欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    2022内蒙古软件水平考试考试模拟卷(2).docx

    • 资源ID:20772496       资源大小:22.65KB        全文页数:26页
    • 资源格式: DOCX        下载积分:20金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要20金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    2022内蒙古软件水平考试考试模拟卷(2).docx

    2022内蒙古软件水平考试考试模拟卷(2)本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.利用并行处理技术可以缩短计算机的处理时间,所谓并行性是指 (1) 。可以采用多种措施来提高计算机系统的并行性,它们可分成三类,即 (2) 。提供专门用途的一类并行处理机(亦称阵列处理机)以 (3) 方式工作,它适用于 (4) 。多处理机是目前较高性能计算机的基本结构,它的并行任务的派生是 (5) 。5()A需要专门的指令来表示程序中并发关系和控制并发执行B靠指令本身就可以启动多个处理单元并行工作C只执行没有并发约束关系的程序D先并行执行,事后再用专门程序去解决并发约束2.计算机执行程序所需的时间P,可用P=I×CPI×T来估计,其中I是程序经编译后的机器指令数,CPI是执行每条指令所需的平均机器周期数,T为每个机器周期的时间。 RISC计算机是采用 (1) 来提高机器的速度。它的指令系统具有 (2) 的特点。指令控制部件的构建, (3) 。RISC机器又通过采用 (4) 来加快处理器的数据处理速度。RISC的指令集使编译优化工作 (5) 。3()ACISC更适于采用硬布线控制逻辑,而RISC更适于采用微程序控制BCISC更适于采用微程序控制,而RISC更适于采用硬布线控制逻辑CCISC和RISC都采用微程序控制DCISC和RISC都只采用硬布线控制逻辑3.RISC是指 (1) 计算机。通常CPU具有高时钟频率,尽量使用单周期操作,其采用 (2) 控制方式。RISC机一般也采用 (3) 结构,遇到转移指令时可以采用延迟转移等办法来解决转移的相关性;并要求编译系统相配合。RISC机都采用了较大的 (4) 结构,以减少访问主存的频度,访内通常仅用LOAD/STORE类指令。RISC和 (5) 技术相结合是当前高速计算机发展的一个重要方向。5()A交叉存取B多处理机C运算器D存储器模块4.被操作数的最高位移入进位位,其余所有位接收其相邻低位值,最低位移入0的操作是 (1) 指令。被操作数的最高位保持不变,其余所有位接收其相邻高位值,最低位移到进位位中的操作是 (2) 指令。在程序执行过程中改变按程序计数器顺序读出指令的指令属于 (3) 。相对寻址方式的实际地址是 (4) 。特权指令在多用户、多任务的计算机系统中必不可少,它主要用于 (5) 。4()A程序计数器的内容加上指令中形式地址值B基值寄存器的内容加上指令中形式地址值C指令中形式地址中的内容D栈顶内容5.计算机执行程序所需的时间P,可用P=I×CPI×T来估计,其中I是程序经编译后的机器指令数,CPI是执行每条指令所需的平均机器周期数,T为每个机器周期的时间。 RISC计算机是采用 (1) 来提高机器的速度。它的指令系统具有 (2) 的特点。指令控制部件的构建, (3) 。RISC机器又通过采用 (4) 来加快处理器的数据处理速度。RISC的指令集使编译优化工作 (5) 。4()A多寻址方式B大容量内存C大量的寄存器D更宽的数据总线6.被操作数的最高位移入进位位,其余所有位接收其相邻低位值,最低位移入0的操作是 (1) 指令。被操作数的最高位保持不变,其余所有位接收其相邻高位值,最低位移到进位位中的操作是 (2) 指令。在程序执行过程中改变按程序计数器顺序读出指令的指令属于 (3) 。相对寻址方式的实际地址是 (4) 。特权指令在多用户、多任务的计算机系统中必不可少,它主要用于 (5) 。5()A检查用户的权限B系统硬件自检和配置C用户写汇编程序时调用D系统资源的分配和管理7.计算机执行程序所需的时间P,可用P=I×CPI×T来估计,其中I是程序经编译后的机器指令数,CPI是执行每条指令所需的平均机器周期数,T为每个机器周期的时间。 RISC计算机是采用 (1) 来提高机器的速度。它的指令系统具有 (2) 的特点。指令控制部件的构建, (3) 。RISC机器又通过采用 (4) 来加快处理器的数据处理速度。RISC的指令集使编译优化工作 (5) 。5()A更简单B更复杂C不需要D不可能8.服务器的部署是网络规划的重要环节。某单位网络拓扑结构如图所示,需要部署VOD服务器、Web服务器、邮件服务器,此外还需要部署流量监控服务器对单位内部网络流量进行监控。VOD服务器应部署在位置 (2) ,Web服务器应部署在位置 (3) ,流量监控服务器应部署在位置 (4) 。上述服务器中,流出流量最大的是 (5) ,流入流量最大的是 (6) 。ABCD9.A project management technique that is currently in widespread use is the (66) . The purpose of this technique is to detail, in hierarchical fashion, all of the activities that are required to meet project objectives. There are some special activities called (67) , which are events that signify the accomplishment or completion of major deliverables during the project. Most system development methodologies also provide (68) , whose purpose is to contain the various pieces of relevant information - feasibility assessments, schedules, needs analysis, and so forth - in a single place so that they can be presented to project clients and other related parties. Several types of important network diagrams are used in project management. (69) was developed to make clear the interdependence between project tasks before those tasks are scheduled. (70) offers the advantage of clearly showing overlapping tasks.A. Functional decomposition diagram B. Work Breakdown Structure C. Structure Chart D. Organizational Structure 10.