2023年江苏软件水平考试考试真题卷(5).docx

上传人:1398****507 文档编号:75637197 上传时间:2023-03-03 格式:DOCX 页数:26 大小:18.94KB
返回 下载 相关 举报
2023年江苏软件水平考试考试真题卷(5).docx_第1页
第1页 / 共26页
2023年江苏软件水平考试考试真题卷(5).docx_第2页
第2页 / 共26页
点击查看更多>>
资源描述

《2023年江苏软件水平考试考试真题卷(5).docx》由会员分享,可在线阅读,更多相关《2023年江苏软件水平考试考试真题卷(5).docx(26页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、2023年江苏软件水平考试考试真题卷(5)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.某磁盘盘组共有10个盘面,每个盘面上有100个磁道,每个磁道有32个扇区,假定物理块的大小为2个扇区,分配以物理块为单位。若使用位示图(Bitmap)管理磁盘空间,则位图需要占用 (13) 字节空间。若采用空白文件管理磁盘空间,且空白文件目录的每个表项占用5个字节,则当空白文件数目大于 (14) 时,空白文件目录占用的字节数大于位图占用的字节数。A400B360C320D1602.若某航空公司的飞机订票

2、系统有行个订票终端,系统为每个订票终端创建一个售票终端的进程。假设Pi(i=1,2,n)表示售票终端的进程,Hj(j=1,2,m)表示公共数据区,分别存放各个航班的现存票数,Temp为工作单元。系统初始化时将信号量S赋值为 (4) 。Pi进程的工作流程如图1-14所示,a、b和c处将执行P操作和v操作,则图1-14中a、b和c应填入 (5) 。AP(S)、V(S)和V(S)BP(S)、P(S)和V(S)CV(S)、P(S)和P(S)DV(S)、V(S)和P(S)3.某计算机系统中有一个CPU、一台扫描仪和一台打印机。现有3个图像任务,每个任务有3个程序段:扫描Si,图像处理Ci和打印Pi(i=

3、1,2,3)。如图1-15所示为3个任务各程序段并发执行的前驱图,其中, (7) 可并行执行, (8) 的直接制约, (9) 的间接制约。AS1受到S2和S3、C1受到C2和C3、P1受到P2和P3BS2和S3受到S1、C2和C3受到C1、P2和P3受到P1CC1和P1受到S1、C2和P2受到S2、C3和P3受到S3DC1和S1受到P1、C2和S2受到P2、C3和S3受到P34.进程P1、P2、P3、P4、P5的前趋图如图117所示。 若用PV操作控制进程并发执行的过程,则需要设置4个信号量S1、S2、S3和S4,且信号量初值都等于零。图118中a和b应分别填写 (17) ,c和d应分别填写

4、(18) ,e和f应分别填写 (19) 。AP(S1)、P(S2)和V(S3)、V(S4)BP(S1)、P(S2)和P(S3)、P(S4)CV(S1)、V(S2)和P(S3)、P(S4)DV(S1)、V(S2)和V(S3)、V(S4)5.微内核的操作系统(OS)结构如图116所示,图中和分别工作在 (15) 方式下,与传统的OS结构模式相比,采用微内核的OS结构模式的优点是提高了系统的灵活性、可扩充性, (16) 。A并增强了可靠性,可运行于分布式系统中B并增强了可靠性,但不适用于分布式系统C但降低了可靠性,可运行于分布式系统中D但降低了可靠性,不适用于分布式系统6.进程P1、P2、P3、P4

5、、P5的前趋图如图117所示。 若用PV操作控制进程并发执行的过程,则需要设置4个信号量S1、S2、S3和S4,且信号量初值都等于零。图118中a和b应分别填写 (17) ,c和d应分别填写 (18) ,e和f应分别填写 (19) 。AP(S3)和P(S4)BP(S3)和V(S4)CV(S3)和V(S4)DV(S3)和P(S4)7.对长度为N的线性表进行查找,若采用顺序查找法,那么在最坏情况下所需要的比较次数为 (42) ;若采用折半查找法,那么在最坏隋况下所需比较的次数为 (43) 。ANBN+1CN/2D(N+1)/2 8.数据库管理系统(DBMS)是位于 (37) 之间的层管理软件,它是

