当前位置:文档之家› 四川大学操作系统课件 选择题库2

四川大学操作系统课件 选择题库2

四川大学操作系统课件 选择题库2
四川大学操作系统课件 选择题库2

Multiple Choice Questions 1

1.The general role of an operating system is to:

a. Provide a set of services to system users

b. Manage files for application programs

c. Act as an interface between various computers

d. None of the above

https://www.doczj.com/doc/8913716174.html,rmation that must be saved prior to the processor transferring control to the interrupt handler routine includes:

a. (PSW) & Contents of processor registers

b. Program Status Word (PSW)

c. None of the above

d. (PSW) & Location of next instruction

3.One accepted method of dealing with multiple interrupts is to:

a. Service them in round-robin fashion

b. Disable all interrupts except those of highest priority

c. None of the above

d. Define priorities for the interrupts

4.In a uniprocessor system(单处理器系统), multiprogramming(多道程序设计) increases processor efficiency by:

a. Taking advantage of time wasted by long wait interrupt handling

b. Eliminating all idle processor cycles

c. All of the above

d. Increasing processor speed

5.As one proceeds down the memory hierarchy (i.e., from inboard memory to offline storage), the following condition(s) apply:

a. Decreasing capacity

b. Increasing access time

c. All of the above

d. Increasing cost per bit

6.Small, fast memory located between the processor and main memory is called

a. WORM memory

b. CD-RW memory

c. None of the above

d. Cache memory

7.When a new block of data is written into cache memory, the following determines which cache location the block will occupy:

a. None of the above

b. Cache size

c. Block size

d. Write policy

8.The four main structural elements of a computer system are:

a. None of the above

b. Processor, Registers, Main Memory & System Bus

c. Processor, Main Memory, I/O Modules & System Bus

d. Processor, Registers, I/O Modules & Main Memory

9.The two basic types of processor registers are:

a. User-visible and Control/Status registers

b. Control and Status registers

c. User-visible and user-invisible registers

d. None of the above

10.Address registers may contain

a. Partial memory addresses

b. Memory addresses of data

c. Memory addresses of instructions

d. All of the above

11.A Control/Status register that contains the address of the next instruction to be fetched is called the:

a. Program Counter (PC)

b. All of the above

c. Instruction Register (IR)

d. Program Status Word (PSW)

12.The two basic steps used by the processor in instruction processing are:

a. None of the above

b. Fetch and Instruction cycles

c. Fetch and Execute cycles

d. Instruction and Execute cycles

13.A fetched instruction is normally loaded into the:

a. Accumulator (AC)

b. None of the above

c. Instruction Register (IR)

d. Program Counter (PC)

14.A common class of interrupts is

a. Program

b. I/O

c. Timer

d. All of the above

15.When an external device becomes ready to be serviced by the processor, the device sends this type of signal to the processor:

a. Handler signal

b. None of the above

c. Interrupt signal

d. Halt signal

Multiple Choice Questions 2

1.A primary objective of an operating system is:

a. Ability to evolve

b. Convenience

c. Efficiency

d. All of the above

2.The paging system in a memory management system provides for dynamic mapping between a virtual address used in a program and:

a. A real address in a program

b. None of the above

c. A virtual address in main memory

d. A real address in main memory

3.Relative to information protection and security in computer systems, access control typically refers to:

a. The flow of data within the system

b. Proving that security mechanisms perform according to specification

c. Regulating user and process access to various aspects of the system

d. None of the above

4.A common problem with full-featured operating systems, due to their size and difficulty of the tasks they address, is:

a. Sub-par performance

b. Chronically late in delivery

c. All of the above

d. Latent bugs that show up in the field

5.A technique in which a process, executing an application, is divided into threads that can run concurrently is called:

a. None of the above

b. Multithreading

c. Symmetric multiprocessing (SMP)

d. Multiprocessing

6.WIN2K supports several types of user applications, including:

a. Linux

b. System 10

c. WIN32

d. None of the above

7.Key to the success of Linux has been its character as a free software package available under the auspices of the:

a. Berkeley Software Distribution

b. Free Software Foundation

c. World Wide Web Consortium

d. None of the above

8.The operating system provides many types of services to end-users, programmers and system designers, including:

a. Built-in user applications

b. All of the above

c. Relational database capabilities with the internal file system

d. Error detection and response

9.The operating system is unusual in its role as a control mechanism, in that:

a. It runs on a special processor, completely separated from the rest of the system

b. It never relinquishes control of the system processor

c. None of the above

d. It frequently relinquishes control of the system processor and must depend on the

processor to regain control of the system

10.Operating systems must evolve over time because

a. Users will only purchase software that has a current copyright date

b. New hardware is designed and implemented in the computer system

c. All of the above

d. Hardware must be replaced when it fails

11.A major problem with early serial processing systems was:

a. Inability to get hardcopy output

b. Setup time

c. Lack of input devices

d. All of the above

12.An example of a hardware feature that is desirable in a batch-processing system is

a. None of the above

b. A completely accessible memory area

c. Large clock cycles

d. Privileged instructions

13.A computer hardware feature that is vital to the effective operation of a multiprogramming operating system is:

a. Very large memory

b. Multiple processors

c. I/O interrupts and DMA

d. All of the above

14.The principle objective of a time sharing, multiprogramming system is to

a. Maximize processor use

b. None of the above

c. Provide exclusive access to hardware

d. Maximize response time

15.Which of the following major line of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process?

a. Multiprogramming batch operation systems

b. Real time transaction systems

c. All of the above

d. Time sharing systems

16.Which of the following major line of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process?

a. Multiprogramming batch operation systems

b. Real time transaction systems

c. Time sharing systems

d. All of the above

Multiple Choice Questions 3

1.The behavior of a processor can be characterized by examining:

a. Multiple process traces

b. A single process trace

c. All of the above

d. The interleaving of the process traces

2.The Process Image element that contains the modifiable part of the user space is called the:

a. User Program

b. None of the above

c. System Stack

d. Process Control Block

3.The processor execution mode that user programs typically execute in is referred to as:

a. System mode

b. None of the above

c. User mode

d. Kernel mode

4.One step in the procedure for creating a new process involves:

a. Assigning a unique identifier

b. All of the above

c. Allocating space for the process

d. Initializing the process control block

5.A process switch may occur when the system encounters an interrupt condition, such as that generated by a:

a. All of the above

b. Trap

c. Supervisor call

d. Memory fault

6.In the Process Based O/S:

a. None of the above

b. Major kernel functions are organized as separate functions

c. The User Process Image includes a kernel stack

d. O/S code and data are contained in the shared address space

7.In a typical UNIX system, the element of the process image that contains the processor status information is:

a. All of the above

b. System-level context

c. Register context

d. User-level context

8.The behavior of an individual process can be characterized by examining:

a. The interleaving of the process traces

b. All of the above

c. Multiple process traces

d. A single process trace

9.The basic Two-State Process Model defines two possible states for a process in relationship to the processor:

a. Running and Executing

b. Running and Not Running

c. None of the above

d. Executing and Waiting

10.There are a number of conditions that can lead to process termination, including:

a. Normal completion

b. Parent termination

c. All of the above

d. Bounds violation

11.In the Five-State Process Model, the following represents a valid state transition:

a. All of the above

b. New -> Blocked

c. New -> Running

d. Running -> Blocked

12.In a Process Model that implements two suspend states, a valid state transition is represented by:

a. Ready -> Ready/Suspend

b. Running -> Ready/Suspend

c. Ready/Suspend -> Ready

d. All of the above

13.The scheduling strategy where each process in the queue is given a certain amount of time, in turn, to execute

and then returned to the queue, unless blocked is referred to as:

a. Round-Robin

b. Prioritization

c. All of the above

d. LIFO

14.A Memory Table is an O/S control structure that is used by the O/S to:

