37. 奔腾处理器已普遍采用超流水线技术,所谓超流水线技术是
A)细化流水、增加级数 B)把普通流水线主频提高 C)不采用多指令分发技术` D)多建立几条流水线
38. 程序趋向于重用它当前正在使用的指令和数据。这个广泛适用的经验规则称为
A)全局性原理 B)时间性原理 C)局部性原理 D)空间性原理
39. 寄存器窗口重叠技术是RISC的关键技术,这项技术能很好地支持过程调用和返回操作。这里所谓的重叠是指
A)高位寄存器与局部寄存器重叠 B)高位寄存器与低位寄存器重叠 C)全局寄存器与局部寄存器重叠 D)全局寄存器与高位寄存器重叠
40. 把向量数据表示与流水技术相结合,形成性能价格比很高的向量流水处理机。其中常用的处理方式是
A)纵向处理 B)纵横处理 C)横向处理 D)水平处理
41. 高速并行结构的种类很多,在下述结构中,硬件效率最低而软件需求量最多的是
A)专用多功能单元 B)阵列处理机 C)数据流计算机 D)多处理机系统 42. 通道实质上是主存与I/O设备之间的DMA接口逻辑上的延伸,适合连接多台低速设备的通道是
A)字节多路通道 B)选择通道 C)数组多路通道 D)块多路通道
43. 计算机A比计算机B吞吐率大30%,表示单位时间内A完成的任务数是B的
A)0.3倍 B)1.3倍 C)3倍 D)30倍
44. 确定网络拓扑构型是网络系统设计的重要内容之一,网络拓扑对网络系统的影响主要表现在哪几个方面?
Ⅰ.网络性能 Ⅱ.系统可靠性 Ⅲ.网络体系结构 Ⅳ.通信费用
A)Ⅰ和Ⅱ B)Ⅰ、Ⅱ和Ⅲ C)Ⅰ、Ⅱ和Ⅳ D)全部
45. 以下哪个(些)说法是错误的?
Ⅰ.IP协议提供的是面向连接的可靠服务 Ⅱ. TCP协议提供的是无连接不可靠服务 Ⅲ.UDP协议提供的是面向连接的可靠服务 Ⅳ.IP协议提供的是无连接不可靠服务
A)全部 B)Ⅰ和Ⅲ C)Ⅱ、Ⅲ和Ⅳ D)Ⅰ、Ⅱ和Ⅲ
46. 城域网设计的目标是要满足几十千米范围内的大量企业、机关、公司的多个局域网互连的需求,以实现大量用户之间的多种信息传输的功能,这些信息的类型主要是文字、语音、图形与
A)视频 B)数据 C)路由信息 D)控制信息
47. 在数据通信技术中,利用数字通信信道直接传输数字数据信号的方法是
A)频带传输 B)基带传输 C) 宽带传输 D)IP传输
48. 网络操作系统的基本任务是:屏蔽本地资源与网络资源的差异性,为用户提供
Ⅰ.各种基本网络服务功能 Ⅱ.网络共享系统资源的管理 Ⅲ.网络计费 Ⅳ.网络系统的安全性服务
A)Ⅰ和Ⅱ B)Ⅰ、Ⅱ和Ⅲ C)Ⅰ、Ⅱ和Ⅳ D)全部
49. 源路选网桥由发送帧的源结点负责路由选择,源结点在发送帧时需要交详细的路由信息放在
A)网络层地址 B)帧的校验字段 C)IP地址 D)帧的首部
50. 一台Internet主机至少有一个IP地址,而且这个IP地址是全网唯一的。如果一台Internet主机有两个或多个IP地址,则该主机属于两个或多个
A)逻辑网络 B)浏览器/服务器结构 C) 通信子网 D)操作系统
51. In a computer,if a logical left shift of the
operand occurs,its lowest bit is
A)1 B)unchanged C)0 D)random
52. The CPU is composed of two components,which are
A)Asthmatics logic unit and controller B)memory
and controller C)arithmetic logic unit and memory D)
controller and storage
Items 53 and 54 are based on the following hash table.
0 1 2 3 4 5 6 7 8 9 10 11 12
26 38 17 33 48 35 25
Hash function is: h(key)=key mod 13
Collisions are solved by using open addressing,
liner probing.
53. Load factor α of the hash table is approximately
A)0.28 B)0.35 C)0.54 D)0.71
54. How many key comparisons are needed in searching
for key value 38?
A)1 B)2 C)3 D)4
55. Which of the following operations belongs to
message passing?
A)Read and write B)send and receive
C)wait and signal D)P and V
56. If file A has the capability of 724,the same
group’s users of file A may do
A)read A only B)write A
C)execute A D)non-operation
57. In which phase of the software engineering process
is the Software Requirements Specification developed?
A)Definition phase B)engineering phase
C)maintenance phase D)development phase
58. The prototyping method is a dynamic design processs,
which requires people who use prototyping method to have
the following capability of
A)Proficient program expertise
B)immediately acquire requirement
C)coordinate & organize eloquently
D)handle tools smartly
59. For relation where primary key contains multiple
attributes, no non-key attribute should be functionally
dependent on a part of primary key. This relation
R is at least in
A)INF B)2NF C)3NF D)BCNF
60. Which of the following statements about object
oriented database is not correct?
A)Each object has a unique object identify in
the system.
B)Encapsulation and inheritance are two
important features of object oriented database
C)A subclass can inherit the attributes and
methods of all its superclasses
D)A supereloss includes the attributes and methods
at all subclasses
61. Local bus can increase the data throughput.
The bus that is most frequently used is
A)VESA B)EISA C)MCA D)PCI
62. Most frequently used algorithm for page
replacement is
A)LRU B)FIFO C) OPT D)PPT
63. The following three concepts are essential to the
OSI model: service, interface and
A)Networks B)applications C)protocols D)layers
64. LANs can be connected by using bridges,which
operate in the
A)Physical layer B)data link layer
C)network layer D)transport layer
65. TCP service is obtained by having both the sender
and the receiver create and points,which are called
A)Network address B)supenet address
C)socket D)IP address