6、一种 (38) 的数据。A硬件和软件B开发者和用户C用户和操作系统D开发者和操作系统 9.实体完整性约束指的是 (64) ,参照完整性约束指的是 (65) 。A关系R的主属性木能取空值B关系R中的所有属性均不能取空值C关系R中至少有一个属性不能取空值D关系R中至多只能有一个属性取空值 10.我们用的掌上电脑通常采用的是 (10) ,其典型特性有 (11) 。 完成某一项或有限项功能,不是通用型的 在性能和实时性方面有严格的限制 能源、成本和可靠性通常是影响设计的重要因素,占有资源少,易于连接 系统功能可针对需求进行裁剪、调整和生成,以便满足最终产品的设计要求A并行操作系统B网络操作系统C嵌入式

7、操作系统D分布式操作系统 11.我们常用的数据模型类型有层次模型、网状模型、关系模型和面向对象模型四种。 (51) 是数据库系统中最早出现的数据模型,其数据库系统的典型代表是IBM公司的IMS(Information Management Systems)数据库管理系统;而 (52) 是使用最广的数据模型。A层次模型B网状模型C关系模型D面向对象模型 12.As mentioned above, C imposes relatively few built - in ways of doing things on the program- mer. Some common tasks, suc

8、h as manipulating (66) , (67) , and doing (68) (I/O), are performed by calling on library functions. Other tasks which you might want to do, such as creating or listing directories, or interacting with a mouse, or displaying windows or other (69) elements, or doing color graphics, are not defined by

9、 the C language at all. You can do these things from a C program, of course, but you will be calling on services which are peculiar to your programming environment (70) , processor, and operating system) and which are not defined by the C standard. Since this course is about portable C programming,

10、it will also be steering clear of facilities not provided in all C environments.AlinesBstringsCthreadsDroutes 13.The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the (71) of the operating system: it allocates time and memory to progra

11、ms and handles the filestore and communications in response to (72) . The shell acts as an (73) between the user and the kernel. When a user logs in, the (74) program checks the username and password, and then starts another program called the shell. The shell is a command line (75) (CLI). It interp

12、rets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt (% on our systems).AhubBcenterCcoreDnucleus 14.根据数据模型的应用目的不同,数据模型可分为 (39) ;而根据数据结构的类型,数据模型又可分为 (40) 。A概念模型和层次模型B概念模型和数据模型C层次模

13、型,分布模型和网状膜型D层次模型,网状模型和关系模型 15.我们用的掌上电脑通常采用的是 (10) ,其典型特性有 (11) 。 完成某一项或有限项功能,不是通用型的 在性能和实时性方面有严格的限制 能源、成本和可靠性通常是影响设计的重要因素,占有资源少,易于连接 系统功能可针对需求进行裁剪、调整和生成,以便满足最终产品的设计要求ABCD 16.数据库管理系统(DBMS)是位于 (37) 之间的层管理软件,它是一种 (38) 的数据。A结构化B非结构化C体系化D非体系化 17.我们常用的数据模型类型有层次模型、网状模型、关系模型和面向对象模型四种。 (51) 是数据库系统中最早出现的数据模型,

14、其数据库系统的典型代表是IBM公司的IMS(Information Management Systems)数据库管理系统;而 (52) 是使用最广的数据模型。A层次模型B网状模型C关系模型D面向对象模型 18.The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the (71) of the operating system: it allocates time and memory to programs and h

15、andles the filestore and communications in response to (72) . The shell acts as an (73) between the user and the kernel. When a user logs in, the (74) program checks the username and password, and then starts another program called the shell. The shell is a command line (75) (CLI). It interprets the