a. Manage I/O devices

b. Provide information about system files

c. None of the above

d. Manage processes

15.The Process Image element that contains the collection of attributes needed by the O/S to control a particular process is called the:

a. User Data

b. System Stack

c. None of the above

d. Process Control Block

Multiple Choice Questions 4

1.The concept of a process in an operating system embodies two primary characteristics, one of which is:

a. None of the above

b. Resource ownership

c. Symmetric multiprocessing

d. Multithreading

2.Early operating systems that were designed with little concern about structure are typically referred to as:

a. Monolithic operating systems

b. Kernel operating systems

c. All of the above

d. Layered operating systems

3.A benefit of the microkernel organization is:

a. Flexibility

b. All of the above

c. Portability

d. Extensibility

4.In low-level microkernel memory management, an example of an operation that can support external paging and virtual memory management is the:

a. Map operation

b. Flush operation

c. Grant operation

d. All of the above

5.In a W2K system, the state that a thread enters when it has been unblocked and the resource for which it has been blocked is not yet available is called the:

a. Waiting state

b. Standby state

c. None of the above

d. Transition state

6.In a Solaris system, a User-Level Thread (ULT) that enters the active state is assigned to a:

a. Heavy-Weight Process (HWP)

b. Light-Weight Process (LWP)

c. None of the above

d. Kernel thread

7.In a Linux system, when a new process is cloned, the two processes share the same:

a. Process identifier

b. Virtual memory

c. task_struct data structure

d. All of the above

8.An example of a system that implements a single process with multiple threads is:

a. WIN 2000

b. All of the above

c. Solaris

d. Java

9.Which of the following is true regarding the relationship between processes and threads:

a. It takes less time to switch between two different processes than to switch between two threads within the same process

b. It takes far less time to create a new thread in an existing process than to create a new process

c. It takes less time to terminate a process than a thread

d. All of the above

10.The basic thread operation related to the change in thread state that occurs when a thread needs to wait for an event is referred to as the:

a. Unblock operation

b. None of the above

c. Spawn operation 派生

d. Block operation

11.One of the disadvantages of User-Level Threads (ULTs) compared to Kernel-Level Threads (KLTs) is:

a. All of the above

b. When a ULT executes a system call, all threads in the process are blocked

c. Scheduling is application specific

d. Thread switching does not require kernel mode privileges

12.In the Linux O/S, multiple threads may be created and executed within a single process. This is an example of the following Thread-to-Process relationship:

a. 1:M

b. 1:1

c. None of the above

d. M:N

13.The computer system category where a single processor executes a single instruction stream to operate on data stored in a single memory is called:

a. Single Instruction Multiple Data (SIMD) stream

b. None of the above

c. Single Instruction Single Data (SISD) stream

d. Multiple Instruction Single Data (MISD) stream

14.In a SMP system, each processor maintains a local cache and must alert all other processors that a change to cache update has taken place. This is referred to as the:

a. Cache coherency problem

b. Interconnection mechanism problem

c. None of the above

d. Synchronization mechanism problem

15.Key issues involved in the design of multiprocessor operating systems include:

a. All of the above

b. Synchronization

c. Scheduling

d. Reliability and fault tolerance

Multiple Choice Questions 5

1.Concurrency plays a major part in which of the following specific contexts:

a. Multiple applications

b. All of the above

c. Structured applications

d. O/S structure

2.In order to implement mutual exclusion on a critical resource for competing processes, only one program at a time should be allowed

a. In the critical section of the program

b. None of the above

c. To Exhibit cooperation

d. To perform message passing

3.The following requirement must be met by any facility or capability that is to provide support for mutual exclusion:

a. All of the above

b. Only one process at a time can be allowed into a critical code section

c. A process remains in its critical code section for a finite time only

d. No assumptions can be made about relative process speeds

4.Processes that are designed to be able to pass execution control back and forth between themselves are referred to as

a. None of the above

b. Threads

c. Coroutines

d. Busy waiting processes

5.In a uniprocessor system, mutual exclusion can be guaranteed by

a. Interleaving processes

b. Disabling interrupts

c. Overlapping processes

d. All of the above

6.A semaphore that does not specify the order in which processes are removed from the queue is called a

a. Binary semaphore

b. Weak semaphore

c. None of the above

d. Strong semaphore

7.The finite circular buffer is used to implement which of the following basic queuing strategies

a. LIFO

b. FILO

c. FIFO

d. None of the above

8.A chief characteristic of a monitor is:

a. A maximum of two processes may be executing in a monitor at a time

b. All of the above

c. Local data variables of the monitor are accessible by any procedure requesting use of the monitor

d. A process enters the monitor by invoking one of its procedures

9.In synchronization involving message passing, the sender of a message can be

a. Only blocking

b. All of the above

c. Only non-blocking

d. Either blocking or non-blocking

10.In a system employing message passing, when a message is sent to a shared temporary data structure, this general approach is known as

a. Direct addressing

b. Blocking

c. Indirect addressing

d. None of the above

11.In a system employing message passing, the typical message is divided into two primary sections

a. None of the above

b. Body and mailbox

c. Destination ID and Source ID

d. Header and mailbox

12.The Reader/Writer problem requires that certain conditions be satisfied, such as:

a. Any number of readers may simultaneously read from the file

b. None of the above

c. Readers may read from the file while writers are writing to it

d. Multiple writers may write to the file simultaneously. Any number of readers may simultaneously read from the file

13.A reason why the Producer/Consumer problem cannot be considered a special case of the Reader/Writer problem with a single writer (the producer) and a single reader (the consumer) is:

a. None of the above

b. The Producer/Consumer problem doesn’t deal with concurrency issues

c. The producer and consumer must be both reader and writer

d. The consumer must perform writes while the reader performs reads

14.Examples of solutions to the concurrency problem that do not involve busy waiting are the following:

a. None of the above

b. Semaphores and monitors

c. Producers and consumers

d. Message passing and caching

15.A basic echo procedure (that echoes a typed character to the screen) running on a multiprocessor system can produce erroneous output if

a. Two processes deadlock while in the echo code

b. Access to the echo procedure is unsynchronized

c. None of the above

d. Access to the echo procedure is synchronized

Multiple Choice Questions 6

1.The permanent blocking of a set of processes that either compete for system resources or communicate with each other is called:

a. Starvation

b. All of the above

c. Prioritization

d. Deadlock

2.In deadlocked process recovery, selection criteria for choosing a particular process to abort or rollback includes designating the process with the:

a. Least total resources allocated so far

b. Lowest priority

c. All of the above

d. Most estimated time remaining

3.One approach to an integrated strategy for dealing with deadlocks involves the implementation of:

a. Process rollbacks

b. Virtual memory

c. Resource classes

d. None of the above

4.The Dining Philosopher’s Problem is a standard test case for evaluating approaches to implementing:

a. Synchronization

b. Starvation

c. All of the above

d. Deadlock

5.A software mechanism that informs a process of the occurrences of asynchronous events in UNIX are called:

a. Pipes

b. Messages

c. Signals

d. All of the above

6.Thread synchronization primitives supported by Solaris include:

a. Condition variables

b. Semaphores

c. All of the above

d. Mutual exclusion (mutex) locks

7.The family of synchronization objects implemented by W2K include:

a. Mutex objects

b. Event objects

c. All of the above

d. Semaphore objects

8.All deadlocks involve conflicting needs for resources by:

a. Three or more processes

b. One or more processes

c. None of the above

d. Two or more processes

9.A resource that can be created and destroyed is called a:

a. Reusable resource

b. Producible resource

c. Consumable resource

d. All of the above

10.An example of a consumable resource is the following:

a. All of the above

b. Main Memory

c. Messages

d. Printers

11.A condition of policy that must be present for a deadlock to be possible is:

a. Mutual exclusion

b. No preemption

c. All of the above

d. Hold and wait

12.A direct method of deadlock prevention is to prevent the occurrence of:

a. Hold and wait

b. All of the above

c. Circular wait

d. Mutual exclusion

13.In the Resource Allocation Denial approach to Deadlock Avoidance, a safe state is defined as one in which:

a. At least one potential process sequence does not result in a deadlock

b. None of the above

c. All potential process sequences do not result in a deadlock:

d. Several potential process sequences do not result in a deadlock:

