当前位置:文档之家› 1Z0-042_v080812_(296题库)=bt

1Z0-042_v080812_(296题库)=bt

1Z0-042_v080812_(296题库)=bt
1Z0-042_v080812_(296题库)=bt

共计:296道题此题库整理了:

1Z0-042(1.14M).pdf

1Z0-042_by_Heyrae_2007-12-4.pdf

042(2008-04-24).doc,

TestKing+Oracle10g+1Z0-042+V2.1.pdf

1、发表于今天通过了042的考试1.14M的那个题库很准。想考的赶快去考吧

2009-4-15 11:23

2、actualtest_080313_1Z0-042.pdf(1Z0-042(1.14M).pdf)这个题库和1Z0-042_by_Heyrae_2007-12-4.pdf两个题库有50%以上是重叠的,我准备的时候两个题库都看了,还有超过042考试大纲的题不用看,另外1.14M的

ExamWorx1Z0-042.exe和1Z0-042_by_Heyrae_2007-12-4.pdf的题目是一样的,可以用来做练习。另外,OCA比较好过,大家不用太紧张。

1. Which three pieces of information are considered while deciding the size of the undo tablespace in your database? (Choose three.)

A) the size of an undo block

B) the size of the redo log files

C) undo blocks generated per second

D) the size of the database buffer cache

E) the value of the UNDO_RETENTION parameter

2. You executed the STARTUP MOUNT command to start your database. For which database operation do you need to start the database in the MOUNT state?

A) renaming the control files

B) dropping a user in your database

C) enabling or disabling redo log archiving

D) dropping a tablespace in your database

E) re-creating the control files, after you lost all the control files in your database

3. You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?

A) Use the CREATE DATABASE.. command to create the database with Oracle-managed files.

B) Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files.

C) Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option.

D) Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template.

E) Use the CREATE DATABASE.. command to create the database with Automatic Storage

Management (ASM) file system.

4. Which three statements are true about the stages of database startup? (Choose three.)

A) Data files and redo log files can be renamed at the MOUNT stage.

B) Control files are read at the OPEN stage for the location of data files.

C) Control files are required to bring the database to the NOMOUNT stage.

D) Data files and redo log files are made available to users at the OPEN stage.

E) Data files and online redo log files are checked for consistency while opening the database

5. A constraint in a table is defined with the INITIALLY IMMEDIATE clause. You executed the ALTER TABLE command with the ENABLE VALIDATE option to enable the constraint that was disabled. What are the two effects of this command? (Choose two.)

A) It fails if any existing row violates the constraint.

B) It does not validate the existing data in the table.

C) It enables the constraint to be enforced at the end of each transaction.

D) It prevents insert, update, and delete operations on the tabl

6. You received complaints about the degradation of SQL query performance. You identified top SQL queries

that consume time. What would be your next step to find out recommendations about statistics collection and restructuring of the SQL statement to improve query performance?

A) run Segment Advisor

B) run SQL Tuning Advisor on top SQL statements

C) run the Automatic Workload Repository (AWR) report

D) run the Automatic Database Diagnostic Monitor (ADDM) on top SQL statements

7. The UNDO_RETENTION parameter in your database is set to 1000 and undo retention is not guaranteed.

Which statement regarding retention of undo data is correct?

A) Undo data becomes obsolete after 1,000 seconds.

B) Undo data gets refreshed after every 1,000 seconds.

C) Undo data will be stored permanently after 1,000 seconds.

D) Committed undo data would be retained for 1,000 seconds if free undo space is available.

E) Undo data will be retained in the UNDO tablespace for 1,000 seconds, then it gets moved to the TEMPORARY

tablespace to provide read consistency.

8. View the Exhibit. Which statement regarding the dept and emp tables is true?

A) When you delete a row from the emp table, you would receive a constraint violation error.

B) When you delete a row from the dept table, you would receive a constraint violation error.

C) When you delete a row from the emp table, automatically the corresponding rows are deleted from the dept table.

D) When you delete a row from the dept table, automatically the corresponding rows are deleted from the emp table.

E) When you delete a row from the dept table, automatically the corresponding rows are updated with null values in the

emp table.

F) When you delete a row from the emp table, automatically the corresponding rows are updated with null values in the

dept table.

9. Which three statements are correct about temporary tables? (Choose three.)

A) Indexes and views can be created on temporary tables.

B) Both the data and the structure of temporary tables can be exported.

C) Temporary tables are always created in a user's temporary tablespace.

D) The data inserted into a temporary table in a session is available to other sessions.

E) Data manipulation language (DML) locks are never acquired on the data of temporary tables.

10. Which statement regarding the contents of the V$PARAMETER view is true?

A) displays only the list of default values

B) displays only the list of all basic parameters

C) displays the currently in effect parameter values

D) displays only the list of all advanced parameters

E) displays the list of all the parameter files of a database

F) displays the current contents of the server parameter file

11. According to your backup strategy, you performed an incremental level 0 backup of your database. Which statement regarding this backup is true?

A) The backup is similar to image copy.

B) The backup contains all used data blocks.

C) The backup contains only unused data blocks.

D) The backup contains all data blocks changed since the last incremental level 1 backup.

12. Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?

A) The user must be granted the database administrator (DBA) privilege.

B) The user must be listed in the password file for the authentication.

C) No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.

D) Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager, and grant the webDba

role to the user.

13. Because of a power outage, instance failure has occurred. From what point in the redo log does recovery begin and where does it end?

A) current redo log and inactive redo log

B) checkpoint position to end of redo log

C) beginning of redo log to end of redo log

D) all redo logs before the point of last commit

E) beginning of redo log to checkpoint position

14. Which two statements are true regarding the database in ARCHIVELOG mode? (Choose two.)

A) You have to shut down the database to perform the backups.

B) Archiving information is written to the data files and redo log files.

C) You can perform complete database backups without closing the database.

D) Online redo log files have to be multiplexed before putting the database in ARCHIVELOG mode.

E) All the previous database backups become invalid after you configure the database to ARCHIVELOG mode.

15. User Scott has updated the salary of one of the employees in the EMPLOYEES table and has not committed the transaction. What are the two types of locks that this scenario would lead to? (Choose two.)

A) null lock on the row being updated

B) null lock on the table containing the row

C) ROW SHARE lock for the row being updated

D) ROW EXCLUSIVE lock for the row being updated

E) shared row-exclusive lock for the row being updated

F) a shareable table lock for the table containing the row

G) exclusive table-level lock for the table containing the row

16. You notice this warning in the alert log file:

ORA-19815: WARNING: db_recovery_file_dest_size of 3221225472 bytes is 100.00% used, and has 0 remaining bytes available.

What would you do to reclaim the used space in the Flash Recovery Area?

A) Back up the Flash Recovery Area.

B) Increase the retention time for the files.

C) Decrease the retention time for the files.

D) Manually delete all the archived log files from the Flash Recovery Area by using operating system (OS) commands.

17. View the Exhibit and examine the output.

Which statement describes the conclusion?

A) The users should use bind variables instead of literals in the query.

B) The dictionary cache is consuming more space than the library cache.

C) The shared pool size should be increased to accommodate the SQL statements.

D) Preparing indexes on the tables used in the SQL statements would improve the library cache performance.

18. Which two operations require undo data? (Choose two.)

A) committing a transaction

B) rolling back a transaction

C) recovering from failed transactions

D) recording a transaction to redo log files

E) rolling forward during instance recovery

19. Your database is configured in NOARCHIVELOG mode. All the control files have been lost due to a hard disk failure but the data files are not lost. You have the closed whole database backup available to you. Which two statements are true in this scenario? (Choose two.)

A) The instance aborts.

B) The database cannot be recovered.

C) The database can be recovered by restoring the control files from the backup.

D) The database remains opened and you have to shut it down with the ABORT option.

E) The database can be restored till the point of the last closed whole database backup.

20. Which is the correct description of the significance of the ORACLE_HOME environmental variable?

A) It specifies the directory containing the Oracle software.

B) It specifies the directory containing the Oracle-Managed Files.

C) It specifies the directory for database files, if not specified explicitly.

D) It specifies the base directory of Optimal Flexible Architecture (OFA) .

21. While running the Oracle Universal Installer on a Unix platform to install Oracle

Database 10g software, you are prompted to run orainstRoot.sh script. What does this script accomplish?

A) It creates the pointer file.

B) It creates the base directory.

C) It creates the Inventory pointer file.

D) It creates the Oracle user for installation.

E) It modifies the Unix kernel parameters to match Oracle's requirement.

22. You find that the database performance degrades while you backup the PROD database using Recovery Manager (RMAN). The PROD database is running in shared server mode. The database instance is currently using 60% of total operating system memory. You suspect the shared pool fragmentation to be the reason. Which action would you consider to overcome the performance degradation?

A) Configure Java Pool to cache the java objects.

B) Configure Streams Pool to enable parallel processing.

C) Increase Shared Pool size to cache more PL/SQL objects.

D) Increase Database Buffer Cache size to increase cache hits.

E) Configure Large Pool to be used by RMAN and shared server.

F) Increase the total System Global Area (SGA) size to increase memory hits.

23. Your database is started with SPFILE. You want the database instance to be dynamically registered with a listener L2 with the following details:

Protocol: TCP

Host: indl151e

Port: 1525

Which is the correct order of the steps that you would follow to achieve this?

1. Set the LOCAL_LISTENER parameter to L2 dynamically.

2. Make an entry for L2 in tnsnames.ora on the database server.

3. Restart L2.

4. Modify the listener.ora file to add the instance name in SID_LIST of L2.

A) 1, 2, 4, 3

B) 1, 2, 3; 4 is not required.

C) 2, 1; 3 and 4 are not required.

D) 1, 2; 3 and 4 are not required.

24. The junior DBA in your organization has accidentally deleted the alert log file. What will you do to create new alert log file?

A) Create the new text file file as ALERT.LOG.

B) You have to recover the alert log file from the valid backup.

C) Change the value for the BACKGROUND_DUMP_DEST parameter.

D) No action required.The file would be created automatically by the instance.

25. A user complains that he gets the following error message repeatedly after executing some SQL statements. The error message forces the user to log off from and log on to the database to continue his work. ORA-02392: exceeded session limit on CPU usage, you are being logged off

Which action would you take to increase the session limit on CPU usage?

A) Modify the profile assigned to the user.

B) Modify the roles assigned to the users.

C) Modify the object privileges assigned to the user.

D) Modify the system privileges assigned to the users.

