Analysis of real questions and answers in the morning for software designers in the second half of 2022

1. In the following description about the characteristics of RISC (Reduced Instruction Set Computer), the wrong one is ( ).

A. Restrict memory operations to simplify control

B. There are many types of commands and strong command functions

C. Set a large number of general-purpose registers

D. Select some instructions with high frequency of use to increase execution speed

2. The basic components of the CPU (Central Processing Unit) do not include ( ).

A. Arithmetic logic unit B. System bus C. Control unit D. Register bank

3. A certain component is used in 2000 computer systems, and after 1000 hours of operation, the component of 4 computers fails, then the thousand-hour reliability R of this component is ( ).

A.0.990    B.0.992    C.0.996     D.0.998

4. In the following memory, ( ) uses capacitors to store information and needs to be refreshed periodically.

A.DRAM    B.EPROM    C.SRAM    D.EEPROM

5. For two types of floating-point numbers with the same length but different formats, assuming that the former has a long exponent code and a short mantissa, and the latter has a short exponent code and a long mantissa, and other regulations are the same, the range and precision of the values ​​that can be represented by the two are ( )

A. The range and precision of the numbers that can be represented by the two are the same B. The range of numbers represented by the former is larger and the precision is higher

C. The range of the number represented by the former is larger but the precision is lower D. The range of the number represented by the former is smaller but the precision is higher

6. Complementary codes are used in computer systems to represent signed values, ( ).

A. It can keep the process of addition and subtraction consistent with manual calculation

B. It can improve the accuracy of the calculation process and results

C. Can increase the speed of addition and subtraction operations

D. The subtraction operation can be converted into an addition operation to simplify the design of the calculator

7. Which of the following authentication methods is less secure is ( ).

A. Biometric authentication B. Multi-factor authentication C. Password authentication DU shield authentication

8.9. The cryptographic algorithm recommended by the X509 digital certificate standard is ( ), while the public key cryptographic algorithm used by the national secret SM2 digital certificate is ( ).

A.RSA    B.DES    C.AES     D.ECC

A.RSA    B.DES    C.AES     D.ECC

10. The homepage of a unit's website has been maliciously tampered with, and ( ) equipment should be deployed to prevent malicious attacks.

A. Database auditing B. Packet filtering firewall C. Web application firewall D. Intrusion detection

11. Regular scanning of information systems and servers by using the vulnerability scanning system is OK ( ).

A. Discover high risks and security vulnerabilities B. Fix high risks and security vulnerabilities

C. Obtain the log information of the system being attacked D. Close unnecessary network ports and services

12. Among the following statements about the ownership of the copyright of a commissioned software development, the correct one is ( ).

A. The copyright ownership of the software is only determined according to the agreement between the client and the trustee in the written contract

B. Regardless of whether there is a contract or not, the copyright of the software is shared by the client and the trustee

C. If there is no written contract or there is no clear agreement in the contract, the copyright of the software shall be enjoyed by the trustee

D. If there is no written contract or there is no clear agreement in the contract, the copyright of the software shall be enjoyed by the client

13. The right to translate the original software in the software copyright stipulated in Item 8, Paragraph 1, Article 8 of the "Computer Software Protection Regulations" ( ).

A. Convert the source program language to the target program language

B. Converting from one programming language to another

C. Convert an assembly language to a natural language

D. Convert one natural language text into another natural language text

14. Company M has registered a software product developed by it as S. In order to ensure the company's position in the market competition, Company M has imposed confidentiality constraints on its employees. In this case, the company does not enjoy ( ).

A. Software copyright B. Patent right C. Trade secret right D. Trademark right

15. In the information system of a certain parts manufacturer, a basic processing takes different actions according to the customer type, order amount, customer credit and other information. At this time, it is most appropriate to use ( ) to describe the processing specification.