14.A conservative strategy for dealing with deadlocks that involves limiting access to resources and imposing restrictions on processes is called:

a. None of the above

b. Deadlock Prevention

c. Deadlock Detection

d. Deadlock Avoidance Multiple Choice Questions 7

1.a task of subdividing memory between O/S and processes is performed automatically by the O/S and is called:

a. All of the above

b. Protection

c. Memory Management

d. Relocation

2.A reference to a memory location independent of the current assignment of data to memory is called a:

a. Absolute address

b. None of the above

c. Logical address

d. Relative address

3.An actual location in main memory is called a:

a. Relative address

b. Absolute address

c. Logical address

d. None of the above

4.The page table for each process maintains:

a. None of the above

b. The frame location for each page of the process

c. The physical memory location of the process

d. The page location for each frame of the process

5.In a system employing a paging scheme for memory management, wasted space is due to:

a. Internal fragmentation

b. Pages and frames of different specified sizes

c. None of the above

d. External fragmentation

6.In a system employing a segmentation scheme for memory management, wasted space is due to:

a. Internal fragmentation

b. External fragmentation

c. None of the above

d. Segments of different sizes

7.In a system employing a segmentation scheme for memory management, a process is divided into:

a. A number of segments which must be of equal size

b. None of the above

c. A number of segments which need not be of equal size

d. One segment per thread

8.The concept of Memory Management satisfies certain system requirements, including:

a. Relocation

b. Physical organization

c. All of the above

d. Protection

9.The practice in which a program and data are organized in such a way that various modules can be assigned the same region of memory is called:

a. Sharing

b. None of the above

c. Overlaying

d. Relocation

10.The concept of virtual memory is based on one or both of two basic techniques:

a. Segmentation and paging

b. None of the above

c. Overlaying and relocation

d. Segmentation and partitioning

11.A problem with the largely obsolete Fixed Partitioning memory management technique is that of:

a. Inefficient use of memory

b. Internal fragmentation

c. Allowing only a fixed number of Processes

d. All of the above

12.The problem of internal fragmentation can be lessened in systems employing a fixed-partition memory management scheme by using:

a. Unequal size partitions

b. Random size partitions

c. Equal size partitions

d. None of the above

13.In the Dynamic Partitioning technique of memory management, the phenomenon that results in unused blocks of memory outside of existing partitions is called:

a. Compaction

b. Internal fragmentation

c. None of the above

d. External fragmentation

14.In the Dynamic Partitioning technique of memory management, the placement algorithm that chooses the block that is closest in size to the request is called:

a. All of the above

b. Next-fit

c. First-fit

d. Best-fit

15.In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the last placement and chooses the next available block that large enough to satisfy the request is called:

a. First-fit

b. All of the above

c. Best-fit

d. Next-fit

Multiple Choice Questions 8

1.The type of memory that allows for very effective multiprogramming and relieves the user of memory size constraints is referred to as:

a. Virtual memory

b. Real memory

c. Main memory

d. All of the above

2.The replacement policy that is impossible to implement because it would require the O/S to have perfect knowledge of future events is called the:

a. Least recently used (LRU) policy

b. Clock policy

c. Optimal policy

d. None of the above

3.The replacement policy that chooses only among the resident pages of the process that generated the page fault in selecting a page to replace is referred to as a:

a. Local replacement policy

b. Variable replacement policy

c. Global replacement policy

d. None of the above

4.The concept associated with determining the number of processes that will be resident in main memory is referred to as:

a. A cleaning policy

b. Load Control

c. None of the above

d. The page fault frequency

5.In SVR4 and Solaris systems, the memory management scheme that manages user processes and disk I/O is called the:

a. Paging system

b. None of the above

c. Virtual memory manager

d. Kernel memory allocator

6.The multilevel memory management scheme implemented in Linux was designed to minimize large page tables and directories in which of the following line of processors:

a. 32-bit Pentium/X86 architecture

b. 16-bit X86 architecture

c. 64-bit Alpha architecture

d. None of the above

7.The Windows 2000 virtual memory manager can use page sizes ranging from:

a. 64 KB to 4 GB

b. None of the above

c. 4 KB to 64 KB

d. 4 GB to 4 TB

8.The situation where the processor spends most of its time swapping process pieces rather than executing instructions is called:

a. Paging

b. The Principle of Locality

c. None of the above

d. Thrashing

9.The situation that occurs when the desired page table entry is not found in the Translation Lookaside Buffer (TLB) is called a:

a. None of the above

b. TLB hit

c. TLB miss

d. Page fault

10.The real address of a word in memory is translated from the following portions of a virtual address:

a. None of the above

b. Frame number and offset

c. Page number and frame number

d. Page number and offset

11.Segmentation has a number of advantages to the programmer over a non-segmented address space, including:

a. Sharing among processes

b. Simplifying the handling of growing data structures

c. All of the above

d. Protection

12.In a combined paging/segmentation system, a user’s address space is broken up into a number of:

a. Fixed-size pages, which are in turn broken down into variable-sized segments

b. Segments or pages, at the discretion of the programmer

c. Variable-sized Segments, which are in turn broken down into fixed-size pages

d. All of the above

13.Sharing is achieved in a segmentation system by:

a. Having a common data area that all processes can share

b. Referencing a segment in the segment tables of more than one process

c. All of the above

d. Each process segment table having a reference to the dispatcher main memory area

14.A fundamental choice in the design of the memory-management portion of an O/S is:

a. Whether or not to use virtual memory techniques

b. All of the above

c. Whether to use paging, segmentation of a combination of the two

d. The algorithms employed for various aspects of memory management

15.The fetch policy that exploits the characteristics of most secondary memory devices, such as disks, which have seek time and rotational latency is called:

a. Swapping

b. Demand paging

c. Prepaging

d. None of the above

Multiple Choice Questions 9

1.The type of scheduling that involves the decision to add a process to those that are at least partially in main memory and therefore available for execution is referred to as:

a. Medium-term scheduling

b. None of the above

c. Long-term scheduling

d. I/O scheduling

2.One difficulty with the Shortest Process Next (SPN) scheduling technique is:

a. All of the above

b. The lack of preemption

c. The need to know or estimate required processing times for each process

d. The starvation of longer processes

3.One difficulty with the Shortest Remaining Time (SRT) scheduling technique is:

a. The lack of preemption

b. The starvation of shorter processes

c. The need to know or estimate required processing times for each process

d. All of the above

4.Which of the following scheduling policies require prior knowledge or estimation of process length:

a. Highest Response Ratio Next (HRRN)

b. Shortest Remaining Time (SRT)

c. Shortest Process Next (SPN)

d. All of the above

5.It is impossible to make definitive comparisons of various scheduling policies due to dependence on factors such as:

a. The probability distribution of service times of the various processes

b. The efficiency of the scheduling and context switching mechanisms

c. All of the above

d. The nature of the I/O demand and performance of the I/O subsystem

6.The strategy that schedules processes based on their group affiliation is generally referred to as:

a. Fair share scheduling

b. All of the above

c. Simulation modeling

d. Queuing analysis

7.The traditional UNIX scheduler divides processes into fixed bands of priority levels, with the highest priority band being the:

a. User process band

b. None of the above

c. File manipulation band

d. Swapper band

8.The decision as to which job to admit to the system next can be based on which of the following criteria:

a. Priority

b. Simple FIFO

c. I/O requirements

d. All of the above

9.Typically, the swapping-in function for processes is based on the need to manage:

a. Virtual memory

b. The degree of multiprogramming

c. None of the above

d. Process priorities

10.In terms of frequency of execution, the short-term scheduler is usually the one that executes:

a. Least frequently

b. None of the above

c. About the same as the other schedulers

d. Most frequently

11.Response time in an interactive system is an example of:

a. System-oriented criteria for short-term scheduling policies

b. None of the above

c. User-oriented criteria for short-term scheduling policies

d. System-oriented criteria for long-term scheduling policies

12.A typical way to overcome starvation of lower-priority processes in a priority-based scheduling system is to:

a. Round-robin cycling of processes in a priority queue

b. All of the above

c. Change a process priority randomly

d. Change a process priority with its age

13.Which of the following scheduling policies allow the O/S to interrupt the currently running process and move it to the Ready state?