E) Modify the value for the RESOURCE_LIMIT parameter in the parameter file.

26. While setting up an Oracle database for one of your critical applications, you want to ensure that the database is backed up at regular intervals without your intervention.What should you do to achieve the objective?

A) configure the database to run in ARCHIVELOG mode

B) configure the Flash Recovery Area to enable automatic database backup

C) schedule the database backup using DBMS_JOB package after creating the database

D) schedule the database backup using Recovery Manager (RMAN) commands after creating the database

E) schedule the database backup using Database Configuration Assistant (DBCA) while creating the database

27. Which two statements about Flashback Query are true? (Choose two.)

A) It is generated by using the redo log files.

B) It helps in row-level recovery from user errors.

C) It can be performed to recover ALTER TABLE statements

D) It fails when undo data pertaining to the transaction is overwritten.

E) The database has to be opened with the resetlogs option after performing Flashback Query.

28. As a result of performance analysis, you created an index on the prod_name column of the prod_det table, which contains about ten thousand rows. Later, you updated a product name in the table. How does this change affect the index?

A) A leaf will be marked as invalid.

B) An update in a leaf row takes place.

C) The index will be updated automatically at commit.

D) A leaf row in the index will be deleted and inserted.

E) The index becomes invalid when you make any updates.

29. View the Exhibit.

Your Oracle 10g database has 6 tablespaces in which)

-TEMP is the default temporary tablespace

-UNDOTBS1 is the default undo tablespace

-USERS is the default permanent tablespace

In this database, which two tablespaces can be made read only? (Choose two.)

A) TEMP

B) PROD

C) USERS

D) SYSAUX

E) SYSTEM

F) UNDOTBS1

30. You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.

How would you achieve this?

A) by using triggers

B) by using external tables

C) by using anonymous PL/SQL blocks

D) by auditing all DML operations on the table

31. You are using the backup scheduler in Enterprise Manager (EM) to schedule a backup of your database. Which type of script does the backup scheduler generate?

A) SQL script

B) PL/SQL script

C) Operating System (OS) script

D) Enterprise Manager (EM) script

E) Recovery Manager (RMAN) script

32. View the Exhibit to observe the message received while trying to drop the SL_REP user in Oracle Enterprise Manager. The SL_REP user owns objects and is currently connected to the database instance. What would happen if you click YES in the Exhibit?

A) An error is returned, and the user is not dropped.

B) The drop operation waits until the session started by the user ends.

C) The user is dropped successfully, and the session started by the user is killed.

D) The user is dropped, and the objects owned by the user are transferred to the recycle bin.

33. User SCOTT executes the following command on the EMP table but has not issued COMMIT, ROLLBACK, or any data definition language (DDL) command:

SQL> SELECT job FROM emp

2 WHERE job='CLERK' FOR UPDATE OF empno;

SCOTT has opened another session to work with the database. Which three operations would wait when issued in SCOTT's second session? (Choose three.)

A) LOCK TABLE emp IN SHARE MODE;

B) LOCK TABLE emp IN EXCLUSIVE MODE;

C) DELETE FROM emp WHERE job='MANAGER';

D) INSERT INTO emp(empno,ename) VALUES (1289,'Dick') ;

E) SELECT job FROM emp WHERE job='CLERK' FOR UPDATE OF empno;

34. You have a text file that maintains information on thousands of items. The end-user application requires the transfer of that information into a table in the database. What would you use to achieve this task? (Choose two.)

A) Oracle Text

B) Data Pump

C) SQL*Loader

D) Oracle Import

E) External table

35. The SAVE_AMT column in the ACCOUNTS table contains the balance details of customers in a bank. As part of the year-end tax and interest calculation process, all the rows in the table need to be accessed. The bank authorities want to track access to the rows containing balance amounts exceeding $200,000, and then send an alert message to the administrator. Which method would you suggest to the bank for achieving this task?

A) implementing value-based auditing by using triggers

B) implementing fine-grained auditing with audit condition and event handler

C) performing standard database auditing to audit object privileges by setting the AUDIT_TRAIL parameter to

EXTENDED

D) performing standard database auditing to audit SQL statements with granularity level set to ACCESS

36. You are creating a locally managed tablespace to meet the following requirements:

All the extents should be of the same size.

The data should be spread across two data files.

A bitmap should be used to record the free space within the allocated extents.

Which three options would you choose? (Choose three.)

A) set PCTFREE and PCTUSED to 50

B) specify extent allocation as Uniform

C) specify extent allocation as Automatic

D) create the tablespace as bigfile tablespace

E) create the tablespace as smallfile tablespace

F) set segment space management to Automatic

G) use the RESIZE clause while creating the tablespace

37. Your test database is running in NOARCHIVELOG mode. What are the implications of this?

A) You can perform open database backups.

B) You can perform closed database backups.

C) You cannot perform schema-level logical backups.

D) You can perform the backup of only the SYSTEM tablespace when the database is open.

38. You are in the middle of a transaction and very crucial data has been modified. Because of a hardware failure, the instance has shut down before synchronizing all the database files. Which two statements are true? (Choose two.)

A) On startup, SMON coordinates instance recovery.

B) On startup, CKPT coordinates instance recovery.

C) On startup, use RMAN to perform instance recovery.

D) Uncommitted changes will be rolled back after the database is opened.

E) On startup, perform media recovery and then instance recovery.

F) On startup, all the files will be synchronized and you get both committed and uncommitted data.

39. After being hired as a database administrator, you find that there is only one database that is functional

and that is being accessed by the applications. You want to create a replica of the database, to be used for testing purposes. What is the best method to create the replica?

A) create a database by using CREATE DATABASE .. command and manually copy the data

B) use Database Configuration Assistant (DBCA) to create a template from the existing database to contain the

database structure

C) use DBCA to create a template from the existing database to contain the database structure and then manually copy

the data using Oracle Data Pump

D) use DBCA to create a template from the existing database to contain the database structure with data files and then

use the same template to create the database in the new location

40. You are working on an online transaction processing (OLTP) system. You notice that a PL/SQL procedure got executed twice at 2) 00 p.m. This has incorrectly updated the EMP_SAL table. How would you revert the table to its state at 2) 00 p.m.?

A) Perform point-in-time recovery to 2: 00 p.m.

B) Use Flashback Table feature to revert the changes.

C) Restore the entire database from the recent backup and open it.

D) Issue the rollback statement with system change number (SCN).

41. View the Exhibit.

What would happen if you change the value of Desired Mean Time To Recover to 30?

A) The MTTR Advisor would be enabled.

B) The Redo Log Advisor would be disabled.

C) Automatic checkpoint tuning would be disabled.

D) The redo log from log buffers would be written to redo log files at a slower rate.

42. Due to media failure you lost one of the data files belonging to the USERS tablespace, and the tablespace is not available to use. Which statement regarding the status of the database is true?

A) The database remains open.

B) The database gets dismounted.

C) The database becomes read only.

D) The database instance gets aborted.

E) The database gets shut down automatically.

F) The status of the database depends on the status of the USERS tablespace.

43. Which two statements are true about the roles in the Oracle database? (Choose two.)

A) A role can be granted to itself.

B) Roles are owned by the SYS user.

C) Roles can be granted to other roles.

D) A role cannot be assigned external authentication.

E) A role can contain both system and object privileges.

48. Which naming method uses the tnsnames.ora file to store the connect descriptor used by the client while connecting to the database instance from a remote machine?

A) host naming method

B) local naming method

C) external naming method

D) directory naming method

44. View the Exhibit to observe the privileges granted to the MGR_ROLE role. The SCOTT user has been granted the CONNECT and RESOURCE roles only.

The database administrator (DBA) grants MGR_ROLE to the SCOTT user by using this command:

SQL> GRANT MGR_ROLE TO SCOTT WITH ADMIN OPTION;

Which statement is true about the SCOTT user after he is granted this role?

A) The SCOTT user can grant the MGR_ROLE role and the privileges in it to other users.

B) The SCOTT user can grant the privileges in the MGR_ROLE role to other users but not with ADMIN_OPTION.

C) The SCOTT user can grant only the MGR_ROLE role to other users but not the privileges in it.

D) The SCOTT user can grant the privileges in the MGR_ROLE role to other users but cannot revoke privileges from

them.

45. You want the user APP_DBA to administer the Oracle database from a remote machine. APP_DBA is granted the SYSDBA privilege to perform administrative tasks on the database.

Which file is used by the Oracle database server to authenticate APP_DBA?

A) control file

B) password file

C) listener controller file

D) control file and password file

46. Which two statements are true about simple views? (Choose two.)

A) Views can be created as read only.

B) Views are data segments like tables.

C) Views can be created on the basis of more than one table.

D) Data manipulation language (DML) operations cannot be performed on views.

47. While planning to manage more than one database in your system, you perform the following activities:

1. Organize different categories of files into independent subdirectories.

2. Use consistent naming convention for database files.

3. Separate administrative information pertaining to each database.

Which option corresponds to the type of activities performed by you?

A) Oracle Managed Files

B) Oracle Grid Architecture

C) Optimal Flexible Architecture

D) Oracle database architecture

49. Your database is running in the ARCHIVELOG mode. You placed a tablespace, tbs_1, offline with the immediate option. Which statement is correct in this scenario?

A) The operation would fail if tbs_1 were a read-only tablespace.

B) The operation would fail if tbs_1 were a read/write tablespace.

C) The operation would fail if tbs_1 were the default tablespace for the database.

D) If the above operation were successful, media recovery would be required to bring the tablespace online.

E) If the above operation were successful, instance recovery would be required to bring the tablespace online.

50. You work in a data warehouse environment that involves the execution of complex queries. The current content of the SQL cache holds the ideal workload for analysis.

You want to analyze only few most resource-intensive statements. What would be your suggestion to receive recommendations on the efficient use of indexes and materialized views to improve query performance?

A) Run the SQL Access Advisor.

B) Run the SQL Tuning Advisor (STA).

C) Run the Automatic Workload Repository (AWR) report.

D) Run the Automatic Database Diagnostic Monitor (ADDM).

51. You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?

A) Upgrade the hardware/memory to accommodate the data.

B) Load the data into your database by using the PARALLEL clause.

C) Give analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.

D) Use an external table so you can have the metadata available in your database, but leave the data in the operating

system files.

52. A user receives the following error while executing a query:

ORA-01555: snapshot too old

Which two options can be the solutions to avoid such errors in future? (Choose two.)