A. Natural language B. Flow chart C. Decision table D. A programming language

16. When optimizing the module structure, ( ) is not an appropriate processing method.

A. Make the module function complete B. Eliminate duplicate functions and improve the software structure

C. Determine the size only according to the function of the module D. Avoid or reduce pathological connections between modules

17.18. The figure below is an activity diagram of a software project, where the vertices represent project milestones, the edges connecting the vertices represent activities, and the numbers on the edges represent the number of days required to complete the activity. Then the critical path length is ( ). In the actual project progress, on the premise that other activities can be carried out normally, once the activity ( ) is postponed, it will affect the progress of the project.

A.34     B.47      C.54      D.58

A.A→B   B.C→F    C.D→F    D.F→H

19. Among the following statements about risk management, which one is incorrect is ( ).

A. Admit that risks exist objectively and cannot be completely avoided B. Manage all risks at the same time

C. Risk management should run through the entire project management process D. The risk plan itself may bring new risks

20. When the function call is executed, a section of storage space created at the top of the stack to support the execution of the called function is called an active record or stack frame, and the stack frame does not include ( ).

A. Formal parameter variable B. Global variable C. Return address D. Local variable

21. Compiler and interpreter are the two basic forms of programming language translation. Among the following descriptions about the working mode and characteristics of the compiler, the correct one is ( ).

A. Execute while translating, the user program has low operating efficiency and poor portability

B. Translate first and then execute, the user program has high operating efficiency and good portability

C. Execute while translating, the user program has low running efficiency but good portability

D. Translate first and then execute, the user program has high operating efficiency but poor portability

22. Grammatical analysis is required in the process of compiling or interpreting high-level language source programs, and recursive subprogram analysis belongs to the analysis method of ( ).

A. Top to bottom B. Bottom to top C. Left to right D. Right to left

23. In the computer system, if the P1 process is running, the operating system forcibly removes the CPU occupied by the P1 process and allows the higher priority process P2 to run. This scheduling method is called ( ).

A. Interrupt method B. First-in first-out method C. Deprivable method D. Non-derivable method

24~26. The predecessor graphs of processes P1, P2, P3, P4, P5 and P6 are shown below. Assuming that PV operation is used to control the synchronization and mutual exclusion of these 6 processes, the program is as follows, the empty and empty in the program should be ( ), the empty and empty should be ( ), empty and empty should be ( ) respectively.

AV(S6) and P(S7)P(S8) BP(S8) and P(S7)P(S8)

CP(S8) and P(S7)V(S8) DV(S8) and P(S7)P(S8)

27. Assume that the address structure in the segment page storage management system is shown in the figure below, then the system ( ).

A. There can be up to 512 segments, the size of each segment is 2048 pages, and the page size is 8k

B. There can be up to 512 segments, each segment can have a maximum of 2048 pages, and the page size is 8K

C. There can be up to 1024 segments, the size of each segment is 1024 pages, and the page size is 4K

D. There can be up to 1024 segments, and each segment can have a maximum of 1024 pages, and the page size is 4K

28. Assume that it takes 2ms for the hard disk head to move from one track to the adjacent track. Files are stored non-continuously on the disk. Logically, the average moving distance of adjacent data blocks is 5 tracks, and the rotation delay time and transmission time of each block are 10ms and 1ms respectively, so it takes ( )ms to read a file with 100 blocks

A.1100    B.1200    C.2100     D.2200

29. In the following statement about the advantages of the rapid prototyping model, the incorrect one is ( ).

A. Helps meet the real needs of users     

B. Suitable for the development of large software systems

C. Developers quickly develop prototype systems, so they can speed up the software development process and save development costs

D. The prototype system has been verified through interaction with users, so the corresponding specification document can correctly describe user needs

30. In the following description about the three-tier C/S structure, which one is incorrect is ( ).

A. Allows the functions of the three-tier structure to be reasonably divided to maintain relative independence logically and improve the maintainability and scalability of the system

B. Allow more flexible and effective selection of corresponding hardware and software platforms and systems

C. Each layer of the application can be developed in parallel, but the same development language is required

D. Use the functional layer to effectively isolate the presentation layer and the data layer, facilitating strict security management

31. If module A and module B exchange input and output information through external variables, then the coupling type of the two modules is ( ) coupling.