a. First-come-first-served

b. Non-Preemptive

c. None of the above

d. Preemptive

14.In terms of the queuing model, the total time that a process spends in a system (waiting time plus service time) is called:

a. None of the above

b. Normalized turnaround time (TAT)

c. Turnaround or residence time (TAT)

d. Finish time (FT)

15.In the Round Robin scheduling technique, the principle design issue is:

a. Determining the fair distribution of time quanta to individual processes

b. Determining the length of the time quantum

c. None of the above

d. Determining the method of cycling through a given set of processes

Multiple Choice Questions 10

1.An example of the key differences that can exist across (and even in) classes of I/O devices is:

a. Error conditions

b. Data rate

c. Data representation

d. All of the above

2.The following disk scheduling policy is useful as a benchmark against which to evaluate other disk scheduling policies because it provides a worst-case scenario:

a. Priority scheduling

b. FIFO scheduling

c. None of the above

d. Random scheduling

3.The disk scheduling algorithm that implements two subqueues in a measure to avoid the problem of “arm

stickiness” is the:

a. All of the above

b. FSCAN policy

c. N-step-SCAN policy

d. C-SCAN policy

4.Which of the following RAID levels implement some form of parity calculation to introduce redundancy:

a. RAID Level 4

b. RAID Level 6

c. All of the above

d. RAID Level 2

5.The disk cache replacement strategy that replaces the block that has experienced the fewest references is called:

a. Least Referenced (LR)

b. Least Frequently Used (LFU)

c. All of the above

d. Least Recently Used (LRU)

6.In a UNIX system, which of the following types of I/O devices make use of character queues:

a. Communications lines

b. Tape drive

c. All of the above

d. Disk drive

7.In a W2K system, the I/O manager module that includes lazy write and lazy commit services to improve overall performance is the:

a. Hardware device drivers

b. File system drivers

c. Cache manager

d. None of the above

8.The I/O technique where the processor busy waits for an I/O operation to complete is called:

a. Direct memory access (DMA)

b. Programmed I/O

c. Interrupt-driven I/O

d. None of the above

9.The system configuration that includes an I/O module which is a separate processor with a specialized instruction set can be referred to using the following terminology:

a. Direct Memory Access (DMA)

b. All of the above

c. I/O Channel

d. I/O Processor

10.The bus configuration for DMA that provides no path other than the system bus between the DMA module(s) and I/O devices is:

a. I/O bus

b. Single bus, detached DMA

c. Single bus, integrated DMA-I/O

d. None of the above

11.The primary objective in designing the I/O facility of a computer system that deals with the desire to handle all I/O devices in a uniform manner is referred to as:

a. Directory management

b. Generality

c. None of the above

d. Efficiency

12.In a hierarchical structure for managing I/O on a secondary storage device that supports a file system, the layer that is closest to the hardware is the:

a. Device I/O layer

b. None of the above

c. Physical organization layer

d. Directory management layer

13.An example of a block-oriented I/O device is:

a. Modem

b. All of the above

c. CD-ROM

d. Printer

14.The scenario where multiple buffers are used in an attempt to alleviate the problem of absorbing rapid bursts

of I/O is typically referred to as:

a. None of the above

b. Double buffering

c. Circular buffering

d. Single buffering

Multiple Choice Questions 11

1.A file is generally defined to be:

a. All of the above

b. A collection of related fields

c. A basic element of data

d. A collection of similar records

2.Fixed file blocking experiences the following potential problem:

a. External fragmentation

b. None of the above

c. Internal fragmentation

d. Gaps due to hardware design

3.In which of the following file allocation methods is preallocation required:

a. Indexed

b. None of the above

c. Chained

d. Contiguous

4.The technique of free disk space management that employs a pointer and length value of each free portion is:

a. None of the above

b. Free block list

c. Bit tables

d. Indexing

5.The data structure that maintains information on available disk space is called the:

a. File Allocation Table (FAT)

b. None of the above

c. Bit Table

d. Disk Allocation Table

6.File allocation in a UNIX system has the following characteristics:

a. Dynamic allocation using non-contiguous blocks with indexing

b. Preallocation using non-contiguous blocks without indexing

c. None of the above

d. Dynamic allocation using contiguous blocks without indexing

7.In a W2K NTFS file system, the smallest physical storage unit on the disk (almost always 512 bytes) is called a:

a. Cluster

b. Volume

c. Sector

d. None of the above

8.The level of the file system architecture that enables users and applications to access file records is called the:

a. Logical I/O level

b. All of the above

c. Basic I/O supervisor level

d. Basic file system level

9.Record access in a pile file can be conducted by:

a. Key field

b. All of the above

c. Exhaustive search

d. Partial index

10.Sequential files are optimal in scenarios involving:

a. Applications that require infrequent updates

b. All of the above

c. Applications that require frequent queries

d. Applications that require the processing of all records in the file

11.Indexed sequential files similar to sequential files, but contain two added features:

a. File index and overflow file

b. Hash function and an overflow file

c. All of the above

d. Hash function and file index

12.Direct or hashed files are often used where:

a. Fixed length records are used

b. All of the above

c. Very rapid access is required

d. Records are always accessed one at a time

13.The file directory information element that holds information such as the identity of the creator of the file is the:

a. All of the above

b. Address information element

c. Usage information element

d. Access control information element

14.In a tree-structured directory, the series of directory names that culminates in a file name is referred to as the:

a. Pathname

b. Working directory

c. None of the above

d. Symbolic name

15.Access rights on a file typically are considered to constitute a hierarchy, with each right implying those that:

a. Precede it

b. Succeed it

c. None of the above

d. Supercede it

Multiple Choice Questions 1

1.A A. 为系统用户提供一系列服务B. 为应用程序管理文件(这显然不是) C. 作为多台计算机间的接口(应该是CPU与硬件之间的接口) D. error

2.D.程序状态字和下个指令的位置P14

3.D处理多个中断的方法P18 The first is to disable interrupts while an interrupt is being processed. A second approach is to define priorities for interrupts and to allow an interrupt of higher priority to cause a lower-priority interrupt handler to be interrupted. A. 轮循服务(显然错误) B. 只服务优先级高的,忽视优先级低的C. error D. 为这些中断定义优先级

4.A.利用等待中断的时间P18

5.B A.容量↑ B.访问时间↑ C.error D.价格↓

6.D.存储器的层次结构由上至下依次为:寄存器(processer),高速缓存,主存储器(memory),磁盘,磁带

7.A Nothing will change. 高速缓冲存储器设计:cache size,block size,mapping function,replacement algorithm,write policy.