净室软件工程(Cleanroom)是软件开发的一种形式化方法,可以开发较高质量的软件。它使用 (91) 进行分析和建模,并且将 (92) 作为发现和排除错误的主要机制。使用 (93) 测试来获取认证软件可靠性所需要的信息。A产生式归约B移进归约C盒结构归约D规范归约11.UML采用4+1视图来描述软件和软件开发过程,其中 (9) 描绘了所设计的并发与同步结构; (10) 表示软件到硬件的映射及分布结构;UML中的类图可以用来表示4+1视图中的 (11) 。A逻辑视图(Logical View)B实现视图(Implementation View)C进程视图(Process View)D部署视图(Deployment View)12.若某航空公司的飞机订票系统有n个订票终端,系统为每个订票终端创建一个售票终端的进程。假设Pi(i=1,2,n)表示售票终端的进程,Hj(j=1,2,m)表示公共数据区,分别存放各个航班的现存票数,Temp为工作单元。系统初始化时将信号量S赋值为 (26) 。Pi进程的工作流程如图所示,a、b和c处将执行P操作和V操作,则图中a、b和c应填入 (27) 。A0B1C2D313.至是风险管理中的4个活动,其恰当的顺序是 (120) 。风险识别的一个方法是 (121) 。 选择风险管理工具 研究风险处理方法 评估风险处理结果 风险识别、确认和度量ABCD14.All known techniques for handling complex problems successfully seem to fall into one of the three classes: subdividing the problem (51) , ignoring irrelevant detail in a safe way (52) , and having an independent agent (53) the internal consistency (contextual checking). The first two provide guidelines for solving the problem, the third serves to provide early warnings. A good programming language supports all three. In subdividing problem, some of the subproblems may be similar to the (54) problem. It leads us to a (55) solution. This (55) solution is viable provided each of the subproblems is easier to solve than the original problem.A. abrogation B. abstraction C. composition D. contraction 15.N(0,1)为标准正态分布,它的密度函数为_,在x=_处有拐点,x=_处有最大值。利用正态分布的结论,有=_。 16.A project management technique that is currently in widespread use is the (66) . The purpose of this technique is to detail, in hierarchical fashion, all of the activities that are required to meet project objectives. There are some special activities called (67) , which are events that signify the accomplishment or completion of major deliverables during the project. Most system development methodologies also provide (68) , whose purpose is to contain the various pieces of relevant information - feasibility assessments, schedules, needs analysis, and so forth - in a single place so that they can be presented to project clients and other related parties. Several types of important network diagrams are used in project management. (69) was developed to make clear the interdependence between project tasks before those tasks are scheduled. (70) offers the advantage of clearly showing overlapping tasks.A. feasibility checkpoints B. phases C. iterations D. milestones 17.UML采用4+1视图来描述软件和软件开发过程,其中 (9) 描绘了所设计的并发与同步结构; (10) 表示软件到硬件的映射及分布结构;UML中的类图可以用来表示4+1视图中的 (11) 。A逻辑视图B实现视图C进程视图D部署视图18.净室软件工程(Cleanroom)是软件开发的一种形式化方法,可以开发较高质量的软件。