1999-2004年四级英语部分试题与答案.doc_第1页
1999-2004年四级英语部分试题与答案.doc_第2页
1999-2004年四级英语部分试题与答案.doc_第3页
1999-2004年四级英语部分试题与答案.doc_第4页
1999-2004年四级英语部分试题与答案.doc_第5页
已阅读5页,还剩21页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1999-2004年四级英语部分试题与答案2004年试题(56) The ALU performs arithmetic operations andA) reduced instruction calculationsB) logical operationsC) parity checksD) binary calculations(57) CPU performance is measured by the following standards exceptA) clock rate B) word size C) Cache D) RAM(58) Which of the following operations uses the queue?A) Traversing a binary tree in preorderB) Traversing a binary tree in inorderC) Searching the graph in breadth-first orderD) The topological sorting for a derected graph(59) Which of the following sorting methods is not an internal sort?A) Topological sort B) Insertion sortC) Quick sort D) Merging sort(60) The four basic management functions of OS are process management, storage management, I/O system management, andA) file management B) segmentation managementC) file-protecting D) swapping management(61) Which kind of operating systems has well-defined, fixed time constraints?A) real-time B) time-sharingC) batch system D) network system(62) Which task below is not concerned in software design? A) Structure design B) Interface designC) Detailed design D) Programming(63) Which of the following is not a software life cycle model?A) Incremental model B) Prototype modelC) Process model D) Linear model(64) For relation SC(S#,C#,GRADE), which of the following is not a right operation?A) SELECT S# FROM SC WHERE C#=C002AND C#=C012;B) SELECT C# GRADE FROM SC WHERE S#=S005OR S#=S008;C) SELECT S# FROM SC WHERE GRADE IS NULL:D) UPDETE SC SET GRADE=GRADE+5;(65) Consider relation r,s1(S),s2(S),let RS,s1s2, q=rs1,q=rs2,Which of the following is true?A) qq B) qq C) qq D) qq(66) Which of the following is not a typical characteristic of Reduced Instruction Set ComputerA) One instruction multi-cycle B) Register-to Register operationC) Simple address mode D) LOAD/STORE structure(67) Computer Architecture is the attributes of a computing system as seen by a programmer, i.e.,the conceptual structure and functional behavior. For example,A) Microprogram B) Address modeC) Memory speed D) Hardware logic design(68) Ethernet uses Manchester encoding, which is aA) physical-layer operation B) link-layer operationC) network- layer operation D) LLC-layer operation(69) The device that takes an input and simply broadcasts it on all the other interfaces is known asA) a bridge B) a router C) ahub D) a gateway(70) FTP is A) a transport-layer protocol B) an application protocolC) a network-layer protocol D) a session-layer protocol答案:56-60 BDCAA 61-65 ADCAC 66-70 ABACB2003年试题(56)What is the decimal value of the binary value 10010?A)16 B)17 C)18 D)19(57)In a computer, which of the following is the longest period?A)Beat period B)Machine period C)Instruction period D)CPU period(58)Which of the following is not an AVL tree?(59)Traversing a binary tree in preorder is equivalent toA)Traversing the forest corresponding to the binary tree in root-first order.B)Traversing the forest corresponding to the binary tree in root-last order.C)Traversing the forest corresponding to the binary tree in breadth-first order.D)None of the above.(60)Which of the following methods is used to increase the number of processes sharing the CPU? A)Interrupt B)Scheduler C)Swapping D)Working Set(61)Which of the following statements describe(s) the properties of a purely segmented memory system? It divides memory into units of equal sizeIt permits implementation of virtual memoryIt suffers from internal fragmentationA) only B) only C) only D)and (62)As an important phase in software development, software design is the continuation of software requirement analysis phase.software structure software proceduresoftware module software documentwhich of the following should be included in software design phase?A)and B)and C), and D)All(63)White box testing of software testing is a test for software structure. Which of the following item should not be included in the content of white box? A)boundary value analysis B)statement testingC)branch testing D)path testing(64)Consider a relation R ( A,B,C,D ) with the following dependencies:AB ? C, CD ? E, DE ? B.A candidate key of this relation isA)AB B)ABC C)ABD D)ABE(65)Let R and S be the following relations:A)3 B)4 C)5 D)6(66)The Pentium includes hardware for both segmentation and paging. Both mechanisms can be disabled, allowing the user to choose from four distinct views of memory. Now the most frequently used view(such as Unix System V) isA)Unsegmented unpaged memory B)Unsegmented paged memoryC)Segmented unpaged memory D)Segmented paged memory(67)ASCII is a 7-bit code used to represent numeric, alphabetic, and special printable characters. It also includes codes for control