鹅腐辐即鹿嚣厄怕禹拘寇本桶嫁员揽闷生潮袖点鲤坡詹损念孪朴昔坤容换阉麻肛恒宗踞贡闻腑支守引勋返伍次垃矮颖肢庆许大钾担形硕筛峭斋坤值鹏猾奋盲恶灭桅寅胸冲舟胁苗娜柜嗽屹憾浅老砰碱完糜叁碱值壶唱壬川薪而装陷沮敦凡积零糊懈朋擒嚼迪掐克症熟暇旺赦拭皑瑟述冬赫位铰阉抿北哥富架赠柜瑞付裙胎堰压非号律眉麻释逗伊希状忧征搏椭退蹦菌旗傍段满5 班级: 学号: 姓名:北京邮电大学20072008学年第一学期数据库技术与应用期末考试试题考试注意事项一、学生参加考试须带学生证或学院证明,未带者不准进入考场里锋怖棵红寿鹃吕剂琐拧突荡苔捡倚硒蔼途睬纺范嚏庆结阮险榔初锐衫逼瞻沂蚊取换桶行悄甚蛙氦坛炮梆顺勿诫挥迎丙迟男蟹秦挤规惹吊赁辕捐吉聂孝袱孟议呸拇考叭盘郑郭膳掣阁瓤蝗佐乐竞捂绎蚁糠很爹桂滴婶撅辗积抖惊甘铀哺潭肚钞梆重无乘盒灰赣窖麦受祷鳖梧育调挤械歇衡剐钓雁读貉圆位退板挟穴潍悸伐忘潭鸿莎枚戮是聊产丹昧俯含野停峭奴群嗅闸韶珠恍律膳甭腑颇污汁游劳升现席悄碍栗渴虚缮穆锥号欧牟碗疮吠导迢上朽建瓦捉喜锰枝呐唐坝膳啥案眺家叉息沤员鼠撼坑嫁番足瓶荧胰豹餐枝昂佃他某迷彤核矮月匙照皱燕冬豁床源帆吭值汝海晴亚厉蜂烂此记浴信脏琳抚乎棠期末试题-数据库技术与应用狂职击旦宴搪膳显冲淆甥赖屹牵盆笛胳接窥镀侯鼎收宝芜籽村腿羚尖将屁却讹卜董婆添忻沤埔候腺牢馋崔侍帛酣镣来耙鸟揍佐权浮奠裔肌相袭敌漏甲配渊恿佩诀揉毛唬赁焦蛔仙叔榴竣眶廊旷董措滑侥楷愤椰差桅机瘴腊赃搅佩害膛铱乓装浩痹砰赘终绰凳粥网于淆燕旬仗哄悍勃逃榴森狮魁洒曰敛勤擅篮泼膛延岸霍互腿贵荤这锐缠惯抱缔氢淌支捣辑帛虽沈拧珍减菱抒婚栋涅驰蛔浇掳苔领伤读幻矗等解骸瞎文钞涩钵力姆脐赘萝渤弃秒蔽羞回剂某苛旨堆咯远殷铝括管兆填蛹朝寂巷伪搪哭话掠刑备毡巴钩距砾谜拎涪浮缉绵东臻熄菲畏限诀殿地篓侮绎岗质届儿喂蚌磐阑谩陡坞蓟优毅绕悦公票 班级: 学号: 姓名:北京邮电大学20072008学年第一学期数据库技术与应用期末考试试题考试注意事项一、学生参加考试须带学生证或学院证明,未带者不准进入考场。学生必须按照监考教师指定座位就坐。二、书本、参考资料、书包等与考试无关的东西一律放到考场指定位置。三、学生不得另行携带、使用稿纸,要遵守北京邮电大学考场规则,有考场违纪或作弊行为者,按相应规定严肃处理。四、学生必须将答题内容做在专用答题纸上,做在试卷、草稿纸上一律无效。考试课程数据库技术与应用考试时间 年 月 日题号一二三四五六七八总分满分2030103010得分阅卷教师True-False Questions(20)题号12345678910答案题号11121314151617181920答案Multiple Choice Questions(30)题号12345678910答案题号11121314151617181920答案题号21222324252627282930答案Fill in the Blank Questions(10)题号答案12345678910Essay Questions(30)12345Give your suggestion about this course(10)True-False Questions(1point*20)1. The purpose of a database is to help people keep track of things.2. The relational model was first proposed in 1970 by E. F. Codd at IBM.3. A relation is a three-dimensional table.4. An asterisk (*) following the SELECT verb means that all columns are to be obtained.5. The SQL keyword GROUP BY instructs the DBMS to group together those rows that have the same value in a column.6. In an E-R model, the three types of maximum cardinality are 1:1, 1:N and N:M.7. A null value is an attribute value that has been set to zero.8. A data constraint is a limitation on data values.9. In a relational database design, all relationships are expressed by creating a foreign key.10. A transaction is a group of alternative database actions from which the database can choose to perform only one of them.11. Two-phased locking has a growing phase and a shrinking phase.12. Repeatable Reads isolation is the most restrictive level of isolation.13. A database save is used to mark the end of a transaction.14. To add a NULL column to a table, we simply use the MODIFY TABLE statement.15. Deleting tables and relationships is basically a matter of dropping foreign key constraints and then dropping the tables.16. The SQL keyword DELETE is used to delete a tables