首页 考试吧论坛 Exam8视线 考试商城 网络课程 模拟考试 考友录 实用文档 缤纷校园 英语学习
2010考研 | 自学考试 | 成人高考 | 专 升 本 | 法律硕士 | MBA/MPA | 中 科 院
四六级 | 商务英语 | 公共英语 | 职称日语 | 职称英语 | 博思 | 口译笔译 | GRE GMAT | 日语 | 托福
雅思 | 专四专八 | 新概念 | 自考英语 | 零起点英韩语 | 在职申硕英语
在职攻硕英语 | 成人英语三级
等级考试 | 水平考试 | 微软认证 | 思科认证 | Oracle认证 | Linux认证
公务员 | 报关员 | 报检员 | 外销员 | 司法考试 | 导游考试 | 教师资格 | 国际商务师 | 跟单员
单证员 | 物流师 | 价格鉴证师 | 银行从业资格 | 证券从业资格 | 人力资源管理师 | 管理咨询师
期货从业资格 | 社会工作者
会计职称 | 注会CPA | 经济师 | 统计师 | 注册税务师 | 评估师 | 精算师 | 高会 | ACCA | 审计师
法律顾问 | 会计证
一级建造师 | 二级建造师 | 造价师 | 监理师 | 安全师 | 咨询师 | 结构师 | 建筑师 | 安全评价师
房地产估价师 | 土地估价师 | 设备监理师 | 岩土工程师 | 质量资格 | 房地产经纪人 | 造价员
投资项目管理 | 土地代理人 | 环保师 | 环境影响评价 | 物业管理师 | 城市规划师 | 公路监理师
公路造价工程师 | 招标师
执业护士 | 执业医师 | 执业药师 | 卫生资格
您现在的位置: 考试吧(Exam8.com) > 计算机等级考试 > 计算机四级 > 历年真题 > 正文

全国计算机等级考试四级试题(三)

  (61) What is the decimal value of the following 32-bit two’s complement number?
1111 1111 1111 1111 1111 1111 1100
  A.-8
  B.-4
  C.4
  D.8

  (62) How many subsets does A have?
Let A={E,O,A,W,P,V,B}
  A.12
  B.36
  C.64
  D.128

  (63) Suppose V1=,V2=,where R is the set of real numbers,+, and· are respectively addition and multiplication.Let f﹕R→R and f(x) = ex, which of the following propositions is true?
  A.f is a surjective homomorphism from V1 to V2
  B.f is an injective homomorphism from V1 to V2
  C.f is an isomorphism from V1 to V2
  D.None of the above

  (64) P(n) is the predicate ’if 4 divides n then 2 divides n’. What is the truth value of P(12)?
  A.10
  B.F
  C.T
  D.None of the above

  (65) An algorithm to solve a given problem has time complexity
T(n)=nlog2n-(n-1)
Given that the algorithm takes 0.8 second for a problem in which n =1024,how long should it take for a problem in which n=4096? (2 Points)
  A.39 seconds
  B.3.9 seconds
  C.3.9 minutes
  D.0.8 seconds

  (66) What is the definition of a Path?
  A.A sequence of vertices and the edges formed by each successive pair of vertices.
  B.A walk with distinct vertices.
  C.A walk with distinct edges.
  D.None of the above

  (67) The figure below shows a record used for recording information about a named event. Which of the following statement is incorrect? (2 Points)
VAR r﹕ record
event﹕array[1..10] of char;
place﹕array[1..20] of record
plname﹕array[1..15] of char;
date﹕ array[1..5] of record
mo﹕1..12;
day﹕1..31;
year﹕integer
end
end
end;
  A.This is a one-dimensional array of records,also called a table.
  B.This is so called record of arrays;
  C.The event can occur in up to 20 places and on up to 5 different dates in each place.
  D.A reference to r.place[i].date[j].mo will access the month of the jth occurrence,in the ith place,of the event named in r.event.

  (68) Which of the following statements is true regarding simple sort techniques? (2 Points)
  A.Exchange sort is frequently referred to as a bubble sort.
  B.Exchange sort is the least expensive.
  C.If random data are in an array that is to be sorted,an Insertion Sort will give the best performance for large elements with small sort items.
  D.Both Insertion Sort and Selection Sort require O(n)moves.

