2021湖北软件水平考试考试考前冲刺卷(3).docx

上传人:w**** 文档编号:20686289 上传时间:2022-06-17 格式:DOCX 页数:34 大小:24.31KB
返回 下载 相关 举报
2021湖北软件水平考试考试考前冲刺卷(3).docx_第1页
第1页 / 共34页
2021湖北软件水平考试考试考前冲刺卷(3).docx_第2页
第2页 / 共34页
点击查看更多>>
资源描述

《2021湖北软件水平考试考试考前冲刺卷(3).docx》由会员分享,可在线阅读,更多相关《2021湖北软件水平考试考试考前冲刺卷(3).docx(34页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、2021湖北软件水平考试考试考前冲刺卷(3)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.关系R、S如下图所示,关系代数表达式π4,5,3(σ16(R×S)的输出结果与()等价,该表达式与()等价。若对关系R、S进行自然连接,所得关系的属性列数和元组个数分别为()。关系R、S如下图所示,该表达式与()等价。AπA,B,C(σAC(R×S)BπR.A,R.B,R.C(σR.AS.B(R×S)CπR

2、.A,S.B,S.C(σR.AS.C(R×S)DπS.A,S.B,R.C(σR.AS.C(R×S)2.设有职工关系Emp (Eno,Ename,Esex,EDno)和部门关系Dept (Dno,Dname, Daddr),创建这两个关系的SQL语句如下:CREATE TABLE Emp (Eno CHAR(4),Ename CHAR(8),Esex CHAR(1) CHECK(Esex IN (’M’,’F’),EDno CHAR(4) REFERENCES Dept (Dno),PRIMAR

3、Y KEY (Eno);CREATE TABLE Dept (Dno CHAR(4) NOT NULL UNIQUE,Dname CHAR(20),Daddr CHAR(30);直接运行该语句,DBMS会报错,原因是()。若经过修改,上述两个表创建完毕之后(尚无数据),则下述语句中能被执行的是()。直接运行该语句,DBMS会报错,原因是()。A创建表Dept时没有指定主码B创建表Dept时没有指定外码C创建表Emp时,被参照表Dept尚未创建D表Emp的外码EDno与被参照表Dept的主码Dno不同名3.事务T1、T2和T3对相同的一组数据A、B和C进行操作,对于如下的一个并发调度,其中T1与

4、T2间并发操作(),T2与T3间并发操作()。T2与T3间并发操作()。A正确B不能重复读C将丢失修改D将读脏数据4.假设员工关系EMP(员工号,姓名,性别,部门,部门电话,部门负责人,家庭住址,家庭成员,成员关系)如下表所示。如果一个部门只能有一部电话和一位负责人,一个员工可以有多个家庭成员,那么关系EMP属于(),且()问题;为了解决这一问题,应该将员工关系EMP分解为()。为了解决这一问题,应该将员工关系EMP分解为()。AEMP1(员工号,姓名,性别,家庭住址)EMP2(部门,部门电话,部门负责人)EMP3(员工号,家庭成员,成员关系)BEMP1(员工号,姓名,性别,部门,家庭住址)E

5、MP2(部门,部门电话,部门负责人)EMP3(员工号,家庭成员,成员关系)CEMP1(员工号,姓名,性别,家庭住址)EMP2 (部门,部门电话,部门负责人,家庭成员,成员关系)DEMP1(员工号,姓名,性别,部门,部门电话,部门负责人,家庭住址)EMP2(员工号,家庭住址,家庭成员,成员关系)5.关系R、S如下图所示,关系代数表达式π4,5,3(σ16(R×S)的输出结果与()等价,该表达式与()等价。若对关系R、S进行自然连接,所得关系的属性列数和元组个数分别为()。若对关系R、S进行自然连接,所得关系的属性列数和元组个数分别为()。A3和0B3和2C6和0D6

6、和26.设有职工关系Emp (Eno,Ename,Esex,EDno)和部门关系Dept (Dno,Dname, Daddr),创建这两个关系的SQL语句如下:CREATE TABLE Emp (Eno CHAR(4),Ename CHAR(8),Esex CHAR(1) CHECK(Esex IN (’M’,’F’),EDno CHAR(4) REFERENCES Dept (Dno),PRIMARY KEY (Eno);CREATE TABLE Dept (Dno CHAR(4) NOT NULL UNIQUE,Dname CHAR(20),

