●由于可重用資源的沖突會引起死鎖,產生死鎖有四個必要條件:互斥、保持和等待、循
環等待以及_(42)_分配方式。
(42)A.資源消耗性 B.資源非消耗性 C.不可搶占式 D.搶占式
●判斷線索二叉樹中某節點P有左孩子的條件是_(43)_。若由森林轉化得到的二叉樹是非空的二叉樹,則二叉樹形狀是_(44)_。
(43)A.P!=null B.p->lchild!=null C.P->itag=0 D.p->itag=1
(44)A.根節點無右子樹的二叉樹 B.根節點無左子樹的二叉樹
C.根節點可能有左二叉和右二叉樹 D.各節點只有一個兒子的二叉樹
●多個并發進程使用一個互斥信號量nap時,如果rap=13,則通常表示_(3)_45) 。
(45)A.有多個進程在臨界區中 D.有一個進程在臨界區中
C.沒有進程在臨界區中
D.有一個進程在臨界區中,另一些進程正等待進入臨界區
●IP操作主要解決三個問題:_(46)_、_(47)_和_(48)_。
(46)A.識別標識號 B.尋址 C.網絡分組 D.名字翻譯
(47)A.分段 B.修改路徑 C.路徑選擇 D.網絡連接
(48)A.分段和重組 B.打包 C.產生數據段 D.目標服務
●如果I/O設備與存儲設備進行數據交換不經過CPU來完成。這種數據交換方式是_(49)_。
(49)A.程序查詢 B.中斷方式 C.DMA方式 D.無條件存取方式
●MIDI的音樂合成器有_(50)_。
①FM ②波表 ③復音 ④音軌
(50)A.① B.①② C.①②③ D.全部
●在多媒體中記錄音樂的文件格式常用的有WAVE、MP3和MIDI等。其中WAVE記錄了音樂的_(51)_,MP3記錄了_(52)_的音樂,MIDI記錄了_(53)_。在用MPEG格式存儲的圖像序列中,不能隨機恢復一幅圖像的原因是它使用了_(54)_技術,影響這種圖像數據壓縮比的主要因素是_(55)_ 。
(51)A.模擬信號電壓量 B.模擬信號的采樣數值
C.數字化壓縮編碼 D.電子合成波形
(52)A.屬于MTV B.有極高保真度 C.經過三次編碼處理 D.經數字化壓縮編碼
(53)A.描述音樂演奏過程的指令 B.音樂電信號的采樣數值
C.分成許多小段的音樂 D.多聲道電子合成的音樂
(54)A.幀內圖像數據壓縮 B.幀間圖像數據壓縮
C.富里哀變換 D.霍夫曼編碼
(55)A.圖像的大小 B.圖像的色彩 C.圖像袁現的細節 D.圖像序列變化的程度
●_(56)_是軟件過程評估的國際標準,可以樁任何組織用于軟件的設計;管理、監督、控制以及提高獲得、供應、開發、操作、升級和支持的能力。IS09000系列標準是國際標準化組織質量管理和質量保證技術委員會于_(57)_年頒布的質量管理和質量保證系列標準。
目前,IS09000、2000系列標準它包括_(58)_項具體標準。_(59)_是軟件生命周期過程的國際標準。
(56)A.ISO/IECl5504 B.IS012207 C.SA-CMM D.CMM
(57)A.1987 B.1990 C.1994 D.2000
(58)A.4 B.5 C.16 D.20
(59)A.ISO/PECl5504 B.IS012207 C.SA CMM D.CMM
●局部用戶所使用的數據可以不參與到全局數據庫中去,這種特性屬于_(60)_。
(60)A.數據的集中控制性 B.數據的獨立性 C.場地自治性 D.數據冗余可控性
●某循環冗余碼(CRC)的生成多項式為G(X)=x5+x4+x+1,則它對任意長度的信息位產生_(61)_位長的冗余位,并可檢驗出所有突發長度_(62)_位的突發錯誤。若信息位于1010100,采用此生多項產生冗余位,加在信息位后形成的碼字是_(63)_。在讀出或接收端讀到的碼字中若不滿足某種規律可判斷其必然有錯。例如_(64)_和_(65)_就是出錯的碼字。
(61)A.小于等于4 B.4 C.小于等于5 D.5 E.大于等于5 F.大于5
(62)A.小于等于4 B.4 C.小于等于5 D.5 E.大于等于5 F.大于5
(63)A.1010110111111 B.1010111010001
C.1010110001101 D.1010111101010
E.1010111011001 F.1010110001100
(64)A.1010110111111 B.1010111010001
C.1010110001101 D.1010111101010
E.1010111011001 F.1010110001100
(65)A.1010110111111 B.1010111010001
C.1010110001101 D.1010111101010
E.1010111011001 F.1010110001100
●Typically,these are concerm with the establishment of _(66)_ the network and with the control of the flow of messages across this channel. The provision of such facilities is only part of the network requirements,however,since in many applications the communicating computers may be of different types. This means that they may use different programming languages and,more importantly,different forms of _(67)_ interface between user(application) prograrma,normally referred to,as application processes or APs,and the underlying communication services may be _(68)_ For example,one computer may be a smaall single- user computer,while another may be alarge _(69)_ system.In the earlier days of computer communication,these issues meant that only closed communities of computers(that is,from the same manufacturer) could communicate with each other in a meaningful way. IBM's Systems Network
Architecture(SNA) and DEC's Digital Network Architecture (DNA) are just two examples of communication software packages produced by manufacturers to allow their systems to be int ercormected together.These proprietary packages, however, of which there am still many inexistence, do not address the problem of universal interconnect ability, or open systems interconnection. In an attempt to alleviate this problem,_(70)_,in the late 1970s,formulated a reference model to provide a common basis (or the coordination of standards developments and to allow existing and evolving standards acivities to be placed into perspective with one another.
(66)A.communication channel access B.protocols
C.datachanneI D.public communieation
(67)A.database B.data representation
C.protocols D.data communication
(68)A.same B.similar C.different D.dependent
(69)A.multi-user B.client C.server D.full-user
(70)A.DNA B.SNA C.the OSI D.the ISO
●One of the functions of the _(71)_ is to store the applications progrms {or the various secondaries. The _(72)_ may have similar or dissimilar functions. The same control code received from two different secondaries may warrant two different actions on the part of the host computer. If the system so requires,the host computer must also provide _(73)_ for the centralized data and the software for database management. Data information is normally stored in auxiliary memories to which the computer has ready access. The_(74)_ peripherals connected to the host computer allow for human entry and intervention. As needs change, application programs may require additions, deletions, or changes. Data link problems also arise which are __(75)_ the range of the computer's programmed capabilities. In such cases, human entry is required to make the necessary changes to resolve the existing problems.
(71)A.peripherals B.host computer C.the interface D.the client
(72)A.set B.host C.secondaries D.record
(73)A.storage B.data C.range D.link
(74)A.peripherals B.database C.the interface D.clients
(75)A.dose to B.during C.within D.beyond
更多軟考資料請訪問:考試吧軟件水平考試欄目