国家计算机三级信息管理技术150题--计算机基础知识部分(精华)_第1页
国家计算机三级信息管理技术150题--计算机基础知识部分(精华)_第2页
国家计算机三级信息管理技术150题--计算机基础知识部分(精华)_第3页
国家计算机三级信息管理技术150题--计算机基础知识部分(精华)_第4页
国家计算机三级信息管理技术150题--计算机基础知识部分(精华)_第5页
已阅读5页,还剩27页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、国家计算机三级信息管理技术150题-计算机基础知识部分(精华)Answer: ALU, controller, memory, input device, output device.2. What two operations can the processor do on the data?Answer: arithmetic and logic operations.What do 3, CAD, CAM, CAT and CAI represent?Answer: 1, computer aided design (CAD)2. Computer aided manufacturing

2、 (CAM)3 、 computer aided testing (CAT)4 、 Computer Aided Instruction (CAI)4, data processing refers to the data (Collection), (storage), processing, analysis (transfer) of the whole process.5, the procedural language is divided into (machine language), (assembly language), (high-level language) thre

3、e categories.6, which languages are high-level and which are low-level languages?Low level language: assembly languageHigh-level language: basic. COBOL. C., FOXBASE, etc.7 * * system can be divided into (batch processing * system), (time-sharing * system), (real-time * system) three * * * system.8.

4、What is the difference between an interpretive program and a compiled program? Which program produces the target program?The compiler generates the target programWhat are 9 and DBMS?A: DBMS is a database management system.10. Computer system consists of two parts: hardware system and software system

5、.11, software system is divided into (system) software, and (application) software two parts.12, * for system characteristics: (concurrency), (sharing), (randomness).13, without any support software computer called (bare metal).14, * for the systems five major functions (process management), (storag

6、e management), (file management), (device management), (Operations Management).15, the operating system development process: (manual * (early stage), stage (batch), execution system (stage), stage (multiprogramming system), time-sharing system), (real time system), (General operating system).The 16

7、and Spooling systems are (batch processing) systems.17, batch processing system has two major characteristics (multi-channel), (Cheng Pi).18, what are the goals of batch processing systems?Answer: improve system resource utilization and throughput of large operations to automate the operation flow.1

8、9, time-sharing system characteristics (multipath), (Interactive), (independence), (timeliness).20, the main goal of time-sharing system?Answer: the timeliness of user response.21. What are the two categories of real-time systems? And give examples of these two categories. What are the systems for a

9、ircraft flight, ballistic launch, scheduled flight tickets, and flight inquiries?A: the real-time system is divided into real-time control system and real-time information processing system.Aircraft flight and ballistic launch are real-time control systemsBooking airline tickets and inquiring flight

10、s are all real-time information processing systems.22. What are the main features of real-time systems?Answer: the most important feature is timeliness, and another is characterized by high reliability.23, the personal computer system is a personal computer system.24, * for the type of system? (batc

11、h processing * system), (time division * system), (real-time * system), (personal computer * operating system), (network * operating system), (distributed * operating system).25. What are the areas of computer applications?Answer: 1, scientific calculation 2, data communication and data processing,

12、3, automatic control 4, computer aided design 5, computer artificial intelligence26, the main technical indicators of the computer?Answer: 1, word length 2, operation speed 3, main memory capacity 4, comprehensive performance27, CPU statusAnswer: CPU alternately executes * for system programs and us

13、er programs. When executing different programs, the permissions of the machine instructions are determined according to the running programSet CPU in a different state,. The status of CPU is one of the program status word PSW. Most computer systems divide CPU execution into pipe and eyeWhat are 28 a

14、nd PCB?Answer: is the process control block.29, what are the two logical documents that users organize?Answer: streaming files, record filesWhat do 30, WAN, LAN and MAN stand for?Answer: WAN stands for WAN, LAN stands for LAN, and MAN stands for metropolitan area network.31, TCP/IP has the following

15、 characteristics?Answer: 1, open protocol standards, independent of specific computer hardware and * as a system.2, independent ring specific network hardware, you can run on LAN, Wan, and more applicable to the internet.3, a unified network address allocation scheme that allows the entire TCP/IP de

16、vice to have a unique IP address in the network.4, standardized high-level protocols. You can provide a variety of reliable user services.32, the main services provided by Internet?Answer: 1, www services2, email service33, Internet basic access mode?Answer: 1, through the ISP access2, through LAN a

17、ccess3, through the telephone line access34, which aspects of information security include?Answer: 1, the confidentiality of information2, the integrity of information3, the availability of information4, the controllability of information35. The program directly executed by the computer is (executab

