《计算机系统概论试卷.pdf》由会员分享,可在线阅读,更多相关《计算机系统概论试卷.pdf(46页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、Final EXAM STUDY MATERIALDONT forget to REVIEW all PPT1.properties are additional information placed within HTML bracketsthat control how the tab is used.TrueFalse2.Having a derived class function with the same name as a function inthe corresponding base class is called function overloading.TrueFals
2、e3.When deriving from a private base class,the public,protected andprivate members of the base class become private members of the derivedclass.TrueFalse4.A base-class initializer must always be provided in the derived-classconstructor to call the base-class constructor.TrueFalse5.After we implement
3、 inheritance in our system,we must recompile allour.cpp files before building an executable file.TrueFalse6.Placing the elevatorRef data member in the protected section of thebase-class declaration allows the derived classes to access that datamember.TrueFalse7.Polymorphism makes systems less extens
4、ible.HintTrueFalse8.Dynamic method binding is a Java feature that exhibits polymorphism.TrueFalse9.Variables declared as final can be modified after they have beendeclared.TrueFalse10.Abstract class objects never have to be instantiated.TrueFalse1.What is the syntax to write the HTML tags?A)(HTML)B)
5、C)HTML2D)2.Which is the correct tag to make a link that will send an email?A)B)C)3.Which tag makes the largest headline?A)HlB)H2C)H3D)H44.Between which set of tags does most of the content of your web page need to beplaced?A)B)C)D)5.What is the correct HTML tag for inserting an horizontal line?A)B)C
6、)horizontal line,D)6.HTML is_A)a company that provides access to the Internet.B)common questions and answers.C)the language of the Web.D)common graphic format on the Web.7.ISP is_A)a company that provides access to the Internet.B)the language of the Web.C)common graphic format on the Web.D)common qu
7、estions and answers.8.HTTP is a _A)file format used to transfer files from one word processor to another.B)a Web Address.C)file format that retains format on the Web.D)the transfer method used on the Web.9.A URL isA)a Web Address.B)file format that retains format on the Web.C)the transfer method use
8、d on the Web.D)file format used to transfer files from one word processor to another.10.What is the file extension used for HTML file?A).webpageB).shtml3C),htmlD).doc11.What is the HTML feature that divides a web page into two or more scrollableparts?A)Split PageB)Frame(结构)C)FormD)Table12.TCP/IP is
9、aA)communicating real time on the Internet.B)program that enhances a browsers capability.C)protocol used on the Internet that sends packets of information.D)a perfomance matrix used for authentic assessment.13.The tag makes text.?A)BoldB)InlineC)UnderlinedD)Italic14.A table is aA)ARPAnet.B)input are
10、a on a web page.C)Hyper text transfer protocolD)an interent activity that involves synthesis of information.Explain Types of Software Application software-Performs specific tasks for users System software-Provides infrastructure for application software-Consists of operating system and utility softw
11、areWhat are the Operating System Components Shell:Communicates with users-Text basedGraphical user interface(GUI)4 Window manager Kernel(内 核)Performing basic required functions-File manager-Device drivers-Memory manager-Scheduler and dispatcherWhat is a Memory Manager.Allocates space in main memory
12、May create the illusion that the machine has more memory than itactually does(virtual memory)by playing a shell game“in whichblocks of data(pages)are shifted back and forth between mainmemory and mass storageWhat is a Network?A network consists of two or more computers that are linked in order tosha
13、re resources(such as printers and CDs),exchange files,or allowelectronic communications.The computers on a network may be linkedthrough cables,telephone lines,radio waves,satellites,or infrared lightbeams.The two basic types of networks include:.Local Area Network(LAN).Wide Area Network(WAN)5You may
