2017計算機等級考試四級筆試必備題

計算機等級證書是我們找工作的敲門磚,現在越來越多人重視計算機等級考試。以下是本站小編整理的2017計算機等級考試四級筆試必備題,歡迎學習!

2017計算機等級考試四級筆試必備題

(1) 網絡中的計算機之間要做到有條不紊地交換數據就必須遵守網絡協議,一個網絡協議主要包括三個要素,即____。

A) 語法、原語與數據 B) 語義、數據與軟件

C) 層次、接口與原語 D) 語法、語義與時序

(2) 當PCM用於數字化語音系統時,它將聲音分爲128個量化級,每個量化級採用7位二進制碼錶示。由 於採樣速率爲8000樣本/秒,因此,數據傳輸速率應該達到____。

A) 2880bps B) 56Kbps C) 144Kbps D) 1200bps

(3) 具有分時系統文件管理的全部功能,提供網絡用戶訪問文件、目錄的`併發控制與安全保密功能的局域網服務器叫做____。

A) 電子郵件服務器 B) WWW服務器

C) 文件服務器 D) FTP服務器

(4) 在網絡層實現多個局域網互連的設備是____。

A) 集線器 B) 網橋 C) 路由器 D) 網關

(5) 在WWW系統中,用戶可以根據需要自動從一臺Web Server搜索到其他任何一臺Web Server,它所採用的是____。

A) 超文本(hypertext)技術 B) 超鏈接(hyperlink)技術

C) 超媒體(hypermedia)技術 D) 超文本標註語言HTML

(6) Give the logical variables X=Y=1, The value of X V Y(logical addition)

is____.

A) 1 B) 2 C) 10 D) 0

(7) The Programming Counter (PC) is normally used to point out____.

A) Programmed execution instruction

B) The address of last execution instruction

C) The address of current execution instruction

D) The address of next execution instruction

Items (58) and (59) are based on the following Pascal code.

FOR i:=1 TO n -1 do

BEGIN

k:=i:

FOR j:=i+1 TO n DO

IF A[j]br> THEN k:=j:

IF k<>i

THEN BEGIN

X:=A[k];

A[k]:=A[i];

A[i]:=x

END

END;

(8) The sorting method described by the code is called____.

A) Insertion sort B) Selection sort C) Radix sort D) Merge sort

(9) Suppose elements in array A are already sorted ascending order of their

values when the code begins to run, then execution time of the code will be____.

A) O(log2n) B) O(n) C) O(nlog2n) D) O(n2)

(10) Assume that N=2M and FIFO is used. If the string p1,p2,…,pN is repeated

three times, then the number of page faults is____.

A) N/2 B) N C) 2N D) 3N

(11) Chang, Tian and An are three users of the system. Chang and An are in

the same group. Tian is a Super User. Which of the following rights is inconsistent

with the given policies?____.

A) Tian has W(write) access to An's Mail files

B) Tian has E(execute) access to An's Mail files

C) Chian has R(read) access to An's text files

D) Tian has E(execute) access to Chang's Binary files

(12) Software Engineering Economy is an effective part of software engineering,

which of the fo llowing content is the research comtent of software engineering

economy?____.

Ⅰmation of software development cost

Ⅱ & Cost analysis of software development

Ⅲstment of software development progress

A) Ⅲ only B) Ⅱ and Ⅲ C) Ⅰ and Ⅱ D) all

(13) Prototype method is one of the software engineering methods frequently

used, which of the following item is the necessary condition for implementing

prototype method?____.

Ⅰ acquire the user requirement quickly

Ⅱ the tools for building software fast

Ⅲ a certain accumulation of prototype systems

A) Ⅰ only B) Ⅰand Ⅱ C) Ⅱ and Ⅲ D) all

(14) ORACLE RDBMS is a distributed DBMS. Which of the following techniques

adapted ensure atomicity of distributed transaction?____.

A) remote procedure call (RPC) B) Two _phases commit (2PC)

C) Snapshots D) triggers

(15) In order to get names of schoolboys(SEX='M')whose age=22, from a relation____.

S(SNO,SNAME,SEX,AGE),which of the following expressions is (are) correct?

Ⅰ.πsname(σsex='M'^age=22(S))

Ⅱ.σsex='M'^age=22(πsname(S))

A) Ⅰ only B) Ⅱ only C) Ⅰand Ⅱ D) neither

(16) In order to improve the performance of a network server, you need to select

bus or local bus. The appropriate local bus is____.

A) VESA B) PCI C) EISA D) ISA

(17) In terms of n's taxonomy, the systolic array falls into____.

A) SISD B) MIMD C) SIMD D) MISD

(18) In the WAN, when a point-to-point subnet is used, an important design

issue is the roucer interconnection____.

A) topology B) computer C) service D) lines

(19) In the Ethernet LAN, an algorithm was chosen to dynarnically adapt to

the number of stations trying to send. It is called____.

A) backward learning B) binary exponential backoff

C) spanning tree D) CRC

(20) The typical firewall consists of two packet filters and a (an)____.

A) router B) bridge C) application D) server