A. Data B. Flag C. Control D. Public

32. The goal of software development is to develop a high-quality software system, which does not include ( ).

A. The software must meet the needs specified by the user

B. Software should follow a set of development guidelines defined by prescribed standards

C. Software development should adopt the latest development technology

D. Software should meet certain implicit requirements, such as understandability, maintainability, etc.

33. Among the various coverage methods of white box testing technology, ( ) has the weakest error discovery ability.

A. Decision coverage B. Statement coverage C. Condition coverage D. Path coverage

34. Documentation is an important factor of software. Regarding high-quality documents, which of the following statements is incorrect ( ).

A. Regardless of the size and complexity of the project, use uniform standards to develop documents of the same type and the same elements

B. The target audience should be clearly defined

C. It should be complete, independent and self-contained

D. The writing should be very precise and there should be no ambiguity in the description

35. In a component of a financial system, a variable is not initialized correctly, (), the error is most likely to be found.

A. Unit testing B. Integration testing C. Acceptance testing D. Installation testing

36. After the software is delivered to the user, it enters the maintenance stage, and the maintenance is divided into different types according to the specific content of the maintenance. Among them, the maintenance of "using special program modules to add, modify and delete records in files or data" belongs to ( ).

A. Program maintenance B. Data maintenance C. Code maintenance D. Equipment maintenance

37.38. Use the object-oriented method to design a certain game. In the game, there are wild ducks, red-headed ducks and other ducks croaking while swimming and playing in the water. Different types of ducks have different colors. The design of the duck class is responsible for the realization of croaking and swimming methods, and displays the colors It is designed as an abstract method, which is implemented by the wild duck and the red-headed roc respectively. This mechanism is called ( ). When the same display color message is sent to a group of different objects of these types, the result of each displaying its own different colors can be achieved. This phenomenon is called ( ).

A. Inheritance B. Aggregation C. Composition D. Polymorphism

A. Coverage B. Overloading C. Dynamic binding D. Polymorphism

39. When using the object-oriented method to analyze, first of all, the object should be identified according to the naturally existing entity in the application field, that is, the naturally existing "( )" should be regarded as an object.

A. Question B. Relationship C. Noun D. Verb

40. When designing an object-oriented system, there is one and only one reason to modify a certain class, that is, a class only performs one type of function, which belongs to the ( ) principle.

A. Single Responsibility B. Open-Closed C. Interface Separation D. Dependency Inversion

41.42. UML activity diagrams are used for modeling ( ). In the following activity diagrams, after activity A1, the possible execution sequence of activities is ( ).

A. Externally visible services provided by the system in the context of its surrounding environment

B. A set of objects at a time and the relationships between them

C. Flow from one activity to another within the system

D. A certain condition or state in the life cycle of an object

A. A2, A3, A4 and A5 B. A3, A4 and A5, or A2, A4 and A5

C.A2, A4 and A5 D.A2 or A3, A4 and A5

43. UML component diagram (Component diagram) embodies the organization and dependence among a group of components, focusing on the static ( ) diagram of the system, which usually includes components, interfaces and various relationships.

A. Association B. Implementation C. Structure D. Behavior

44~46. In a certain system, different levels of log information are recorded in different ways, and the log processing objects of each level are recorded in different ways according to the level of information. Each log processing object checks the level of the message, logs if it reaches its level, or not, and passes the message to its next log processing object. For this requirement, design the class diagram as shown below. The design adopts ( ) mode to make multiple connected objects have the opportunity to process the request, thus avoiding the coupling relationship between the sender and receiver of the request. The pattern belongs to the ( ) pattern, and the pattern applies to the ( ) pattern.