18、le file), which is expressed in binary coded form in the machine. It is written in the program (source code)Assembly language is (low-level language), commonly used in high-level programming language written applications, called (high-level language source program translated into machine language pr

19、ogram, that is, the target program)36, the interpretation program is explained by side by side, by one by one, do not retain machine code (target program). Compilation is the use of compilers to compile source code into machine code (object program)And form (document) retain.37, in general, interrup

20、t sources are divided into two broad categories (forced interruptions), (voluntary interruptions).38 、 forced interrupts include (input / output interrupts) (hardware failure interrupts) (clock interrupts) (console interrupts) (program interrupts).39, what is voluntary interruption?A: this kind of i

21、nterrupt event is running a program. It should be due to the programmers intention to serve the system while the program is being fabricated. It is interesting to use the access instruction or system call to cause the interruption,It is also called the interruption of access control. The occurrence

22、of such interrupts is inevitable and location determination occurs.40, interrupt level is specified by martingale hardware, because it cannot be changed, but interrupts the order of events by interrupting the reader41, interrupt processing is divided into four stagesAnswer: 1. Save the scene of the

23、program being interrupted. The purpose is to continue the execution of the interrupted places that can be returned after the interruption has been processed.2. Analyze the interrupt source and determine the reason for the interruption.3, turn to execute the corresponding processing program.4, restor

24、e the interrupted program site (has been interrupted to return), continue to be interrupted program.42, what are the two categories of hardware clocks?Answer: 1, absolute clock and relative clock.43, what is the process?Answer: process is a program with independent function, a process of running on

25、a data set, the process is a separate unit of the systems allocation of resources, the process is dynamically generated,Dynamically disappearing, each process has a data structure - process control block - records its execution, and the process has three basic states that change with each other as t

26、he process progresses.44, the shared resources used by concurrent processes are referred to as critical resources.45, the conversion of the logical address space to the physical address space is called (address mapping).46, what are the main storage management solutions?Answer: partition management,

27、 section management, management page, section page management.47, the characteristics of computer virusesAnswer: infectious, destructive, hidden, latent, excitable.48. The encryption and decryption methods are performed under a key control. They are called encryption keys (decryption keys) respectiv

28、ely.49, what are the main features of the software crisis?Answer: 1, software demand growth is not met2, software production is expensive and expensive.3, software production schedule illegal control.4, the definition of software requirements is inaccurate, easy to deviate from user needs.5, softwar

29、e quality is not easy to guarantee.6, software maintainability is poor.In 50 and 1970s, B.W.Boehm proposed the software life cycle (waterfall model).51, waterfall model will strive for eight stages of software lifeAnswer: 1, problem definition 2, feasibility study 3, demand analysis 4, overall desig

30、n 5, detailed design 6, program 7, test and operation 8, maintenance52, the waterfall model including planning period (define), (feasibility study), (demand analysis); development period (including overall design) (detailed design), (programming), which includes (encoding) and program design (test)R

31、un time includes system (use) and maintenance.53, software development techniques include (software development methodology), (software tools), (software engineering environment).54, software engineering management includes (software management), (software engineering economics).55, software develop

32、ment technology includes (software development methodology), (tools) and (environmental support), the main content is (software development methodology).56, software engineering management including (software management), (software engineering economics).57, the structured method divides the softwar

33、e life cycle into three stages: (plan), (Development) and (operation).58, the main task of the planning period is the definition of the problem (feasibility study).59, the main tasks of the development period are (requirements analysis), (overall design), (detailed design), (coding), (testing).60, t

34、he main tasks of the operation period are software (operation) and maintenance.61 、 structured software development methods have the following characteristicsAnswer: 1, stage 2, postpone the implementation of 3, document management.62, the task of the problem definition phase is to do exactly what t

35、he software system is going to do.63, the feasibility study focuses on the following specific programmesAnswer: 1, the economic feasibility2, technical feasibility3 * * feasibility64, software plan, martingale, two tasks (analysis) and (estimation).65, the software development work in resources (hum

36、an resources), (including software resources), (hardware resources), for each kind of resource should be specified in three (resource description), (the starting time of the use of resources), (the time of termination of the use of resources).66. Developers of software include managers (analysts), d

37、esigners, and (coding and testing personnel).67, software resources include (support software) and (application software).68, the basic task that needs to be analyzed is that users and analysts both understand the requirements of the system together and will form a document, namely, the specificatio

