?? 2006年下半年軟件設計師上午試卷.htm
字號:
<TD align=middle width="33%" bgColor=#c0c0c0>A</TD>
<TD align=middle width="33%" bgColor=#c0c0c0>B</TD>
<TD align=middle width="34%" bgColor=#c0c0c0>C</TD></TR>
<TR>
<TD align=middle width="33%">3<BR>4</TD>
<TD align=middle width="33%">7<BR>5</TD>
<TD align=middle
width="34%">11<BR>6</TD></TR></TBODY></TABLE></CENTER></TD></TR>
<TR>
<TD width="13%"></TD>
<TD width="44%">
<CENTER>
<TABLE cellSpacing=0 width="63%" border=1>
<TBODY>
<TR>
<TD align=middle width="33%" bgColor=#c0c0c0>A</TD>
<TD align=middle width="33%" bgColor=#c0c0c0>B</TD>
<TD align=middle width="34%" bgColor=#c0c0c0>C</TD></TR>
<TR>
<TD align=middle width="33%">7<BR>10</TD>
<TD align=middle width="33%">8<BR>11</TD>
<TD align=middle width="34%">9<BR>12</TD></TR></TBODY></TABLE></CENTER></TD>
<TD width="43%">
<CENTER>
<TABLE cellSpacing=0 width="63%" border=1>
<TBODY>
<TR>
<TD align=middle width="33%" bgColor=#c0c0c0>A</TD>
<TD align=middle width="33%" bgColor=#c0c0c0>B</TD>
<TD align=middle width="34%" bgColor=#c0c0c0>C</TD></TR>
<TR>
<TD align=middle width="33%">5<BR>6</TD>
<TD align=middle width="33%">9<BR>10</TD>
<TD align=middle
width="34%">13<BR>14</TD></TR></TBODY></TABLE></CENTER></TD></TR></TBODY></TABLE>
<P> ● 某企業職工和部門的關系模式如下所示,其中部門負責人也是一個職工。職工和部門關系的外鍵分別是
<U>(48)</U>。<BR> 職工(職工號,姓名,年齡,月工資,部門號,電話,辦公室)<BR> 部門(部門號,部門名,負責人代碼,任職時間)<BR> 查詢每個部門中月工資最高的“職工號”的
SQL 查詢語句如下:<BR> Select 職工號 from 職工 as E<BR> where 月工資=(Select
Max(月工資)from 職工 as M <U>(49)</U>)。<BR> (48)A. 職工號和部門號 B.
部門號和負責人代碼<BR> C. 職工號和負責人代碼 D. 部門號和職工號<BR> (49)A. where M.職工號=E.職工號 B.
where M.職工號=E.負責人代碼<BR> C. where M.部門號=部門號 D. where M.部門號=E.部門號</P>
<P> ● 操作序列 T1、T2、T3 對數據 A、B、C 并發操作如下所示,T1 與 T2 間并發操作<U>(50)</U>, T2 與 T3
間并發操作<U>(51)</U> 。</P>
<DIV align=center>
<CENTER>
<TABLE cellSpacing=0 width="80%" border=1>
<TBODY>
<TR>
<TD align=middle width="25%">時間</TD>
<TD align=middle width="25%">T1</TD>
<TD align=middle width="25%">T2</TD>
<TD align=middle width="25%">T3</TD></TR>
<TR>
<TD width="25%">
<P
align=center>t1<BR>t2<BR>t3<BR>t4<BR>t5<BR>t6<BR>t7<BR>t8<BR>t9<BR>t10<BR>t11<BR>t12</P></TD>
<TD width="25%">
<P
align=center>讀A=50<BR>讀B=200<BR>X1=A+B<BR><BR><BR><BR><BR>讀A=50<BR>讀B=200<BR>X1=A+B<BR>驗算不對<BR></P></TD>
<TD width="25%">
<P
align=center><BR><BR><BR><BR>讀B=200<BR>B=B-100<BR>寫B<BR><BR><BR><BR><BR></P></TD>
<TD width="25%">
<P
align=center><BR><BR><BR>讀B=200<BR><BR><BR><BR><BR><BR><BR>B=B+50<BR>寫B</P></TD></TR></TBODY></TABLE></CENTER></DIV>
<P> (50)A. 不存在問題 B. 將丟失修改C. 不能重復讀 D. 將讀“臟”數據<BR> (51)A. 不存在問題 B. 將丟失修改C. 不能重復讀
D. 將讀“臟”數據</P>
<P> ● 結點數目為 n 的二叉查找樹(二叉排序樹)的最小高度為 <U>(52)</U> 、最大高度為<U>(53)</U>。<BR> (52)A.
n B.<IMG height=31 src="2006年下半年軟件設計師上午試卷.files/gc06_2s04.gif" width=20
align=middle border=0> C. [log<SUB>2</SUB>n] D.