7、Daddr CHAR(30);直接运行该语句,DBMS会报错,原因是()。若经过修改,上述两个表创建完毕之后(尚无数据),则下述语句中能被执行的是()。若经过修改,上述两个表创建完毕之后(尚无数据),则下述语句中能被执行的是()。AINSERT INTO Emp VALUES(’e001’,’王’,’M’,’d1’);BINSERT INTO Emp VALUES(NULL,’王’,’M’,’d1’,);CINSERT INTO

8、 Emp VALUES(’e001’,’王’,’M’,NULL);DINSERT INTO Emp VALUES(’e001’,’王’,’X’,’d1’);7.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商

9、品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库关系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();该关系没有达到第三范式的原因是()。A没有消除非主属性对码的部分函数依赖,如:仓库号→电话B没有消除非主属性对码的部分函数依赖,如:地址→电话C只消除了非主属性对码的部分函数依赖,而未消除传递函数依赖D只消除了非主属性对码的传递函数依赖,而未消除部分函数依赖8.某超市的商品(商品号,商品名称,

10、生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库关系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();SELECT 商品名称,()。ANUMBER(库存量)BSUM(库存量)C

11、COUNT(库存量)DTOTAL(库存量)9.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库关系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),(

12、);WHERE ()A生产商=联想B仓库.生产商=联想C生产商=’联想’D仓库.生产商=’联想’10.在需求分析阶段,需求调查的内容是(),需求分析的结果是()。在需求分析阶段,需求调查的内容是()。A信息要求、处理要求B安全性与完整性要求C信息要求、安全性要求D信息要求、处理要求、安全性与完整性要求11.For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, cons

13、tructing, and documenting the () of a software-intensive system. As the () standard modeling language, the UML facilitates communication and reduces confusion among project (). The recent standardization of UML 2.0 has further extended the language’s scope and viability. Its inherent expressiv

14、eness allows users to () everything from enterprise information systems and distributed Web-based applications to real-time embedded systems.The UML is not limited to modeling software. In fact, it is expressive enough to model () systems, such as workflow in the legal system, the structure and beha

15、vior of a patient healthcare system, software engineering in aircraft combat systems, and the design of hardware.To understand the UML, you need to form a conceptual model of the language, and this requires learning three major elements: the UML’s basic building blocks, the rules that dictate

16、how those building blocks may be put together, and some common mechanisms that apply throughout the UML.For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the () of a software-intensive system.AclassesBc

17、omponentsCsequencesDartifacts12.在需求分析阶段,需求调查的内容是(),需求分析的结果是()。在需求分析阶段,需求分析的结果是()。A数据流图B数据字典C数据流图、数据字典DE-R图13.For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the () of a software-intensive system. As t

18、he () standard modeling language, the UML facilitates communication and reduces confusion among project (). The recent standardization of UML 2.0 has further extended the language’s scope and viability. Its inherent expressiveness allows users to () everything from enterprise information syste

19、ms and distributed Web-based applications to real-time embedded systems.The UML is not limited to modeling software. In fact, it is expressive enough to model () systems, such as workflow in the legal system, the structure and behavior of a patient healthcare system, software engineering in aircraft

20、 combat systems, and the design of hardware.To understand the UML, you need to form a conceptual model of the language, and this requires learning three major elements: the UML’s basic building blocks, the rules that dictate how those building blocks may be put together, and some common mechan

21、isms that apply throughout the UML.As the () standard modeling language.ArealBlegalCde factoDillegal14.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库关系SQL语句的空缺部分补充完整。CREA

22、TE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();AND ()A商品名称=激光打印机AND商品.商品号=仓库.商品号B商品名称=’激光打印机’AND商品.商品号=仓库.商品号C商品名称=激光打印机OR商品.商品号=仓库.商品号D商品名称=’激光打印机’OR商品.商品号=仓库.商品号15.For nearly ten years, the Unified Modeling Language (UML) has been the indu

