56. Which is not the characteristic of operating system?
A.resource management
B.transaction management
C.memory management
D.disk management
A B C D
B
57. Which devices are instruments of interpretation and communication between humans and computers?
A.main memory
B.input/output devices
C.CPU
D.hard disk
A B C D
B
58. Suppose a given binary tree has 10 left nodes,then the number of nodes with degree of 2 is
A.12
B.11
C.9
D.Indeterminable
A B C D
C
59. Which traversal method for a binary tree does the following Pascal code illustrate? Procedure traverse(p:pointer); Begin Ifp<>NIL Then begin Traverse (p^.left); Process(p); Traverse(p^.right) End; End_
A.pre_order
B.middle_order
C.none
D.last_order
A B C D
B
60. A virtual memory system has five virtual pages numbered zero through four and three page frames. All the page frames are initially empty. How many page faults are generated with the following access sequence using a FIFO replacement policy? 0 1 2 3 0 1 4 0 1 2 3 4
A.8
B.9
C.10
D.11
A B C D
B
61. Which element is NOT part of a microkemel?
A.basic I/O
B.a file system
C.IPC mechanisms
D.memory management
A B C D
B
62. In one project of software engineering, the issue that adding more people will not lead to corresponding rise of productivity.
A.the time that we wait during the process of working
B.complexity of constructing prototype model
C.the number of stations that we need
D.communication complexity among people
A B C D
D
63. Which of following statements about testing software with data is (are) true? Ⅰ. The primary purpose of such testing is to find errors. Ⅱ. Such testing can demonstrate the existence of errors but can not demonstrate the absence of errors.
A.Neither
B.Ⅰ only
C.Ⅱ only
D.Ⅰ and Ⅱ
A B C D
B
64. What is a sub-select statement?
A.a select statement that selects a subset of fields in a table
B.a select statement that returns a subset of the data in a table
C.a select statement that appears within another select statement
D.a select statement that returns a subset of the constraints on a field
A B C D
C
65. The most commonly used locking level in implementing concurrency control is at which of the following levels?
A.database
B.table
C.record
D.field
A B C D
C
66. You are performing two sums: the first is a sum of two scalar variables and the second is a matrix sum of a pair of two- dimensional arrays-size 1000 by 1000. What speedup is achieved when the calculations are performed on size 1000 processors?
A.50
B.100
C.999
D.none of the above
A B C D
C
The technology for carrying out multiple processing by means of multiple pipelines is called
A.Super scalar
B.Superpipeline
C.Multiple pipeline
D.Very long instruction word
67.
A B C D
A
68.
A B C D
A
69. It can merely extend transport media's length so that compensate for the attenuation of signals.It is
A.repeater
B.bridge
C.router
D.gateway
A B C D
A
70. Which OSI layer does a bridge operate at?
A.the Physical Layer
B.the Network Layer
C.the Transport Layer
D.the Data Link Layer
A B C D
D
71. URLs have three parts:the DNS name of machine on which the page is located,then a local name uniquely indicating the specific page and