14、 also see references to a Metropolitan Area Networks(MAN),aWireless LAN(WLAN),or a Wireless WAN(WWAN).Local Area NetworkA Local Area Network(LAN)is a network that is confined to a relativelysmall area.It is generally limited to a geographic area such as a writinglab,school,or building.Rarely are LAN
15、 computers more than a mileapart.In a typical LAN configuration,one computer is designated as the fileserver.It stores all of the software that controls the network,as well as thesoftware that can be shared by the computers attached to the network.Computers connected to the file server are called wo
16、rkstations.Theworkstations can be less powerful than the file server,and they may haveadditional software on their hard drives.On many LANs,cables are usedto connect the network interface cards in each computer;other LANs maybe wireless.See the Topology,Cabling,and Hardware sections of thistutorial
17、for more information on the configuration of a LAN.Wide Area NetworkWide Area Networks(WANs)connect larger geographic areas,such asFlorida,the United States,or the world.Dedicated transoceanic cablingor satellite uplinks may be used to connect this type of network.Using a WAN,schools in Florida can
18、communicate with places like6Tokyo in a matter of minutes,without paying enormous phone bills.AWAN is complicated.It uses multiplexers to connect local andmetropolitan networks to global communications networks like theInternet.To users,however,a WAN will not appear to be much differentthan a LAN.Wh
19、at is a Topology?The physical topology of a network refers to the configuration of cables,computers,and other peripherals.Physical topology should not beconfused with logical topology which is the method used to passinformation between workstations.Main Types of Physical TopologiesThe following sect
20、ions discuss the physical topologies used in networksand other related topics.Linear BusStarTree(Expanded Star)Considerations When Choosing a TopologySummary ChartLinear Bus7A linear bus topology consists of a main run of cablewith a terminator at each end(See fig.1).All nodes(fileserver,workstation
21、s,and peripherals)are connected tothe linear cable.File ScruerB1=ri_ II_:_ JUw DE_nFig.Linear Bus topologyAdvantages of a Linear Bus TopologyEasy to connect a computer or peripheral to a linear bus.Requires less cable length than a star topology.Disadvantages of a Linear Bus TopologyEntire network s
22、huts down if there is a break in the main cable.Terminators are required at both ends of the backbone cable.Difficult to identify the problem if the entire network shuts down.Not meant to be used as a stand-alone solution in a large building.StarA star topology is designed with each node(file server
23、,workstations,andperipherals)connected directly to a central network hub,switch,orconcentrator(See fig.2).Data on a star network passes through the hub,switch,or concentrator8before continuing to its destination.The hub,switch,or concentratormanages and controls all functions of the network.It also
24、acts as arepeater for the data flow.This configuration is common with twisted paircable;however,it can also be used with coaxial cable or fiber optic cable.Fig.Star topologyAdvantages of a Star TopologyEasy to install and wire.No disruptions to the network when connecting or removing devices.Easy to
25、 detect faults and to remove parts.Disadvantages of a Star TopologyRequires more cable length than a linear topology.If the hub,switch,or concentrator fails,nodes attached are disabled.More expensive than linear bus topologies because of the cost of thehubs,etc.Tree or Expanded StarA tree topology c
26、ombines characteristics of linear bus and star topologies.9It consists of groups of star-configured workstations connected to a linearbus backbone cable(See fig.3).Tree topologies allow for the expansionof an existing network,and enable schools to configure a network to meettheir needs.Fig.Tree topo