16、 commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt (% on our systems).Asystem commandsBsystem callsCsystem transferDsystem deliver 19.实体完整性约束指的是 (64) ,参照完整性约束指的是 (65) 。A若关系R的外码是属性(或属性组

17、)F,它与关系S的主码K相对应,则关系S的主码K的取值必须在关系R中属性(或属性组)F的取值范围内B若关系R的外码是属性(或属性组)F,它与关系S的主码,K相对应,则关系R中属性(或属性组)F的取值必须在关系S的主码K的取值范围内C若关系R的外码是属性(或属性组)F,它与关系S的主码K相对应,则对于R中每个记录在F上的值必须等于S中某个记录的主码值。D若关系R的外码是属性(或属性组)F,它与关系S的主码K相对应,则对于R中每个记录在P上的值或者取空值(F的每个属性值均为空值);或者等于S中某个记录的主码值。 20.对长度为N的线性表进行查找,若采用顺序查找法,那么在最坏情况下所需要的比较次数为

18、 (42) ;若采用折半查找法,那么在最坏隋况下所需比较的次数为 (43) 。Alog2NBlog2N+1Clog2(N+1)Dlog2(N+1)+1 21.根据数据模型的应用目的不同,数据模型可分为 (39) ;而根据数据结构的类型,数据模型又可分为 (40) 。A概念模型和层次模型B概念模型和数据模型C层次模型,分布模型和网状模型D层次模型,网状模型和关系模型 22.As mentioned above, C imposes relatively few built - in ways of doing things on the program- mer. Some common tas

19、ks, such as manipulating (66) , (67) , and doing (68) (I/O), are performed by calling on library functions. Other tasks which you might want to do, such as creating or listing directories, or interacting with a mouse, or displaying windows or other (69) elements, or doing color graphics, are not def

20、ined by the C language at all. You can do these things from a C program, of course, but you will be calling on services which are peculiar to your programming environment (70) , processor, and operating system) and which are not defined by the C standard. Since this course is about portable C progra

21、mming, it will also be steering clear of facilities not provided in all C environments.Aallocating storageBallocating memoryCdistributing memoryDassigning storage 23.As mentioned above, C imposes relatively few built - in ways of doing things on the program- mer. Some common tasks, such as manipulat

22、ing (66) , (67) , and doing (68) (I/O), are performed by calling on library functions. Other tasks which you might want to do, such as creating or listing directories, or interacting with a mouse, or displaying windows or other (69) elements, or doing color graphics, are not defined by the C languag

23、e at all. You can do these things from a C program, of course, but you will be calling on services which are peculiar to your programming environment (70) , processor, and operating system) and which are not defined by the C standard. Since this course is about portable C programming, it will also b

24、e steering clear of facilities not provided in all C environments.Ainput/outputBinoptimization/optimizationCinside/outsideDinordinacy/ordinance 24.The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the (71) of the operating system: it a

25、llocates time and memory to programs and handles the filestore and communications in response to (72) . The shell acts as an (73) between the user and the kernel. When a user logs in, the (74) program checks the username and password, and then starts another program called the shell. The shell is a

26、command line (75) (CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt (% on our systems).AinterfaceBinterconnectCchangerDboundary 25.As mentioned above, C impose

27、s relatively few built - in ways of doing things on the program- mer. Some common tasks, such as manipulating (66) , (67) , and doing (68) (I/O), are performed by calling on library functions. Other tasks which you might want to do, such as creating or listing directories, or interacting with a mous

28、e, or displaying windows or other (69) elements, or doing color graphics, are not defined by the C language at all. You can do these things from a C program, of course, but you will be calling on services which are peculiar to your programming environment (70) , processor, and operating system) and

29、which are not defined by the C standard. Since this course is about portable C programming, it will also be steering clear of facilities not provided in all C environments.Auser - interconnectBperson - interconnectCuser - interfaceDperson - interface 26.The UNIX operating system is made up of three