A) increase the size of redo log files

B) increase the size of the undo tablespace

C) increase the size of the Database Buffer Cache

D) increase the size of the default temporary tablespace

E) enable the retention guarantee for the undo tablespace

54. You execute the following command to audit the database activities:

SQL> AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL;

What is the effect of this command?

A) One audit record is created for the whole session if user SCOTT successfully drops one or more tables in his

session.

B) One audit record is created for every session when any user successfully drops a table owned by SCOTT.

C) One audit record is created for each successful DROP TABLE command executed by any user to drop tables

owned by SCOTT.

D) One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to other users in

his session.

E) One audit record is created for each successful DROP TABLE command executed in the session of SCOTT.

53. You executed the following command to export the EMPLOYEES table from a remote Machine:

$ EXPDP hr/hr@https://www.doczj.com/doc/857766478.html,

DUMPFILE=my_dir) exp_hr.log

LOGFILE=data_pump_dir) log_hr.log

TABLES=employees

What would be the outcome of this command?

A) The command would execute successfully and the export dump file would be created in the destination of the

directory object MY_DIR.

B) The command would execute successfully. But log file would not be created as DATA_PUMP_DIR directory is only

accessible to user with SYSDBA privilege.

C) The command fails with an error because DATA_PUMP_DIR directory have higher precedence over the per-file

directory.

D) The command fails with an error because no absolute path is specified for log file and dumpfile.

55. Examine the following commands executed in your database:

SQL> ALTER SESSION RECYCLEBIN=ON;

Session altered

SQL> CREATE TABLE emp TABLESPACE tbsfd AS SELECT * FROM hr.employees;

Table created.

Further, you executed the following command to drop the table:

SQL> DROP TABLE emp;

Table dropped.

What happens in this scenario?

A) The table is moved to the SYSAUX tablespace.

B) The table is moved to the SYSTEM tablespace.

C) The table is removed from the database permanently.

D) The table is renamed and remains in the TBSFD tablespace.

56. Which two statements are true about a bitmap index? (Choose two.)

A) It is recommended for the columns that have unique values.

B) It can be converted to a B-tree index by using the ALTER INDEX command.

C) It has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit

represents the presence or absence of a key column value.

D) Updating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.

57. Your database is configured with the following parameters related to SGA)

SGA_TARGET=256MB

SHARED_POOL_SIZE=32MB

DB_CACHE_SIZE=100MB

LARGE_POOL_SIZE=0

JAVA_POOL_SIZE=0

STREAMS_POOL_SIZE=0

Which two statements are true about the configuration? (Choose two.)

A) The SGA_TARGET value cannot be sized smaller than 100 MB.

B) The shared pool and the default buffer pool will not be sized bigger than 32 MB and 100 MB, respectively.

C) The shared pool and the default buffer pool will not be sized smaller than 32 MB and 100 MB, respectively.

D) 124 MB (256 minus 132) of memory is available for use by all the manually sized components.

E) 124 MB (256 minus 132) of memory is available for use by all the manually and automatically sized components.

58. The application workload on your database is same between 10 a.m. and 11 a.m. on weekdays. Suddenly you observe poor performance between 10 a.m. and 11 a.m. in the middle of the week. How would you identify the changes in configuration settings, workload profile, and statistics to diagnose the possible causes of the performance degradation?

A) by using the SQL access advisor

B) by using the Automatic Workload Repository report

C) by running the Automatic Database Diagnostic Monitor (ADDM)

D) by using the Automatic Workload Repository Compare Period report

E) by analyzing the output of the V$ACTIVE_SESSION_HISTORY view

59. The application development team has developed PL/SQL procedures and functions for different purposes and calls them as and when required. The loading of individual procedures or functions into memory degrades performance with every call. Also, it causes a security problem for individual subprograms and loss of program units when the whole system is transported into a new location. Which method would you recommend to the application developers to solve this problem?

A) avoiding the use of cursors in the subprograms

B) using anonymous PL/SQL blocks instead of subprograms

C) referring to views instead of tables inside the subprograms

D) creating PL/SQL packages to include interrelated subprograms

60. Which three pieces of information are to be mandatorily provided while creating a new listener using Enterprise Manager Database Control? (Choose three.)

A) the port used by the listener

B) the protocol used by the listener

C) the server name where the listener runs

D) the log file and trace file destination for the listener

E) the database services to be registered with the listener

61. What are the consequences of executing the SHUTDOWN ABORT command? (Choose two.)

A) The database files are synchronized.

B) Uncommitted changes are not rolled back.

C) The database is closed, but the instance is still started.

D) Database buffers and redo buffers are not written to the disk.

E) The database undergoes automatic media recovery during the next startup.

62. User SCOTT wants to export his objects using Oracle Data Pump and executes the following command: $ expdp scott/tiger

directory = EXPORT_DIR

dumpfile = scott.dmp

include = table

include = view: "like '%DEPARTMENTS%'"

content = DATA_ONLY

Which task would the command accomplish?

A) Oracle Data Pump would export only the data of all of the tables and views.

B) Oracle Data Pump would export all of the table structures along with data and all the views.

C) Oracle Data Pump would export the table data and the view definitions where the view name contains a string

named DEPARTMENTS.

D) Oracle Data Pump would export the table data and the view definitions with data where view name contains a string

named DEPARTMENTS.

E) Oracle Data Pump would export all of the table structures and the view definitions with data where view name

contains a string named DEPARTMENTS.

63. View the Exhibit, and examine the alert messages.

You added space to the TEST tablespace to bring the space usage below the threshold value.

Which statement is true about the Tablespace Full alert?

A) The alert is purged because it is a threshold alert.

B) The alert is cleared and transferred to the alert log file.

C) The alert is automatically cleared and sent to the alert history.

D) The alert appears in Oracle Enterprise Manager Database Control until it is manually cleared.

64. In your database, the Log Writer (LGWR) process is unable to write to a member of a current redo log group due to read/write failure. Which two effects would you see in your database? (Choose two.)

A) The database instance aborts.

B) The database operation temporarily halts till the member becomes available.

C) Writing proceeds as normal. LGWR writes to the available members of a group and ignores the unavailable

members.

D) The member would be marked as STALE and an error message would be written to the alert log file and LGWR

trace file.

E) The status of the group changes to INACTIVE and an error message would be written to the alert log file and LGWR

trace file.

65. You executed the following command to start the database:

SQL> STARTUP

ORACLE instance started.

Total System Global Area 281018368 bytes

Fixed Size 789000 bytes

Variable Size 229635576 bytes

Database Buffers 50331648 bytes

Redo Buffers 262144 bytes

ORA-00205: error in identifying controlfile, check alert log for more info

Which view would you query at this stage to investigate this missing control file?

A) V$INSTANCE

B) V$CONTROLFILE

C) DBA_CONTROL_FILES

D) V$DATABASE_PROPERTIES

E) V$CONTROLFILE_RECORD_SECTION

66. Which statement is true about the loss of system-critical data files in ARCHIVELOG mode?

A) The data files can be recovered till the last committed transaction.

B) The data files can be recovered without shutting down the database.

C) The data file is taken offline automatically; the database remains open.

D) The data files can be recovered to the time of the most recent backup.

67. Which two statements about bigfile tablespaces are true? (Choose two.)

A) The bigfile tablespace have only one data file.

B) The segment space management is automatic.

C) The extent management is dictionary managed.

D) The database can have only one bigfile tablespace.

E) The bigfile tablespace can be converted to a smallfile tablespace.

68. User A executes the following command to update the TRANS table)

SQL> UPDATE B.trans SET tr_amt=tr_amt+500 WHERE c_code='C005';

Before user A issues a COMMIT or ROLLBACK command, user B executes the following command on the TRANS table:

SQl> ALTER TABLE trans MODIFY (tr_type VARCHAR2 (3));

What would happen in this scenario?

A) The transaction for user A is rolled back.

B) The ALTER TABLE command modifies the column successfully.

C) The ALTER TABLE command fails due to the resource being busy.

D) The ALTER TABLE command waits until user A ends the transaction.

69. You backed up the control file to trace. Which statement is true about the trace file generated?

A) The trace file is in binary format.

B) The trace file has a SQL script to re-create the control file.

C) The trace file is a backup set created during the backup of the control file.

D) The trace file contains the instructions to manually re-create the control file.

E) The trace file is an image copy of the control file created during the backup of the control file.

70. You created a response file and want to check it before starting installations in silent mode. You started

installation of Oracle software in interactive mode by providing the response file. In the middle of the installation, you realize that the behavior of the Oracle Universal Installer (OUI) is not consistent with the response file. What action would you take to detect the cause of this behavior?

A) Compare the contents of the install.log file with the response file.

B) Refer to the contents of the oraInst.loc file to verify the steps performed by OUI.

C) Compare the contents of the installActions.log file with that of the response file.

D) Refer to the alert log file for information regarding the actions performed by OUI during installation.

72. Your database is open and users are connected using the LISTENER listener. The new DBA of the system stops the listener by using the following command:

LSNRCTL> STOP

What would happen to the sessions that are presently connected to the database instance?

A) The sessions are able to perform only queries.

B) The sessions are not affected and continue to function normally.

C) The active transactions are rolled back and the sessions get terminated.

D) The sessions are not allowed to perform any operations till the listener is started.

73. You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA. While observing the server settings, you find that the following parameter has been set in the parameter file of the database: REMOTE_OS_AUTHENT = TRUE

What could have been the reason to set this parameter as TRUE?

A) to enable operating system authentication for a remote client

B) to restrict the scope of administration to identical operating systems

C) to allow the start up and shut down of the database from a remote client

D) to enable the administration of the operating system from a remote client

E) to disable the administration of the operating system from a remote client

71. View the Exhibit and analyze the CREATE TABLE statements used to create the ITEMS and ORDERS tables. The ITEMS table has 50 rows and ORDERS table has 500 rows. Because you decide to not deal with the item code 188 in future, you execute the following command to remove the item:

SQL> DELETE FROM items WHERE item_code=188;

What is the effect of this command?

A) The command fails with integrity violation error.

B) The row containing the value 188 corresponding to the ITEM_CODE column is deleted from the ITEMS table, and

the foreign key constraint is disabled in the ORDERS table.

C) The row containing the value 188 corresponding to the ITEM_CODE column is deleted from the ITEMS table, and

the dependent rows in the ORDERS table are also deleted automatically.

D) The row containing the value 188 corresponding to the ITEM_CODE column is deleted from the ITEMS table, and

the dependent rows in the ORDERS table are populated with NULL values in their ITEM_CODE columns.

