Analysis of real questions and answers in the morning for system architects in the second half of 2020

1. According to the rights protection period of my country’s Copyright Law, ( ) is protected permanently.

A.Right of publication B.Right of modification C.Right of reproduction D.Right of distribution

2. Assume that the word length of a computer is 32 bits. The disk space management of the computer file management system uses bitmaps to record disk usage. If the disk capacity is 300GB and the physical block size is 4MB, then the size of the bitmaps For ( ) characters.

A.2400    B.3200     C.6400     D.9600

3. In a real-time operating system, external events must ( ).

A. Processing within a time slice

B. Processed within one cycle

C. Processed within one machine cycle

D. Within the time allowed by the controlled object

4. ( ) means that users do not need to know the physical location where the data is stored.

A. Sharding transparency B. Logic transparency C. Location transparency D. Replication transparency

5. The description of microkernel is incorrect ( ).

A. The microkernel system has a clear structure and improves system flexibility.

B. The microkernel has a small amount of code and good portability.

C. The microkernel has good scalability and good expansibility.

D. Microkernel function codes can call each other with high performance

6. The vulnerability of the hierarchical structure includes ( ).

A. The underlying error causes the entire system to fail to run, and functional references between layers may cause functional failure.

B. The underlying error causes the entire system to fail to operate. The introduction of communication mechanisms between layers will inevitably cause performance degradation.

C. An error in the upper layer causes the entire system to fail to operate. The introduction of a communication mechanism between layers will inevitably cause performance degradation.

D. Errors in the upper layer cause the entire system to fail to operate, and functional references between layers may cause functional failure.

7. In the following description of the "mining" behavior in the system used in the blockchain, the incorrect one is ( ).

A. "Mining" obtains the accounting rights of the blockchain and obtains token rewards at the same time

B. “Mining” is essentially trying to calculate a Hash collision

C. “Mining” is a proof-of-work mechanism

D. Can prevent double-spending attacks on Bitcoin

8. Among the following statements about delay, which one is correct ( ).

A. In a peer-to-peer network, the delay of the network has nothing to do with the number of terminals in the network

B. The delay caused by using a router for data forwarding is smaller than that of a switch

C. Using an Internet server can minimize network latency

D. The main influencing factors of server delay are queue delay and disk I/O delay

9.10. There are three forms of system monitoring: one is through ( ) such as PS, last; the other is checking the system running status through system record files; the third is integrating commands, file recording and visualization technology, and monitor diagrams, such as ( ).

A. System command B. System call C. System interface D. System function

A.Windows netstat    B.Linux iptables    C. Windows perfmon     D.Linux top

11~14. The business of population collection, processing and utilization belongs to ( ), the issuance of business licenses belongs to ( ), household registration management belongs to ( ), and participation in the handover of government projects belongs to ( ).

A. Government to business (G2B) B. Government to government (G2G) C. Business to government (B2G) D. Government to the public (G2C)

A. Government to business (G2B) B. Government to government (G2G) C. Business to government (B2G) D. Government to the public (G2C)

A. Government to business (G2B) B. Government to government (G2G) C. Business to government (B2G) D. Government to the public (G2C)

A. Government to business (G2B) B. Government to government (G2G) C. Business to government (B2G) D. Government to the public (G2C)

15.16. Software documentation can be divided into user documentation and ( ), among which user documentation mainly describes ( ) and usage methods.

A. System documentation B. Requirements documentation C. Standard documentation D. Implementation documentation issues

A. System implementation B. System design C. System function D. System testing

17.18. The final document of software requirements development defines the development work after review ( ). It builds the functional requirements and non-functional requirements of the product between customers and developers ( ). It is the link between requirements development and requirements management. bridge.

A. Requirement baseline B. Requirement standard C. Requirement use case D. Requirement analysis

A. Requirement use case B. Requirement management standard C. Requirement agreement D. Requirement change

19~21. Software activities mainly include software description, ( ), software validity verification and ( ). ( ) defines software functions and usage restrictions.

A. Software Model B. Software Requirements C. Software Analysis D. Software Development

A. Software Analysis B. Software Testing C. Software History D. Software Evolution

A. Software Analysis B. Software Testing C. Software Description D. Software Development

22.23. Corresponding to various activities in the software development process, software development tools include demand analysis tools, ( ), coding and debugging tools, and testing tools. According to the method of describing demand definition, demand analysis tools can be divided into natural language or graphics based Described tools and tools based on ( ).

A. Design tools B. Analysis tools C. Coupling tools D. Monitoring tools

A. Use Case B. Formal Requirements Definition Language C. UML D. Requirements Description

24.25. Software design includes 4 independent but interrelated activities: ( ), software structure design, man-machine interface design and ( ).

A.Use case design B.Data design C.Program design D.Module design

A. Interface design B. Operation design C. Input and output design D. Process design

26.27. The ( ), testability and ( ) of software can be improved by information hiding.

A. Modifiability B. Scalability C. Reliability D. Coupling

A. Encapsulation B. Security C. Portability D. Interoperability

28. According to the external form, the components that constitute a software system can be divided into five categories. Among them ( ) means that version replacement can be performed and new functions of the component can be added.

A. Assembled components      B. Modifiable components      C. Constrained components     D. Adaptive components

Answers and analysis of real questions in the morning for system architects in the second half of 2020

1.B   Click this link to view the real test analysis video https://ke.qq.com/course/333058

Analysis:

Guess you like

Origin blog.csdn.net/xiaornshuo/article/details/132624685