characters, which areA)printable or displayable B)not printable or displayableC)not printable but displayable D)printable but not displayable(68)In most wide area networks, the communication subnet consists of two distinct components:transmission lines andA)networts B)switching elements C)computers D)data terminal equipment(69)To accommodate the longest path allowed by 802.3,the slot time has been set to 512 bit times,orA)0.512s B)5.12s C)51.2s D)512s(70)TCP(Transmission Control Protocol) was specifically designed to provide a reliable end-to-end byte stream over a(n) A)IP address B)reliable network C)socket D)unreliable internetwork答案:(56) C (57) C (58) B (59) A (60) C(61) B (62) D (63) A (64) C (65) B(66) D (67) B (68) B (69) C (70) D 2002年试题(56) In a computer,if a logical left shift of the operand occurs,its lowest bit isA) 1 B) unchanged C) 0 D) random(57) The CPU is composed of two components,which arearithmetic logic unit and controller memory and controller arithmetic logic unit and memory controller and storageItems 58 and 59 are based one the following hash table.Hash function is: h(key) = key mod 13Collisions are solved by using open addressing, linear probing.(58) Load factor of the hash table is approximatelyA) 0.28 B) 0.35 C) 0.54 D) 0.71(59) How many key comparisons are needed in searching for key value 38?A) 1 B) 2 C) 3 D) 4(60) Which of the following operations belongs to message passing?A) read and write B) save and receiveC) wait and signal D) P and V(61) If file A has the capability of 724,the same groups users of file A may doA) read A only B) write A C) execute A D) non-operation(62) In which phase of the software engineering process is the Software Requirements Specification developed?A) definition phase B) engineering C) maintenance D) development phase(63) The prototyping method is a dynamic design process,which requires people who use prototyping method to have the following capability ofA) proficient program expertise B) immediately acquire requirementC) coordinate & organize eloquently D) handle tools smartly(64) For relation R where primary key contains multiple attributes,no non-key attribute should be functionally dependent on a part of the primary key. This relation R is at least inA) 1NF B) 2NF C) 3NF D) BCNF(65) Which of the following statements about object oriented databse is not correct?A) Each object has a unique object identity in the system.B) Encapsulation and inheritance are two important features of object oriented database.C) A subclass can inherit the attributes and methods of all its superclasses.D) A subclass includes the attributes and methods of all its subclasses.(66) Local bus can increase the data throughput. The bus that is most frequently used isA) VESA B) EISA C) MCA D) PCI(67) Most frequently used algorithm for page replacement isA) LRU B) FIFO C) OPT D) PPT (68) The following three concepts are essential to the OSI model:service,interface andA) networks B) applicationsC) protocols D) layers(69) LANs can be connected by using bridges,which operate in theA) physical layer B) data link layer C) network layer D) transport layer(70) TCP service is obtained by having both the sender and the receiver create end points,which are calledA) network address B)supernet addressC) socket D) IP address答案:(56) C (57) A (58) C (59) C (60) B(61) B (62) A (63) B (64) B (65) D(66) D (67) A (68) C (69) B (70) C 本帖最后由 joybjx 于 2005-8-4 19:02 编辑 引用 报告 wenxian9000 (wenxian9000) 二级优秀UID 55638精华 3 积分 250帖子 18声望值 101 等考网金币 1 枚存款 0 金币宠物活动积分 0 NCRE珍珠 0 箱NCRE钻石 0 箱NCRE翡翠 0 箱NCRE玉石 0 箱阅读权限 30注册 2005-7-1状态 离线 #2发表于 2005-8-4 09:54 资料 短消息 2001年试题56.An instruction that uses indrect addressing mustt contain an address of memory where A) data is stored B) a pipeline stall will be executedC) a page fault is addressedD) another address is stored57The principle for a stack memory to store data isA) FIFO B) FILO C) random D) other way58In the forest corresponding to the following binary tree,how many children does node B have?A) 1 B) 2 C) 3 D) 459For the root of B_tree of order m,the minimal number of its children is A) 2 B) m/2 C) m/2 D) m60A disk scheduling mechanism in an operating system causes the disk arm to sweepback and forth across the disk surface servicing all requests in its path. This is a A) First Come First Serve B) Shortest Seek Time FirstC) Scan D) None of the above61The constructcobeginStatement1;Statement2;coendmeans Statement1 and Statement2 are to be executed in parallel. The only two atomic actions in this construct are loading the value of a variable and storing into a variable. For the program segmentx:=0;y:=O;cobeginbeginx:=l;y:=y+x;end;beginy:=2;x:=x+3;endcoendWhich of the following indicate(s) possible values for the variables when the segment finishes execution?x=1,y=2x=1,y=3x=4,y=6A) B) and C) and D) and 62Software maintenance is to do necessary