8.C 计算机有四个主要的结构化部件:处理器、主存储器、输入/输出模块、系统总线P6

9.A用户可见寄存器:数据寄存器、地址寄存器、索引寄存器、段指针、栈指针

控制和状态寄存器:程序计数器PC、指令寄存器IR

10.D A.辅存地址B.数据的主存储器地址C.指令的主存储器地址

11.A A. Program counter (PC) = Address of instruction C. Instruction register (IR) = Instruction being executed D. Program Status Word (PSW) = contains status information

12.C In its simplest form, instruction processing consists of two steps: The processor reads (fetches) instructions from memory one at a time and executes each instruction. P9

13.C Instruction register (IR) = Instruction being executed Accumulator (AC) = Temporary storage 临时存储体

14.D Classes of interrupts: Program, Timer, I/O, Hardware failure

15.C请求中断信号

Multiple Choice Questions 2

1.D 操作系统的三个主要目标:方便,有效,扩展的能力

2.D The paging system provides for a dynamic mapping between the virtual address used in the program and a real address, or physical address, in main memory. P51

3.C 调节用户和进程对系统方方面面的访问权限

4.C 一个功能完善的操作系统的大小和它所处理任务的困难性,导致了四个让人遗憾但又普遍存在的问题:

①操作系统在交付使用时习惯性表现出落后②系统有潜在的错误③总是难以达到期望的性能④不可能开发出既复杂又不易受各种安全性攻击的操作系统P 54

5.B Multithreading is a technique in which a process, executing an application, is divided into threads that can run concurrently. P56

6.C

7.B Key to the success of Linux has been the availability of free software packages under the auspices of the Free Software Foundation (FSF). P70

8.D the OS typically provides services in the following areas:? Program development ? Program execution ?Access to I/O devices ? Controlled access to files ? System access ? Error detection and response ? Accounting 9.D ? The OS functions in the same way as ordinary computer software; that is, it is a program or suite of programs executed by the processor. ? The OS frequently relinquishes control and must depend on the processor to allow it to regain control. P40

10.B 计算机需要不断发展的原因:硬件升级和新型硬件的出现、新的服务、纠正错误P 40/41

11.B 调度和准备时间

12.D 内存保护、定时器、特权指令、中断

13.C 支持I/O中断和直接存储器访问

14.B 批处理多道程序设计是为了充分使用处理器,分时多道程序设计是为了减小响应时间

15.C Three major lines of computer system development created problems in timing and synchronization that contributed to the development of the concept of the process: multiprogramming batch operation, time sharing, and real-time transaction systems.

16.D

Multiple Choice Questions 3

1.D We can characterize behavior of the processor by showing how the traces of the various processes are interleaved. P81

2.B User data.

3.C 用户态。System mode = kernel mode

4.B P99 12345

5.A 中断:时钟中断、I/O中断、内存失效陷阱系统调用

6.B 主要的内核函数被组织成独立的进程P103

7.C 处理器状态信息保存在寄存器上下文中

8.D 独立的进程:单独的进程轨迹

9.B 运行和非运行两种状态

10.C P 85

11.D Null -> New / New -> Ready / Ready -> Running / Running -> Exit / Running -> Ready / Running -> Blocked / Blocked -> Ready / Ready -> Exit / Blocked -> Exit

12.D P 89/90

13.A Round-Robin 轮循P84

14.C Memory tables are used to keep track of both main (real) and secondary (virtual) memory.

15.D 进程控制块

Multiple Choice Questions 4

1.B 资源所有权、调度/执行

2.A 单体结构的操作系统

3.B 一致接口、可扩展性、灵活性、可移植性、可靠性、分布式系统支持、对面向对象操作系统的支持

4.D 三个微内核操作支持内核外的分页和虚存管理授权、映射、刷新P129

5.D 过渡态

6.B 轻量级进程

7.B 克隆后共享同一个虚存

8.D P 113

9.B 10.D 11.B P 119/120

12.D Thread :Process = M :1

13.C 14.A 高速缓存的一致性问题P124

15.A P 125

Multiple Choice Questions 5 BAACB BCDDC AACAB

Multiple Choice Questions 6

1.D 死锁是一组竞争系统资源或互相通信的竞争间相互的"永久"阻塞

2.C 中文P196 死锁检测后恢复过程对“牺牲”进程的选择

3.C 综合死锁策略:资源分类

4.A 哲学家进餐问题是评价同步方法的一个测试标准

5.C 信号是用于通知发生一个同步事件的软件机制

6.C 互斥锁、信号量、多读者单写者锁、条件变量

7.C 事件、互斥、信号量、可等待的计时器

8.D 两个或多个进程资源需求冲突

9.C 可重用资源VS 可消费资源

10.C 可创建可销毁的信息资源

11.C 三个必要条件

12.C 死锁预防的直接法

13.A 一条安全道路便可

14.B

Multiple Choice Questions 7

1.C

2.C 逻辑地址的定义

3.B 物理地址即绝对地址

4.B 页号对应帧号

5.A 固定分区和分页都产生内部碎片

6.B 动态分区和分段都产生外部碎片

7.C 分段:多个大小不等的块

8.C 重定位、保护、共享、逻辑组织、物理组织

9.C 覆盖

10.A 虚拟=>分段分页

11.D 12.A 分段解决内部碎片,但是会引入外部碎片

13.D 动态分区外部碎片

14.D 最佳适配,首次适配,邻近适配

15.D

Multiple Choice Questions 8 ACADA CCDCD CCBBC

Multiple Choice Questions 9 AACDC ADDBD CDDCB

Multiple Choice Questions 10 DDBCB ACBBB BBCC

Multiple Choice Questions 11 DCDAD ACACD ABCAA

操作系统试题库填空题及答案

操作系统试题库填空题及答案 1、分时系统必须为用户提供(操作控制命令)以实现(交互(或联机))控制方式。 2、Spooling系统中,作业执行时,从磁盘上的(输入井)中读取信息,并把作业的执行结 果暂时存放在磁盘上的(输出井)中。 3、中断分类后,中断是指(源自CUP以外事件的中断,通常与当前程序(进程)运行无关),异常 是指(源自CUP内部事件的中断,通常与当前程序(进程)运行有关)。 4、所谓脱机用户接口是指(作业控制语言)。 5、用户程序必须通过程序级接口方能获得操作系统的服务,程序级接口主要是由一组(系统调 用)组成。 6、操作系统的主要功能是(存储器管理)、(处理机管理)、(设备管理)、(文件管理)、 (作业管理)。 7、用户是通过(命令接口)或者程序接口向计算机发出请求的。 8、用户与操作系统的接口有(通讯语言)和(系统调用)。 9、交互式系统和多道程序系统相结合可构成(分时)系统。 10、SPOOLing是指(并发的外部设备联机操作),操作系统用它来实现(虚拟设备)的功

能。 11、分时系统追求的目标是(及时响应). 12、用户进程从目态(常态)转换为管态(特态)的唯一途径是(中断). 13、实时系统应具有两个基本特征:及时性和(可靠性). 14、实时系统应具有两个基本特征:(及时性)和可靠性. 15、用户程序通过(访管指令(或系统调用))向操作系统提出各种资源要求和服务请求. 16、SPOOLing(同时的外部设备联机操作)技术是关于慢速字符设备如何与计算机主机交换信息 的一种典型的(虚拟设备)技术. 17、计算机操作系统是方便用户、管理和控制计算机(软硬件资源)的系统软件。 18、面对一般用户,通过(操作命令)方式控制操作系统;面对编程人员,通过(系统调 用)控制。 19、一个完整的计算机系统是由(硬件)和(软件)两大部分组成的。 20、操作系统是(控制和管理)计算机系统内部(各种硬件和软件资源)、有效地组织 多道程序运行的(系统软件(或程序集合)),是用户和计算机的(接口)。

数据库试题及答案

、选择题(40 X 1=40分) 1 .用二维表数据来表示实体及实体之间联系的数据模型称为( 2 .表在数据库中是一个非常重要的数据对象,它是用来( 数据库是在计算机系统中按照一定的数据模型组织、 操作的软件系统叫 —,由计算机、操作系统、 存储和应用的 —,支持数据库各种 DBMS 、数据库、应用程序及用户等组成的一 A 、概念数据模型 B 、结构数据模型 C 物理数据模型 D 、逻辑数据模型 11.数据是信息的符号表示或称载体;信息则是数据的内涵,是数据的 12 .下列关于关系数据模型的术语中, 最接A 、 显示 B 、查询 C 、存放 D 、检索 3. 数据库创建后就可以创建表了,创建表可以用( 等方法来创建。 A 、 企业管理器 B 、查询分析器 C 、 OSQL D 、企业管理器和 CREAT E TABL 语句 个整体叫 。(D A 、文件的集合、操作系统、文件系统 B 、 数据的集合、数据库管理系统、数据库系统 C 、命令的集合、数据库系统、软件系统 D 、 程序的集合、命令系统、数据库系统 7 .下面对于关系的叙述中,哪个是不正确的? A 、关系中的每个属性是不可分解的 C 、任意的一个二维表都是一个关系 B 、 (B ) 在关系中元组的顺序是无关紧要的 每一个关系只有一种记录类型 8 . SQL 中,下列涉及空值的操作,不正确的是( C ) A. AGE IS NULL B. AGE IS NOT NULL C. AGE = NULL D. NOT (AGE IS NULL) 10 .在数据库技术中,实体-联系模型是一种 D )。 A 、实体--联系模型 B 、层次模型 C 、网状模型 D 、关系模型 C )各种数据内容的。 A 、语法解释 B 、语义解释 C 、语意说明 D 、用法说明 哪一个术语所表达的概念与二维表中的 “行” 的概念

操作系统试卷题库(含部分答案)

题( 1 ) 一、单选题。每小题1分,共16分(将正确答案的序号写在题目的括号中) 1、关于静态分页存储管理的页表,下列说法错误的是(C )。P115 A、内存中每个作业都对应着一个页表 B、页表属于操作系统的内核数据结构 C、如果在不同时间运行同一作业,那么每次运行时页表都是相同的 D、页表存放在内存中 2、批处理操作系统的主要缺点是(C )。P7 A、资源利用率不高 B、作业吞吐量小 C、无人机交互能力 D、作业周转时间短 3、在下列调度算法中,(A )不属于进程调度算法。 A 电梯调度法 B 优先级调度法 C 时间片轮转法 D FIFO法 4、如果文件采用直接存取方式且文件大小不固定,则宜选择(D )文件结构。P189 A 任意 B 顺序 C 随机 D 索引 5、CPU输出数据的速度远远高于打印机的打印速度,为了解决这一矛盾,可采用(C )。 A 交换技术 B 覆盖技术 C 缓冲技术 D DMA技术 6、操作系统是一种(A ) A、系统软件 B、应用软件 C、UNIX D、Window NT 7、在请求页式中,因置换算法选择不当造成页面调度非常频繁,这种情况被称为(A ) A、抖动现象 B、交换现象 C、碎片 D、虚拟 8、多个进程实体能存在于同一内存中,在一段时间内都得到运行。这种性质称作进程的(B )。P30 A 动态性 B 并发性 C 调度性 D 异步性 9、使用户所编制的程序与实际使用的物理设备无关,这是由设备管理的(A)功能实现的。P163 A 设备独立性 B 设备分配 C 缓冲管理D虚拟设备 10、操作系统中,进程之间交换数据的过程称为(C ) A、进程共享 B、进程同步 C、进程通信 D、进程协调 11、关于进程的运行、就绪和阻塞三个状态,下列观点正确的是(D ) A、每个进程从创建到撤消都要经历这三个状态 B、每个进程从创建到撤消,各个状态只能经历一次 C、某些进程可以从阻塞状态转化为运行状态 D、某些进程可以从运行状态转化为就绪状态 12、在一段时间内,只允许一个进程访问的资源称为(C ) A、共享资源 B、临界区 C、临界资源 D、共享区 13、段页式存储管理汲取了页式管理和段式管理的长处,其实现原理结合了页式和段式管理的基本思想,即(B) A、用分段方法来分配和管理物理存储空间,用分页方法来管理用户地址空间 B、用分段方法来分配和管理用户地址空间,用分页方法来管理物理存储空间。 C、用分段方法来分配和管理主存空间,用分页方法来管理辅存空间 D、用分段方法来分配和管理辅存空间,用分页方法来管理主存空间 14、下面的论述中,正确的是(A ) A、一个进程是由一个伪处理机执行的一个程序 B、程序的并发执行将导致最终结果失去封闭性 C、不同的进程所执行的程序段代码也不同 D、以优先级为基础的低级调度算法,可以保证任何时候当前正在运行的进程总是非等待状态下 诸进程中优先级最高的进程。 15、避免死锁的一个著名的算法是(B) A、先入先出法 B、银行家算法 C、优先级算法 D、资源按序分配法 16、资源的预先分配策略可以实现死锁的(A ) A、预防 B、避免 C、检测 D、恢复

操作系统试题库填空题

1、分时系统必须为用户提供( 操作控制命令) 以实现( 交互(或联机) )控制方式。 2、Spooling系统中,作业执行时,从磁盘上的 ( 输入井) 中读取信息,并把作业的执行结 果暂时存放在磁盘上的( 输出井)中。 3、中断分类后,中断是指(源自CUP以外事件的中断,通常与当前程序(进程)运行无关),异常 是指(源自CUP内部事件的中断,通常与当前程序(进程)运行有关)。 4、所谓脱机用户接口是指(作业控制语言)。 5、用户程序必须通过程序级接口方能获得操作系统的服务,程序级接口主要是由一组(系统调 用)组成。 6、操作系统的主要功能是(存储器管理)、(处理机管理)、(设备管理)、(文件管理)、 (作业管理)。 7、用户是通过(命令接口)或者程序接口向计算机发出请求的。 8、用户与操作系统的接口有(通讯语言)和(系统调用)。 9、交互式系统和多道程序系统相结合可构成(分时)系统。 10、SPOOLing是指(并发的外部设备联机操作),操作系统用它来实现(虚拟设备)的功 能。 11、分时系统追求的目标是(及时响应). 12、用户进程从目态(常态)转换为管态(特态)的唯一途径是(中断). 13、实时系统应具有两个基本特征: 及时性和(可靠性). 14、实时系统应具有两个基本特征:(及时性)和可靠性. 15、用户程序通过(访管指令(或系统调用) )向操作系统提出各种资源要求和服务请求. 16、SPOOLing(同时的外部设备联机操作)技术是关于慢速字符设备如何与计算机主机交换信息 的一种典型的(虚拟设备)技术. 17、计算机操作系统是方便用户、管理和控制计算机(软硬件资源)的系统软件。 18、面对一般用户,通过(操作命令)方式控制操作系统;面对编程人员,通过(系统调 用)控制。 19、一个完整的计算机系统是由(硬件)和(软件)两大部分组成的。 20、操作系统是(控制和管理)计算机系统内部(各种硬件和软件资源)、有效地组织 多道程序运行的(系统软件(或程序集合)),是用户和计算机的(接口)。 21、操作系统的主要功能有:(存储器管理)、(处理机管理)、(设备管理)、 (文件管理)和(作业管理)。 22、操作系统是裸机之上的第(一)层软件,与硬件关系尤为密切。 23、操作系统是整个系统的控制管理中心,它既管理(硬件),又管理(软件)。 24、操作系统的基本特征是(并发)、(共享)和(异步(不确定性) )。 25、根据操作系统的功能、使用环境、配置规模等,操作系统一般可分为如下六种类型:(多 道批处理系统)、(分时系统)、(实时系统)、个人机系统、(网络操作系统)和(分布式操作系统)。 26、现代操作系统通常为用户提供三种使用界面,即(命令界面)、(图形界面)和(系

