计算机水平为四级,2016计算机等级四级考试笔试题

2016计算机等级四级考试笔试题

如果每个指令执行的时间相同,该机器的MFLOPS是多少? ____。

A) 1.3 B) 2.9 C) 4.5 D) 6.2

(44) 按照Flynn分类法,ILLIAC-IV和CM-2所属的类型为 ____。

A) SISD B) SIMD C) MISD D) MIMD

(45) 页表是一个单值的地址映射,映射地址是:____。

A) 从寄存器到主存 B) 从主存到寄存器

C) 从物理地址到虚拟地址 D) 从虚拟地址到物理地址

(46) 虚拟存储中遇到的一个问题是,当页表存在主存储器中而需要进行地址映射时,会产生瓶颈。下述哪一种超高速缓冲器可用来解决这一问题?____。(2分)

Ⅰ. TB(Translation Buffer)

Ⅱ. TLB(Translation – Lookaside Buffer)

Ⅲ. FPT(Fast Page Table)

A) 只有Ⅰ B) Ⅰ和Ⅱ C) Ⅱ和Ⅲ D) Ⅰ,Ⅱ和Ⅲ

(47) 一条普遍接受的规则说,程序中10%的指令占用了90%的执行时间。这一规则被称为____。

A) 局部性原理 B) 运行时间原理

C) 编码执行原理 D) 频率原理

(48) 可保持2000条指令的计算机高速缓冲存储器(Cache),设其中10%的指令用去90%的程序执行时间,另外10%的时间在程序中的分布是均匀的。设一目标程序有50,000条指令,且已知最常使用的指令占10%。那么多大比例的存取指令可以放入高速缓存中?____。 (2分)

A) 20% B)&nb sp;36% C) 72% D) 90%

(49) 堆栈型机器的例子为____。

A) IBM 360/370 B) DEC VAX C) EDSAC D) HP 3000/70

(50) 下列哪一个测试程序是复合基准程序? ____。

A) Kernel B) Puzzle C) Whetstone D) Quicksort

(51) 在OSI参考模型中,同等层相互交换信息的实体构成了____。

A) 相邻实体 B) 对等实体 C) 传输实体 D) 通信实体

(52) 在OSI参考模型中,两个(N)层实体之间交换的数据单元称之为(N)协议数据单元,记做(N)PDU。(N)PDU是由两部分组成:(N)PCI与 ____。

A) (N+1)IDU B) (N+1)SDU C) (N)SDU D) (N)IDU

(53) 一个数据源产生8bit的ASCII字符(含1bit校验位),通过一条64Kbps的线路进行数据传输。指出在以下数据传输方式中,哪一种方式的有效数据传输速率可以达到最高? ____。(2分)

A) 采用面向字符型传输协议,每个数据帧包括24B的控制字段与128B的信息字段

B) 除信息字段长度为256B外,其它条件同A)

C) 采用面向比特型传输协议,每个数据帧包括12B的控制字段与64B的信息字段

D) 除信息字段长度为128B外,其它条件同C)

(54) 在面向比特型数据链路层协议HDLC中,帧格式中的哪个域既可以用于流量控制,又可以实现对发送帧的捎带确认?____。(2分)

A) 无编号帧的M域 B) 信息帧的N(S)域

C) 监控帧的S域 D) 信息帧的N(R)、N(S)域

(55) IEEE802.5标准规定令牌环网采用 ____。

A) 多令牌协议

B) 单令牌协议

C) 随机访问协议

D) HDLC协议

(56) 在局域网中,以下哪种传输介质既可以用于物理层10BASE-T协议,又可以适用于100BASE-T协议? ____。

A) 同轴电缆 B) 3类非屏蔽双绞线

C) 5类非屏蔽双绞线 D) 光纤电缆

(57) 如果两个局域网LAN A与LAN B互连,它们的传输层协议不同,而其它层协议均相同, LAN A与LAN B的互连设备应该选择____。

A) repeater B) bridge C) router D) gateway

(58) CCITT推荐的用于多个X.25网络互连的协议为____。

A) X.400 B) X.75 C) X.121 D) X.21

(59) 城市地区网(MAN)主要使用的技术是交换多兆位数据服务SMDS、分布队列双总线DQDB和____。

A) FDDI B) CSMA/CD C) Token Bus D) Token Ring

(60) 在计算机集成制造系统(CIMS)中,存在着办 公自动化(OA)与生产过程控制(MC)两种环境,它们对网络通信的要求也不相同。在CIMS环境中,根据MAP/TOP协议选择局域网协议标准时,应采用以下哪种方案? ____。(2分)

A) 全部采用802.3协议标准

B) OA采用802.3协议标准,MC采用802.4协议标准

C) OA采用802.3协议标准,MC采用802.5协议标准

D) 全部采用HDLC协议标准

(61) An instrucion that uses indirect addressing must contain an address of memory where____.