74. You are working on a database created with the Oracle Database 10g software in which the initialization parameter COMPATIBLE is set to 10.0.0. The hr_tbs tablespace in the database is created as follows:

CREATE TABLESPACE hr_tbs DATAFILE '/oracle/oradata/hr_tbs.dbf' SIZE 50M;

View the Exhibit to see the properties of the database.

Which statement is correct in this scenario?

A) hr_tbs is a bigfile tablespace.

B) hr_tbs is a dictionary-managed tablespace.

C) All the tablespaces in the database will be locally managed by default.

D) All the tablespaces in the database must be of the smallfile tablespace type.

E) The tablespace type bigfile or smallfile must be mentioned in the command.

75. You perform differential incremental level 1 backups of your database on each working day and level 0 backup on Sundays. Which two statements are true about the differential incremental backups? (Choose two.)

A) The backup performed on Sundays contains all the blocks that have ever been use in the database.

B) The backup performed on Sundays contains all the blocks that have changed since the last level 1 backup.

C) The backup performed on each working day contains all the blocks that have changed since the last level 0 or level

1 backup.

D) The backup performed on each working day contains all the blocks that have changed since the last level 0 backup.

76. Users of HR schema complain about slower-than-normal performance. On investigation the DBA found that maintenance was recently performed on some of the tables. The DBA traced the query that takes longer than normal to execute.

View the Exhibit exhibit_before.

After the DBA resolves the problem, the query performs normally.

View the Exhibit exhibit_after.

What action would the DBA have taken to resolve the performance problem?

A) analyzed the EMPLOYEES table to collect the current statistics

B) moved the EMPLOYEES table in to a locally managed tablespace

C) moved the EMPLOYEES table to another location in the same tablespace

D) reorganized the associated indexes for the EMPLOYEES table that were in an unusable state

E) moved the indexes associated with the EMPLOYEES table to the same tablespace where the EMPLOYEES table

exists

77. Your database is having two control files, three redo log file groups with two members in each group. Failure of which file would cause an instance to shut down?

A) any control file

B) any archive log file

C) one of the redo log members

D) loss of the initialization parameter file

E) any data file belonging to the default permanent tablespace

78. Which two operations can be flashed back using the Flashback technology? (Choose two.)

A) DROP USER SMITH;

B) DROP TABLE EMPLOYEES;

C) DROP TABLESPACE USERS;

D) ALTER TABLE SALES_REP DROP PARTITION P1;

E) ALTER TABLE EMPLOYEES DROP COLUMN DESIG_ID;

79. Which two statements regarding the LOGGING clause of the CREATE TABLESPACE... statement are correct? (Choose two.)

A) This clause is not valid for a temporary or undo tablespace.

B) If the tablespace is in the NOLOGGING mode, no operation on the tablespace will generate redo.

C) The tablespace will be in the NOLOGGING mode by default, if not specified while creating a tablespace.

D) The tablespace-level logging attribute can be overridden by logging specifications at the table, index, materialized

view, materialized view log, and partition levels.

80. Which two statements are true about the Automatic Database Diagnostic Monitor (ADDM)? (Choose two.)

A) The ADDM runs after each AWR snapshot is collected.

B) The ADDM requires at least four AWR snapshots for analysis.

C) The ADDM analysis provides only the diagnostic information but does not provide recommendations.

D) The results of the ADDM analysis are stored in the Automatic Workload Repository (AWR).

E) The ADDM calls other advisors if required, but does not provide recommendations about the advisors.

81. You want to refer the employee personal information stored in operating system(OS) files in EMPLOYEE table. You plan to add a new column to EMPLOYEE table to achieve this.

Which data type would you use for the new column?

A) BLOB

B) CLOB

C) BFILE

D) LONG RAW

82. You want to monitor and control the resource usage by sessions. You want to be warned automatically when more than 100 sessions are opened with your database. What action would you take to achieve this?

A) Use the Database Resource Manager.

B) Set the limits in the profiles used by users.

C) Modify the SESSIONS initialization parameter.

D) Set the warning threshold for the Current Logons Count metric.

83. In your database, the STATISTICS_LEVEL initialization parameter is set to BASIC. What is the impact of this setting?

A) The optimizer statistics are collected automatically.

B) Only the timed operating system (OS) statistics and plan execution statistics are collected.

C) The Oracle server dynamically generates the necessary statistics on tables as part of query optimization.

D) The snapshots for the Automatic Workload Repository (AWR) are not generated automatically.

E) Snapshots cannot be collected manually by using DBMS_WORKLOAD_REPOSITORY PACKAGE.

84. You are using flat files as the data source for one of your data warehousing applications. You plan to move the data from the flat file structures to an Oracle database to optimize the application performance. In your database you have clustered tables. While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into Oracle database?

A) use the external table population

B) use the Oracle Data Pump export and import utility

C) use the conventional path data load of SQL*Loader utility

D) use the direct path data load of Oracle export and import utility

85. You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?

A) Upgrade the hardware/memory to accommodate the data.

B) Load the data into your database by using the PARALLEL clause.

C) Give analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.

D) Use an external table so you can have the metadata available in your database, but leave the data in the operating

system files.

86. Which two statements are true about the primary key constraint in a table? (Choose two.)

A) It is not possible to disable the primary key constraint.

B) It is possible to have more than one primary key constraint in a single table.

C) The primary key constraint can be referred by only one foreign key constraint.

D) The primary key constraint can be imposed by combining more than one column.

E) The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already

indexed.

87. You are working on the 24X7 database with high transaction volume, to ensure faster instance recovery on your database you set the FAST_START_MTTR_TARGET initialization parameter to a very low value. What effect it will have on the database?

A) The database performance would be enhanced.

B) The redo log files would be get filled more frequently.

C) The overall database performance would be degraded.

D) The mean time to recover (MTTR) would be increased.

88. Data files of which three tablespaces can be recovered by performing an open recovery? (Choose three.)

A) TEMP

B) UNDO

C) INDEX

D) SYSAUX

E) SYSTEM

93. The junior DBA in your organization has accidentally deleted the alert log file. What will you do to create new alert log file?

A) Create the new text file file as ALERT.LOG.

B) You have to recover the alert log file from the valid backup.

C) Change the value for the BACKGROUND_DUMP_DEST parameter.

D) No action required.The file would be created automatically by the instance.

89. View the Exhibit.

Your Oracle 10g database has 6 tablespaces in which:

-TEMP is the default temporary tablespace

- UNDOTBS1 is the default undo tablespace

- USERS is the default permanent tablespace

In this database, which three tablespaces can be made offline? (Choose three.)

A) TEMP

B) PROD

C) USERS

D) SYSAUX

E) SYSTEM

F) UNDOTBS1

90. The HR user creates a view with this command:

SQL> CREATE VIEW emp_v AS SELECT * FROM scott.emp;

Now HR wants to grant the SELECT privilege on the EMP_V view to the JIM user. Which statement is true in this scenario?

A) HR can grant the privilege to JIM but without GRANT OPTION.

B) HR can grant the privilege to JIM because HR is the owner of the view.

C) SCOTT has to grant the SELECT privilege on the EMP table to JIM before this operation.

D) HR needs the SELECT privilege on the EMP table with GRANT OPTION from SCOTT for this operation.

91. You executed the following command to back up your control file:

ALTER DATABASE BACKUP CONTROLFILE TO TRACE;

Which initialization parameter is used to specify the location of the trace file?

A) USER_DUMP_DEST

B) CORE_DUMP_DEST

C) TRACE_DUMP_DEST

D) BACKUP_DUMP_DEST

E) BACKGROUND_DUMP_DEST

92. You work as a database administrator for https://www.doczj.com/doc/857766478.html,. You determine that archiving was not successful in one of thedestinators. You want to check the alert log file for more information on this.Which initialization parameter gives you the location of the alert log file?

A. USER_DUMP_DEST

B. CORE_DUMP_DEST

C.ALERT_LOG_DEST

D.ALERT_DUMP_DEST

E.TRACE_DUMP_DEST

F.BACKGROUND_DUMP_DEST

解答选择题填空题的12种巧妙方法

传说中的十二招 你知道选择题和大题最大的区别是什么吗?那就是选择题只需要有一个模糊的方向,而不需要确切的答案;或者,选择题可以用一些歪招解出来,而不是像大题一样算到吐血——如果每道选择题都像大题一样算,一张卷下来,估计你所有的血小板都不够你用的……而传说中应对选择、填空题的十二招其实来自它们可抓的五个特征…… 一、答案符合题意 我们目前所学的数学,基本上是按照充分必要的套路。所以,题目可以推出答案,答案同样必然符合题意所指。以此本质的基础可以衍生出两大招。 1.特殊值法(适用于选择、填空) 1)对于问区间的题,只需分别找出可选区间中的元素,代入原题检验其真假,其实也就知道了选哪个区间;正如去到陌生的星球,一看满眼纳美人,那么此地当然就是潘多拉星。 2)特殊值一般选取容易算的,代入选项就可以判断真假,假的统统排除。 例题:y = cos(7π2 – 3x ) 是 函数(填奇偶性) 解析:代入x=0 得 y=0 答案:奇 2.代入法(适用于选择) 这个小学生都会。电池有电没电,放进多啦A 梦看看work 不work 不就知道了吗?题目算不出来,把答案代进去看成不成立不就知道了?然而这种方式不仅对一些题目无效,而且浪费太多时间;如果配合其它招式一起用效果会更强。 例题:函数f(x) = 2x ·ln(x-2) – 3 在下列哪个区间有零点() A 、(1,2) B 、(2,3) C 、(3,4) D 、(4,5) 解析:我们知道若f(x 1)<0 ,f(x 2)>0,则f(x)在x 1 ~ x 2 之间一定有零点,所以把1、2、3、4、5 代入 x ,发现f(3)<0, f(4)>0. 答案:C 二、放诸四海皆准 既然叫做“成立”,那么就是不管什么条件均能成立。我们不妨把题目当做实验品,放到苛刻的条件下,通过观察它的反应剖析其内涵。

移动通信技术的现状与发展

移动通信技术的现状与发展-标准化文件发布号:(9456-EUATWK-MWUB-WUNN-INNUL-DDQTY-KII

下一代互联网技术大作业 题目移动通信技术的现状与发展 姓名 专业网络工程 班级 1402班 学号

1. 移动通信技术的概念及相关知识 1.1 移动通信的基本概念 移动通信是指通信中的移动一方通过无线的方式在移动状态下进行的通信,这种通信方式可以借助于有线通信网,通过通信网实现与世界上任何国家任何地方任何人进行通信,因此,从某种程度上说,移动通信是无线通信和有线通信的结合。移动通信的发展先后经历了第一代蜂窝模拟通信,第二代蜂窝数字通信,以及未来的第三代多媒体传输、无线Internet等宽带通信,它的最终目标是实现任何人在任何时间任何地点以任何方式与任何人进行信息传输的个人通信。 1.2移动通信的发展 目前,移动通信已从模拟通信发展到了数字移动通信阶段,并且正朝着个人通信这一更高级阶段发展。未来移动通信的目标是,能在任何时间、任何地点、向任何人提供快速可靠的通信服务。1978年底,美国贝尔实验室研制成功先进移动电话系统(AMPS),建成了蜂窝状模拟移动通信网,大大提高了系统容量。与此同时,其它发达国家也相继开发出蜂窝式公共移动通信网。这一阶段的特点是蜂窝移动通信网成为实用系统,并在世界各地迅速发展,这个系统一般被当作是第一代移动通信系统。 从20世纪80年代中期开始,数字移动通信系统进入发展和成熟时期。蜂窝模拟网的容量已不能满足日益增长的移动用户的需求。80年代中期,欧洲首先推出了全球移动通信系统(GSM:Global System for Mobile)。随后美国和日本也相继指定了各自的数字移动通信体制。20世纪90年代初,美国Qualcomm 公司推出了窄带码分多址(CDMA:Code-Division Multiple Access)蜂窝移动通信系统,这是移动通信系统中具有重要意义的事件。从此,码分多址这种新的无线接入技术在移动通信领域占有了越来越重要的地位。些目前正在广泛使用的数字移动通信系统是第二代移动通信系统。

最新初中数学选择题、填空题解题技巧

初中数学选择题、填空题解题技巧 黄俭红 选择题目在初中数学试题中所占的比重不是很大,但是又不能失去这些分数,还要保证这些分数全部得到。因此,要特别掌握初中数学选择题的答题技巧,帮助我们更好的答题,选择填空题与大题有所不同,只求正确结论,不用遵循步骤。我们从日常的做题过程中得出以下答题技巧,跟同学们分享一下。 1.排除选项法: 选择题因其答案是四选一,必然只有一个正确答案那么我们就可以采用排除法从四个选项中排除掉易于判断是错误的答案那么留下的一个自然就是正确的答案。 例1 一次函数y=-3x+2的大致图象为( ) A B C D 解析:因为k=-3<0,所以y 随着x 的增大而减小,故排除C 、D 。又因为 b=2>0,所以图象交于y 轴正半轴,故排除A ,因此符合条件的为B 。 对于正确答案有且只有一个的选择题,利用题设的条件,运用数学知识推理、演算,把不正确的选项排除,最后剩下一个选项必是正确的。在排查过程中要抓住问题的本质特征 2.赋予特殊值法: 即根据题目中的条件,选取某个符合条件的特殊值或作出特殊图形进行计算、推理的方法。用特殊值法解题要注意所选取的值要符合条件,且易于计算。 例2.如果m-n C.1m <1n D.m n >1 有些问题从理论上论证它的正确性比较困难,但是代入一些满足题意的特殊值,验证它是错误的比较容易,此时,我们就可以用这种方法来解决问题。

例3 已知ABC △中,60A ∠=,ABC ∠,ACB ∠的平分线交于点O ,则BOC ∠的度数为 . 分析:此题已知条件中就是ABC △中,60A ∠=说明只要满足此条件的三角形都一定能够成立。故不妨令ABC △为等边三角形,马上得出BOC ∠=120。 例4、填空题:已知a<0,那么,点P(-a 2-2,2-a)关于x 轴的对称点是在第_______象限. 解:设a=-1,则P{-3,3}关于x 轴的对称点是 {-3,-3}在第三象限,所以点P(-a^2-2,2-a)关于x 轴的对称点是在第三象限. 3.观察猜想法: 这类方法在近年来的初中题中常被运用于探索规律性的问题,此类题的主要解法是运用不完全归纳法,通过试验、猜想、试误验证、总结、归纳等过程使问题得解。 例5 用同样大小的黑色棋子按图所示的方式摆图形,按照这样的规律摆下去,则第n 个图形需棋子 枚(用含n 的代数式表示). 分析:从第1个图中有4枚棋子4=3×1+1,从第2个图中有7枚棋子7=3×2+1, 从第3个图中有10枚棋子10=3×3+1,从而猜想:第n 个图中有棋子3n+1枚. 例6 一组按规律排列的式子:2b a -,53b a ,83b a -,11 4b a ,…(0ab ≠),其中第7个式子是 ,第n 个式子是 (n 为正整数). 分析:观察题干及选择支特点,区别各选择支差异及相互关系作出选择。 通过观察已有的四个式子,发现这些式子前面的符号一负一正连续出现,也就是序号为奇数时负,序号为偶数时正。同时式子中的分母a 的指数都是连续的正整数,分子中的b 的指数 为同个式子中a 的指数的3倍小1,通过观察得出第7个式子是20 7b a -,第n 个式子是31 (1)n n n b a --。 4、直接求解法: 有些选择题本身就是由一些填空题、判断题解答题改编而来的因此往往可采用直接法直接由从题目的条件出发通过正确的运算或推理直接求得结论再与选择项对照来确定选择项。我们在做解答题时大部分都是采用这种方法。 第1个图 第2个图 第3个图 …

新一代网络与通信

单选题 1.互联网的特点是()。(分) A.面向连接、电路交换 B.面向连接、分组交换 C.无连接、电路交换 D.无连接、分组交换 我的答案:D√答对 2.发展新一代移动通信,()问题是关键。(分) A.频率 B.带宽 C.技术 D.基站 我的答案:C×答错 3.下一代光通信最核心的技术是()。(分) A.光的频分复用 B.光的波分复用 C.光的电路交换 D.光的分组交换 我的答案:B×答错 年,从()接了一条电路通到斯坦福大学,是中国第一条连接到国际互联网的通路。(分)

A.中科院理化技术研究所 B.中国科技大学过程工程研究所 C.中科院高能物理研究所 D.清华大学大气物理研究所 我的答案:C√答对 5.目前,中国在()中,Ipv6应用规模最大。(分) A.教育科研网 B.科学技术网 C.公用互联网 D.金桥信息网 我的答案:A√答对 年,()的秘书长发了一封函,肯定了电信业未来会转向IP网络。(分) A.国际标准化组织(ISO) B.麻省理工学院(MIT) C.国际电信联盟(ITU) D.美国电气和电子工程师协会(IEEE) 我的答案:C√答对 7.现在的移动通信技术依靠的是(),需要有基站、频率和网络规划。(分) A.模拟通信 B.蜂窝通信

C.互联网通信 D.码分多址通信 我的答案:B√答对 8.现阶段,公共互联网的性能改进主要依靠()方法来实现。(分) A.演化法 B.重叠法 C.革命法 D.归纳法 我的答案:D×答错 9.()的目的是发展移动多媒体通信。(分) A.第一代移动通信 B.第二代移动通信 C.第三代移动通信 D.第四代移动通信 我的答案:C√答对 10.“360-QQ大战”侵犯的是()的权益。(分) 和QQ D.消费者 我的答案:D√答对 多选题

初中英语选词填空题解题技巧与专题训练_5

初中英语选词填空题解题技巧与专题训练 根据平时的观察,学生在做英语“选词填空”时,遇较多困难,有的甚至条件反射一样畏惧或厌烦。在此,我把平时积累的解题技巧和训练技巧略作归纳,希望能给有大家提供一点帮助。 “选词填空”要求学生利用所给的10-11个词汇(今年的湛江中考要求是用给出10个词汇补全一篇有10个空缺的短文)。据观察,所给出的词汇一般有名词、代词、动词、形容词、副词、数词、冠词、介词和连词等,补全一篇有10个空缺的短文。要攻克这一难关,学生除了要进行大量的课外阅读,积累丰富的语言知识外,还需掌握一定的解题技巧。 1.在拿到题目後,不要急于看文章,首先对备选的词汇研究几遍,对词性作简单的标记,例如:名词-n.,动词-v.,形容词-a.,副词-ad. 等等。同时对词义作初步的理解。 2.通读全文,语义完整、适用、合乎逻辑是做好填词的前提。通过上、下文的句子,充分理解短文的内容,注意发现固定搭配关系,凭借语感积极主动地猜测空格中所缺的信息,根据需要去备选词汇中寻找匹配的答案。 3.在选定单词後,不要轻率地填入。在填词过程中,需要瞻前顾後,既要符合本句的含义,又要保证句式结构的正确。当你选定一个名词时,要考虑是否要把它变成复数或“所有格”形式。例如:match-matches,friend-friends/friend's/friends。其他还要考虑名词是否需要变成形容词,例如:sun-sunny, use-useful/useless/used, care-careful,danger-dangerous;在遇到动词时,要有意识地去考虑时态和语态的变化以及非谓语动词形式的变化(动词不定式- to do, 现在分词-doing, 过去分词-done, 固定搭配-enjoy doing sth./used to do sth./have sth. done…);形容词和副词填空时要主动去判定是否需要变成比较级或最高级,还有它们之间的相互转换以及形容词变名词的需求也需考虑,例如:interesting-more /the most interesting, happy-happily,happy -happiness; 填入代词时,需注意辨別主格、宾格、名词性和形容词性物主代词或反身代词的用法;数词方面要注意基数词和序数词的变化以及分数和虚实数的用法,例如:three-third, 2/3-two thirds, one thousand/thousands of ;冠词只需要在 a或an之间判別,如a girl/an old man; 当遇到介词和连词时,就更简单,只要符合上下文逻辑或固定短语搭配,填入即可。为了方便记忆,试著记住下面的顺口溜:空前空后要注意,“名词”单复数要牢记,还有 's 不能弃,“动词”注意要变形,“形副”注意要用三种级,要填“数词”请留意,千万別忘“基”和“序”,填入“代词”需慎重,五格变化要谨记。 4.完成填词后,应通读全文,复核校对。检查单词拼写是否正确,是否有时态、语态、惯用法及词语选用上的错误,以确保答案的正确性。最後把答案填入答卷时,切勿错位。 初中英语选词填空题的解题思路: 1.跳过空格、通读短文、了解大意。解题时先跳过空格,通读完形填空的短文,了解全篇的内容和要旨。要重视首句,善于以首句的时态、语气为立足点,理清文脉,推测全文主题及大意。 2.复读短文、确定语义、判断词形。把握短文大意后再认真复读短文,利用上下文的语境,结合所学过的知识,先确定空格处所需词语的意义,再根据空格在句子中的位置,判断其在句中充当的成分,从而确定所填词的词性,再依据词语搭配和语法规则,判断所填的词的正确形式。 3.三读短文、上下参照、验证答案。在短文的每一空白处填上一个词后,将完成的短文再细读一遍,上下参照,连贯思考。把所填的答案放入短文中进行检验,可从上、下文内容是否协调一致、顺理成章,语法结构是否正确无误等进行综合验证,凡有疑问必须重新推敲考虑。 做选词填空题时应注意如下几点:

新一代网络与通信

单选题 1.互联网的特点是()。(3.0分) A.面向连接、电路交换 B.面向连接、分组交换 C.无连接、电路交换 D.无连接、分组交换 我的答案:D√答对 2.发展新一代移动通信,()问题是关键。( 3.0分) A.频率 B.带宽 C.技术 D.基站 我的答案:C×答错 3.下一代光通信最核心的技术是()。(3.0分) A.光的频分复用 B.光的波分复用 C.光的电路交换 D.光的分组交换 我的答案:B×答错

4.1993年,从()接了一条电路通到斯坦福大学,是中国第一条连接到国际互联网的通路。(3.0分) A.中科院理化技术研究所 B.中国科技大学过程工程研究所 C.中科院高能物理研究所 D.清华大学大气物理研究所 我的答案:C√答对 5.目前,中国在()中,Ipv6应用规模最大。(3.0分) A.教育科研网 B.科学技术网 C.公用互联网 D.金桥信息网 我的答案:A√答对 6.1999年,()的秘书长发了一封函,肯定了电信业未来会转向IP网络。(3.0分) A.国际标准化组织(ISO) B.麻省理工学院(MIT) C.国际电信联盟(ITU) D.美国电气和电子工程师协会(IEEE) 我的答案:C√答对

7.现在的移动通信技术依靠的是(),需要有基站、频率和网络规划。(3.0分) A.模拟通信 B.蜂窝通信 C.互联网通信 D.码分多址通信 我的答案:B√答对 8.现阶段,公共互联网的性能改进主要依靠()方法来实现。(3.0分) A.演化法 B.重叠法 C.革命法 D.归纳法 我的答案:D×答错 9.()的目的是发展移动多媒体通信。(3.0分) A.第一代移动通信 B.第二代移动通信 C.第三代移动通信 D.第四代移动通信 我的答案:C√答对 10.“360-QQ大战”侵犯的是()的权益。(3.0分) A.360.0

中考数学选择填空解题策略(习题及答案)

中考数学选择填空解题策略(二) 1. 为了解某小区居民的日用电情况,居住在该小区的一名同学 随机抽查了15户家庭的日用电量,结果如下表: 日用电量(单位:度) 5 6 7 8 10 户数 2 5 4 3 1 关于这15户家庭的日用电量,下列说法错误的是【 】 A .众数是6度 B .平均数是6.8度 C .极差是5度 D .中位数是6度 2. 下列图形中只有一个是二次函数y =ax 2+bx +a 2-1(b >0)的图 象,根据该图象可判断a 的值为【 】 x y O -11x y O -1 1 -1 O y x x y O -1 A . 15 2 -+ B .-1 C .15 2 -- D .1 3. 如图,一根长5米的竹杆AB 斜立于墙AC 的右侧,底端B 与 墙角C 的距离为3米,当竹杆顶端A 下滑x 米时,底端B 便随之向右滑行y 米,则下列图象中能大致表示y 与x 之间的函数关系的是【 】 1O y x 2 423 1 1 O y x 2423 1 A B 1O y x 2 4 23 1 1 O y x 2 4 231 C D C B A

4. 如图,在Rt △ABC 中,∠ACB =90°,∠BAC =30°,AB =2,D 是AB 上的一动点(不与点A ,B 重合),连接CD ,过点D 作CD 的垂线,交射线CA 于点E .设AD =x ,CE =y ,则下列图象中能大致表示y 与x 之间的函数关系的是【 】 E D C B A A . x y O 1 21 B . 1 21O y x C . 1 21O y x D . 1 21 O y x 5. 若函数y =x 2-2x +b 的图象与坐标轴有三个交点,则b 的取值 范围是【 】 A .b <1且b ≠0 B .b >1 C .0<b <1 D .b <1 6. 如图,在△ABC 中,AB =AC =5,BC =6,D ,E 分别是AB , AC 的中点,F ,G 为BC 上的两点,且FG =3,线段DG ,EF 相交于点O ,当线段FG 在线段BC 上移动时,△FGO 的面积与四边形ADOE 的面积之和恒为定值,这个定值是【 】 A .15 B .12 C .9 D .6 O G F E D C B A

新一代网络与通信

单选题1?互联网的特点是()。(3.0分) A.面向连接、电路交换 B.面向连接、分组交换 C.无连接、电路交换 D.无连接、分组交换 我的答案:D V答对 2.发展新一代移动通信,()问题是关键。( 3.0 分) A.频率 B.带宽 C.技术 D.基站 我的答案:C X答错 3.下一代光通信最核心的技术是()。(3.0分) A.光的频分复用 B.光的波分复用 C.光的电路交换 D.光的分组交换我的答案:B X答错 4.1993年,从()接了一条电路通到斯坦福大学,是中国第一条连接到国际互联网的通路。(3.0分) A.中科院理化技术研究所

B.中国科技大学过程工程研究所 C.中科院高能物理研究所 D.清华大学大气物理研究所 我的答案:C V答对 5.目前,中国在()中,Ipv6应用规模最大。(3.0分) A.教育科研网 B.科学技术网 C.公用互联网 D.金桥信息网 6.1999年,()的秘书长发了一封函,肯定了电信业未来会转向 IP网络。(3.0 分) A.国际标准化组织(ISO) B.麻省理工学院(MIT ) C.国际电信联盟(ITU ) D.美国电气和电子工程师协会(IEEE)我的答案:C V答对 7.现在的移动通信技术依靠的是(),需要有基站、频率和网络规划。(3.0 分) A.模拟通信 B.蜂窝通信 C.互联网通信

D.码分多址通信 我的答案:B V答对 8.现阶段,公共互联网的性能改进主要依靠()方法来实现。 (3.0 分) A.演化法 B.重叠法 C.革命法 D.归纳法 9.()的目的是发展移动多媒体通信。(3.0分) A.第一代移动通信 B.第二代移动通信 C.第三代移动通信 D.第四代移动通信 我的答案:C V答M 10.“ 360-QQ大战”侵犯的是()的权益。(3.0分) A.360.0 B.QQ C.360 和QQ D.消费者 我的答案:D V答对

新课标2016高考英语语法填空解题策略及解题思路剖析

新课标2016高考英语语法填空解题策略及解题思路。 高考英语悦读2016-01-02 22:06:32高考英语辅导阅读(8090)评论(0) 声明:本文由入驻搜狐公众平台的作者撰写,除搜狐官方账号外,观点仅代表作者本人,不代表搜狐立场。 举报新课标高考英语语法填空解题策略及解题思路。 (附2007-2015年高考英语语法填空真题) ★无提示词的解题技巧 技巧1名词/代词/动名词前设空,首先考虑限定词。 a, an, the, my, your, his, which, whose, one’s, some, any, one, each, either, neither, another, other等 例1. I wonder __which_____ team would win, Black or Red? 技巧2 及物动词后设空,此处缺宾语或宾语从句。应考虑名词,代词或宾语从句连接词。 例1. I found ____it____ difficult to explain to him what had happened. 技巧3 分析句子关系,正确使用____连接词____ 例1. Put the book back ____where_____ it was. ★有提示词的解题技巧 技巧1:首先要分析该空的句子成分, 再确定__词性和词形_。 I am eager to share my _happiness____ ( happy) with you. 技巧2:句中缺失谓语,要考虑___时态和语态________ 。 例1.The first card ___was designed________ (design) by the boy last week. 技巧3 :若提示词是动词,在句中不做谓语,需优先考虑____非谓语动词to do, doing, done ___________________。 例1. ____To catch____ (catch) the train, the boy is running like a wild horse. 技巧4:adj. 或adv.最常考, ___词形变换和级别____最重要。 例1.You have made much ____greater____ (great) progress in English. 语篇型语法填空题备考思路大致有如下特点: 语法填空题专项训练范例 语篇型语法填空题的形式为:在一篇200词左右的语篇(短文或对话)中留出10处空白,部分空白的后面给出单词的基本形式,要求考生根据上下文填写空白处所需的内容或所提供单词的正确形式,所填写词语不得多于3个单词。考生须灵活运用语法知识,如单词词性、单词时态、名词单复数、连接词、代词、冠词等判断各空白处应填写的内容。 一、给出动词基本形态,填写词性词形转化(转为名词、形容词),或填写谓语部分,可能需要填写两个或三个词,或是填写非谓语动词;

(完整版)下一代通信网络技术

下一代通信网络技术 1、世界范围内电信业的发展期待振兴 目前,全世界电话用户大约22亿多,固定电话和移动电话各占一半,移动电话略多;因特网用户数(包括无线互联网用户数)5亿;预计,电话用户数发展速度:移动通信用户即将超过固定电话用户;预计互联网用户数在4-5年时间后,将超过固定电话用户数;历来,网络的发展对于运营商影响极大,因为运营商几乎所有的业务都是依靠网络进行的。这些影响是:原有网络能否满足用户的需要,是运营商能否取得稳定收入的决定性因素;新的网络的诞生,将从老的网络中抢走大量用户,使得运营商的利润大量转移。例如移动网络的诞生和发展,使得固话用户流失,收入下降。小灵通对于移动通信也有极大的影响,在老的网络上开展新的业务或者增值业务,将使得运营商增加大量的业务和利润。网络业务发展停滞,运营商就将“下课”。 2、最近的两个动向: (1)美国宽带发展提速: 2002年,美国宽带用户增加了640万户,达到1740万户.其中仅Comcast 公司cable modem 用户就增加了120万户;预测至2005年,宽带用户将超过窄带用户,至2007年,宽带用户将达到4900万户。图1 : 图1 美国宽带发展提速 (2)光纤到户(FTTH )启动,美、日走向实用 目前的最新进展,表明,网络的干线在向全光网络发展,接入网则向光纤到家庭(FTTH )发展。图2 : 美国宽带用户增长率预测 2002年新增电缆用户数