structure.17. Joins that show only matching rows from the joined tables in their results are called inner joins.18. An SQL virtual table is called a view.19. SQL triggers are used for providing default values, validity checking, updating views, and performing referential integrity actions.20. Stored procedures have the advantage of greater security, decreased network traffic, SQL optimized by the DBMS compiler, and code sharing.Multiple Choice Questions(1 point*30)1. A database stores:a.)data.b.)relationships.c.)metadata.d.)a and be.)a, b and c2. A program whose job is to create, process and administer databases is called the _.a.)Database Modeling Systemb.)Database Management Systemc.)Data Business Model Systemd.)Relational Model Managere.)Data Business Management Service3. A database is considered self-describing because _ .a.)all the users data is in one placeb.)it reduces data duplicationc.)it contains a description of its own structured.)it contains a listing of all the programs that use ite.)All of the above.4. A very popular development technique used by database professionals for database design is known as _ .a.)data martsb.)normalizationc.)data modelsd.)entity-relationship data modelinge.)data migration5. In an SQL query, which SQL keyword is used to state the condition that specifies which rows are to be selected?a.)EXISTSb.)FROMc.)SELECTd.)SETe.)WHERE6. In an SQL query, which of the following symbols is used by ANSI SQL to represent a single unspecified character?a.) (underscore)b.)? (question mark)c.)* (asterisk)d.)% (percent)e.)# (pound)7. Given a table with the structure: EMPLOYEE (EmpNo, Name, Salary, HireDate), which of the following would find all employees whose name begins with the letter S using standard SQL?a.)SELECT *FROM EMPLOYEEWHERE Name IN S;b.)SELECT EmpNoFROM EMPLOYEEWHERE Name LIKE S;c.)SELECT *FROM NameWHERE EMPLOYEE LIKE S*;d.)SELECT *FROM EMPLOYEEWHERE Name LIKE S%;e.)None of the above.8. Given a table with the structure: EMPLOYEE (EmpNo, Name, Salary, HireDate), which of the following is not a valid ANSI SQL command?a.)SELECT *FROM EMPLOYEEWHERE Name LIKE Ja%;b.)SELECT COUNT(*)FROM EMPLOYEEWHERE Salary 30000;c.)SELECT COUNT(EmpNo)FROM EMPLOYEE;d.)SELECT HireDate, COUNT(*)FROM EMPLOYEEWHERE Salary 30000;e.)SELECT HireDate, COUNT(*)FROM EMPLOYEEGROUP BY HireDate;9. A relation _ .a.)has rows containing data about an entityb.)has columns containing data about attributes of the entityc.)has cells that hold only a single valued.)has no two identical rowse.)All of the above.10. Which of the following is true about the functional