数据库考题及答案

Data Structures and Algorithms – MidTerm Exam 1. Let ‘I’ be “push”, ‘O’ be “pop” and ‘P’ be “print” directly. To convert the infix expression a+(b*c–d)/e to its postfix through a stack, the sequence of operations are PIIPIPOIPOOIPOO (For example: (a+b) is converted to ab+ by IPIPOO.) (5 points) 2. In a binary tree of N nodes, there are N+1 NULL pointers representing children. (2 points) 3. A sorting algorithm is stable if elements with equal keys are left in the same order as they occur in the input. Which of the following algorithms is/are stable? Answer: (a) (c) (8 points) (a) insertion sort; (b) quick sort; (c) merge sort; (d) heap sort 4. The following routine removes duplicates from an array-based list A[0] … A[N-1]. LastPosition is initially N-1. for ( i = 0; i < LastPosition; i ++ ) { j = i + 1; while ( j < LastPosition ) if ( A[i] == A[j] ) Delete(j); ++; j else } (a) What is the function of Delete? (3 points) Delete A[ j ] by shifting A[ j+1 ] … A[ LastPosition-1 ] to the left. LastPosition -- . (b) T worst( N ) = O( N2 ) . (2 points) (c) Using linked list implementation, T worst( N ) =O( N2 ) . (2 points) 5. Among the given trees, d has the same inorder and preorder traversal results, and b has the same postorder and inorder traversal results. (4 points) (a) (b) (c) (d) (e) 6. Show the result of inserting { 51, 25, 36, 88, 42, 52, 15, 96, 87, 30 } into (a) an initially empty binary search tree; (b) an initially empty AVL tree; (c) an initially empty 2-3 tree. (30 points)

操作系统选择题整理及答案

一 .操作系统概论 1.计算机操作系统的功能是(D ) A 把源程序代码转换为目标代码 B 实现计算机用户之间的相互交流 C 完成计算机硬件与软件之间的转换 D 控制、管理计算机系统的资源和程序的执行 2.操作系统是一组(C)。 A 文件管理程序 B 中断处理程序 C 资源管理程序 D 设备管理程序 3.操作系统的功能是进行处理机管理、(B )管理、设备管理、文件管理和作业管理等。 A 进程 B 存储器 C 硬件 D 软件 4. (D )指令是非特权指令。 A 启动I/O B 设置中断屏敝 C 传送PSW D trap 5.在(B )的控制下,计算机系统能及时处理由过程控制反馈的数据,并作出响应。 A 批处理操作系统 B 实时操作系统 C 分时操作系统 D 多处理机操作系统 6.操作系统为用户程序完成与(B )的工作。 A 硬件无关和应用无关 B 硬件相关和应用无关 C 硬件无关和应用相关 D 硬件相关和应用相关 7.分时操作系统的主要目的是(A)。 A 计算机系统的交互性 B 计算机系统的实时性 C 计算机系统的可靠性 D 提高软件的运行速度 8.在操作系统中,用户界面指的是(B )。 A 硬件接口、软件接口和操作环境 B 命令接口、程序接口和操作环境 C 硬件接口、命令接口和操作环境 D 硬件接口、命令接口和程序接口 9.特权指令(B )执行。 A 只能在目态下 B 只能在管态下

C 在目态或管态下均能 D 在目态或管态下均不能 10.下列管理功能中,(B )不属于操作系统的功能。 A 处理器管理 B 软件管理 C 作业管理 D 设备管理 11.以下描述与操作系统无关的是(C )。 A 方便用户的程序集合 B 控制和管理计算机系统的硬件和软件资源 C 计算机系统的硬件和软件资源的集合 D 合理地组织计算机工作流程 12.分时操作系统的特点是(A )。 A 交互性、同时性(多路性)、独立性、及时性 B 可靠性、交互性、独立性、及时性 C 可靠性、交互性、独立性、及时性 D 交互性、同时性(多路性)、独立性、动态性 13.下列各项中,(C )不是现代操作系统的主要特征。 A 并发性 B 共享性 C 确定性 D虚拟性 14.以下关于操作系统作用的叙述中,不正确的是(D )。 A 管理系统资源 B 控制程序执行 C 改善人机界面 D 提高用户软件运行速度 15.从用户的观点看,操作系统是(A )。 A 用户与计算机之间的接口 B 控制和管理计算机资源的软件 C 合理地组织计算机工作流程的软件 D 由若干层次的程序按一定的结构组成的有机体 16.(C )操作系统允许在一台主机上同时连接多台终端,多个用户可以通过各自的终端同时交互地使用计算机。 A 网络 B 分布式 C 分时 D 实时 17.若把操作系统看作计算机系统资源的管理者,下列的(D )不属于操作系统管理的资源。 A 程序 B 内存 C CPU D 中断

SQL数据库选择题及答案

1、在数据库技术中,独立于计算机系统的模型是 C 、E-R 模型 D 、层次模型 C 。 A 、面向对象的模型 B 、关系模型 2、数据库系统的控制中枢是 _B_。A 、数据库、b 、数据库管理系统 C 、数据库管理员 D 、 数据库应用系统 3、使用 SQL 命令将学生表 STUDENT 中的学生年龄 AGE 字段的值增加 1 岁,应该使用的 命令是 __C_。 C 、UPDATE STUDENT SET AGE = AGE + 1 D 、UPDAT E STUDENT AGE WITH AGE + 1 4、 在关系数据库中,建立数据库表时,将年龄字段值限制在 12?40岁之间的这种约束属于 __B__。 A 、 视图完整性约束 B 、域完整性约束 C 、参照完整性约束 D 、实体完整性约束 5、 在 SQL 语句中,与 X BETWEEN 20 AND 30 等价的表达式是 __D_。 A 、 X>=20 AND X<30 B 、 X>20 AND X<30 C 、 X>20 AN D X<=30 D 、 X>=20 AND X<=30 6、在数据库中,概念模型是 _D_。A 、用于现实的建模,与具体的 DBMS 有关B 、用于信 息世界的建模,与具体的 DBMS 有关 C 、用于现实的建模,与具体的 DBMS 无关D 、 用于信息世界的建模,与具体的 DBMS 无关 7、数据库的并发操作可能带来的问题包括 __B_。A 非法用户的使用B 丢失更新C 数据独立 性会提高 D 增加数据冗余度 8、在关系数据库中,模式对应的是 表 C 、基本表 D 、索引 9、能实现绝 对的与平台无关性的 C 、 WebbaseAPI D 、 JDBC C 、 SQL 不能嵌入到高级语言程序中 D 、 SQL 是一种 DBMS 11、数据库系统是 由__A_组成的。A 、数据库、数据库管理系统和用户 B 、数据文件、命令文件和报表 C 、数据库文件结构和数据 D 、常量、变量和函数 12、在SQL 查询时,使用 WHER E 子句指出的是 _B_。A 、查询目标B 、查询条件 C 、查 询视图D 、查 询结果 13、在下列RDMBS 产品中,属于小型数据库系统的是 D 、Informix A 、UPDAT E SET AGE WITH AGE + 1 B 、 REPLACE AGE WITH AGE +1 A ___ 。A 、视图和所有基本表 B 、视图和部分基本 Web 数据库访问技术是 _D_。 A 、 ADO B 、 ActiveX 10、在下列描述中,正确的描述是 __B 合操作方式 A 、 SQL 是一种过程化语言 B 、 SQL 采用集 _A_。A 、Access B 、Oracle C 、Sybase

