《2021年甘肃软件水平考试考试真题卷(3).docx》由会员分享,可在线阅读,更多相关《2021年甘肃软件水平考试考试真题卷(3).docx(25页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、2021年甘肃软件水平考试考试真题卷(3)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.假设系统中有三类互斥资源R1, R2 和R3,可用资源数分别为8, 7 和4。在T0 时刻系统中有P1、P2, P3, P4 和P5 五个进程,这些进程对资源的最大需求量和己分配资源数如下表所示。在T0 时刻系统剩余的可用资源数分别为(24)。如果进程按(25)序列执行,那么系统状态是安全的。(24)处填()。A0、1 和0B0、1 和1C1、1 和0D1、1 和12.ARP 协议的作用是(61),AR
2、P 报文封装在(62)中传送。(61)处填()。A由IP 地址查找对应的 MAC 地址B由MAC 地址查找对应的IP 地址C由IP 地址查找对应的端口号D由MAC 地址查找对应的端口号3.下图是一有限自动机的状态转换图,该自动机所识别语言的特点是(45),等价的正规式为(46)。(45)处填()。A由符号 a、b 构成且包含偶数个a 的串B由符号a、b 构成且开头和结尾符号都为a 的串C由符号a、b 构成的任意串D由符号a、b 构成且b 的前后必须为a 的串4.操作序列T1、T2、T3 对数据A、B、C 并发操作如下所示,T1 与T2 间并发操作(50),T2与T3 间并发操作(51)。(50
3、)处填()。A不存在问题B将丢失修改C不能重复读D将读脏数据5.某企业职工和部门的关系模式如下所示,其中部门负责人也是一个职工。职工和部门关系的外键分别是(48)。 职工(职工号,姓名,年龄,月工资,部门号,电话,办公室) 部门(部门号,部门名,负责人代码,任职时间) 查询每个部门中月工资最高的职工号的SQL 查询语句如下: Select 职工号from 职工as E where 月工资=(Select Max(月工资) from 职工as M(49))。(48)处填()。A职工号和部门号B部门号和负责人代码C职工号和负责人代码D部门号和职工号6.对于具有n 个元素的一个数据序列,若只需得到其
4、中第k 个元素之前的部分排序,最好采用(59),使用分治(Divide and Conquer)策略的是(60)算法。(59)处填()。A希尔排序B直接插入排序C快速排序D堆排序7.结点数目为n 的二叉查找树(二叉排序树)的最小高度为(52)、最大高度为(53)。(52)处填()。A.AB.BC.CD.D8.ARP 协议的作用是(61),ARP 报文封装在(62)中传送。(62)处填()。A以太帧BIP 数据报CUDP 报文DTCP 报文9.在一个单CPU 的计算机系统中,采用可剥夺式(也称抢占式)优先级的进程调度方案,且所有任务可以并行使用I/O 设备。下表列出了三个任务刊、T2, T3 的
5、优先级、独立运行时占用CPU 和I/O 设备的时间。如果操作系统的开销忽略不计,这三个任务从同时启动到全部结束的总时间为_(21)_msCPU 的空闲时间共有_(22)_ms。(22)处填()。A3B5C8D1310.操作序列T1、T2、T3 对数据A、B、C 并发操作如下所示,T1 与T2 间并发操作(50),T2与T3 间并发操作(51)。(51)处填()。A不存在问题B将丢失修改C不能重复读D将读脏数据11.UML 的设计视图包含了类、接口和协作,其中,设计视图的静态方面由(37)和(38)表现;动态方面由交互图、(39)表现。(38)处填()。A状态图B顺序图C对象图D活动图12.下图
6、是一有限自动机的状态转换图,该自动机所识别语言的特点是(45),等价的正规式为(46)。(46)处填()。A(ab)*(aa)*Ba(ab)*aC(ab)*Da(ba)*a13.对于具有n 个元素的一个数据序列,若只需得到其中第k 个元素之前的部分排序,最好采用(59),使用分治(Divide and Conquer)策略的是(60)算法。(60)处填()。A冒泡排序B插入排序C快速排序D堆排序14.假设系统中有三类互斥资源R1, R2 和R3,可用资源数分别为8, 7 和4。在T0 时刻系统中有P1、P2, P3, P4 和P5 五个进程,这些进程对资源的最大需求量和己分配资源数如下表所示。
7、在T0 时刻系统剩余的可用资源数分别为(24)。如果进程按(25)序列执行,那么系统状态是安全的。(25)处填()。AP1→P2→P4→P5→P3BP2→P1→P4→P5→P3CP4→P2→P1→P5→P3DP4→P2→P5→P1→P315.某企业职工和部门的关系模式如下所示,其中部门负责人也是一个职工。职工和部门关系的外键分别是(48)。 职工(职工号,姓名,年龄,月工资,部门号,电话,办公室) 部门(部门号,部门名,负责人代码,任职
8、时间) 查询每个部门中月工资最高的职工号的SQL 查询语句如下: Select 职工号from 职工as E where 月工资=(Select Max(月工资) from 职工as M(49))。(49)处填()。Awhere M.职工号=E.职工号Bwhere M.职工号=E.负责人代码Cwhere M.部门号部门号Dwhere M.部门号=E.部门号16.结点数目为n 的二叉查找树(二叉排序树)的最小高度为(52)、最大高度为(53)。(53)处填()。A.AB.BC.CD.D17.UML 的设计视图包含了类、接口和协作,其中,设计视图的静态方面由(37)和(38)表现;动态方面由交互图
9、、(39)表现。(39)处填()。A状态图和类图B类图和活动图C对象图和状态图D状态图和活动图18.Virtualization is an approach to IT that pools and shares_(71)_so that utilization is optimized and supplies automatically meet demandTraditional IT environments are often silos, where both technology and human _(72)_。 are aligned around an applicati
10、on or business functionWith a virtualized _(73)_,people, processes, and technology are focused on meeting service levels, _(74)_ is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexibleWe offer a broad spectrum of virtualization_(75)_that allows cus