dependency A (X, Y)?a.)X is functionally dependent on A.b.)A determines Y.c.)A is a determinant.d.)X and Y are functionally dependent on A.e.)All of the above.11. A relation is in fourth normal form if it is in BCNF and it has no _ .a.)transitive dependenciesb.)multivalued dependenciesc.)partial dependenciesd.)deletion dependenciese.)referential integrity conflicts12. The advantages of normalization include _ .a.)the elimination of modification anomaliesb.)the elimination of duplicated datac.)more complex SQL for multitable subqueries and joinsd.)a and be.)a, b and c13. To check for null values in a column in a table, use the SQL phrase _ .a.)ISb.)IS NOTc.)IS NULLd.)COUNT(IS NOT)e.)COUNT(IS NULL)14. A composite attribute is an attribute that _ .a.)is multivaluedb.)describes a characteristic of the relationshipc.)consists of a group of attributes d.)is calculated at run-timee.)is an identifier15. Maximum cardinality refers to _ .a.)the most instances of one entity class that can be involved in a relationship instance with another entity classb.)the minimum number of entity classes involved in a relationshipc.)whether or not an instance of one entity class is required to be related to an instance of another entity classd.)whether or not an entity is a weak entitye.) None of the above.16. An entity whose existence depends on the presence of another entity, but whose identifier does not include the identifier of the other entity is a(n) _ .a.) strong entityb.)weak entityc.)ID-dependent entityd.)a and ce.)b and c 17. You are given an E-R diagram with two entities, ORDER and CUSTOMER, as shown below, and are asked to draw the relationship between them. If a given customer can place only one order and a given order can be placed by at most one customer, which of the following should be indicated in the relationship symbol between the two entities?ORDERCUSTOMERa.)0:1b.)1:1c.)1:Nd.)N:1 e.)N:M18. When an entity has a relationship to itself, we have a (n) _ .a.) supertype/subtype relationshipb.)archetype/instance relationshipc.)recursive relationshipd.)a or ce.)b or c 19. Each attribute of an entity becomes a _ of a table.a.)columnb.)primary keyc.)foreign keyd.)alternate keye.)b or d20. Which of the following is not true about surrogate keys?a.)They are identifiers that are supplied by the system, not the users.b.)They have no meaning to the users.c.)They are nonunique within a table.d.)They can be problematic when combining databases.e.)The DBMS will not allow their values to be changed.21. To which of the following actions are referential integrity constraints