图2 FTTH-EPON实验网 光器件价格不断下降,使FTTH如约到来: 据介绍,今年以来,FTTH用的激光器和收发器价格, VCSEL(850nm) 3-5US$/只, 收发器(850nm)40US$/只, 用户对于FTTH的承受能力:估记在300US$,(据了解,目前中国电信ADSL的建设费用约180US$。) 根据资料介绍,美国和日本的FTTH最近有较大的发展: *美国加快光纤到户的部署 据FTTH协会估计,美国已经有20个州的70个社区,72000个用户铺设了光纤到户的网络,可以为用户提供话音、视频和互联网服务;预计到2004年传统运营商将开始全面铺设和提供FTTH服务。据分析和预测,至今年年底,美国的FTTH用户可达31.5万户,2004年底可达80万户;图3 :

专题二 填空题的解题策略

专题二填空题的解题策略 【精解考点】 填空题有传统型和开放型两种题型,也是高考试卷中又一常见题型。近几年高考,都有一定数量的填空题,且稳定在7个小题,每题5分,共35分,约占全卷总分的23.3%。 预测2012年高考的命题方向为: (1)保持题量和分值的稳定,2012年还保持2011的模式; (2)出题点多在:简单难度的填空题为分段函数求值、导数和定积分的求解以及简单的三角、数列问题;中等难度的填空题为三角、数列、解析几何、立体几何的求值问题;难度较大的填空题为考察合情推理的开放题 【精点考计】 一、填空题解题策略 传统型填空题: (1)直接求解法 直接求解法是直接从题设出发,抓住命题的特征,利用定义、性质、定理、公式等,经过变形、推理、计算、判断而得结果。这是解填空题时常用的基本方法; (2)特殊值法 当填空题有暗示,结论唯一或其值为定值时,我们可以取一些特殊值来确定这个“定值”,特别适用于题目的条件是从一般性的角度给出的问题; (3)数形结合法 由于填空题不必写出论证过程,因而可以画出辅助图形进行分析并帮助解答; (4)等价转化法 将所给的命题等价转化为另一种容易理解的语言或容易求解的模式; (5)升华公式法 在解填空题时,常由升华的公式解答,使之起点高、速度快、准确率高; (6)特征分析法 有些问题看似非常复杂,一旦挖掘出其隐含的数量或位置等特征,此问题就能迎刃而解; (7)归纳猜想法 由于填空题不要求推证过程,因此,我们也可用归纳、猜想得出结论; 二、开放型填空题 (1)多选型填空题 多选型填空题是指:给出若干个命题或结论,要求从中选出所有满足题意的命题或结论。这类题不论多选还是少选都是不能得分的。因此,要求同学们有扎实的基本功,而举反例是否定一个命题的最有效方法; (2)探索型填空题 探索型填空题是指:从给定的题设中探究其相应的结论,或从题目的要求中探究其必须具备的相应条件; (3)新定义型填空题 即定义新情景,给出一定容量的新信息(考生未见过),要求考生依据新信息进行解题。这样必须紧扣新信息的意义,学会语言的翻译、新旧知识的转化,便可使问题顺利获解; (4)组合型填空题 组合型填空题是指:给出若干个论断要求考生将其重新组合,使其构成符合题意的命题。解题时,要求考生对知识点间的关系有一个透彻的理解和掌握,准确地阐述自己的观点,理清思路,进而完成组合顺序; 3.填空题减少失分的方法 (1)回顾检验:填空题解答之后再回顾,即再审题,这是最起码的一个环节,可以避免审题上带来的某些明显的错误; (2)赋值检验:若答案是无限的、一般性结论时,可赋予一个或几个特殊值进行检验,以避免知识性错误;

2018高考数学选择题、填空题答题策略与答题技巧

2018年高考数学答题策略与答题技巧 一、2012-2017历年高考数学试卷的启发 1.试卷上有参考公式,80%是有用的,它为你的解题指引了方向; 2.解答题的各小问之间有一种阶梯关系,通常后面的问要使用前问的结论。如果前问是证明,即使不会证明结论,该结论在后问中也可以使用。当然,我们也要考虑结论的独立性; 3.注意题目中的小括号括起来的部分,那往往是解题的关键; 二、答题策略选择 1.先易后难是所有科目应该遵循的原则,而数学卷上显得更为重要。一般来说,选择题的后两题,填空题的后一题,解答题的后两题是难题。当然,对于不同的学生来说,有的简单题目也可能是自己的难题,所以题目的难易只能由自己确定。一般来说,小题思考1分钟还没有建立解答方案,则应采取“暂时性放弃”,把自己可做的题目做完再回头解答; 2.选择题有其独特的解答方法,首先重点把握选择支也是已知条件,利用选择支之间的关系可能使你的答案更准确。切记不要“小题大做”。注意解答题按步骤给分,根据题目的已知条件与问题的联系写出可能用到的公式、方法、或是判断。虽然不能完全解答,但是也要把自己的想法与做法写到答卷上。多写不会扣分,写了就可能得分。 三、答题技巧 1.函数或方程或不等式的题目,先直接思考后建立三者的联系,首先考虑定义域。 2.如果在方程或是不等式中出现超越式,优先选择数形结合的思想方法; 3.面对含有参数的初等函数来说,在研究的时候应该抓住参数没有影响到的不变的性质。如所过的定点,二次函数的对称轴或是……; 4.选择与填空中出现不等式的题目,优选特殊值法; 5.求参数的取值范围,应该建立关于参数的等式或是不等式,用函数的定义域或是值域或是解不等式完成,在对式子变形的过程中,优先选择分离参数的方法; 6.恒成立问题或是它的反面,可以转化为最值问题,注意二次函数的应用,灵活使用闭区间上的最值,分类讨论的思想,分类讨论应该不重复不遗漏; 7.圆锥曲线的题目优先选择它们的定义完成,直线与圆锥曲线相交问题,若与弦的中点有关,选择设而不求点差法,与弦的中点无关,选择韦达定理公式法;使用韦达定理必须先考虑是否为二次及根的判别式; 8.求曲线方程的题目,如果知道曲线的形状,则可选择待定系数法,如果不知道曲线的形状,则所用的步骤为建系、设点、列式、化简(注意去掉不符合条件的特殊点);

选择填空题的解题方法与技巧

选择题 选择题是高考数学试卷的三大题型之一.选择题的分数一般占全卷的40%左右,高考数学选择题的基本特点是: (1)绝大部分数学选择题属于低中档题,且一般按由易到难的顺序排列,主要的数学思想和数学方法能通过它得到充分的体现和应用,并且因为它还有相对难度(如思维层次、解题方法的优劣选择,解题速度的快慢等),所以选择题已成为具有较好区分度的基本题型之一. (2)选择题具有概括性强、知识覆盖面广、小巧灵活及有一定的综合性和深度等特点,且每一题几乎都有两种或两种以上的解法,能有效地检测学生的思维层次及观察、分析、判断和推理能力. 目前高考数学选择题采用的是一元选择题(即有且只有一个正确答案),由选择题的结构特点,决定了解选择题除常规方法外还有一些特殊的方法.解选择题的基本原则是:“小题不能大做”,要充分利用题目中(包括题干和选项)提供的各种信息,排除干扰,利用矛盾,作出正确的判断. 数学选择题的求解,一般有两条思路:一是从题干出发考虑,探求结果;二是从题干和选择支联合考虑或从选择支出发探求是否满足题干条件.解答数学选择题的主要方法包括直接对照法、概念辨析法、图象分析法、特例检验法、排除法、逆向思维法等,这些方法既是数学思维的具体体现,也是解题的有效手段. 以上的解法,能有效地检测学生的思维层次及观察、分析、判断和推理能力.目前高考数学选择题采用的是一元选择题(即有且只有一个正确答案),由选择题的结构特点,决定了解选择题除常规方法外还有一些特殊的方法.解选择题的基本原则是:“小题不能大做”,要充分利用题目中(包括题干和选项)提供的各种信息,排除干扰,利用矛盾,作出正确的判断. 数学选择题的求解,一般有两条思路:一是从题干出发考虑,探求结果;二是从题干和选择支联合考虑或从选择支出发探求是否满足题干条件.解答数学选择题的主要方法包括直接对照法、概念辨析法、图象分析法、特例检验法、排除法、逆向思维法等,这些方法既是数学思维的具体体现,也是解

高考数学选择填空题解题技巧

高考数学选择填空题技巧——十种武器 在考场上,几乎所有同学都会遇到不会做的题目。在这个时候,大多数同学选择的是放弃或者瞎猜。而较难的选择题、填空题都有一些解题技巧,在使用这些技巧后,不需要严谨论证也能够得出正确的答案。这些技巧不是纯猜乱猜,而是有一定根据的推断,利用各种方法在没有完全做出题目的情况下得到正确的答案。 第一武器:排除法 目前高考数学选择题为四选一单项选择题,所以选择一个符合题意的选项等于选择三个不合题意的选项。例如:范围问题可把一些简单的数代入,符合条件则排除不含这个数的范围选项,不合条件则排除含这个数的范围。当然,选取数据时要注意考虑选项的特征,不能选取所有选项都含有或都不含的数。 例如:(08江西)已知函数f (x )=2mx 2-2(4-m )x +l,g (x )=mx ,若对于任一实数x ,f (x ) 与g (x )的值至少有一个为正数,则实数m 的取值范围是 A.(0,2)B.(0,8)C.(2,8)D.(-∞,0) 我们可以简单的代入数据m=4及m=2,容易检验这两个数都是符合条件的,所以正确选项为B。 再如,选择题中的解不等式问题都直接应用排除法,与范围问题类似。选择题中的数列求通项公式、求和公式问题也可应用排除法。令n 等于1,2,3……即可。 使用排除法应注意积累常见特例。如:常函数,常数列(零数列),斜率不存在的直线……第二武器:增加条件法 当发现条件无法使所有变量确定时,而所求为定值时,可自我增加一个条件,使题目简单。例如:(07全国2)设F 为抛物线 24y x =的焦点,A B C ,,为该抛物线上三点,若FA FB FC ++=0 ,则FA FB FC ++= ( )A.9B.6C.4D.3发现有A、B、C 三个动点,只有一个FA FB FC ++=0 条件,显然无法确定A、B、C 的位置,可令C 为原点,此时可求A、B 的坐标,得出答案B。 其实,特值法是狭义的增加条件法。因为我们习惯具体的数字,不习惯抽象的字母符号,所以经常可以把题目中的字母换成符合条件的数字解题。 第三武器:以小见大法 关于一些判断性质类的题目,可以用点来检验,只有某些点的性质符合性质,函数才可能符合性质。以小见大法通常结合排除法。 例如:(08江西)函数sin ()sin 2sin 2x f x x x =+是() A.以4π为周期的偶函数B.以2π为周期的奇函数 C.以2π为周期的偶函数D.以4π为周期的奇函数 我们可以通过计算f(π/2),f(-π/2),f(3π/2),f(5π/2)就可以选出选项A。