11、tomers to choose the most appropriate path and optimization focus for their IT infrastructure resources(71)处填()。AadvantagesBresourcesCbenefitsDprecedents19.NAC’s(Network Access Control)role is to restrict network access to only compliant endpoints and _(66)_ usersHowever, NAC is not a complete
12、 LAN_(67)_solution; additional proactive and_(68)_security measures must be implementedNevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 100Gbps, ensuring a high level of security plus application availability and performanceNev
13、is integrates NAC as the first line of LAN security _(69)_In addition to NAC,enterprises need to implement role-based network access control as well as critical proactive security measures-real-time, multilevel _(70)_inspection and microsecond threat containment(66)处填()。AautomatedBdistinguishedCauth
14、enticatedDdestructed20.Virtualization is an approach to IT that pools and shares_(71)_so that utilization is optimized and supplies automatically meet demandTraditional IT environments are often silos, where both technology and human _(72)_。 are aligned around an application or business functionWith
15、 a virtualized _(73)_,people, processes, and technology are focused on meeting service levels, _(74)_ is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexibleWe offer a broad spectrum of virtualization_(75)_that allows customers to choose the most a
16、ppropriate path and optimization focus for their IT infrastructure resources(72)处填()。AprofitsBcostsCresourcesDpowers21.Virtualization is an approach to IT that pools and shares_(71)_so that utilization is optimized and supplies automatically meet demandTraditional IT environments are often silos, wh
17、ere both technology and human _(72)_。 are aligned around an application or business functionWith a virtualized _(73)_,people, processes, and technology are focused on meeting service levels, _(74)_ is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and fle
18、xibleWe offer a broad spectrum of virtualization_(75)_that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources(73)处填()。AsystemBinfrastructureChardwareDlink22.NAC’s(Network Access Control)role is to restrict network access to only co
19、mpliant endpoints and _(66)_ usersHowever, NAC is not a complete LAN_(67)_solution; additional proactive and_(68)_security measures must be implementedNevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 100Gbps, ensuring a high le
20、vel of security plus application availability and performanceNevis integrates NAC as the first line of LAN security _(69)_In addition to NAC,enterprises need to implement role-based network access control as well as critical proactive security measures-real-time, multilevel _(70)_inspection and micr
21、osecond threat containment(67)处填()。AcrisisBsecurityCfavorableDexcellent23.NAC’s(Network Access Control)role is to restrict network access to only compliant endpoints and _(66)_ usersHowever, NAC is not a complete LAN_(67)_solution; additional proactive and_(68)_security measures must be implem