27、logyAdvantages of a Tree TopologyPoint-to-point wiring for individual segments.Supported by several hardware and software venders.Disadvantages of a Tree TopologyOverall length of each segment is limited by the type of cabling used.If the backbone line breaks,the entire segment goes down.More diffic
28、ult to configure and wire than other topologies.10Several protocols overlap the session,presentation,andapplication layers of networks.There protocols listedbelow are a few of the more well-known:DNS-Domain Name System-translates networkaddress(such as IP addresses)into termsunderstood by humans(suc
29、h as URLs)DHCP-Dynamic Host Configuration Protocol-can automatically assign Internet addresses tocomputers and users FTP-File Transfer Protocol-a protocol thatis used to transfer and manipulate files on theInternet HTTP-HyperText Transfer Protocol-AnInternet-based protocol for sending andreceiving w
30、ebpages IMAP-Internet Message Access Protocol-Aprotocol for e-mail messages on the Internet IRC-Internet Relay Chat-a protocol used forInternet chat and other communications1 1.POP3-Post Office protocol Version 3-aprotocol used by e-mail clients to retrievemessages from remote servers.SMTP-Simple Ma
31、il Transfer Protocol-Aprotocol for e-mail messages on the Internet1.SQL structured query language2.ASCII American Standard Code for InformationInterchange3.WAN wide area network4.OS Operating systems5.CPU Central Processing Unit6.USB Universal serial bus7.FTP File transfer protocol8.PC Personal comp
32、uter9.MIS Management information system10.IT Information Technology判 断 题(o请将答案写在题前的括号中)()1.微计算机由运算器和控制器所组成,简称CPU。()2.I/O接口是一种人与计算机交换信息的界面。()3.数据的队列结构是一种按先进先出原则进行存12取的数据结构,因而它的存储结构只能是顺序结构。()4.进程是由程序、数据及PCB所组成。()5.虚拟存储器的容量主要由辅存大小决定。()6.在间接寻址方式中,指令中给出的地址是操作数地址的地址。()7.实存管理(如可变分区式管理)下,在不增加内存条的提示下也可以实现主存“
33、扩充”。()8.计算机的硬件与软件在逻辑上是等效的。()9.与高级语言相比汇编语言已没有优点。()1 0.多级目录结构中,允许信息文件重名,但其路径名必须不同。1.X 2.X 3.X 4.V 5.X 6.V 7.V 8.J 9.X 10.V单项选择题请将答案写在题中的横线上)1.在 系统中只使用0和loA.十进制 B.八进制 C.二进制D.十六进制2.在 无 符 号 整 数 中,4位地址分配单元可以表示个非负数。A.8 B.15 C.16 D.173.计算机病毒是 oA.生物病毒 B.有破坏作用的设备C.计算机指令或者程序代码 D.一种系统程序4.W ord中的 实际上一种已经编辑好的特殊13
34、文档。A.向导 B.模板 C.样 式D.标题5.计算 机 的 硬 件 系 统 包 括 oA.内存和外设 B.显示器和主机箱 C.主机和打印机 D.主机和外部设备6.Pentium IV 3.2微机型号中的3.2与 有关。A.显示器的类型 B.CPU的速度 C.内存容量D.磁盘容量7.CPU中的 可存放少量数据。A.存储器 B.辅助存储器 C.寄存器D.只读存储器8.TCP/IP协议的含义是 oA.局域网的传输协议 B.拨号入网的传输协议C.传输控制协议和网际协议 D.OSI协议集9.在局域网中,一端联接计算机,另一端联接传输介质的部件是。A.双绞线 B.网卡 C.B N C接头 D.终结器(堵
35、头)10.下面有关计算机操作系统的叙述中,是不正确的。A.操作系统属于系统软件B.操作系统只管理内存,而不管理外存C.UNIX、Windows 2000属于操作系统D.计算机的内存、I/O设备等硬件资源也由操作系统管理。1 1.如果单元格中输入内容以 开始,Excel认为输入的是公式。A.=B.!C.*D.1 2.供科学研究、军事和大型组织用的高速、大容量计算机是 O14A.微型机 B.小型机 C.大型机D.巨型机1 3.队列的存取规则是 oA.随机存取 B.先进先出 C.先进后出D.按名存取1 4.A LU 完 成 算 术 操 作 和 oA.存储数据 B.奇偶校验 C.逻辑操作 D.二进制计
36、算15.下列 是顺序存取的存储媒体。A.软盘 B.硬盘 C.光盘D.磁带16.数 据库管理系统可分为三种类型是 oA.小型、中型和大型 B.层次型、网状型和关系型C.集中型、联机型和分布型 D.实时型、分时型和共享型1 7.防止内部网络受到外部攻击的主要防御措施是A.防火墙 B.杀毒程序 C.加密D.备份18.下列I P 地址中,错误的表示是A.2 1 0.39.0.35 B.1 8.1 81.0.31C.1 66.1 1 1.9.2 D.1 92.5.348.341 9.CD-R O M上的光道是 oA.同心环 B.放射形状 C.螺旋线形D.都不是2 0.S Q L语言中,实 现 数 据 检
37、 索 的 是。A.S E LE CT B.I N S E R T C.U P D A T E D.D E LE T El.C6.B2.B 3.C7.C 8.C4.B9.B5.D10.B1511.A 12.D 13.B 14.C 15.D16.B 17.A 18.D 19.C 20.A判断题(请将答案写在题前的括号中)()1.在字号选择中,所用阿拉伯数字越大表示字符越大,中文数目越大则表示字符越小。()2.在 用 W o r d 2 0 0 0 制表时,只能在水平方向合并单元格,不能在垂直方向合并单元格。()3.补码运算的结果是正数时得到的就是真值。()4.如果没有软件,计算机是不能工作的。()
38、5.计算机总采用二进制仅仅是为了计算简单.。1.(V)2.(X)3.(V)4.(V)5.(X)()6.八进制数中最大的数字是8。()7.W i n d o w s 2 0 0 0 的字处理软件、写字板和记事本都可以编辑文本,表格和图形。()8.在数据传输方式中,在一个通信线路上允许双向通信,但不能同时双向传送的称为全双工通信。()9.P o w e r P o i n t 中的一张幻灯片相当于W o r d 中的一页文档,可以进行段落格式化。()1 0.Ex c e l 2 0 0 0 中,清除单元格就是删除单元格。6.(X)7.(X)8.(X)9.(V)10.(X)1 .D B S是 由 D
39、 B和D B M S所 组 成。()2.通过赋于用户不同的存取控制权限,可以协调文件的共享与保护之间的矛盾。()3.多级目录结构中,允许信息文件重名,但其路径名必须不同()164.源程序在编译后所生成的目标代码就是一种可执行5.微计算机由运算器和控制器所组成,简 称 CPU()1.X 2.V 3.V 4.X 5.X6 .I/o 接口是一种人与计算机交换信息的界面。()7.数据的队列结构是一种按先进先出原则进行存取的数据结构,因而它的存储结构只能是顺序结构。(O 声 力 J在储 器 的 容 量 主 要 由 辅 存 大 京 定()9.在间接寻址方式中,指令中给出的地址是操作数地址的地址。()10.