它使用 (91) 进行分析和建模,并且将 (92) 作为发现和排除错误的主要机制。使用 (93) 测试来获取认证软件可靠性所需要的信息。A正确性验证B黑白盒测试C集成测试D基本路径测试19.服务器的部署是网络规划的重要环节。某单位网络拓扑结构如图所示,需要部署VOD服务器、Web服务器、邮件服务器,此外还需要部署流量监控服务器对单位内部网络流量进行监控。VOD服务器应部署在位置 (2) ,Web服务器应部署在位置 (3) ,流量监控服务器应部署在位置 (4) 。上述服务器中,流出流量最大的是 (5) ,流入流量最大的是 (6) 。ABCD20.至是风险管理中的4个活动,其恰当的顺序是 (120) 。风险识别的一个方法是 (121) 。 选择风险管理工具 研究风险处理方法 评估风险处理结果 风险识别、确认和度量A定义风险参照水准B预测风险组合C建立风险条目检查表D制定风险尺度21.若某航空公司的飞机订票系统有n个订票终端,系统为每个订票终端创建一个售票终端的进程。假设Pi(i=1,2,n)表示售票终端的进程,Hj(j=1,2,m)表示公共数据区,分别存放各个航班的现存票数,Temp为工作单元。系统初始化时将信号量S赋值为 (26) 。Pi进程的工作流程如图所示,a、b和c处将执行P操作和V操作,则图中a、b和c应填入 (27) 。AP(S)、V(S)和V(S)BP(S)、P(S)和V(S)CV(S)、P(S)和P(S)DV(S)、V(S)和P(S)22.All known techniques for handling complex problems successfully seem to fall into one of the three classes: subdividing the problem (51) , ignoring irrelevant detail in a safe way (52) , and having an independent agent (53) the internal consistency (contextual checking). The first two provide guidelines for solving the problem, the third serves to provide early warnings. A good programming language supports all three. In subdividing problem, some of the subproblems may be similar to the (54) problem. It leads us to a (55) solution. This (55) solution is viable provided each of the subproblems is easier to solve than the original problem.A. abrogation B. abstraction C. composition D. contraction 23.N(0,1)为标准正态分布,它的密度函数为_,在x=_处有拐点,x=_处有最大值。利用正态分布的结论,有=_。A0B+1C+1/2D+ 224.A project management technique that is currently in widespread use is the (66) . The purpose of this technique is to detail, in hierarchical fashion, all of the activities that are required to meet project objectives. There are some special activities called (67) , which are events that signify the accomplishment or completion of major deliverables during the project. Most system development methodologies also provide (68) , whose purpose is to contain the various pieces of relevant information - feasibility assessments, schedules, needs analysis, and so forth - in a single place so that they can be presented to project clients and other related parties. Several types of important network diagrams are used in project management. (69) was developed to make clear the interdependence between project tasks before those tasks are scheduled. (70) offers the advantage of clearly showing overlapping tasks.A. baseline plan B. project planning C. statement of work D. information system planning 25.净室软件工程(Cleanroom)是软件开发的一种形式化方法,可以开发较高质量的软件。它使用 (91) 进行分析和建模,并且将 (92) 作为发现和排除错误的主要机制。使用 (93) 测试来获取认证软件可靠性所需要的信息。A边界值B统计C代数D精确26.服务器的部署是网络规划的重要环节。某单位网络拓扑结构如图所示,需要部署VOD服务器、Web服务器、邮件服务器,此外还需要部署流量监控服务器对单位内部网络流量进行监控。VOD服务器应部署在位置 (2) ,Web服务器应部署在位置 (3) ,流量监控服务器应部署在位置 (4) 。上述服务器中,流出流量最大的是 (5) ,流入流量最大的是 (6) 。ABCD27.UML采用4+1视图来描述软件和软件开发过程,其中 (9) 描绘了所设计的并发与同步结构; (10) 表示软件到硬件的映射及分布结构;UML中的类图可以用来表示4+1视图中的 (11) 。