23、stry standard for visualizing, specifying, constructing, and documenting the () of a software-intensive system. As the () standard modeling language, the UML facilitates communication and reduces confusion among project (). The recent standardization of UML 2.0 has further extended the language&rsqu

24、o;s scope and viability. Its inherent expressiveness allows users to () everything from enterprise information systems and distributed Web-based applications to real-time embedded systems.The UML is not limited to modeling software. In fact, it is expressive enough to model () systems, such as workf

25、low in the legal system, the structure and behavior of a patient healthcare system, software engineering in aircraft combat systems, and the design of hardware.To understand the UML, you need to form a conceptual model of the language, and this requires learning three major elements: the UML’s

26、 basic building blocks, the rules that dictate how those building blocks may be put together, and some common mechanisms that apply throughout the UML.The UML facilitates communication and reduces confusion among project ().AinvestorsBdevelopersCdesignersDstakeholders16.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓库

27、号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库关系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();地址 CHAR(20) ()。ANOTNULLBUNIQUECNOTNULLUNIQUEDPRIMA

28、RYKEY17.For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the () of a software-intensive system. As the () standard modeling language, the UML facilitates communication and reduces confusion among proje

29、ct (). The recent standardization of UML 2.0 has further extended the language’s scope and viability. Its inherent expressiveness allows users to () everything from enterprise information systems and distributed Web-based applications to real-time embedded systems.The UML is not limited to mod

30、eling software. In fact, it is expressive enough to model () systems, such as workflow in the legal system, the structure and behavior of a patient healthcare system, software engineering in aircraft combat systems, and the design of hardware.To understand the UML, you need to form a conceptual mode

31、l of the language, and this requires learning three major elements: the UML’s basic building blocks, the rules that dictate how those building blocks may be put together, and some common mechanisms that apply throughout the UML.Its inherent expressiveness allows users to () everything from ent

32、erprise information systems and distributed Web-based applications to real-time embedded systems.AmodelBcodeCtestDmodify18.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库关

33、系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),APRIMARY KEY(仓库号)BPRIMARY KEY(仓库号,商品号)CPRIMARY KEY(商品号,地址)DPRIMARY KEY(仓库号,地址)19.For nearly ten years, the Unified Modeling Language (UML) has been the indu

34、stry standard for visualizing, specifying, constructing, and documenting the () of a software-intensive system. As the () standard modeling language, the UML facilitates communication and reduces confusion among project (). The recent standardization of UML 2.0 has further extended the language&rsqu

35、o;s scope and viability. Its inherent expressiveness allows users to () everything from enterprise information systems and distributed Web-based applications to real-time embedded systems.The UML is not limited to modeling software. In fact, it is expressive enough to model () systems, such as workf

36、low in the legal system, the structure and behavior of a patient healthcare system, software engineering in aircraft combat systems, and the design of hardware.To understand the UML, you need to form a conceptual model of the language, and this requires learning three major elements: the UML’s

37、 basic building blocks, the rules that dictate how those building blocks may be put together, and some common mechanisms that apply throughout the UML.In fact, it is expressive enough to model () systems, such as workflow in the legal system, the structure and behavior of a patient healthcare system

38、, software engineering in aircraft combat systems, and the design of hardware.Anon-hardwareBnon-softwareChardwareDsoftware20.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓

39、库关系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),();AFOREIGN KEY(仓库号)REFERENCES仓库号BFOREIGN KEY(仓库号)REFERENCES仓库(仓库号)CFOREIGN KEY(商品号)REFERENCES仓库(商品号)DFOREIGN KEY(商品号)REFERENCES商品(商品号)21.应用MPLS VPN时,针对每个VPN

40、地址规划应满足的条件是 (1) 。不同的VPN信息通过MPLS骨干网(或核心网)时通过 (2) 进行区分。1()A每个VPN都是独立的,可以使用任何地址,只要保证在VPN内部合法正确即可BVPN之间的地址不能相互重叠CVPN内只能使用公网IP地址DVPN内只能使用私网IP地址22.在采用公开密钥密码体制的数字签名方案中,每个用户有一个私钥,可用它进行 (1) ;同时每个用户还有一个公钥,可用于 (2) 。1()A解密和验证B解密和签名C加密和签名D加密和验证23.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,他需要做的第一步工作通常是 (1) ;第二步通常是 (2) ;在成功入侵