[log<SUB>2</SUB>(n+1)]<BR> (53)A. n B.<IMG height=31
src="2006年下半年軟件設計師上午試卷.files/gc06_2s04.gif" width=20 align=middle border=0>
C. [log<SUB>2</SUB>n] D. [log<SUB>2</SUB>(n+1)]</P>
<P> ● 某雙向鏈表中的結點如下圖所示,刪除 t 所指結點的操作為 <U>(54)</U> 。</P>
<P align=center><IMG height=119 src="2006年下半年軟件設計師上午試卷.files/gc06_2s05.gif"
width=363 border=0></P>
<P> (54)A. t->prior->next = t->next; t->next->prior =
t->prior;<BR> B. t->prior->prior = t->prior; t->next->next
= t->next;<BR> C. t->prior->next = t->prior;
t->next->prior = t->next;<BR> D. t->prior->prior =
t->next; t->next->prior = t->prior;
<P> ● 對于二維數組 a[0..4,1..5],設每個元素占 1 個存儲單元,且以列為主序存儲,則元素 a[2,2]相對于數組空間起始地址的偏移量是
<U>(55)</U>。<BR> (55)A. 5 B. 7 C. 10 D. 15
<P> ● 對于n個元素的關鍵字序列{k1 , k 2 ,..., k n } ,當且僅當滿足關系<IMG height=24
src="2006年下半年軟件設計師上午試卷.files/gc06_2s07.gif" width=295 align=middle
border=0>稱其為小根堆,反之則為大根堆。以下序列中,<U>(56)</U>
不符合堆的定義。<BR> (56)A.(4,10,15,72,39,23,18) B.(58,27,36,12,8,23,9)<BR> C.(4,10,18,72,39,23,15) D.(58,36,27,12,8,23,9)
<P> ● 求單源點最短路徑的迪杰斯特拉(Dijkstra)算法是按 <U>(57)</U> 的順序求源點到各頂點的最短路徑的。<BR> (57)A.
路徑長度遞減 B. 路徑長度遞增 C. 頂點編號遞減 D. 頂點編號遞增
<P> ● <U>(58)</U> 算法策略與遞歸技術的聯系最弱。<BR> (58)A. 動態規劃 B. 貪心 C. 回溯 D. 分治
<P> ● 對于具有 n 個元素的一個數據序列,若只需得到其中第 k 個元素之前的部分排序, 最好采用 (59) ,使用分治(Divide and
Conquer)策略的是 <U>(60)</U> 算法。<BR> (59)A. 希爾排序 B. 直接插入排序 C. 快速排序 D.
堆排序<BR> (60)A. 冒泡排序 B. 插入排序 C. 快速排序 D. 堆排序
<P> ● ARP 協 議的 作 用 是 <U>(61)</U> ,ARP 報文封裝在 <U>(62)</U> 中傳送。<BR> (61)A. 由 IP
地址查找對應的 MAC 地址 B. 由 MAC 地址查找對應的 IP 地址<BR> C. 由 IP 地址查找對應的端口號 D. 由 MAC
地址查找對應的端口號<BR> (62)A. 以太幀 B. IP 數據報 C. UDP 報文 D. TCP 報文
<P> ● 802.11 標準定義的分布式協調功能采用了 <U>(63)</U> 協議。<BR> (63)A. CSMA/CD B.
CSMA/CA C. CDMA/CD D. CDMA/CA
<P> ● 設有兩個子網 202.118.133.0/24 和 202.118.130.0/24,如果進行路由匯聚,得到的網 絡地址是 <U>(64)</U>
。<BR> (64)A. 202.118.128.0/21 B. 202.118.128.0/22<BR> C.
202.118.130.0/22 D. 202.118.132.0/20
<P> ● 路由器收到一個數據包,其目標地址為 195.26.17.4,該地址屬于 <U>(65)</U>子網。<BR> (65)A.
195.26.0.0/21 B. 195.26.16.0/20<BR> C. 195.26.8.0/22 D.
195.26.20.0/22
<P> ● NAC’s(Network Access Control) role is to restrict network access to only
compliant endpoints and (66) users. However, NAC is not a complete LAN
<U>(67)</U> solution; additional proactive and <U>(68) </U>security measures
must be implemented. Nevis is the first and only comprehensive LAN security
solution that combines deep security processing of every packet at 10Gbps,
ensuring a high level of security plus application availability and performance.
Nevis integrates NAC as the first line of LAN security <U>(69)</U> . In addition
to NAC, enterprises need to implement role-based network access control as well
as critical proactive security measures— real-time, multilevel
<U>(70)</U>inspection and microsecond threat containment.<BR> (66)A.
automated B. distinguished C. authenticated D. destructed<BR> (67)A.
crisis B. security C. favorable D. excellent<BR> (68)A.
constructive B. reductive C. reactive D. productive<BR> (69)A.
defense B. intrusion C. inbreak D. protection<BR> (70)A. port B.
connection C. threat D. insurance
<P> ● Virtualization is an approach to IT that pools and shares <U>(71)</U> so
that utilization is optimized and supplies automatically meet demand.
Traditional IT environments are often silos, where both technology and human
<U>(72)</U>are aligned around an application or business function. With a
virtualized <U>(73)</U> , people, processes, and technology are focused on
meeting service levels, <U>(</U> <U>74</U> <U>)</U> is allocated dynamically,
resources are optimized, and the entire infrastructure is simplified and
flexible. We offer a broad spectrum of virtualization <U>(75)</U> that allows
customers to choose the most appropriate path and optimization focus for their
IT infrastructure resources.<BR> (71)A. advantages B. resources C.
benefits D. precedents<BR> (72)A. profits B. costs C. resources
D. powers<BR> (73)A. system B. infrastructure C. hardware D.
link<BR> (74)A. content B. position C. power D.
capacity<BR> (75)A. solutions B. networks C. interfaces D.
connections</P>
<P align=center><A href="http://www.oldchild.net/stgc.htm">回目錄</A> <A
href="http://www.4juan.com/">http://www.4juan.com/</A> 收集整理</P></BODY></HTML>
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -