. 1, , the CPU needs to be analyzed and the instruction fetch and execution from memory during program execution. CPU based on (different phases of the instruction cycle) to distinguish between instructions and data stored in memory in binary coded form.
[A]:
The instructions and data are stored in memory, in a conventional computer CPU during execution to distinguish the different stages of the instruction cycle data or instruction fetch is an instruction fetch cycle, data is fetched execution cycle
Instruction cycle is the time required to execute an instruction, typically by a number of machine cycles, from the instruction fetch, instruction to analyze total time required to complete execution. CPU during execution of the instructions, to operate step by step in accordance with a clock timing signal emitted member. Read the instruction fetch stage, in the analysis and execution of instructions, operands are read again when necessary operand.
2, (the recipient can verify the legitimacy) is not a digital signature role.
A: recipient can verify the authenticity of sources
B: The sender can not deny sending the message
C: recipient of a message can not be forged or tampered with
D: verify the legitimacy of the recipient
[A]:
A digital signature is someone else to produce the sender can not be forged for a string of numbers, this is the message sender to send a valid proof of authenticity
Timbre (Timbre): refers to the sensory properties of sound, different voices and different sounds can be divided into different sounds, namely audio overtone or harmonic components.
Pitch: Refers to a variety of high and low sounds (ie the first height), it is a basic feature of the first.
In the FM mode in the music synthesizer, there are many digital carrier waveform and the modulation waveform, different types of FM synthesis waveforms are chosen different. A variety of different tones are generated by combining various waveforms and waveform parameters and using various different methods to achieve. Changing the carrier frequency may change the number of tone pitch, change the amplitude of the tone pitch can be changed .
A: Architecture Design
B: Data Design
C: Interface Design
D: Process Design
[A]:
The main structural elements and their relationships definition of software: ① architecture design.
② Data Design: Based entities associated table structure diagram to determine the structure of the database and software related to the file system.
③ interface design: a user interface description, software and other hardware devices, the internal interface between the external interface, and various other software components and systems used in the art.
④ design process: determining algorithm and the internal data structure of the various components of the software, and some form of expression of the selected process to describe various algorithms.
[A]:
This title examines the software development process model basics.
Waterfall model development phase will be described as a transition from one process to another phase Waterfall camel stage.
Prototype model, developers quickly construct part of the system or systems in order to understand or clarify issues. Is the incremental model of software products as a series of incremental member design, coding, testing and integration, by a member of each module consisting of a plurality of interacting, and to perform specific functions.
Chapter fountain model development process to the user demand-driven, object-driven, suitable for object-oriented development methodology.
In the several development process model, the waterfall model can not adapt to changes in demand.
6, (easy to understand) does not belong to the quality characteristics of software portability.
[A]:
This title examines software quality basics.
ISO / IEC software quality model defines six software quality characteristics, namely:
Functionality, reliability, ease of use, efficiency, maintainability and portability .
Define for each sub-quality characteristic properties.
Which comprises the sub-portable features: adaptability, ease of installation, and ease of replacement of consistency .
7, a processing module has two A and B, respectively, write data and read data to the data structure X, the cohesive type of module (process) cohesion.
[A]:
本题考查软件设计的基础知识。
模块间的耦合和模块的内聚是度量模块独立性的两个准则。内聚是模块功能强度的度量,即模块内部各个元素彼此结合的紧密程度。一个模块内部各个元素之间的紧密程度越高,则其内聚性越高,模块独立性越好。模块内聚类型主要有以下几类:
偶然内聚,巧合内聚:指一个模块内的各处理元素之间没有任何联系。
逻辑内聚:指模块内执行g干个逻辑上相似的功能,通过参数确定该模块完成哪一个功能。
时间内聚:把需要同时执行的动作组合在一起形成的模块。
过程内聚:指一个模块完成多个任务,这些任务必须按指定的过程执行。
通信内聚:指模块内的所有处理元素都在同一个数据结构上操作,或者各处理使用相同的输入数据或产生相同的输出数据。
顺序内聚:指一个模块中的各个处理元素都密切相关于同—个功能且必须顺序执行,前一个功能元素的输出就是下一功能元素的输入。
功能内聚:指模块内的所有元素共同作用完成一个功能,缺一不可。
本题中,两个处理A和B对相同的数据结构操作,属于通信内聚。
8、面向对象分析的目的是为了获得对应用问题的理解,其主要活动不包括(面向对象程序设计)。
本题考查面向对象的基本知识。
面向对象分析的目的是为了获得对应用问题的理解,以确定系统的功能、性能要求。
9、 以下关于UML状态图中转换(transition)的叙述中,不正确的是(一个转换可以有事件触发器、监护条件和一个状态)。
本题考查面向对象和统一建模语言(UML)的基础知识。
状态图(state diagram)展现了一个状态机,关注系统的动态视图,强调对象行为的事件顺序引起的对象状态变化。
一般情况下,活动可以在状态转换时执行,也可以走状态内执行。检测到事件可能导致对象从一个状态移动到另一个状态,这样的移动即为转换,即事件触发转换,
这样能引起转换的事件称为触发器。事件发生时,检查监护条件,如果满足相应的事件,则进行相应的转换,如果都没满足,则此事件没有引起状态的改变。
一个线性表有n个元素。当删除线性表末尾元素时需要移动0个元素,当删除线性表第一个元素时需要移动(n-1)个元素,则平均需要移动(n-1)+(n-2)+...+1+0/n=(n+1)/2。
故答案为(n+1)/2。
11、与地址220.112.179.92匹配的路由表的表项是(70)。
![](file:///C:\Users\孙娇娇\AppData\Roaming\Tencent\TIM\Temp\%W@GJ$ACOF(TYDYECOKVDYB.png)
B:
![](file:///C:\Users\孙娇娇\AppData\Roaming\Tencent\TIM\Temp\%W@GJ$ACOF(TYDYECOKVDYB.png)
C:
![](file:///C:\Users\孙娇娇\AppData\Roaming\Tencent\TIM\Temp\%W@GJ$ACOF(TYDYECOKVDYB.png)
D:
![](file:///C:\Users\孙娇娇\AppData\Roaming\Tencent\TIM\Temp\%W@GJ$ACOF(TYDYECOKVDYB.png)
![](file:///C:\Users\孙娇娇\AppData\Roaming\Tencent\TIM\Temp\%W@GJ$ACOF(TYDYECOKVDYB.png)
根据选项,要求是22位网络号,也就是说1101 1100 0111 0000 1011 0011 0101 1100加粗部分的22位网络号是固定不变的,剩下的10位是主机号。
也就是说斜线记法的地址是在1101 1100 0111 0000 1011 0000 0000 0000(
![](file:///C:\Users\孙娇娇\AppData\Roaming\Tencent\TIM\Temp\%W@GJ$ACOF(TYDYECOKVDYB.png)
![](file:///C:\Users\孙娇娇\AppData\Roaming\Tencent\TIM\Temp\%W@GJ$ACOF(TYDYECOKVDYB.png)
以
![](file:///C:\Users\孙娇娇\AppData\Roaming\Tencent\TIM\Temp\%W@GJ$ACOF(TYDYECOKVDYB.png)
CIDR地址块的范围是1101 1100 0111 0000 1011 0000 0000 0000(
![](file:///C:\Users\孙娇娇\AppData\Roaming\Tencent\TIM\Temp\%W@GJ$ACOF(TYDYECOKVDYB.png)
![](file:///C:\Users\孙娇娇\AppData\Roaming\Tencent\TIM\Temp\%W@GJ$ACOF(TYDYECOKVDYB.png)
![](file:///C:\Users\孙娇娇\AppData\Roaming\Tencent\TIM\Temp\%W@GJ$ACOF(TYDYECOKVDYB.png)