30、parts; the kernel, the shell and the programs. The kernel of UNIX is the (71) of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to (72) . The shell acts as an (73) between the user and the kernel. When a user logs in, the (74)

31、program checks the username and password, and then starts another program called the shell. The shell is a command line (75) (CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user

32、 another prompt (% on our systems).AenterBinsideCloginDlogout 27. (61) 是关系数据库的标准语言,它主要由 (62) 和一些其它语言要素组成。ACBC+CPascalDSQL 28.The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the (71) of the operating system: it allocates time and memo

33、ry to programs and handles the filestore and communications in response to (72) . The shell acts as an (73) between the user and the kernel. When a user logs in, the (74) program checks the username and password, and then starts another program called the shell. The shell is a command line (75) (CLI

34、). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt (% on our systems).AinterconnectBindexCinterfaceDinterpreter 29. (61) 是关系数据库的标准语言,它主要由 (62) 和一些其它语言要素组成。A数据定义语言,数

35、据操纵语言和数据控制语言B数据定义语言,数据操纵语言和数据说明语言C数据定义语言,数据说明语言和数据控制语言D数据说明语言,数据操纵语言和数据控制语言 30.As mentioned above, C imposes relatively few built - in ways of doing things on the program- mer. Some common tasks, such as manipulating (66) , (67) , and doing (68) (I/O), are performed by calling on library functions.

36、Other tasks which you might want to do, such as creating or listing directories, or interacting with a mouse, or displaying windows or other (69) elements, or doing color graphics, are not defined by the C language at all. You can do these things from a C program, of course, but you will be calling

37、on services which are peculiar to your programming environment (70) , processor, and operating system) and which are not defined by the C standard. Since this course is about portable C programming, it will also be steering clear of facilities not provided in all C environments.AgathererBtranslatorC

38、generatorDcompiler 31.以关键字比较为基础的排序算法在最坏情况下的计算时间下界为O(nlogn)。下面的排序算法中,在最坏的情况下,计算时间可以达到O(nlogn)的是 (53) ;该算法采用的设计方法是 (54) 。(53)处填()。A归并排序B插入排序C选择排序D冒泡排序32.逻辑覆盖标准主要用于 (14) 。它主要包括条件覆盖、条件组合覆盖、判定覆盖、条件及判定覆盖、语句覆盖、路径覆盖等几种,其中除路径覆盖外最弱的覆盖标准是 (15) 。(14)处填()。A黑箱测试方法B白箱测试方法C灰盒测试方法D软件验证方法33.以关键字比较为基础的排序算法在最坏情况下的计算时间下

39、界为O(nlogn)。下面的排序算法中,在最坏的情况下,计算时间可以达到O(nlogn)的是 (53) ;该算法采用的设计方法是 (54) 。(54)处填()。A分治法B贪心法C动态规划法D回溯34.逻辑覆盖标准主要用于 (14) 。它主要包括条件覆盖、条件组合覆盖、判定覆盖、条件及判定覆盖、语句覆盖、路径覆盖等几种,其中除路径覆盖外最弱的覆盖标准是 (15) 。(15)处填()。A条件测试B条件组合覆盖C判定覆盖D语句覆盖35.目前,我国已形成了相对完备的知识产权保护的法律体系,对软件形成一种综合性的法律保护,如源程序和设计文档作为软件的表现形式受 (9) 保护,同时作为技术秘密又受 (10

40、) 的保护。(9)处填()。A著作权法B合同法C专利法D反不正当竞争法36.对于构件,应当按可复用的要求进行设计、实现、打包、编写文档。构件应当 (50) ,并具有相当稳定的公开的 (51) 。有的构件具有广泛的可复用性,可复用到众多种类的应用系统中,有的构件只在有限的特定范围内被复用。(50)处填()。A内聚的B耦合的C外延的D封闭的37.软件能力成熟度模型CMM(Capability Maturity Model)描述和分析了软件过程能力的发展与改进的程度,确立了一个软件过程成熟程度的分级标准。在 (19) ,已建立了基本的项目管理过程,可对成本、进度和功能特性进行跟踪。在 (20) ,用

