招生考试网
学历| 高考 美术高考 考研 自考 成考 专升本 中考 会考 外语| 四六级 职称英语 商务英语 公共英语 日语能力 翻译资格 JTEST
资格| 公务员 报关员 银行从业 司法 导游 教师资格 报关 财会| 会计证 经济师 会计职称 注册会计 税务师 资产评估 审计师
工程| 一建 二建 造价师 造价员 咨询师 监理师 安全师 医学| 卫生资格 执业医师 执业药师 执业护士 | 教案 论文 文档
IT类| 计算机等级 计算机软考 职称计算机 高校计算机 推荐-国家公务员 事业单位招聘 军校国防生 自主招生 艺术特长生 招飞
 3773考试网 - 计算机等级考试 - 试题答案 - 正文

1996年全国计算机等级考试四级试卷

来源:招生考试网 1996-9-19

. The space required depends on the number of edges.

(65) When the adjacency matrix method is used to store a graph, which of the statements is (are) true?
 A) None B) Ⅰ only C) Ⅱ only D) Ⅰ and Ⅱ

(66) When the adjacency list method is used to store a graph, which of the statements is (are) true?
 A) None B) Ⅰ only C) Ⅱ only D) Ⅰ and Ⅱ

Questions 67-68 are based on the following information,
A hash table with hash function
 h1(k)=k mod 13
is shown below.
 0 1 2 3 4 5 6 7 8 9 10 11 12
 35 33 48 25
 Collision is resolved using the hash function h2(k)=(k mod 11)+1.

(67) How many key comparisons occur in searching for key 35 in the given hash table? (2分)
 A) 0 B) 1 C) 2 D) 3

(68) If a new key 67 is inserted into the given hash table, what will be its address? (2分)
 A) 3 B) 4 C) 5 D) 6

(69) Suppose the contents of the DOS IF1.BAT file on the hard disk is as follows.
 @ECHO OFF
 MEM>FILE1
 SORTFILE2
 DEL FILE1
 @DATE
 @TIME
 IF EXIST %1 ECHO % IF FOUND
 If all of the commands are successfully executed after IF1 FILE1 is
 typed, then the screen displays?
 A) None B) Date and time C) FILE1 IS FOUND D) FILE2 IS FOUND

(70) If the files in the current directory are
 aac, abc, acb,acc, aca, ao, al, a2, ab, ac, aa,
 and the command ls a?[bc] is executed, how many files will be listed?
 (2分)
 A) 3 B) 4 C) 5 D) 6



(71) In order to append a standard output to an existing file, which of the following operators is used in the UNIX system?
 A) | B) & C) > D) >>

(72) Consider the following figure, where the shaded parts represent already assigned blocks of memory, and the unshaded parts represent free blocks. (2分)
 
 0KB
 
 100KB

180KB
190KB
 

280KB
330KB
 

390KB
410KB
 
512KB-1

 If there is a request for 40KB of memory and the best-fit algorithm is used, then the beginning address of memory that is allocated in response to the request is
 A) 100KB B) 190KB C) 330KB D) 410KB



(73) On a certain disk, there are 200 tracks, numbered 0-199, the current position of the disk head is track 53. If the shortest-seek-time-first scheduling algorithm is used when the tracks
 98, 183, 37, 122, 14, 124, 65, 67
 are requested, then the head-moving sequence that results will be (2分)
 A) 65, 67, 37, 14, 98, 122, 124, 183
 B) 65, 67, 37, 98, 122, 124, 183, 14
 C) 65, 67, 98, 122, 124, 183, 37, 14
 D) 98, 183, 37, 122, 14, 124, 65, 67

(74) Whant operation on relations R and S produces the relation shown below?
 {tuple│tuple∈R۸tuple∈\ S}
 A) Union B) Difference C) Intersection D) Division

(75) When embedding SQL in a C language program, the prefix that should be added to all SQL statements in order to distinguish SQL statements from the host language statements is
 A) : B) EXEC C) EXEC SQL D) SQL

(76) In the ORACLE system,sets of SQL statements and control flow statements that have been named,compiled,and stored tn the database are referred to as stored
 A) batches B) procedures C) triggers D) transactions

(77) Which of the following statements about object oriented databases is NOT correct? (2分)
 A) Each object has a unique object identity in the system.
 B) Encapsulation and inheritance are two important features of object oriented databases.
 C) A subclass can inherit the attributes and methods of all its superclasses.
 D) A superclass includes the attributes and methods of all its subclasses.

(78) In the design phase of software engineering, decomposition of the program into modules should follow the principles of
 A) low cohesion with low corpling B) low cohesion with high coupling
 C) high cohesion with low coupling D) high cohesion with high coupling

(79) Specifications for software should contain several components, e.g., specifications of 
 information flow,
 user interface,
 functional requirements, and
 design constraints.
 Two other important components are specifications of the (2分)
 A) methods of testing and ways to obtain quality assurance
 B) criteria for testing and ways to obtain quality assurance
 C) methods of testing and criteria for function assurane
 D) criteria for testing and methods of function assurance

(80) Which of the following statements about testing software with data is (are) true?
 I. The primary purpose of such testing is to find errors.
 II. Such testing can demonstrate the existence of errors

上一页  [1] [2] [3] [4] [5] 下一页



  • 上一个文章:
  • 网站版权与免责声明
    ①由于各方面情况的不断调整与变化,本网所提供的相关信息请以权威部门公布的正式信息为准.
    ②本网转载的文/图等稿件出于非商业性目的,如转载稿涉及版权及个人隐私等问题,请在两周内邮件fjksw@163.com联系.


    | 关于我们 | 联系我们 | 版权申明 | 网站导航 |
    琼ICP备12003406号