A) data is stored B) another address is stored

C) a page fault is addressed D) a pepeline stall will be executed

(62) Let R be a binary relation on a set S such that for each x,y,z∈S, if xRy and xRz then y =z. Which of the following must be true? ____.(2分)

A) R is anti-symmetric B) R is transitive

C) R is an equivalence relation D) R is a function

(63) If p and q are Boolean variables, which of the following formulas is (are) tautological?____.

Ⅰ. (┐p→q)↔ (p∨q)

Ⅱ. ((p→q))∧(q→r))→(p→r))

A) none B) Ⅰ only C) Ⅱ only D) Ⅰ and Ⅱ

(64) Which of the following statements is (are) true? ____.

Ⅰ. The number of cyclic subgroups of the additive group of integers is infinite.

Ⅱ. The number of cyclic subgroups of the additive group of real numbers is infinite.

A)&nb sp;Neither B) Ⅰ only C) Ⅱ only D) Ⅰ and Ⅱ

Questions 65- 66 refer to the space requirements of different methods of storing graphs. The choices for these questions are combinations of the following statements.

Ⅰ. The space required depends on the number of vertices.

Ⅱ. The space required depends on the number of edges.

(65) When the adjacency matrix method is used to store a graph, which of the statements is (are) true? ____.

A) None B) Ⅰ only C) Ⅱ only D) Ⅰ and Ⅱ

(66) When the adjacency list method is used to store a graph, which of the statements is (are) true?____.

A) None B) Ⅰ only C) Ⅱ only D) Ⅰ and Ⅱ

Questions 67-68 are based on the following information,

A hash table with hash function

h1(k)=k mod 13

is shown below.

0 1 2 3 4 5 6 7 8 9 10 11 12

35 33 48 25

Collision is resolved using the hash function h2(k)=(k mod 11)+1.

(67) How many key comparisons occur in searching for key 35 in the given hash table?____. (2分)

A) 0  B) 1  C) 2  D) 3

(68)& If a new key 67 is inserted into the given hash table, what will be its address?____. (2分)

A) 3 B) 4 C) 5 D) 6

(69) Suppose the contents of the DOS IF1.BAT file on the hard disk is as follows.

@ECHO OFF

MEM>FILE1

SORTFILE2

DEL FILE1

@DATE

@TIME

IF EXIST %1 ECHO % IF FOUND

If all of the commands are successfully executed after IF1 FILE1 is

typed, then the screen displays?____.

A) None B) Date and time C) FILE1 IS FOUND D) FILE2 IS FOUND

(70) If the files in the current directory are

aac, abc, acb,acc, aca, ao, al, a2, ab, ac, aa,

and the command ls a?[bc] is executed, how many files will be listed?____. (2分)

A) 3 B) 4 C) 5 D) 6

(71) In order to append a standard output to an existing file, which of the following operators is used in the UNIX system? ____.

A) | B) & C) > D) >>

(72) Consider the following figure, where the shaded parts represent already assigned blocks of memory, and the unshaded parts represent free blocks. (2分) If there is a request for 40KB of memory and the best-fit algorithm is used, then the beginning address of memory that is allocated in response to the request is ____.        A) 100KB B) 190KB C) 330KB D) 410KB

(73) On a certain disk, there are 200 tracks, numbered 0-199, the current position of the disk head is track 53. If the shortest-seek-time-first scheduling algorithm is used when the tracks

98, 183, 37, 122, 14, 124, 65, 67

are requested, then the head-moving sequence that results will be (2分)

A) 65, 67, 37, 14, 98, 122, 124, 183

B) 65, 67, 37, 98, 122, 124, 183, 14

C) 65, 67, 98, 122, 124, 183, 37, 14

D) 98, 183, 37, 122, 14, 124, 65, 67

(74) Whant operation on relations R and S produces the relation shown below?____.

{tuple│tuple∈R۸tuple∈\ S}

A) Union B) Difference C) Intersection D) Division

(75) When embedding SQL in a C language program, the prefix that should be added to all SQL statements in order to distinguish SQL statements from the host language statements is____.

A) : B) EXEC C) EXEC SQL D) SQL

(76) In the ORACLE system,sets of SQL statements and control flow statements that have been named,compiled,and stored tn the database are referred to as stored____.

A) batches B) procedures C) triggers D) transactions

(77) Which of the following statements about object oriented databases is NOT correct? ____. (2分)

A) Each object has a unique object identity in the system.

B) Encapsulation and inheritance are two important features of object oriented databases.

C) A subclass can inherit the attributes and methods of all its superclasses.

D) A superclass includes the attributes and methods of all its subclasses.

(78) In the design phase of software engineering, decomposition of the program into modules should follow the principles of ____.

A) low cohesion with low corpling   B) low cohesion with high coupling

C) high cohesion with low coupling  D) high cohesion with high coupling

(79) Specifications for software should contain&nbs p;several components, e.g., specifications of

information flow,

user interface,

functional requirements, and

design constraints.

Two other important components are specifications of the____. (2分)

A) methods of testing and ways to obtain quality assurance

B) criteria for testing and ways to obtain quality assurance

C) methods of testing and criteria for function assurane

D) criteria for testing and methods of function assurance

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值