In the second half of 2022, the real questions and answer analysis of network planning designers in the afternoon

1. If the system loses power when the system is writing the result of file modification ( ) back to the disk, the impact on the system will be relatively large. A. Directory B. Free block C. User program D. User data

2. In a database system with a three-level schema structure, if a clustered index is created for a table, the ( ) of the database is changed.

A. External mode B. Mode C. Internal mode D. User mode

3. HarnonyOS is an intelligent operating system with independent copyright developed by Huawei. It proposes a set of system capabilities and a distributed concept that adapts to various terminal forms. In the following description of Harmony OS, no the correct one is( ).

A. The overall architecture of the Hongmeng operating system adopts a layered and hierarchical design, from bottom to top: kernel layer, system service layer, framework layer and application layer

B. The kernel layer of the Hongmeng operating system adopts a macro kernel design, which has stronger security features and low latency

C. The Hongmeng operating system architecture adopts the distributed design concept and realizes four distributed capabilities, including distributed soft bus, distributed device virtualization, distributed data management and distributed task scheduling.

D. The system security of the architecture is mainly reflected in the distributed terminal intercepting HarmonyOS, which can ensure that "the right people use the right data through the right equipment"

4. AI chip is the core technology of the current development of artificial intelligence technology, and its ability must support training and reasoning. Usually, the technical architecture of AI chip includes three types: ( ) and so on.

A.GPU、FPGA、ASIC  B.CPU、FPGA,DSP  

C.GPU、CPU、ASIC  D.GPU、FPGA、SOC

5. The characteristics of data assets include ( ).

① Value-added ② Testable ③ Shareable ④ Maintainable ⑤ Controllable ⑥ Quantifiable

A.①②③④  B.①②③⑤  C.①②④⑤  D.①③⑤⑥

6. Among the following statements about the creation time of software copyright, the correct one is ( ).

A. The software copyright arises when the software is first published

B software copyright arises when the developer has the intention to develop

C. Software copyright arises from the date when the software development is completed

D. The software copyright is generated when the software copyright is registered

7. In the following memory, ( ) uses capacitors to store information and needs to be refreshed periodically.

A.DRAM    B.EPROM    C.SRAM    D.EEPROM

8. Compiler and interpreter are the two basic forms of language translation. Among the following descriptions about the working methods and characteristics of compilers, the correct one is ( ).

A. Execute while translating, the user program has low operating efficiency and poor portability

B. Translate first and then execute, the user program has high operating efficiency but good portability

C. Execute while translating, the user program has low running efficiency but good portability

D. Translate first and then execute, the user program has high operating efficiency but poor portability

9. In the following description about the three-tier C/S structure, which one is incorrect is ( ).

A. Allows the functions of the three-tier structure to be reasonably divided to maintain relative independence logically and improve the maintainability and scalability of the system

B. Allow more flexible and effective selection of corresponding hardware and software platforms and systems

C. Each layer of the application can be developed in parallel, but the same development language is required

D. Use the functional layer to effectively isolate the presentation layer and the data layer, facilitating strict security management

10. The goal of software development is to develop a high-quality software system, which does not include ( ).

A. The software must meet the needs specified by the user

B. Software should follow a set of development guidelines defined by prescribed standards

C. Software development should adopt the latest development technology

D. Software should meet certain implicit requirements, such as understandability, maintainability, etc.

11. After the optical fiber signal is transmitted through a 10km line, the optical power drops to 50% of the input power. Only considering the attenuation of the optical fiber line, the loss coefficient of the optical fiber is ( ).

A.0.1dB/km    B.0.3dB/km   C.1dB/km    D. 3dB/km

12. A channel uses 16 symbols to transmit data. If the baud rate of the signal is 4800 Baud, the channel data rate is ( )kb/s.

A. Must be 4.8kb/s B. Must be 9.6 kb/s    

C. It must be 19.2 kb/s D. Not sure, it depends on the encoding rules of the system

13. In the access network, hardware equipment + virtual dial-up is often used to realize broadband access. The protocol usually used in virtual dial-up is ( ).

A.ATM    B.NETBIOS    C.PPPoE      D.IPX/SPX

14. In the following description about the IS-IS protocol, the error is ( ).

A. IS-IS uses the SPF algorithm to calculate routes    

B. IS-IS is a link state routing protocol

C.IS-IS uses domains (area) to establish a hierarchical network topology, and the backbone is area0

D.IS-IS transfers link information by transferring LSP to complete the synchronization of the link database

15. The TCP protocol is ().

A. A reliable transport protocol built on a reliable network

B. An unreliable transport protocol built on top of a reliable network

C. Reliable transport protocols built on top of unreliable networks

D. Unreliable transport protocols built on top of unreliable networks

16. (16) is not included in the routing information.

A. Hop count B. Destination network C. Source network D. Routing weight

17. ( ) technology separates the data plane, control plane and application plane of the network, which can better realize network control, security,

In the second half of 2022, the real questions and answer analysis of network planning designers in the afternoon

1.A Click this link to view the real test analysis video: https://ke.qq.com/course/289727

2. C

Analysis: Clustered index is not a separate index type, but a data storage method. A clustered index is to construct a B+ tree according to the primary key of each table. At the same time, the leaf nodes store the row record data of the entire table, and the leaf nodes of the clustered index are also called data pages. This feature determines that the data in the index-organized table is also part of the index, and each table can only have one clustered index.

 

Guess you like

Origin blog.csdn.net/xiaornshuo/article/details/127890900