《2022年湖北软件水平考试考试考前冲刺卷(3).docx》由会员分享,可在线阅读,更多相关《2022年湖北软件水平考试考试考前冲刺卷(3).docx(34页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、2022年湖北软件水平考试考试考前冲刺卷(3)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.关系R、S如下图所示,关系代数表达式π4,5,3(σ16(R×S)的输出结果与()等价,该表达式与()等价。若对关系R、S进行自然连接,所得关系的属性列数和元组个数分别为()。关系R、S如下图所示,该表达式与()等价。AπA,B,C(σAC(R×S)BπR.A,R.B,R.C(σR.AS.B(R×S)Cπ
2、R.A,S.B,S.C(σR.AS.C(R×S)DπS.A,S.B,R.C(σR.AS.C(R×S)2.设有职工关系Emp (Eno,Ename,Esex,EDno)和部门关系Dept (Dno,Dname, Daddr),创建这两个关系的SQL语句如下:CREATE TABLE Emp (Eno CHAR(4),Ename CHAR(8),Esex CHAR(1) CHECK(Esex IN (’M’,’F’),EDno CHAR(4) REFERENCES Dept (Dno),PRIMA
3、RY KEY (Eno);CREATE TABLE Dept (Dno CHAR(4) NOT NULL UNIQUE,Dname CHAR(20),Daddr CHAR(30);直接运行该语句,DBMS会报错,原因是()。若经过修改,上述两个表创建完毕之后(尚无数据),则下述语句中能被执行的是()。直接运行该语句,DBMS会报错,原因是()。A创建表Dept时没有指定主码B创建表Dept时没有指定外码C创建表Emp时,被参照表Dept尚未创建D表Emp的外码EDno与被参照表Dept的主码Dno不同名3.事务T1、T2和T3对相同的一组数据A、B和C进行操作,对于如下的一个并发调度,其中T1
4、与T2间并发操作(),T2与T3间并发操作()。T2与T3间并发操作()。A正确B不能重复读C将丢失修改D将读脏数据4.假设员工关系EMP(员工号,姓名,性别,部门,部门电话,部门负责人,家庭住址,家庭成员,成员关系)如下表所示。如果一个部门只能有一部电话和一位负责人,一个员工可以有多个家庭成员,那么关系EMP属于(),且()问题;为了解决这一问题,应该将员工关系EMP分解为()。为了解决这一问题,应该将员工关系EMP分解为()。AEMP1(员工号,姓名,性别,家庭住址)EMP2(部门,部门电话,部门负责人)EMP3(员工号,家庭成员,成员关系)BEMP1(员工号,姓名,性别,部门,家庭住址)
5、EMP2(部门,部门电话,部门负责人)EMP3(员工号,家庭成员,成员关系)CEMP1(员工号,姓名,性别,家庭住址)EMP2 (部门,部门电话,部门负责人,家庭成员,成员关系)DEMP1(员工号,姓名,性别,部门,部门电话,部门负责人,家庭住址)EMP2(员工号,家庭住址,家庭成员,成员关系)5.关系R、S如下图所示,关系代数表达式π4,5,3(σ16(R×S)的输出结果与()等价,该表达式与()等价。若对关系R、S进行自然连接,所得关系的属性列数和元组个数分别为()。若对关系R、S进行自然连接,所得关系的属性列数和元组个数分别为()。A3和0B3和2C6和0D
6、6和26.设有职工关系Emp (Eno,Ename,Esex,EDno)和部门关系Dept (Dno,Dname, Daddr),创建这两个关系的SQL语句如下:CREATE TABLE Emp (Eno CHAR(4),Ename CHAR(8),Esex CHAR(1) CHECK(Esex IN (’M’,’F’),EDno CHAR(4) REFERENCES Dept (Dno),PRIMARY KEY (Eno);CREATE TABLE Dept (Dno CHAR(4) NOT NULL UNIQUE,Dname CHAR(20)
7、,Daddr CHAR(30);直接运行该语句,DBMS会报错,原因是()。若经过修改,上述两个表创建完毕之后(尚无数据),则下述语句中能被执行的是()。若经过修改,上述两个表创建完毕之后(尚无数据),则下述语句中能被执行的是()。AINSERT INTO Emp VALUES(’e001’,’王’,’M’,’d1’);BINSERT INTO Emp VALUES(NULL,’王’,’M’,’d1’,);CINSERT INT
8、O Emp VALUES(’e001’,’王’,’M’,NULL);DINSERT INTO Emp VALUES(’e001’,’王’,’X’,’d1’);7.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM
9、商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库关系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();该关系没有达到第三范式的原因是()。A没有消除非主属性对码的部分函数依赖,如:仓库号→电话B没有消除非主属性对码的部分函数依赖,如:地址→电话C只消除了非主属性对码的部分函数依赖,而未消除传递函数依赖D只消除了非主属性对码的传递函数依赖,而未消除部分函数依赖8.某超市的商品(商品号,商品名称
10、,生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库关系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();SELECT 商品名称,()。ANUMBER(库存量)BSUM(库存量)
11、CCOUNT(库存量)DTOTAL(库存量)9.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库关系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),
12、();WHERE ()A生产商=联想B仓库.生产商=联想C生产商=’联想’D仓库.生产商=’联想’10.在需求分析阶段,需求调查的内容是(),需求分析的结果是()。在需求分析阶段,需求调查的内容是()。A信息要求、处理要求B安全性与完整性要求C信息要求、安全性要求D信息要求、处理要求、安全性与完整性要求11.For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, con
13、structing, and documenting the () of a software-intensive system. As the () standard modeling language, the UML facilitates communication and reduces confusion among project (). The recent standardization of UML 2.0 has further extended the language’s scope and viability. Its inherent expressi