A逻辑视图B实现视图C进程视图D部署视图28.All known techniques for handling complex problems successfully seem to fall into one of the three classes: subdividing the problem (51) , ignoring irrelevant detail in a safe way (52) , and having an independent agent (53) the internal consistency (contextual checking). The first two provide guidelines for solving the problem, the third serves to provide early warnings. A good programming language supports all three. In subdividing problem, some of the subproblems may be similar to the (54) problem. It leads us to a (55) solution. This (55) solution is viable provided each of the subproblems is easier to solve than the original problem.A. check B. original C. perform D. recursive 29.N(0,1)为标准正态分布,它的密度函数为_,在x=_处有拐点,x=_处有最大值。利用正态分布的结论,有=_。A0B1C-1D1/230.数字化后的图像数据量是非常大的,例如,一幅分辨率是640×480,具有224种彩色的图像占用存储量约为7.4MB。如果要无闪烁显示动画10s,则全部图像占用存储量 (6) MB。除此之外还需要有 (7) 才行。所以,数据压缩技术是多媒体计算机的关键技术之一。目前公认的关于压缩编码的国际标准是:用于多灰度静止图像的 (8) 标准;用于电视电话/会议电视的 (9) 标准和用于数字存储媒体运动图像的 (10) 标准。A74B185C740D185031.在多个用户共享数据库时,对同一资料的 (6) 操作可能破坏数据库的 (7) 。因此数据库管理机制要解决丢失更新、不一致以及 (8) 等问题。解决的方法主要有加锁技术和时标技术。在加锁技术中, (9) 要求太严, (10) 会产生死锁。A连接B并发C查询D更新32.A project management technique that is currently in widespread use is the (66) . The purpose of this technique is to detail, in hierarchical fashion, all of the activities that are required to meet project objectives. There are some special activities called (67) , which are events that signify the accomplishment or completion of major deliverables during the project. Most system development methodologies also provide (68) , whose purpose is to contain the various pieces of relevant information - feasibility assessments, schedules, needs analysis, and so forth - in a single place so that they can be presented to project clients and other related parties. Several types of important network diagrams are used in project management. (69) was developed to make clear the interdependence between project tasks before those tasks are scheduled. (70) offers the advantage of clearly showing overlapping tasks.A. CPM B. Network Diagram C. PERT D. Gantt chart 33.服务器的部署是网络规划的重要环节。某单位网络拓扑结构如图所示,需要部署VOD服务器、Web服务器、邮件服务器,此外还需要部署流量监控服务器对单位内部网络流量进行监控。VOD服务器应部署在位置 (2) ,Web服务器应部署在位置 (3) ,流量监控服务器应部署在位置 (4) 。上述服务器中,流出流量最大的是 (5) ,流入流量最大的是 (6) 。AVOD服务器BWeb服务器C流量监控服务器D邮件服务器34.All known techniques for handling complex problems successfully seem to fall into one of the three classes: subdividing the problem (51) , ignoring irrelevant detail in a safe way (52) , and having an independent agent (53) the internal consistency (contextual checking). The first two provide guidelines for solving the problem, the third serves to provide early warnings. A good programming language supports all three. In subdividing problem, some of the subproblems may be similar to the (54) problem. It leads us to a (55) solution. This (55) solution is viable provided each of the subproblems is easier to solve than the original problem.A. check B. original C. perform D. recursive 35.