22、entedNevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 100Gbps, ensuring a high level of security plus application availability and performanceNevis integrates NAC as the first line of LAN security _(69)_In addition to NAC,enter
23、prises need to implement role-based network access control as well as critical proactive security measures-real-time, multilevel _(70)_inspection and microsecond threat containment(68)处填()。AconstructiveBreductiveCreactiveDproductive24.Virtualization is an approach to IT that pools and shares_(71)_so
24、 that utilization is optimized and supplies automatically meet demandTraditional IT environments are often silos, where both technology and human _(72)_。 are aligned around an application or business functionWith a virtualized _(73)_,people, processes, and technology are focused on meeting service l
25、evels, _(74)_ is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexibleWe offer a broad spectrum of virtualization_(75)_that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources(74)处填()。Aco
26、ntentBpositionCpowerDcapacity25.NAC’s(Network Access Control)role is to restrict network access to only compliant endpoints and _(66)_ usersHowever, NAC is not a complete LAN_(67)_solution; additional proactive and_(68)_security measures must be implementedNevis is the first and only comprehen
27、sive LAN security solution that combines deep security processing of every packet at 100Gbps, ensuring a high level of security plus application availability and performanceNevis integrates NAC as the first line of LAN security _(69)_In addition to NAC,enterprises need to implement role-based networ
28、k access control as well as critical proactive security measures-real-time, multilevel _(70)_inspection and microsecond threat containment(69)处填()。AdefenseBintrusionCinbreakDprotection26.Virtualization is an approach to IT that pools and shares_(71)_so that utilization is optimized and supplies auto
29、matically meet demandTraditional IT environments are often silos, where both technology and human _(72)_。 are aligned around an application or business functionWith a virtualized _(73)_,people, processes, and technology are focused on meeting service levels, _(74)_ is allocated dynamically, resource
30、s are optimized, and the entire infrastructure is simplified and flexibleWe offer a broad spectrum of virtualization_(75)_that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources(75)处填()。AsolutionsBnetworksCinterfacesDconnections27.NAC&rs
31、quo;s(Network Access Control)role is to restrict network access to only compliant endpoints and _(66)_ usersHowever, NAC is not a complete LAN_(67)_solution; additional proactive and_(68)_security measures must be implementedNevis is the first and only comprehensive LAN security solution that combin
32、es deep security processing of every packet at 100Gbps, ensuring a high level of security plus application availability and performanceNevis integrates NAC as the first line of LAN security _(69)_In addition to NAC,enterprises need to implement role-based network access control as well as critical p
