选择题每题一分50.docx

上传人:b****4 文档编号:1459916 上传时间:2022-10-22 格式:DOCX 页数:5 大小:18.13KB
下载 相关 举报
选择题每题一分50.docx_第1页
第1页 / 共5页
选择题每题一分50.docx_第2页
第2页 / 共5页
选择题每题一分50.docx_第3页
第3页 / 共5页
选择题每题一分50.docx_第4页
第4页 / 共5页
选择题每题一分50.docx_第5页
第5页 / 共5页
亲,该文档总共5页,全部预览完了,如果喜欢就下载吧!
下载资源
资源描述

选择题每题一分50.docx

《选择题每题一分50.docx》由会员分享,可在线阅读,更多相关《选择题每题一分50.docx(5页珍藏版)》请在冰豆网上搜索。

选择题每题一分50.docx

选择题每题一分50

1、選擇題(每題一分)(50%)

1.Astep-by-stepsolutiontoaproblemiscalled

2.a.hardwareb.anoperatingsystemc.acomputerlanguaged.analgorithm

3.FORTRANandCOBOLareexamplesof

4.a.hardwareb.operatingsystemsc.computerlanguaged.algorithms

5.InextendedASCII,eachsymbolisbits.a.7b.8c.9d.10

6.Whenyouwanttodownloadmusictoacomputer,theaudiosignalmustbe

7.a.sampleb.quantizedc.codedd.alloftheabove

8.IftheASCIIcodeforZis1011010,thentheASCIIcodeforzis

9.a.1011011b.1011110c.1111010d.0011010

10.Innumberrepresentation,1111inmemoryrepresent-0.

11.a.unsignedintegerb.sign-and-magnitudec.one’scomplementd.two’scomplement

12.Theprecisionofthefractionalnumberstoredinacomputerisdefinedbythe

13.a.signb.exponentc.mantissad.anyoftheabove

14.Whichnumberrepresentationmethodismostwidelyusedforstoringnumberinacomputer?

15.a.two’scomplementb.sign-and-magnitudec.one’scomplementd.unsignedinteger

16.Forthebinaryoperator,iftheinputistwo1’s,theoutputis0

17.a.ANDb.ORc.XORd.alloftheabove

18.InthemethodtosynchronizetheoperationoftheCPUwiththeI/Odevice,alargeblockofdatacanbepassedfromanI/Odevicetomemorydirectly.a.programmedI/Ob.interrupt-drivenI/Oc.DMAd.isolatedI/O

19.Thethreestepsintherunningofaprogramonacomputerareperformedinthisspecificorder.a.fetch,execute,anddecodeb.decode,execute,andfetchc.fetch,decode,andexecuted.decode,fetch,andexecute

20.Whichopticalstoragedevicehasthehighestcapacity?

21.a.CD-ROMb.CD-Rc.CD-RWd.DVD

22.Thememorycontainsacopyofaportionofmainmemory.

23.a.CPUb.cachec.maind.ROM

24.TheOSImodelhaslayers.a.5b.6c.7d.8

25.

Aisaconnectingdevicethatactsasaprotocolconverter.

26.a.repeaterb.bridgec.router

27.Whatisthedomainnameintheemailaddress?

28.a.kaylab.c.d.

29.isaprogramthatfacilitatestheexecutionofotherprograms.

30.a.Anoperatingsystemb.Hardwarec.Aqueued.Anapplicationprogram

31.AsystemwithmorethanoneCPUrequiresaoperatingsystem

32.a.batchb.time-sharingc.paralleld.distributed

33.Thecontrollerfeaturesaparallelinterfaceanddaisy-chainedconnectionforI/Odevices.a.SCSIb.FireWirec.USBd.IDE

34.Thesmalleststorageareaonamagneticdiskthatcanbeaccessedatonetimeisa.a.trackb.sectorc.framed.head

35.Tosetthevalueofavariablebeforeanyprocessingoccurs,youthevariable.a.defineb.iteratec.initialized.increase

36.isapictorialrepresentationofanalgorithm.

37.a.Aflowchartb.Astructurechartc.Pseudocoded.Analgorithm

38.Theonlylanguageunderstoodbycomputerhardwareisalanguage.

39.a.machineb.symbolicc.high-leveld.natrral

40.Theassemblesprecompiledunitsfromdifferentsourcesintoanexecutableprogram.a.preprocessorb.texteditorc.linkerd.loader

41.Thecompilerconsistsofaanda.

42.a.preprocessor,loaderb.texteditor,loaderc.preprocessor,translatord.linker,preprocessor

43.TheUNIXoperatingsystemiswritteninalanguagecalled.

44.a.Cb.FORTRANc.C++d.JAVA

45.InC++,isthehidingofdataandoperationsfromtheuser.

46.a.modularityb.polymorphismc.inheritanced.encapsulation

47.Testingasoftwarepackagecaninvolvetesting.

48.a.blackboxb.whiteboxc.breadboxd.aandb

49.isthebreakingupofalargeprogramintosmallparts.

50.a.Couplingb.Incrementingc.Obsolescenced.Modularity

51.Codereusability,interoperability,andportabilityarefactorsimportanttothe

52.ofsoftware.

53.a.operabilityb.maintainabilityc.transferabilityd.longevity

54.Eachelementinarecordiscalled.

55.a.avariableb.anindexc.afieldd.anode

56.isanorderedcollectionofdatainwhicheachelementcontainsthelocationofthenextelement.

57.a.Anarrayb.Arecordc.Alinkedlistd.Astruct

58.ATuringmachinehasthreecomponents:

.

59.a.tape,memory,andread/writeheadb.disk,controller,andread/writehead

60.c.tape,controller,andread/writeheadd.disk,memory,andcontroller

61.Weusetodenoteaprogram’scomplexity.

62.a.theTuringmachineb.big-Onotationc.factorialsd.thesimplelanguage

63.Inthedigitalsignaturemethod,thesenderuseshisorherkeytosignthemessage.a.publicb.privatec.secretd.skeleton

64.Tocreateadigestofadocument,youcanuse.

65.a.adigitalsignatureb.aprimenumberc.DESd.ahashfunction

66.TheRSAalgorithmisthebasisofaencryptionmethod.

67.a.publickeyb.secretkeyc.privatekeyd.alloftheabove

68.Anexampleoflossycompressionis.

69.a.JPEGb.run-

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 高中教育 > 语文

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1