选择填空解题策略

选择填空解题策略 一、知识点睛 特殊化法 常用于已知信息处于变化状态,但结果唯一确定的问题.难以入手时,先从特殊情况进行研究,然后类比推广到一般情形进行验证. 常见处理手段:特殊位置,特殊图象,特殊函数,特殊值,极端值等. 操作要领:采取特殊化法时,不能违背题意.只需求出一种特殊状态下的结果,对应选项验证即可. 注:常用在选择题和填空题中,迅速得到问题答案;有时也会用在大题中来辅助寻找思路和进行探索. 排除法 常用于选择题,根据题目条件或分析转化得到的结论,针对选项间的差异进行验证排除,合理利用排除法,可以提高做题速度和正确率. 常见处理手段:代入验证法,倒推法(正难则反法)等. 操作要领:充分利用各选项的特点,边分析边排除,往往从选项的差异处入手,降低工作量. 注:一般应用在选择题中,充分利用选项的优势解决问题.(4个选项,有且只有一个正确答案) 二、精讲精练 1. 一次函数y ax b =+(0a ≠)、二次函数2y ax bx =+(0a ≠)和反比例函数 k y x = (0k ≠)在同一直角坐标系中的图象如图所示,点A 的坐标为(-2,0),则下列结论正确的是( ) A .2b a k =+ B .a b k =+ C .0a b >> D .0a k >> 2. A (-2,4),B (4,2),直线y =kx -2与线段AB ( ) A .-5 B .-2 C .2 D .5

第2题图 第3题图 3. 如图,△ABC 的三个顶点分别为A (1,2),B (2,5),C (6,1).若函数x k y = 在第一象限内的图象与△ABC 有交点,则k 的取值范围是( ) A .2≤k ≤ 4 49 B .6≤k ≤10 C .2≤k ≤6 D .2≤k ≤ 2 25 4. 如图,在直角三角形纸片ABC 中,AB =3,AC =4,D 为斜边BC 中点.第1 次将纸片折叠,使点A 与点D 重合,折痕与AD 交于点P 1;设P 1D 的中点为D 1,第2次将纸片折叠,使点A 与点D 1重合,折痕与AD 交于点P 2;设P 2D 1的中点为D 2,第3次将纸片折叠,使点A 与点D 2重合,折痕与AD 交于点P 3;…;设P n -1D n -2的中点为D n -1,第n 次将纸片折叠,使点A 与点D n -1重合,折痕与AD 交于点P n (n >2).则AP n 的长为( ) 第 3第2次折叠第1次折叠 第1次折叠 第2次折叠 第3次折叠 A .1 2532 n n -? B . 32 352 n n ? C .2(1)532n n +? D .1 21 352 n n +-? 5. 已知函数y =(k -3)x 2+2x +1的图象与x 轴有交点,则k 的取值范围是( ) A .k <4 B .k ≤4 C .k <4且k ≠3 D .k ≤4且k ≠3 6. 下列图形是二次函数221y ax bx a =++-的图象,若 0b >,则a 的值为 ( )

选择填空解题策略(一)(含答案)

学生做题前请先回答以下问题 问题1:选择填空解题策略中常用的两种方法分别为________与___________. 问题2:特殊化法常见的处理手段有___________________________. 问题3:排除法常见的处理手段有_____________________________,一般用在什么题型中?以下是问题及答案,请对比参考: 问题1:选择填空解题策略中常用的两种方法分别为与. 答: 问题2:特殊化法常见的处理手段有. 答: 问题3:排除法常见的处理手段有,一般用在什么题型中?答: 选择填空解题策略(一) 一、单选题(共8道,每道12分) 1.为了解某小区家庭垃圾袋的使用情况,小亮随机调查了该小区10户家庭一周的使用数量,结果如下(单位:个):7,9,11,8,7,14,10,8,9,7.关于这组数据,下列结论错误的是( ) A.极差是7 B.平均数是9

C.中位数是8.5 D.众数是8 答案:D 解题思路: 试题难度:三颗星知识点:平均数 2.若一组数据1,2,3,4,x的平均数与中位数相同,则实数x的值不可能是( ) A.0 B.2.5 C.3 D.5 答案:C 解题思路:

试题难度:三颗星知识点:平均数 3.已知一个函数图象经过(1,-4),(2,-2)两点,在自变量x的某个取值范围内,都有函数值y随x的增大而减小,则符合上述条件的函数可能是( ) A.正比例函数 B.一次函数 C.反比例函数 D.二次函数 答案:D 解题思路: 试题难度:三颗星知识点:函数的图象 4.如图,在正方形ABCD中,以A为顶点作等边△AEF,交BC边于点E,交CD边于点F;又以点A为圆心,AE的长为半径作弧EF.若△AEF的边长为2,则图中阴影部分的面积约为( ) (参考数据:,,)

初中数学选择题、填空题解题技巧(完美版)

初中数学选择题、填空题解题技巧 1.排除选项法: 选择题因其答案是四选一,必然只有一个正确答案,那么我们就可以采用排除法,从四个选项中排除掉易于判断是错误的答案,那么留下的一个自然就是正确的答案。 例1、圆O 1和圆O 2的半径分别为4㎝和3㎝,圆心距O 1O 2为2㎝,则圆O 1和圆O 2的公切 线的条数是( )。 A 、1条 B 、2条 C 、3条 D 、4条 例2、在同一直角坐标系下,一次函数y=ax+b 和二次函数y=ax 2+bx 的图像可能是( ) A B C D 2.赋予特殊值法: 即根据题目中的条件,选取某个符合条件的特殊值或作出特殊图形进行计算、推理的方法。用特殊值法解题要注意所选取的值要符合条件,且易于计算。 例1、已知ABC △中,60A ∠=o ,ABC ∠,ACB ∠的平分线交于点O ,则BOC ∠的度数为 ( ) 2、无论m 为任何实数,二次函数y=x 2+(2-m)x+m 的图像都经过的点是 _______. 3、已知a<0,那么,点P(-a 2 -2,2-a)关于x 轴的对称点是在第_______象限. 3.通过猜想、测量的方法,直接观察或得出结果: 这类方法在近年来的初中题中常被运用于探索规律性的问题,此类题的主要解法是运用不完全归纳法,通过试验、猜想、试误验证、总结、归纳等过程使问题得解。 例1、用同样大小的黑色棋子按图所示的方式摆图形,按照这样的规律摆下去,则第n 个图 形需棋子( )枚(用含n 的代数式表示). 第1个图 第2个图 第3个图 … x y o x x x y o o o

4、直接求解法: 有些选择题本身就是由一些填空题,判断题,解答题改编而来的,因此往往可采用直接法,直接由从题目的条件出发,通过正确的运算或推理,直接求得结论,再与选择项对照来确定选择项。我们在做解答题时大部分都是采用这种方法。 如:1、商场促销活动中,将标价为200元的商品,在打8折的基础上,再打8折销售,现该商品的售价是( ) 2、抛物线y=x2-4x+5的顶点坐标是()。 5、数形结合法: 解决与图形或图像有关的选择题,常常要运用数形结合的思想方法,有时还要综合运用其他方法。 例1、在直线l上依次摆放着七个正方形(如图所示)。已知斜放置的三个正方形的面积分别是1、2、3,正放置的四个正方形的面积依次是S1、S2、S3、S4,则S1+S2+S3+S4=_______。 例2、在函数y=k x (k>0)的图像上有三点(x 1 ,y 1 ),(x 2 ,y 2 ),(x 3 ,y 3 ),已知 x 1

初中数学选择、填空、压轴题、解题技巧(含例题)

选择题解题技巧 ▼方法一:排除选项法 选择题因其答案是四选一,必然只有一个正确答案,那么我们就可以采用排除法,从四个选项中排除掉易于判断是错误的答案,那么留下的一个自然就是正确的答案。 ▼方法二:赋予特殊值法 即根据题目中的条件,选取某个符合条件的特殊值或作出特殊图形进行计算、推理的方法。用特殊值法解题要注意所选取的值要符合条件,且易于计算。 ▼方法三:通过猜想、测量的方法,直接观察或得出结果 这类方法在近年来的初中题中常被运用于探索规律性的问题,此类题的主要解法是运用不完全归纳法,通过试验、猜想、试误验证、总结、归纳等过程使问题得解。 ▼方法四:直接求解法 有些选择题本身就是由一些填空题、判断题、解答题改编而来的,因此往往可采用直接法,直接由从题目的条件出发,通过正确的运算或推理,直接求得结论,再与选择项对照来确定选择项。我们在做解答题时大部分都是采用这种方法。 例如:商场促销活动中,将标价为200元的商品,在打8折的基础上,再打8折销售,现该商品的售价是( ) A 、160元B、128元C 、120元D、88元 ▼方法五:数形结合法 解决与图形或图像有关的选择题,常常要运用数形结合的思想方法,有时还要综合运用其他方法。 ▼方法六:代入法 将选择支代入题干或题代入选择支进行检验,然后作出判断。 ▼方法七:观察法 观察题干及选择支特点,区别各选择支差异及相互关系作出选择。 ▼方法八:枚举法 列举所有可能的情况,然后作出正确的判断。 例如:把一张面值10元的人民币换成零钱,现有足够面值为2元,1元的人民币,换法有( ) A.5种 B.6种 C.8种 D.10种 分析:如果设面值2元的人民币x张,1元的人民币y元,不难列出方程,此方程的非负整数解有6对, 故选B。 ▼方法九:待定系数法 要求某个函数关系式,可先假设待定系数,然后根据题意列出方程(组),通过解方程(组),求得待定系数, 从而确定函数关系式,这种方法叫待定系数法。 ▼方法十:不完全归纳法 当某个数学问题涉及到相关多乃至无穷多的情形,头绪纷乱很难下手时,行之有效的方法是通过对若干简单情形进行考查,从中找出一般规律,求得问题的解决。 填空题解题技巧

相关主题
文本预览
相关文档 最新文档