A. Chain of Responsibility B. Strategy C. Filter D. Memento

A. Behavioral class B. Behavioral object C. Structural class D. Structural object

A. Different criteria filter a set of objects and link them in a decoupled manner through logical operations

B. The set of objects that can handle a request should be dynamically specified

C. A copy of the object at a certain moment must be saved so that it can be restored to its previous state when needed

D. A class defines multiple behaviors and appears in the form of multiple conditional statements

47. When driving the engine of a new energy vehicle, the electric energy vehicle and the light energy vehicle adopt different driving methods, but the client wants to use a unified driving method, and needs to define a unified driving interface to shield different driving methods. This requirement is suitable for the ( ) mode .

A. Mediator (Mediator) B. Visitor (Visitor) C. Observer (Observer) D. Adapter (Adapter)

48. In Python3, () is not a legal exception handling structure.

A.try...except…   B.try...except...finally   C.try...catch...   D.raise

49. In Python3, the value of the expression list(range(11)[10:0:-2] is ( )

A.[10,8,6,4,2,0]   B.[10,8,6,4,2]    C.[0,2,4,6,8,10]    D.[0,2,4,6,8)

50. In Python3, execute the statement x=imput( ), if you input 123 from the keyboard and press the Enter key, the value of x is ( )

A.123    B.1,2,3    C.1 2 3    D.'123'

51. When the ER model is transformed into a relational model, the many-to-many relationship R between two entities E1 and E2 should be transformed into an independent relational pattern, and the keywords of the relational pattern are composed of ( ).

A. Attributes of Contact R B. Keywords of E1 or E2    

C.Keywords of E1 and E2 D.Keywords of E1 and E2 plus attributes of R

52.53. In the database of a human resource management system of a university, the teacher relationship model is T (teacher number, name, department number, position, contact address, salary), and the functional dependency set F={teacher number→(name, department number, position , contact address), position→salary}. The primary key of T relationship is ( ), and the functional dependency set is F( ).

A. The teacher number, T has redundancy and the problem of inserting and deleting exceptions

B. The teacher number, T does not have the problem of Shenyu, insertion exception and deletion exception

C. (teacher number, post), T has the problem of redundancy, insertion exception and deletion exception

D. (teacher number, post), T does not have the problem of redundant and abnormal insertion and deletion

A. There is a transitive dependency, so the relationship model T can reach up to 1NF

B. There is a transitive dependency, so the relationship model T can reach 2NF at most

C. There is no transitive dependency, so the relationship model T can reach up to 3NF

D. There is no transitive dependency, so the relationship model T can reach 4NF at most

56. Assume that the expression x/y in transaction program A, if the value of y is 0, a fault will occur when calculating the expression. The fault belongs to ( )

A. System failure B. Transaction failure C. Media failure D. Crash

57. Set the stack to be empty at the beginning. For the stacked sequence 1, 2, 3...n these elements pass through the stack and get the stacked sequence P1, P2, P3, ... Pn. If P3=4, then P1 and P2 are impossible is taken as ( ).

A.6,5    B.2,3    C.3,1    D.3,5

58. Let m and n be two nodes on a certain binary tree. During in-order traversal, the condition for n to be ranked before m is ( ).

Am is the ancestor node of n Bm is the descendant node of n Cm is on the left of n Dm is on the right of n

59. If the undirected graph G has n vertices and e edges, then when G is stored in an adjacency matrix, the size of the matrix is ​​( ).

An*e B.n2 C.n2+e2 D. (n+e)2

60. Among the following statements about m-order B-trees, the error is ( ).

A. The root node has at most m subtrees B. All leaf nodes are on the same level

C. The keywords in the nodes are arranged in an orderly manner D. The leaf nodes are linked into an ordered list through pointers

61. Among the following sorting algorithms, the most occupied auxiliary storage space is ( ).

A. Merge sort B. Quick sort C. Heap sort D. Bubble sort

62.63. Binary search Find a specific record K in the ordered array A: by comparing K and the middle element A[mid] in the array, if they are equal, the algorithm ends; if K is less than [Amid], then the first half of the array half of the array; otherwise, a half search is performed on the second half of the array. According to the above description, the binary search algorithm adopts the ( ) algorithm design strategy. For ordered arrays (3, 14, 27, 39, 42, 55, 70, 85, 93, 98), the average number of comparisons required for successful and failed searches are ( ) respectively (assuming that the probability of finding each element is identical)