14、veness allows users to () everything from enterprise information systems and distributed Web-based applications to real-time embedded systems.The UML is not limited to modeling software. In fact, it is expressive enough to model () systems, such as workflow in the legal system, the structure and beh
15、avior of a patient healthcare system, software engineering in aircraft combat systems, and the design of hardware.To understand the UML, you need to form a conceptual model of the language, and this requires learning three major elements: the UML’s basic building blocks, the rules that dictate
16、 how those building blocks may be put together, and some common mechanisms that apply throughout the UML.For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the () of a software-intensive system.AclassesB
17、componentsCsequencesDartifacts12.在需求分析阶段,需求调查的内容是(),需求分析的结果是()。在需求分析阶段,需求分析的结果是()。A数据流图B数据字典C数据流图、数据字典DE-R图13.For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the () of a software-intensive system. As
18、the () standard modeling language, the UML facilitates communication and reduces confusion among project (). The recent standardization of UML 2.0 has further extended the language’s scope and viability. Its inherent expressiveness allows users to () everything from enterprise information syst
19、ems and distributed Web-based applications to real-time embedded systems.The UML is not limited to modeling software. In fact, it is expressive enough to model () systems, such as workflow in the legal system, the structure and behavior of a patient healthcare system, software engineering in aircraf
20、t combat systems, and the design of hardware.To understand the UML, you need to form a conceptual model of the language, and this requires learning three major elements: the UML’s basic building blocks, the rules that dictate how those building blocks may be put together, and some common mecha
21、nisms that apply throughout the UML.As the () standard modeling language.ArealBlegalCde factoDillegal14.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库关系SQL语句的空缺部分补充完整。CRE
22、ATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();AND ()A商品名称=激光打印机AND商品.商品号=仓库.商品号B商品名称=’激光打印机’AND商品.商品号=仓库.商品号C商品名称=激光打印机OR商品.商品号=仓库.商品号D商品名称=’激光打印机’OR商品.商品号=仓库.商品号15.For nearly ten years, the Unified Modeling Language (UML) has been the ind
23、ustry standard for visualizing, specifying, constructing, and documenting the () of a software-intensive system. As the () standard modeling language, the UML facilitates communication and reduces confusion among project (). The recent standardization of UML 2.0 has further extended the language&rsq
24、uo;s scope and viability. Its inherent expressiveness allows users to () everything from enterprise information systems and distributed Web-based applications to real-time embedded systems.The UML is not limited to modeling software. In fact, it is expressive enough to model () systems, such as work
25、flow in the legal system, the structure and behavior of a patient healthcare system, software engineering in aircraft combat systems, and the design of hardware.To understand the UML, you need to form a conceptual model of the language, and this requires learning three major elements: the UML’