  (69) Which UNIX command creates a symbolic link named myfile in the current directory to the file/etc/hosts?
  A.In -s /etc/hosts myfile
  B.In -s myfile /etc/hosts
  C.link -s /etc/hosts myfile
  D.link -s myfile /etc/hosts

  (70) Which MS-DOS command is correct?
  A.DEL /s *.bat
  B.DEL *.exe/sp
  C.DEL *.obj >nul:
  D.DEL *.com *.sys

  (71) A virtual memory system has five virtual pages numbered zero through four and three page frames. All the page frames are initially empty. How many page faults are generated with the following access sequence using a FIFO replacement policy? (2 Points)
0 1 2 3 0 1 4 0 1 2 3 4
  A.8
  B.9
  C.10
  D.11

  (72) Which element is NOT part of a microkernel? (2 Points)
  A.basic I/O
  B.a file system
  C.IPC mechanisms
  D.memory management

  (73) Which is local to a thread instead of a process? (2 Points)
  A.a stack
  B.an open file
  C.a semaphores
  D.an address space

  (74) What is a subselect statement?
  A.a select statement that selects a subset of fields in a table
  B.a select statement that returns a subset of the data in a table
  C.a select statement that appears within another select statement
  D.a select statement that returns a subset of the constraints on a field

  (75) In developing a hospital database,it is determined that on the average,each patient will have 6 treatments during a hospital stay. The averge length of a stay is three days.The hospital has 1000 beds. There are on the average 800 patients occupying beds each day. The relationship between PATIENT and TREATMENT is l: M. The relationship between PATIENT and BED is 1: 1, conditional. If treatment record occurrences are archived as soon as a patient is discharded from the hospital,how many occurrences of the TREATMENT records will be stored in the TREATMENT database file on the average? (2 Points)
  A.6,000
  B.4,800
  C.18,000 D)1,600

  (76) Which of the following conditions will make a relation that is in first normal form to be in second normal form?
Ⅰ.every non-key attribute is functionally dependent on the full set of primary key attributes.
Ⅱ.no non-key attributes exist in the relation.
Ⅲ.the primary key consists of only one attribute.
  A.Ⅰ only
  B.Ⅰand Ⅱ only
  C.Ⅰand Ⅲ only
  D.any of them

  (77) The most commonly used locking level in implementing concurrency control is at which of the following levels?
  A.database
  B.table
  C.record D)field

  (78) Which function is NOT served by building a prototype?
  A.It takes the place of the final system.
  B.It assists in gathering software requirements
  C.It assists in estimating the cost of the project.
  D.It is used as the foundation of the larger projects.

  (79) Software document is an important part of software and a basis of software development phase.It also influnces software’s (2 Points)
  A.Reusability
  B.Maintanence
  C.Expansibility
  D.Portability

  (80) Which phase of the software development requires the most development time?
  A.the design phase
  B.the testing phase
  C.the maintenance phase
  D.the development phase

  (81) Which of the following statements is correct? (2 Points)
  A.The definition phase results in the Software Requirements Specification.
  B.Testing is optional in software life cycle.
  C.CASE tools can only aid in the design phase of a software life cycle.
  D.A change during a later phase does not require the documentation of all earlier phases to be updated.

  (82) Black-box and white-box testing method are often used in software testing phase,in which,the white-box is mainly used to test software’s
  A.reasonableness of structure
  B.correctness of a program
  C.external function of a program
  D.internal logic of a program

  (83) How does Booth’s Algorithm improve binary multiplication?
  A.It prevents overflow.
  B.It prevents underflow.
  C.It preserves the sign of the multiplication operation.
  D.It enhances the speed of the operation significantly.

  (84) A cache has 64 blocks; each block is 16 bytes. Which block does byte 1200 map to ?
  A.25
  B.60
  C.75 D)100

  (85) Which is NOT a characteristic of an RISC processor?
  A.a high clock speed
  B.a highly optimized pipeline
  C.a few general-purpose registers
  D.a limited amount of small instructions

  (86) You are performing two sums: the first is a sum of two scalar variables and the second is a matrix sum of a pair of two- dimensional arrays-size 1000 by 1000. What speedup is achieved when the calculations are performed on size 1000 processors? (2 Points)
  A.50
  B.100
  C.999
  D.none of the above

  (87) According to Shannon’s equation, what is the channel capacity of an analog voice-grade phone line with a bandwidth of 3100 Hz and a signal-to-noise ratio or 30dB? (2 Points)
  A.9.1 Kbps
  B.9.3 Kbps
  C.30.9 Kbps
  D.30.17 Kbps

  (88) The X﹒25 standard specifies three layers of functionality. Which layers of the OSI model correspond to the X﹒25 layers?
  A.the Physical,Network,and Session Layers
  B.the Physical,Data Link,and Network Layers
  C.the Physical,Data Link,and Transport Layers
  D.the Physical,Session,and Presentation layers

  (89) Which routing algorithm is described below?
It is a mechanism in which the setding station determines the route the frame will follow and includes the routing information with the frame; bridges read the routing information to determine if they should forward the frame.
  A.Fixed Routing
  B.Spanning Tree
  C.Source Routing
  D.Frame Forwarding

  (90) Which OSI layer does a bridge operate at?
  A.the Physical Layer
  B.the Network Layer
  C.the Transport Layer
  D.the Data Link Layer

上一页  1 2 3 4 5 下一页
文章搜索
全国计算机等级考试四级试题(三)网友评论网友评论
版权声明 --------------------------------------------------------------------------------------
    如果计算机等级考试网所转载内容不慎侵犯了您的权益,请与我们联系,我们将会及时处理。如转载本计算机等级考试网内容,请注明出处。
 gaoxiaoliang