41、该公司网络某台主机并取得该主机的控制权后,通常所作的工作是 (3) ;在窃取到机密信息后,最后需要做的工作是 (4) ;为了预防黑客入侵的第一步,该公司网络应该采取的预防措施为 (5) ;针对第二步的预防措施为 (6) 。为了能及时发现上述入侵,该公司网络需要配备 (7) 。1()A收集目标网络的所在位置及流量信息B到网上去下载常用的一些攻击软件C捕获跳板主机,利用跳板主机准备入侵D通过端口扫描等软件收集目标网站的IP地址、开放端口和安装的软件版本等信息24.用IPSec机制实现VPN时,如果企业内部网使用了私用IP地址,应该采用 (1) 技术,IPSec该采用 (2) 模式。1()ANAT技

42、术B加密技术C消息鉴别技术D数字签名技术25.网络安全应用协议SSL协议工作在 (1) ,HTTPS协议工作在 (2) 。1()A数据链路层B网络层C传输层D应用层26.在采用公开密钥密码体制的数字签名方案中,每个用户有一个私钥,可用它进行 (1) ;同时每个用户还有一个公钥,可用于 (2) 。2()A解密和验证B解密和签名C加密和签名D加密和验证27.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,他需要做的第一步工作通常是 (1) ;第二步通常是 (2) ;在成功入侵该公司网络某台主机并取得该主机的控制权后,通常所作的工作是 (3) ;在窃取到机密信息后,最后需要做的工作是 (

43、4) ;为了预防黑客入侵的第一步,该公司网络应该采取的预防措施为 (5) ;针对第二步的预防措施为 (6) 。为了能及时发现上述入侵,该公司网络需要配备 (7) 。2()A了解目标网络的所在位置的周围情况及流量规律,选择流量小的时间发起攻击B下载攻击软件,直接发起攻击C向目标网络发起拒绝服务攻击D根据收集的开放端口和安装的软件版本等信息,到网络查找相关的系统漏洞,下载相应的攻击工具软件28.应用MPLS VPN时,针对每个VPN地址规划应满足的条件是 (1) 。不同的VPN信息通过MPLS骨干网(或核心网)时通过 (2) 进行区分。2()AIP地址+AS号BIP地址+子网掩码CVPN标识符DV

44、PN标识符+IP地址29.某企业拟建设通信网络对外提供服务。根据市场预测,未来业务发展好的概率为0.7,业务发展差的概率为0.3。现有三种规划方案可供选择:方案1,直接投资3000万元大规模建网。若业务发展得好,每年可获利1000万元,若业务发展不好,每年亏损200万元,服务期为10年;方案2,投资1400万元建设小规模网络。若业务发展得好,每年可获利400万元,若业务发展不好,每年仍可获利300万元,服务期为10年;方案3,前3年按方案2实施,即先投资1400万元建设小规模网络,收益同方案2。3年后若业务发展不好,则继续按方案2实施;若业务发展得好,则再追加投资2000万元进行网络扩容,扩容

45、后服务期为7年,每年可获利950万元。根据以上条件经计算可知()A方案1的期望净收益为5000万元B方案3的期望净收益为3595万元C方案1为最优方案D方案2为最优方案30.A glue that holds the whole Internet together is the network layer protocol, (1) .Unlike most older network layer protocols, it was designed from the beginning with internetworking in mind. Its job is to provide a

46、 (2) way to transport data grams from source to destination, without regard to whether these machines are on the same network or whether there are other networks in between them.Communication in the Internet works as follows. The (3) layer takes data streams and breaks them up into data grams. Each

47、datagram is transmitted through the Internet, possibly being fragmented into smaller units as it goes. When all the pieces finally get to the destination machine, they are reassembled by the (4) layer into the original datagram. This datagram is then handed to the transport layer, which inserts it i

48、nto the receiving process’ input stream.An IP datagram consists of a header part and a text part. The header has a (5) part and a variable length optional part.1()AIP (Internet Protocol)BIP (Interworking Protocol)CTCP (Transport Control Protocol)DTCP (Transfer Communication Protocol)31.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,他

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 应用文书 > 工作计划

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