33、roactive security measures-real-time, multilevel _(70)_inspection and microsecond threat containment(70)处填()。AportBconnectionCthreatDinsurance28.在面向对象技术中,类属是一种 (1) 机制。一个类属类是关于一组类的一个特性抽象,它强调的是这些类的成员特征中与 (2) 的那些部分,而用变元来表示与 (3) 的那些部分。(1)处填()。A包含多态B参数多态C过载多态D强制多态29.在面向对象技术中,类属是一种 (1) 机制。一个类属类是关于一组类的一个特性
34、抽象,它强调的是这些类的成员特征中与 (2) 的那些部分,而用变元来表示与 (3) 的那些部分。(2)处填()。A具体对象无关B具体类型无关C具体对象相关D具体类型相关30.在面向对象技术中,类属是一种 (1) 机制。一个类属类是关于一组类的一个特性抽象,它强调的是这些类的成员特征中与 (2) 的那些部分,而用变元来表示与 (3) 的那些部分。(3)处填()。A具体对象无关B具体类型无关C具体对象相关D具体类型相关31.下图为一确定有限自动机(DFA)的状态转换图,与该自动机等价的正规表达式是 (12) ,图中的(13) 是可以合并的状态。(12)处填()。A.AB.BC.CD.D32.已知关
35、系R 如下表所示,关系R 的主属性为(17),候选关键字分别为 (18) 。(17)处填()。AABCBABDCACDDABCD33.设供应商供应零件的关系模式为SP(Sno, Pno, Qty),其中Sno 表示供应商号,Pno 表示零件号,Qty 表示零件数量。查询至少包含了供应商168所供应的全部零件的供应商号的SQL 语句如下: SELECT Sno FROM SP SPX WHERE (19) (SELECT * FROM SP SPY WHERE (20) AND NOT EXISTS (SELECT * FROM SP SPZ WHERE (21) );(19)处填()。AEXI
36、STSBNOT EXISTSCINDNOT IN34.若有一个仓库,可以存放P1、P2 两种产品,但是每次只能存放一种产品。要求: w= P1 的数量 – P2 的数量 – i (54) ;如果网络B中有1000 台主机,那么需要为网络B 分配 (55) 个C 类网络地址,其中 B1 主机的IP 地址可以为 (56) ,网络B 的子网掩码应为 (57) 。(54)处填()。A192.60.80.0B192.60. 80.2C192.60. 80.3D192.60.80.437.已知关系R 如下表所示,关系R 的主属性为(17),候选关键字分别为 (18) 。(18)处填
37、()。AABCBAB、ADCAC、AD 和CDDAB、AD、BD 和CD38.下图为一确定有限自动机(DFA)的状态转换图,与该自动机等价的正规表达式是 (12) ,图中的(13) 是可以合并的状态。(13)处填()。A0 和1B2 和3C1 和2D0 和339.设供应商供应零件的关系模式为SP(Sno, Pno, Qty),其中Sno 表示供应商号,Pno 表示零件号,Qty 表示零件数量。查询至少包含了供应商168所供应的全部零件的供应商号的SQL 语句如下: SELECT Sno FROM SP SPX WHERE (19) (SELECT * FROM SP SPY WHERE (20
38、) AND NOT EXISTS (SELECT * FROM SP SPZ WHERE (21) );(20)处填()。ASPY.Sno=′168′BSPY.Sno′168′CSPY.Sno= SPX.SnoDSPY.SnoSPX.Sno40.当在软件工程的环境中考虑风险时,主要基于Charette 提出的三个概念。以下选项中不属于这三个概念的是 (27) 。项目风险关系着项目计划的成败, (28) 关系着软件的生存能力。在进行软件工程风险分析时,项目管理人员要进行四种风险评估活动,这四种活动是 (29)以及确定风险估计的正确性。(27)处填(
39、)。A关心未来B关心变化C关心技术D关心选择41.若有一个仓库,可以存放P1、P2 两种产品,但是每次只能存放一种产品。要求: w= P1 的数量 – P2 的数量 – i (54) ;如果网络B中有1000 台主机,那么需要为网络B 分配 (55) 个C 类网络地址,其中 B1 主机的IP 地址可以为 (56) ,网络B 的子网掩码应为 (57) 。(55)处填()。A1B2C3D444.设供应商供应零件的关系模式为SP(Sno, Pno, Qty),其中Sno 表示供应商号,Pno 表示零件号,Qty 表示零件数量。查询至少包含了供应商168所供应的全部零件的供应商
40、号的SQL 语句如下: SELECT Sno FROM SP SPX WHERE (19) (SELECT * FROM SP SPY WHERE (20) AND NOT EXISTS (SELECT * FROM SP SPZ WHERE (21) );(21)处填()。ASPZ.Sno=SPY.Sno AND SPZ.Pno=SPY.PnoBSPZ.Sno=SPX.Sno AND SPZ.Pno=SPX.PnoCSPZ.Sno=SPX.Sno AND SPZ.Pno=SPY.PnoDSPY.Sno=′168′ AND SPZ.Pno=SPY.Pno45.FTP 默
41、认的数据端口号是 (58) 。HTTP 默认的端口号是 (59) 。(58)处填()。A20B21C22D2346.当在软件工程的环境中考虑风险时,主要基于Charette 提出的三个概念。以下选项中不属于这三个概念的是 (27) 。项目风险关系着项目计划的成败, (28) 关系着软件的生存能力。在进行软件工程风险分析时,项目管理人员要进行四种风险评估活动,这四种活动是 (29)以及确定风险估计的正确性。(28)处填()。A资金风险B技术风险C商业风险D预算风险47.若有一个仓库,可以存放P1、P2 两种产品,但是每次只能存放一种产品。要求: w= P1 的数量 – P2 的数量
42、– i (54) ;如果网络B中有1000 台主机,那么需要为网络B 分配 (55) 个C 类网络地址,其中 B1 主机的IP 地址可以为 (56) ,网络B 的子网掩码应为 (57) 。(56)处填()。A192.60.16.1B192.60.16.2C192.60.16.5D192.60.16.25549.FTP 默认的数据端口号是 (58) 。HTTP 默认的端口号是 (59) 。(59)处填()。A25B80C1024D808050.某网络的拓扑结构如下图所示,网络A 中A2 主机的IP 地址可以为 (54) ;如果网络B中有1000 台主机,那么需要为网络B 分配 (55) 个C 类网络地址,其中 B1 主机的IP 地址可以为 (56) ,网络B 的子网掩码应为 (57) 。(57)处填()。A255.255.255.0B255.255.254.0C255.255.253.0D255.255.252.0第25页 共25页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页第 25 页 共 25 页