A. Divide and conquer B. Dynamic programming C. Greedy D. Backtracking

A.29/10 and 29/11 B.30/10 and 30/11 C.29/10 and 39/11 D.30/10 and 40/11

64.65. Use the Dijkstra algorithm to solve the shortest path from point A to point E in the figure below. The algorithm design strategy used is ( ). The length of the shortest path is ( ).

A. Divide and conquer B. Dynamic rules C. Greedy algorithm D. Backtracking method

A.5          B.6          C.7           D.9

66. VLAN tag is implemented in ( ) of the OSI reference model.

A. Network layer B. Transport layer C. Data link layer D. Physical layer

67. The Telnet protocol is a ( ) remote login protocol.

A. Safe BB/S mode C. Based on TCP D. Distributed

68. In the following description about HTTPS and HTTP protocols, the wrong one is ().

A. The HTTPS protocol uses encrypted transmission B. The default service port number of the HTTPS protocol is 443

C. The default service port number of the HTTP protocol is 80 D. Electronic payment websites should use the HTTP protocol

69. The ( ) protocol is used to convert the URL to an IP address.

A. Domain name resolution B. IP address resolution C. Routing selection D. Transmission control

70. The following statement about IP address and MAC address is wrong ( ).

A. The length of the IP address is 32 or 128 bits, and the length of the MAC address is 48 bits

B. The IP address works at the network layer, and the MAC address works at the data link layer

C. The allocation of IP addresses is based on the network topology, and the allocation of MAC addresses is based on the manufacturer

D.IP address is unique, MAC address is not unique

71~75.We initially described SOA without mentioning Web s ervices, and vice versA. This is because they are ortho gonal: service-orientation is an architectural (71) whil e Web services are an implementation (72).The two can be used together, and they frequently are, but they are not mutually dependent.

For example, although it is widely considered to be a distributed-computing solution,SOA can be applied to advantage in a single system,where services might be individual processes with well-defined (73) that communicate using local channels,or in a self-contained cluster, where they might communicate across a high -speed interconnect.

Similarly, while Web services are(74) as the basis for a service-oriented environment, there is nothing in their definition that requires them to embody the SOA p rinciples. While(75)is often held up as a key characte ristic of Web services,there is no technical reason that they should be stateless-that would be a design choi ce of the developerwhich may be dictated by the arc hitectural style of the environment in which the servic e is intended to participate.

(71)A.design     B.Style       C.technology     D.structure

(72)A.Structure   B.style       C.technology     D.method

(73)A.interfaces   B.functions    C.lonics         D.formatsul

(74)A.regarded    B.well-suitede  C.worked       D.used

(75)A.distribution    B.interconnection    C.dependence     D.statelessness

Analysis of answers to real questions in the morning for software designers in the second half of 2022

1.B Click this link to view the real test analysis video.

Parse:

2.B

Parse:

3.D

Parse:

Reliability R=(2000-4)÷2000=0.998

4.A

Parse:

5.C

Parse:

6.D

7.C

8.9. AD

Parse:

The X.509 certificate standard supports three asymmetric encryption algorithms: RSA, DSA, and Diffie-Hellman algorithms. The most commonly used is the RSA algorithm.

10.C

11.A

12.C

Parse:

13.D

Parse:

  1. The right of reproduction, that is, the right to make one or more copies of the software;
  2. The right of information network dissemination, that is, the right to provide software to the public in a wired or wireless manner, so that the public can obtain the software at the time and place they personally choose;
  3. Translation right, that is, the right to convert the original software from one natural language to another;

14.B

Parse:

15.C

16.C

17.18.DB

Analysis: Click this link to view the real test analysis video.