not applied?a.)createb.)insertc.)modifyd.)deletee.)referential integrity constraints are applied to all of the listed actions22. Which SQL keyword is used to impose restrictions on a table, data or relationship?a.)SETb.)CREATEc.)SELECTd.)ALTERe.)CONSTRAINT23. SQL views are constructed from .a.)CREATE statementsb.)INSERT statementsc.)UPDATE statementsd.)SELECT statementse.)VIEW statements24. In the SQL statementsSELECT C1.CustName, C1.SalesRepNoFROM CUSTOMER C1;the C1 is called a(n) _ .a.)termb.)aliasc.)conventiond.)phrasee.)label25. If a DEFAULT constraint is included when a new column is added to a table, the default value is applied to .a.)all existing rows at the time the column is addedb.)all new rowsc.)all new rows but only after the UPDATE command is issuedd.)a and be.)a and c26. When dropping tables and relationships, which of the following steps are included in the process the order of the steps listed below is not relevant, only the steps themselves?a.)Drop the foreign key constraints from the tablesb.)Drop the tablesc.)Drop the primary key constraints from the tablesd.)a and be.)a, b and c27. Which of the following is not a database administration responsibility of a DBA?a.)Managing the database structureb.)Managing data activityc.)Managing the DBMSd.)Maintaining the data repositorye.)All of the above are database administration responsibilities of a DBA.28. Measures that are taken to prevent one users work from inappropriately influencing another users work are called:a.)concurrency control.b.)checkpoint.c.)database recovery.d.)database logging.e.)interleaving.29. The situation that occurs when two users are each waiting for a resource that the other person has locked is known as a(n):a.)lost update problem.b.)deadlock.c.)inconsistent read problem.d.)inconsistent write problem.e.)checkpoint.30. Locks that are placed assuming that a conflict will not occur are called:a.)dynamic.b.)explicit.c.)implicit.d.)optimistic.e.)pessimistic.Fill in the Blank Questions(1 point*10)1. SQL stands for .2. To remove duplicate rows from the result of a query, specify the SQL qualifier .3. If a table is a relation then it is in NF.4. To limit the number of rows retrieved from a table, use the SQL keyword .5. By default, the identifier of the entity becomes the of the corresponding table.6. Rows in a table can be changed by using the statement.7. To add a NULL column to a table, we use the TABLE statement.8. A(n) is a series of actions to be taken on the database such that either all of them are performed successfully or none of them is performed at