40、按速度的快慢次序排列,计算机系统的三级存储体系是主存、Cache 和辅存。()6.X 7.X 8.X9.V 10.X11.用 DMA方式实现输入/输出时,由DMA控制器发出控制信号,实现外设与主存之间的信息直接交换,无需CPU参与。()12.面向对象程序设计的基本思路是只需告诉计算机“做什么”而无需告诉计算机“怎么做”。()13.与 高 级 语 言 相 比 汇 编 语 言 已 没 有 优 点。()14.计算机的硬件与软件在逻辑上是等效的。()15.实存管理(如可变分区式管理)下,在不增加内存 条 的 提 示 下 也 可 以 实 现 主 存“扩 充”。()11.J 12.V 13.X 14.V
41、15.V16.简单的数据应辑结而与物施结构完整一致,血数组和表结构。()删除的内容:1717.从数据的逻辑结构到物理结构,数据元素间的关系 发 生 了 改 变,但 数 据 元 素 不 变。()18.进 程 是 由 程 序、数 据 及P C B所 组 成。()19.光盘存储信息轨道与磁盘存储信息的磁道结构相同。()20.高 级 程 序 设 计 语 言Pascal是用发明机械式计16.V17.V 18.V 19.X 20.V,请分别写出这10个专业术语的所对应的英文全称。(共2 0分)ROM_Read-only memory_CPU_Central processing unit._OLE_ Ob
42、ject Linking and embedding_SQL _Structured Query LanguageGUI_ Graphical User interface_CAI_Computer-aided instruction_VCD_Video Compact Disk_TCP_Transfer Control Protocol,_LAN_Local area network_18OS_Operating System_1、世界上第一台计算机诞生于1947年。(X)2、鼠标是一种输入设备。(V)3、保持计算机清洁卫生可有效防止计算机病毒。(X)4、目前使用的计算机基本上遵循冯诺依曼体
43、系结构。(V )5、显示器需要显示卡的支持才能显示计算机信息。(V)6、关闭Windows操作系统可以直接关闭电源开关。(X)7、Windows操作系统的文件名可以包含空格。(V )8、记事本和写字板是功能相同的编辑程序。(X)What is software engineering?Software engineering is an engineering discipline which is concernedwith all aspects of software productionSoftware engineers should adopt a systematic and o
44、rganised approach totheir work and use appropriate tools and techniques depending on theproblem to be solved,the development constraints and the resourcesavailableWhat is the difference between softwareengineering and computer science?Computer science is concerned with theory and fundamentals;softwa
45、reengineering is concerned with the practicalities of developing and19delivering useful softwareComputer science theories are currently insufficient to act as a completeunderpinning for software engineeringWhat is a software process?A set of activities whose goal is the development or evolution of s
46、oftwareGeneric activities in all software processes are:Specification-what the system should do and its developmentconstraintsDevelopment-production of the software systemValidation-checking that the software is what the customer wantsEvolution-changing the software in response to changing demandsSo
47、ftware Development Process ModelsWaterfall Model has the following stages or workflows:20Requirements:Capture what the system shall do Reach agreement between the customer(orstakeholder)and development team Define the requirements in stakeholder language:include text and Use Case Models.Analysis:Str
48、ucture the requirements into a logicalsystem Define the problem(or logic)in structured UML(orother)notationDesign:Applying a physical architecture to the logicsystem21 Apply computer science techniques(s/w packages,algorithms,data structures)to the logical designImplementation:Code the software May
49、include Unit Test to verify proper moduleconstructionTest:Verify that the software executes as required May include Integration Test,Acceptance Test,Alpha&Beta Test,Regression Test,System Test.System Test:Entire system is tested.Thoroughtest.Regression Test:Re-testing existing features.Acceptance Te
50、st:Client is present at testing Alpha Test:Same as acceptance test.Customeragrees that product works as specified,in dry run.Beta Test:In actual environment.The spiral model,The spiral model by B.Boehm(1980)is a moresophisticated extension of the waterfall model22(http:en.wikipedia.ore/wiki/SpiraI m