19.B

20.B

Parse:

Every time a function is called, an independent stack frame (stack frame) will be maintained on the call stack (call stack). The stack frame of a function is bounded by two registers, ebp and esp.

Stack frames include:

  1. The return address and parameters of the function.
  2. Temporary variables. Includes non-static local variables of functions and other temporary variables automatically generated by the compiler.
  3. Stack frame state value: ebp (frame pointer), pointing to the bottom of the current stack frame; esp (stack pointer) always points to the top of the stack frame;

21.D

Parse:

22.A

Parse:

The recursive subroutine method is a definite top-down syntax analysis method, which requires the grammar to be LL(1) grammar. Its implementation idea is to write a recursive process corresponding to each non-terminal symbol in the grammar. The function of each process is to identify the string derived from the non-terminal symbol. When there are multiple candidates for the production of a non-terminal symbol, it can press The LL(1) form uniquely determines the selection of a candidate formula for derivation.

23.C

Parse:

24~26.CCD Click this link to view the real test analysis video.

27.D

Parse:

28.C

Parse:

29.B

30.C

31.D

Parse:

32.C

33.B

Parse:

34.A

35.A

36.B

Parse:

The content of information system maintenance can be divided into the following five categories.

(1) System application maintenance. The business process of the system is realized through the operation of the program. Once a problem occurs in the program or the business changes, it will inevitably cause the modification and adjustment of the program. Therefore, the main activity of system maintenance is to maintain the program.

(2) Data maintenance. The demand for data in business processing is constantly changing. In addition to the regular update of the main business data in the system, there are many data that need to be updated irregularly, or adjusted with changes in the environment and business. The increase in data content, Data structure adjustment, data backup and recovery, etc., are all part of the data maintenance work.

(3) Code maintenance. When the application scope of the system expands and the application environment changes, various codes in the system need to be added, modified, deleted and set new codes to a certain extent.

(4) Maintenance of hardware equipment. It mainly refers to the daily management and maintenance of the host and peripherals, which should be carried out regularly by special personnel to ensure the normal and effective operation of the system.

(5) Document maintenance. According to changes in application systems, data, codes, and other maintenance, modify the corresponding documents and record the maintenance performed.

37.38.AD

Parse:

39.C

Parse:

In the application domain, objects are established as naturally occurring entities. In the definition domain, first consider the naturally occurring "noun" as an object, which is usually a good start to research the problem, definition domain entity.

40.A

Parse:

41.42.CD

Parse:

43.B

Parse:

44~46.ABB

Parse:

47.D

48.C

Parse:

Three common exception handling structures in Python

1. try...except...structure

2. try...except...else...structure

3. try...except...finally... structure

Python uses the raise statement to raise a specified exception.

49.B

Parse:

range(start, stop[, step])

Parameter Description:

  1. start: Counting starts from start. The default is to start from 0. For example range(5) is equivalent to range(0, 5);
  2. stop: Count up to stop, but not including stop. For example: range(0, 5) is [0, 1, 2, 3, 4] without 5
  3. step: step size, the default is 1. For example: range(0, 5) is equivalent to range(0, 5, 1)

50.D

Parse:

The input() function receives any input, processes all inputs as strings by default, and returns a string type.

51.C

Parse:

52.53.AB

Parse:

54.55.BD

56.B

Parse:

57.C

58.D

59.B

Parse:

60.D

Parse:

A B-tree of order m satisfies the following conditions:

1. Each node has at most m subtrees.

2. Except the root node, every other branch node has at least ⌈m/2⌉ subtrees.

3. The root node has at least two subtrees (unless the B-tree contains only one node).

4. All leaf nodes are on the same layer. The leaf node of the B tree can be regarded as a kind of external node, which does not contain any information.

5. A non-leaf node with j children has exactly j-1 keys, and the keys are arranged in increasing order.

61.A

Parse:

62.63.AC

Parse:

64.65.CA

66.C

67.C

68.D

Parse:

69.A

70.D

71~75.BCBAD

Guess you like

Origin blog.csdn.net/xiaornshuo/article/details/127765664