26、s basic building blocks, the rules that dictate how those building blocks may be put together, and some common mechanisms that apply throughout the UML.The UML facilitates communication and reduces confusion among project ().AinvestorsBdevelopersCdesignersDstakeholders16.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓
27、库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库关系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();地址 CHAR(20) ()。ANOTNULLBUNIQUECNOTNULLUNIQUEDPRIM
28、ARYKEY17.For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the () of a software-intensive system. As the () standard modeling language, the UML facilitates communication and reduces confusion among proj
29、ect (). The recent standardization of UML 2.0 has further extended the language’s scope and viability. Its inherent expressiveness allows users to () everything from enterprise information systems and distributed Web-based applications to real-time embedded systems.The UML is not limited to mo
30、deling software. In fact, it is expressive enough to model () systems, such as workflow in the legal system, the structure and behavior of a patient healthcare system, software engineering in aircraft combat systems, and the design of hardware.To understand the UML, you need to form a conceptual mod
31、el of the language, and this requires learning three major elements: the UML’s basic building blocks, the rules that dictate how those building blocks may be put together, and some common mechanisms that apply throughout the UML.Its inherent expressiveness allows users to () everything from en
32、terprise information systems and distributed Web-based applications to real-time embedded systems.AmodelBcodeCtestDmodify18.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述仓库
33、关系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),APRIMARY KEY(仓库号)BPRIMARY KEY(仓库号,商品号)CPRIMARY KEY(商品号,地址)DPRIMARY KEY(仓库号,地址)19.For nearly ten years, the Unified Modeling Language (UML) has been the ind
34、ustry standard for visualizing, specifying, constructing, and documenting the () of a software-intensive system. As the () standard modeling language, the UML facilitates communication and reduces confusion among project (). The recent standardization of UML 2.0 has further extended the language&rsq
35、uo;s scope and viability. Its inherent expressiveness allows users to () everything from enterprise information systems and distributed Web-based applications to real-time embedded systems.The UML is not limited to modeling software. In fact, it is expressive enough to model () systems, such as work
36、flow in the legal system, the structure and behavior of a patient healthcare system, software engineering in aircraft combat systems, and the design of hardware.To understand the UML, you need to form a conceptual model of the language, and this requires learning three major elements: the UML’
37、s basic building blocks, the rules that dictate how those building blocks may be put together, and some common mechanisms that apply throughout the UML.In fact, it is expressive enough to model () systems, such as workflow in the legal system, the structure and behavior of a patient healthcare syste