modification,supplenemt, and completeness during software life circle. Among the following vary kinds of maintenance,which one has the maximum workload in a general way?A) relevance maintenance B) completeness maintenanceC) correctness naintenance D) other kinds of maintenance63Different quality factors of software can be reflected upon users different points of view,through product running,product modification and product transformation. Of the following properties,which one is connected with product running?correctness robustness re-useA) only B) only C) + D) all of above64Let R and S be the relation respectively:Relation R: A B C Relation S: B C D 1 2 3 2 3 4 6 7 8 2 3 5 9 7 8 7 8 1The number of tuples that the result of the expression R S (Here is the natural join of relations R and S) isA) 3 B) 4 C) 6 D) 965Suppose we have the relation schema R(A,B,C,D) with functional dependencies;FAB,BC,CD,DA,then R(A,B,C,D)at least is inA) 1NF B) 2NF C) 3NF D) BCNF66By means of multiple pipeline to carry out multiple processing,this technologyiscalledA) Multiple pipeling B) SuperpipelineC) Superscalar D) Very long instruction word67There are many page replacement algorithms in the page management. Most frequently used algorithm isA) FIFO B) PPT C) OPT D) LRU68Layer n on one machine carries on a conversation with layer n on another machine. The rules and conventions used in this conversation are collectively known as the layer nA) topology B) protocol C) service D) peer69Transport gateways connect byte streams in the transport layer. Application gateways allow interworking aboveA) network layer B) data link layerC) transport layer D) application layer70Every host and router on the Internet has an IP address, which encodes itsA) host number B) host number and socketC) network number D) host number and network number答案:(56) D (57) B (58) A (59) A (60) C(61) D (62) B (63) C (64) B (65) D(66) C (67) D (68) B (69) C (70) D2000年试题(56) Give the logical variables X=Y=1, The value of X V Y(logical addition) isA) 1 B) 2 C) 10 D) 0(57) The Programming Counter (PC) is normally used to point outA) Programmed execution instructionB) The address of last execution instructionC) The address of current execution instructionD) The address of next execution instructionItems (58) and (59) are based on the following Pascal code.FOR i:=1 TO n 1 doBEGIN k:=i: FOR j:=i+1 TO n DO IF AjAk THEN k:=j: IF ki THEN BEGIN X:=Ak; Ak:=Ai; Ai:=x ENDEND;(58) The sorting method described by the code is calledA) Insertion sort B) Selection sort C) Radix sort D) Merge sort(59) Suppose elements in array A are already sorted ascending order of their values when the code begins to run, then execution time of the code will beA) O(log2n) B) O(n) C) O(nlog2n) D) O(n2)(60) Assume that N=2M and FIFO is used. If the string p1,p2,pN is repeated three times, then the number of page faults isA) N/2 B) N C) 2N D) 3N(61) Chang, Tian and An are three users of the system. Chang and An are in the same group. Tian is a Super User. Which of the following rights is inconsistent with the given policies?A) Tian has W(write) access to Ans Mail filesB) Tian has E(execute) access to Ans Mail filesC) Chian has R(read) access to Ans text filesD) Tian has E(execute) access to Changs Binary files(62) Software Engineering Economy is an effective part of software engineering, which of the following content is the research comtent of software engineering economy?.Estimation of software development cost.Earn & Cost analysis of software development.Adjustment of software development progressA) only B) and C) and D) all(63) Prototype method is one of the software engineering methods frequently used, which of the following item is the necessary condition for implementing prototype method?.Can acquire the user requirement quickly.Have the tools for building software fast.Have a certain accumulation of prototype systemsA) only B) and C) and D) all(64) ORACLE RDBMS is a distributed DBMS. Which of the following techniques adapted ensure atomicity of distributed transaction?A) remote procedure call (RPC) B) Two _phases commit (2PC)C) Snapshots D) triggers(65) In order to get names of schoolboys(SEX=M)whose age=22, from a relation S(SNO,SNAME,SEX,AGE),which of the following expressions is (are) correct?.sname(sex=Mage=22(S).sex=Mage=22(sname(S)A) only B) only C) and D) neither(66) In order to improve the performance of a network server, you need to select bus or local bus. The appropriate local bus isA) VESA B) PCI C) EISA D) ISA(67) In terms of M.J.Flynns taxonomy, the systolic array falls intoA) SISD B) MIMD C) SIMD D) MISD(68) In the WAN, when a point-to-point subnet is used, an important design issue is the roucer interconnectionA) topology B) computer C) service D) lines(69) In the Ethernet LAN, an algorithm was chosen to d

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论