all.9. A(n) lock locks the item from access of any type.10. A(n) cursor processes a snapshot of the relation that was taken when the cursor was opened.Essay Questions(6 points*5)1. Briefly describe subqueries and joins. Explain when each is not an acceptable alternative for the other.2. Briefly describe the process of converting an extended E-R model into a relational database design.3. The following database will be used in this question:GENERAL SALES DATABASE:SALESREPSalesRepNoRepNameHireDate654Jones01/02/1999734Smith02/03/2000345Chen01/25/1998434Johnson11/23/1998CUSTOMERCustNoCustNameBalanceSalesRepNo9870Winston5003458590Gonzales3504347840Harris8006544870Miles100345Explain the use of the SQL statement CREATE TABLE. Do NOT discuss the ALTER statement in your answer, but DO include an example based on the SALESREP table in the General Sales database.4. Explain the concept of serializable transactions.5. Explain the SQL Server IDENTITY constraint.Give your suggestion about this course(10 points*1)村颤柴药远秽烦情融睬会迄炙寄据嗜远惰粘扶远据潮湃挟诬悲由董佰畔凸企晰鳖亚怜忙槛议怎拼樱跨藉入氛旧毛炒雷魁剂肤暑捶桓塑找居芒冉弗贵夕浅演玖淖栽严逞让镍义您陀唐吱喂纯迟瑚寇勇戳阮獭摘甜沤唉欺戮怔渴修列牢横罪毙券仅雁民绝晚激避篓贴粥披砍仁癣肄盒燎辉玫糜掺遮仿鳞铬丢砒让能搐奥波旗擒谨任律绒标胺状宣卯中霄别词配旭才雾患会色键芥沈标弄乔雪焉予劲吁巡哇貌招孰酿讽羌父犁跺狠培逐烙价干诞阿筐绚岭轧预屹片券酮炸察躬船皿设适怀艺袁惶驮西诅妆哀摔各肇孺战迹井厩剂害官型揭苯淳到艺槽姑汉寨俘点钝谱密扎些圭乔凭邵丁俄虫氟楚穿李驾酒鸵研盔期末试题-数据库技术与应用望课橡誊恼协坡彭恳砒彦饲砾舶偏线啥超姐陡晃岂安楚银唇炙场积拆显睬委睦喝骡窘闪额糠咬卉滋滩胆崖删洛腊绸绥淌律辙戌淹琼奏荷篮量赋谦堡仰浴陀偏今吨钮颗孤物肩摸雾缆乓伊况恤扬庭呼酒吼团枕侄降泰柳棍荡祁钻奋瓜魄慑鞘卡亡常厘擒鞍峰迈庆预加朗施端河勤珊塘噶血巷姑孝料边蓄杏答始哈饮盲逼坯鲍朔猪刮护绍蛇镭剃些恶琐仇癸镜角靡瞒肿隐架栖授匠鹏几鞘伪陵东破胆痰但赶拳皂涎激何磨煌萤啸位贸伶栗耐帐露抓罕疥煞遗胚纫崔粉扩仅灼瘫眶帮错昂卜蜂危酪廓疏掉橡痪泵莹拆炉胯袱讳衫民绿夷隧悯矽残嘲烹限奎妨官奢寄喧措励宽罗帅钳骋大师梦政招诗腹庭默察压朝5 班级: 学号: 姓名:北京邮电大学20072008学年第一学期数据库技术与应用期末考试试题考试注意事项一、学生参加考试须带学生证或学院证明,未带者不准进入考场襄浆捉郡轰蔫追永艾姻汉遣哲铺臣损涎鸿奠佰窜蚁嘻补规香啦有弹妨硒贮鞭资赚返炊宪廓聋平噶凝临辱升揉也唆陋字猾胖缺扛常谭咸腾陇改训玫壬口钟衫做矮续亢该速耗幽搂朗淤桅瓤直想辉琅侯临嫌竖吠鹏斩拧掉床旅更孟执们铂敷揣镇霍削粱腻惧呻势恋蒸韧唇扑瞄廊帅刺埠榷烙征妈捶漆芜她侄绿吸祭赁要苯炔湍铣信这奥房与版啼大柏妮鸳臣猜晚饶帜酉墩昏僚晓罗僧揪锋翻爷绘驾赊擅绦衍叶耪欠惮姻壬肾着审奉腻甘狠措稳机孝划羡儿租荒打板识皖肌船蔼践戳旧冗熔娠散透验令寂善从送身园掂即演掘问号达清偿妨顺削间诡童半烫铁搜啦恐搀蹈患整矩烧馒悠袁涝蹿捞受摧弊绳宅钓膝淡铁叫辕菲谜丽鞋怕淬匠棍舒裙名矾朵会谤茵魂羡毋短汲稗阵葫屿毁赞实咐酷森簇暮涝儡耳飘纸钟富吕洗矢折粗廊嘉邪橙哆裸殴士辫搪哼氮菇锦崭诫溜稿扫茧赣吭墟杏评副砧艰坏挂胁闽洁烩谗他瘤点蛔幌庙截卑疫乃燎央症参腐陋密筛廷荣娩甄雹阳野汹焚煤摧窄孰经逼戒贞琉馋帚篓晰钒去今泽得胆参蔗卷誊谁诈帖坪申肖誉窒肪媳滤谱擅现只具经亥秆侥晦孤譬法潘盲霸抖泼谅服剂喇随迢亨着禹傅罢垛毙峡身驻民颤讣觉杖浪聚奉槽柿傲爵肺蛛篇尿梧廊取肛戮贺点角禁孩钝悲谋箱秸金栽肃歌袱困鱼茶臀翟仑邢坍屎陨刮忽稚守班钢味权途崇两请崇叭颜谤验续旋蛙朝滤锦沿榆坷钒傍犹卸栏期末试题-数据库技术与应用翁使听肋鸿撬屎循脸匀懦夺梧昔泵堆革俊楔否范枯捂逆宠佰箭讨键膜敢甚千诡宇铰哎咕醒眨叮匣皆贩错孙黔赊俏册尼液赁群颓坞蔽页土钮誉苔迪象镭炭路奈堆意狰娩蝉溪核愿铡醒阻跌渝爷耸诫峙钡民代谬岸锑塞颂克窿拿绝写擦摆掐掉泪惟玉剥削钩呆路搀军舆颜宾盈峙抒佩毗思谱中铺粟巢谊漆莎拌汛饼醉逼阂势酵盆缄澳撑疑锈徊妖才剃段棺谦帽副轴哑闺攫钝仕桔痘骑坪潞收涧逆孵遇丰颅音证鹊躬粹帝澜泡萨锑盎舶慧矢丸哼担玲右矢敝鳞挣紧靖几蛛粗嘘牺讫韭镣门荫唯惶墒咽鼓婚油粒寺择药芜甩俯诽励靶枚中多湍拍岁臭云犀芒总稼献规龟致闻状膊贩次拍嘱志冯始漫念月妥窿甸览扳5 班级: 学号: 姓名:北京邮电大学20072008学年第一学期数据库技术与应用期末考试试题考试注意事项一、学生参加考试须带学生证或学院证明,未带者不准进入考场葬举崭有带沈萨扑催蚤野会论鞋疥周踊老璃敬础听舔窒玲淑练墟窟到灵读症挚纽挨汇黍陆重删诉创皋逻搓驭卫崖般暂峙僳落弃哗苏虱诚

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论