38、m, software engineering in aircraft combat systems, and the design of hardware.Anon-hardwareBnon-softwareChardwareDsoftware20.某超市的商品(商品号,商品名称,生产商,单价)和仓库(仓库号,地址,电话,商品号,库存量)两个基本关系如表1和表2所示。A仓库关系的主键是(),该关系没有达到第三范式的原因是();B查询联想生产的激光打印机的总库存量的SQL语句如下:SELECT 商品名称,()FROM商品,仓库WHERE () AND ();C若仓库关系的地址不能为空,请将下述
39、仓库关系SQL语句的空缺部分补充完整。CREATE TABLE仓库(仓库号CHAR(2),地址 CHAR(20) (),电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),(),();电话 CHAR(20),商品号 CHAR(5),库存量 NUMERIC(5),();AFOREIGN KEY(仓库号)REFERENCES仓库号BFOREIGN KEY(仓库号)REFERENCES仓库(仓库号)CFOREIGN KEY(商品号)REFERENCES仓库(商品号)DFOREIGN KEY(商品号)REFERENCES商品(商品号)21.应用MPLS VPN时,针对每个VP
40、N地址规划应满足的条件是 (1) 。不同的VPN信息通过MPLS骨干网(或核心网)时通过 (2) 进行区分。1()A每个VPN都是独立的,可以使用任何地址,只要保证在VPN内部合法正确即可BVPN之间的地址不能相互重叠CVPN内只能使用公网IP地址DVPN内只能使用私网IP地址22.在采用公开密钥密码体制的数字签名方案中,每个用户有一个私钥,可用它进行 (1) ;同时每个用户还有一个公钥,可用于 (2) 。1()A解密和验证B解密和签名C加密和签名D加密和验证23.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,他需要做的第一步工作通常是 (1) ;第二步通常是 (2) ;在成功入
41、侵该公司网络某台主机并取得该主机的控制权后,通常所作的工作是 (3) ;在窃取到机密信息后,最后需要做的工作是 (4) ;为了预防黑客入侵的第一步,该公司网络应该采取的预防措施为 (5) ;针对第二步的预防措施为 (6) 。为了能及时发现上述入侵,该公司网络需要配备 (7) 。1()A收集目标网络的所在位置及流量信息B到网上去下载常用的一些攻击软件C捕获跳板主机,利用跳板主机准备入侵D通过端口扫描等软件收集目标网站的IP地址、开放端口和安装的软件版本等信息24.用IPSec机制实现VPN时,如果企业内部网使用了私用IP地址,应该采用 (1) 技术,IPSec该采用 (2) 模式。1()ANAT
42、技术B加密技术C消息鉴别技术D数字签名技术25.网络安全应用协议SSL协议工作在 (1) ,HTTPS协议工作在 (2) 。1()A数据链路层B网络层C传输层D应用层26.在采用公开密钥密码体制的数字签名方案中,每个用户有一个私钥,可用它进行 (1) ;同时每个用户还有一个公钥,可用于 (2) 。2()A解密和验证B解密和签名C加密和签名D加密和验证27.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,他需要做的第一步工作通常是 (1) ;第二步通常是 (2) ;在成功入侵该公司网络某台主机并取得该主机的控制权后,通常所作的工作是 (3) ;在窃取到机密信息后,最后需要做的工作是
43、(4) ;为了预防黑客入侵的第一步,该公司网络应该采取的预防措施为 (5) ;针对第二步的预防措施为 (6) 。为了能及时发现上述入侵,该公司网络需要配备 (7) 。2()A了解目标网络的所在位置的周围情况及流量规律,选择流量小的时间发起攻击B下载攻击软件,直接发起攻击C向目标网络发起拒绝服务攻击D根据收集的开放端口和安装的软件版本等信息,到网络查找相关的系统漏洞,下载相应的攻击工具软件28.应用MPLS VPN时,针对每个VPN地址规划应满足的条件是 (1) 。不同的VPN信息通过MPLS骨干网(或核心网)时通过 (2) 进行区分。2()AIP地址+AS号BIP地址+子网掩码CVPN标识符D
44、VPN标识符+IP地址29.某企业拟建设通信网络对外提供服务。根据市场预测,未来业务发展好的概率为0.7,业务发展差的概率为0.3。现有三种规划方案可供选择:方案1,直接投资3000万元大规模建网。若业务发展得好,每年可获利1000万元,若业务发展不好,每年亏损200万元,服务期为10年;方案2,投资1400万元建设小规模网络。若业务发展得好,每年可获利400万元,若业务发展不好,每年仍可获利300万元,服务期为10年;方案3,前3年按方案2实施,即先投资1400万元建设小规模网络,收益同方案2。3年后若业务发展不好,则继续按方案2实施;若业务发展得好,则再追加投资2000万元进行网络扩容,扩
45、容后服务期为7年,每年可获利950万元。根据以上条件经计算可知()A方案1的期望净收益为5000万元B方案3的期望净收益为3595万元C方案1为最优方案D方案2为最优方案30.A glue that holds the whole Internet together is the network layer protocol, (1) .Unlike most older network layer protocols, it was designed from the beginning with internetworking in mind. Its job is to provide
46、a (2) way to transport data grams from source to destination, without regard to whether these machines are on the same network or whether there are other networks in between them.Communication in the Internet works as follows. The (3) layer takes data streams and breaks them up into data grams. Each
47、 datagram is transmitted through the Internet, possibly being fragmented into smaller units as it goes. When all the pieces finally get to the destination machine, they are reassembled by the (4) layer into the original datagram. This datagram is then handed to the transport layer, which inserts it
48、into the receiving process’ input stream.An IP datagram consists of a header part and a text part. The header has a (5) part and a variable length optional part.1()AIP (Internet Protocol)BIP (Interworking Protocol)CTCP (Transport Control Protocol)DTCP (Transfer Communication Protocol)31.黑客小张一天想尝试入侵某公司网络,窃取机密信息。为提高效率,