41、于软件管理与工程量方面的软件过程均已文档化、标准化,并形成了整个软件组织的标准软件过程。(19)处填()。A可重复级B已管理级C功能级D成本级38.(24) 存储管理方式提供一维地址方式,算法简单但存储碎片多。 (25) 存储管理能使存储碎片尽可能的少,而且内存利用率较高,它每取一数据,要访问内存 (26) 次。(24)处填()。A固定分区B分页式C分段式D段页式39.将拥有2500台主机的网络划分为两个子网,并采用C类IP地址。子网1有500台主机,子网2有2000台主机,则子网1的子网掩码应设置为 (62) ,子网2至少应划分为 (63) 个C类网络。(62)处填()。A255.255.2

42、55.0B255.255.250.128C255.255.240.0D255.255.254.040.Basically, a firewall is a (71) process or a set of integrated processes that runs on a router or (72) to control the flow of networked application traffic (73) through it. Typically, firewalls are placed on the entry point to a (74) Network such as

43、 the Internet. They could be considered traffic cops. The firewall’s (75) is to ensure that all communication between an organization’s network and the Internet conform to the organization’s security policies.(71)处填()。AdependentBisolatedCrelatedDstandalone41.软件能力成熟度模型CMM(Capability

44、 Maturity Model)描述和分析了软件过程能力的发展与改进的程度,确立了一个软件过程成熟程度的分级标准。在 (19) ,已建立了基本的项目管理过程,可对成本、进度和功能特性进行跟踪。在 (20) ,用于软件管理与工程量方面的软件过程均已文档化、标准化,并形成了整个软件组织的标准软件过程。(20)处填()。A标准级B已定义级C可重复级D优化级42.目前,我国已形成了相对完备的知识产权保护的法律体系,对软件形成一种综合性的法律保护,如源程序和设计文档作为软件的表现形式受 (9) 保护,同时作为技术秘密又受 (10) 的保护。(10)处填()。A专利法B合同法C著作权法D反不正当竞争法43

45、.对于构件,应当按可复用的要求进行设计、实现、打包、编写文档。构件应当 (50) ,并具有相当稳定的公开的 (51) 。有的构件具有广泛的可复用性,可复用到众多种类的应用系统中,有的构件只在有限的特定范围内被复用。(51)处填()。A界面B接口C文档D规范44.Hash函数有共同的性质,则函数值应当以 (55) 概率取其值域的每一个值。解决Hash法中出现的冲突问题常采用的方法是 (56) 。(55)处填()。A最大B最小C平均D同等45.为了保障数据的存储和传输安全,需要对一些重要数据进行加密。由于对称密码算法 (22) ,所以特别适合对大量的数据进行加密。国际数据加密算法IDEA的密钥长度

46、是 (23) 位。(22)处填()。A比非对称密码算法更安全B比非对称密码算法密钥长度更长C比非对称密码算法效率更高D还能同时用于身份认证46.已知关系R如下表所示,关系R的主属性为 (33) ,候选关键字分别为 (34) 。(33)处填()。AABCBABDCACDDABCD47.(24) 存储管理方式提供一维地址方式,算法简单但存储碎片多。 (25) 存储管理能使存储碎片尽可能的少,而且内存利用率较高,它每取一数据,要访问内存 (26) 次。(25)处填()。A固定分区B分页式C分段式D段页式48.Hash函数有共同的性质,则函数值应当以 (55) 概率取其值域的每一个值。解决Hash法中出现的冲突问题常采用的方法是 (56) 。(56)处填()。A数字分析法、除余法、

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 考试试题 > 事业单位考试

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