数字化后的图像数据量是非常大的,例如,一幅分辨率是640×480,具有224种彩色的图像占用存储量约为7.4MB。如果要无闪烁显示动画10s,则全部图像占用存储量 (6) MB。除此之外还需要有 (7) 才行。所以,数据压缩技术是多媒体计算机的关键技术之一。目前公认的关于压缩编码的国际标准是:用于多灰度静止图像的 (8) 标准;用于电视电话/会议电视的 (9) 标准和用于数字存储媒体运动图像的 (10) 标准。A超高分辨率显示器B超高速运算器C极高通道数据传送率D光盘36.N(0,1)为标准正态分布,它的密度函数为_,在x=_处有拐点,x=_处有最大值。利用正态分布的结论,有=_。A0B1CD1/237.在多个用户共享数据库时,对同一资料的 (6) 操作可能破坏数据库的 (7) 。因此数据库管理机制要解决丢失更新、不一致以及 (8) 等问题。解决的方法主要有加锁技术和时标技术。在加锁技术中, (9) 要求太严, (10) 会产生死锁。A安全性B保密性C完整性D独立性38.A project management technique that is currently in widespread use is the (66) . The purpose of this technique is to detail, in hierarchical fashion, all of the activities that are required to meet project objectives. There are some special activities called (67) , which are events that signify the accomplishment or completion of major deliverables during the project. Most system development methodologies also provide (68) , whose purpose is to contain the various pieces of relevant information - feasibility assessments, schedules, needs analysis, and so forth - in a single place so that they can be presented to project clients and other related parties. Several types of important network diagrams are used in project management. (69) was developed to make clear the interdependence between project tasks before those tasks are scheduled. (70) offers the advantage of clearly showing overlapping tasks.A. CPM B. Network Diagram C. PERT D. Gantt chart 39.服务器的部署是网络规划的重要环节。某单位网络拓扑结构如图所示,需要部署VOD服务器、Web服务器、邮件服务器,此外还需要部署流量监控服务器对单位内部网络流量进行监控。VOD服务器应部署在位置 (2) ,Web服务器应部署在位置 (3) ,流量监控服务器应部署在位置 (4) 。上述服务器中,流出流量最大的是 (5) ,流入流量最大的是 (6) 。AVOD服务器BWeb服务器C流量监控服务器D邮件服务器40.All known techniques for handling complex problems successfully seem to fall into one of the three classes: subdividing the problem (51) , ignoring irrelevant detail in a safe way (52) , and having an independent agent (53) the internal consistency (contextual checking). The first two provide guidelines for solving the problem, the third serves to provide early warnings. A good programming language supports all three. In subdividing problem, some of the subproblems may be similar to the (54) problem. It leads us to a (55) solution. This (55) solution is viable provided each of the subproblems is easier to solve than the original problem.A. check B. original C. perform D. recursive 41.数字化后的图像数据量是非常大的,例如,一幅分辨率是640×480,具有224种彩色的图像占用存储量约为7.4MB。如果要无闪烁显示动画10s,则全部图像占用存储量 (6) MB。除此之外还需要有 (7) 才行。所以,数据压缩技术是多媒体计算机的关键技术之一。目前公认的关于压缩编码的国际标准是:用于多灰度静止图像的 (8) 标准;用于电视电话/会议电视的 (9) 标准和用于数字存储媒体运动图像的 (10) 标准。ACOREBJPEGCAudioDVideo42.在多个用户共享数据库时,对同一资料的 (6) 操作可能破坏数据库的 (7) 。因此数据库管理机制要解决丢失更新、不一致以及 (8) 等问题。解决的方法主要有加锁技术和时标技术。在加锁技术中, (9) 要求太严, (10) 会产生死锁。A“脏资料”B安全C保密D授权43.数字化后的图像数据量是非常大的,例如,一幅分辨率是640×480,具有224种彩色的

    注意事项

    本文(2022内蒙古软件水平考试考试模拟卷(2).docx)为本站会员(w****)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开