38、n of the software.69, user requirements usually include (functional requirements), performance requirements, (reliability requirements), (security, confidentiality requirements), and (development costs, development cycles, available resources, etc.).70, analysis needs to be (user) and (software) dis

39、cussion and consultation between the two sides.71, which four basic graphical symbols are included in the data flow diagram?Answer: 1, round box: Transform / process 2, box: external entity 3, arrow: data stream 4, line: data storage72, a data dictionary is a collection of information about data def

40、initions.73, there are four types of entries in the data dictionary: (data flow), (data storage), (data items) and (processing).74, the data dictionary can be implemented in three ways:Answer: 1, people through the process2. Automation process3, man-machine mixing process75. What are the features of

41、 the data dictionary?Answer: 1, through the name can easily access the definition of data2, no redundancy3, try not to repeat other parts of the information has been described4, can separately describe each name of the information5, the writing method is simple, convenient and strict, easy to update

42、 and modify.76, the method of analysis is usually divided into four stepsAnswer: 1, understand the current reality environment2, the current model of the system is abstracted into the current logical model3. Analyze the differences between the new system and the current system logic4, determine the

43、human interface of the new system and some additional details.77, the steps that need to be analyzed?Answer: 1, understand 2, analysis 3, decision-making 4, realize 5, review78, the standards and content of the reviewAnswer: 1. The software requires that the specifications in the specification are c

44、onsistent with the goals in the system specifications2, the software requirements specification for the important system elements interface, all data flow and data file definition is clear, whether there is inconsistency or omission3. Does each function clearly describe whether the designs major con

45、straints are achieved and whether future possible software needs are taken into account?.4 、 do you agree with the users?.5, whether the document has agreed.6 、 is the estimation in the software plan affected?.79 (software requirements specification) is the final result of requirements analysis phas

46、e, and it is one of the important documents in software development.80, the contents of the software requirements manual and writing reference format?Answer: 1, overview2, data description3. Function description4, performance description5. Bibliography6, appendix81. What are the main functions of th

47、e software requirements specification?Answer: 1. As a common document between users and software staff, it provides the basis for mutual understanding between the two parties.2, reflecting the structure of user problems, can be used as the basis for the design and coding of software staff.3, as the

48、basis of acceptance, it has been chosen as the basis for selecting test cases and performing formal verification.82. Structured design is based on the documentation generated by the software requirements analysis phase, which includes the data flow diagram (data dictionary).83. The term of measureme

49、nt of software structureAnswer: depth: the number of layers from root module to lowest layer.Width: the total distribution of control.Fan in number: how many modules direct control of a given module?Fan out number: the number of other modules is directly controlled by one module.Superior module: mod

50、ule that controls other modulesA module that is controlled by another module.84 (module) is a collection of data descriptions, executable, permanent, and other procedural elements.85, the concept of modular independence is the direct result of modularity, abstraction, information hiding and localiza

51、tion concepts.86, module independence is measured by two indexes: cohesion and (coupling).87, coupling is a measure of the connection between modules in a software structure.88, which kinds of coupling can be divided into? The degree of coupling between them ranges from high to lowAnswer: 1, content

52、 coupling 2, public coupling 3, external coupling 4, control coupling 5, mark coupling 6, data coupling 7, non direct coupling89, cohesion is measured from the function point of view90, what kind of cohesive one, what is the cohesion between them are from?Answer: 1, accidental cohesion 2, logic cohe

53、sion 3, time cohesion 4, process cohesion 5, communication cohesion 6, sequential cohesion 7, functional cohesion91, what is the inclusion time?Answer: inclusion time refers to the time in which a module is merged into the source language description of the software.92, what are the two activation m

54、echanisms for a module?Answer: 1. Call the module 2 by reference and call the module by break.93, in software architecture, modules can be broken down into the following categoriesAnswer: 1, sequence module 2, incremental module 3, parallel module94, what are the requirements for fan in and fan out

55、in software systems?Answer: the design of a good software structure, usually the top fan out is relatively large, fan less fan out, the bottom module has a large fan into.96. The scope of function of a module is the set of all modules that are affected by a decision within the module97, in the overa

56、ll design of several plans used?Answer: 1, level diagram and HIPO diagram 2, structure diagram98, the general flow of information is divided into (transaction flow) and (exchange flow).99. What is transaction flow?Answer: when the information live input path arrives at a process, this process is exe

57、cuted from one of several action sequences based on the type of input data, which is classified as a special class,Transaction stream.The 100 and PAD diagrams are also called problem analysis diagramsThe 101 and PAD graphs are (two-dimensional tree structure) graphs.The 102 and PAD diagrams are (top

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论