计算机操作系统考试题题库及答案

计算机操作系统试题库与答案 一、选择题 1、热启动 DOS的方法是____C____键。 A、依次按下 CTRL+ALT+INS B、依次按下 CTRL+ALT+ESC C、同时按下 CTRL+ALT+DEL D、同时按下 CTRL+ALT+ESC 2、DOS 规定,主文件名由 1到_______个字符组成。 A、4 B、6 C、8 D、12 3、下列一个 DOS 的主文件名中,____C____是合法的。 A、&A.DBF B、@Z2 材 C、FILEL.WPS D、*.EZE1 4、DOS 中规定文件名是由____B____两部分组成的。 A、文件名+基本名 B、主文件名+ .扩展名 C、主文件名+扩展名 D、后缀+名称 5、MS-DOS 包括内部命令和外部命令, 外部命令以____A____存放在磁 A、文件方式 B、数据方式 C、系统方式 D、记录方式 6、当用户需使用某一文件时,在命令行中应指出文件的_____C____。 A、关键字 B、内容 C、盘符\路径\文件名 D、属性 7、DOS 的内部命令是在____D____时装入到内存的。 A、安装 B、执行用户程序 C、启动 D、执行系统程序 8、DOS 文件标识符一般格式为____D____。 A、[<路径>] <文件名> B、[<盘符>] <文件名> C、[<盘符>] <文件名> [<扩展名>] D、[<盘符>][<路径>]<文件名>[<.扩展名>] 9、DOS 命令中的"*"号可代替___A___个字符。 A、任意 B、1 C、3 D、8 10、设当前工作盘是 C 盘,存盘命令中没有指明盘符,则信息将存放于____B__。 A、内存 B、C 盘 C、A 盘 D、D 盘 11、在 DOS系统下,要编辑现有磁盘文件,则必须将文件读至____D____。 A、运算器 B、寄存器 C、控制器 D、内存储器 12、DOS 的含义是:____C___ A、数据库管理系统 B、实时操作系统 C、磁盘操作系统 D、汉字操作系统 13、可以对一张作了写保护的软盘进行操作的 DOS 命令是:___C____ A、DEL B、RD C、DIR D、REN 14、下列文件中,不是 DOS 可执行文件的是:____A___ A、TODAY.BAS B、TODAY.BAT C、https://www.doczj.com/doc/8913716174.html, D、WPS.EXE 15、在 DOS命令中可用的通配符是:___B____ A、*和/ B、*和? C、?和/ D、\和. 16、表示当前工作目录的父目录的符号是:_______ A、. B、..\.. C、\ D、.. 17、要分屏显示 C 盘当前目录下的文件目录的全部信息,正确的命令是:____C___ A、TYPE C: /P B、DIR C:\ /P C、DIR C: /P D、LIST C:/P 18、删除指定子目录的 DOS 命令是:___A__ A、RD B、ERASE C、DEL D、RM

四川大学期末考试试题(A卷).doc

四川大学期末考试试题(A卷) (2013——2014 学年第一学期) 课程号:303066030课序号:课程名称:计算机基础及C程序设计语言 任课教师:刘亚梅刘洋任瑞玲曾晓东余勤罗伟王茂宁王忠邓丽华成绩: 适用专业年级:2012级学生人数:印题份数:学号:姓名: 考试须知 四川大学学生参加由学校组织或由学校承办的各级各类考试,必须严格执行《四川大学考试工作管理办法》和《四川大学考场规则》。有考试违纪作弊行为的,一律按照《四川大学学生考试违纪作弊处罚条例》进行处理。 四川大学各级各类考试的监考人员,必须严格执行《四川大学考试工作管理办法》、《四川大学考场规则》和《四川大学监考人员职责》。有违反学校有关规定的,严格按照《四川大学教学事故认定及处理办法》进行处理。 一、单项选择题(每题1.5分,共45分)(注:本题及以下各题均以VC++6.0为软件编程平台) 1.一个C程序总是从_______开始执行的。 A)main函数B)程序的第一行 C)程序的第一个函数D)不固定位置 2.以下对C语言的描述正确的是。 A)函数允许嵌套定义B)编译时不检查语法 C)用户所定义的标识符必须以字母开头D)转义字符以“\”开头 3.下列C语言中运算对象必须是整型的运算符是。 A) %= B) && C) = D) *= 4.若有以下程序段:int c1, c2=3, c3=2; c1=(float)c2/c3;则执行后,c1、c2的值分别是。 A)0,3.0 B) 1,3.0 C) 0,3 D) 1,3 5.下列变量定义中合法的是。 A)short_a=0xda; B)double b=1+5e2.5; C)int a=‘A’; D)float 2_and=1-e-3; 6.若变量已正确定义并赋值,符合C语言语法的表达式是。 A)++(a+1) B)a=7+b/c=a++ C)a=a+7=c+b D)a=’\0’ 7.设int a=1,b=2,c=3,m=4,n=5,p=3;,则执行表达式(a=m10);,则a和b的值分别是。 A)10和1 B)10和0 C)11和0 D)11和1 11.以下4个选项中,不能 ..看作一条语句的是。 A)if (b= =0) m=1;n=2; B)a=0,b=0,c=0; C)if (b==0){m=1;n=2;} D)if (a>0); 注:1试题字迹务必清晰,书写工整。本题8 页,本页为第 1 页

操作系统复习题选择和填空 带答案

精品文档 第一章绪论复习题 1、操作系统有多种类型,允许多个用户将若干个作业提交给计算机集中处理的 操作系统,称为__A___。 A.批处理操作系统 B.分时操作系统 C.实时操作系统 D.多处理机操作系统 2、????C?????操作系统允许用户把若干个作业提交给计算机系统。 A、单用户 B、分布式 C、批处理 D、监督 3、以下4个特征中,????C???不是分时OS的特征。 A、多路性 B、交互性 C、及时响应性 D、批量性 4、操作系统有多种类型,允许多个用户以交互方式使用计算机的操作系统,称 为______B_。 A.批处理操作系统 B.分时操作系统 C.实时操作系统 D.多处理机操作系统 5、一个完整的计算机系统是由___C _组成的。 A、硬件 B.软件 C. 硬件和软件 D.用户程序 6、操作系统是一种____B__,它负责为用户和用户程序完成所有与硬件相关并与应用无关的工作。 A.应用软件 B.系统软件 C.通用软件 D.软件包 7、把处理机的时间分成很短的时间片(如几百毫秒),并把这些时间片轮流地分配给各联机作业使用的技术称为_________A_。 A. 分时技术 B. 实时技术 C. 批处理技术 D. 多道程序设计技术 8、实时操作系统追求的目标是 C 。 A.高吞吐率 B.充分利用内存 C.快速响应 D.减少系统开销 9、分时操作系统通常采用???????B?????策略为用户服务。 A、可靠性和灵活性 B、时间片轮转 C、时间片加权分配 D、短作业优先 10、操作系统是对?????C??????进行管理的软件。 A、软件 B、硬件 C、计算机资源 D、应用程序 11、现代操作系统的主要目标是___提高资源利用率和___方便用户_ 。 12、操作系统的基本类型主要有___分时系统(或分时操作系统)、实时系统(或实时操作系统)和_批处理系统(或批处理操作系统)。 13、操作系统五个功能是:处理机管理、存储器管理、设备管理、以及文件管理和为用户提供操作接口。 14、操作系统的基本特征是___并发____,__共享___,___虚拟___ 和__异步___。 15、操作系统一般为用户提供了三种界面,它们是______命令界面____,__图形界面___和___系统调用界面__。 第二章进程管理复习题 1、并发性是指若干事件在 B 发生。 A.同一时刻 B.同一时间间隔内 C.不同时刻 D.不同时间间隔内 2、进程和程序的本质区别是 D 。 A.存储在内存和外存 B.顺序和非顺序执行机器指令 C.分时使用和独占使用计算机资源 D.动态和静态特征 3、进程从运行状态进入就绪状态的原因可能是 D 。 A.被选中占有处理机 B.等待某一事件 C.等待的事件已发生 D.时间片用完

SQL数据库选择题及答案

1、在数据库技术中,独立于计算机系统的模型是_C__。A、面向对象的模型B、关系模型C、E-R模型D、层次模型 2、数据库系统的控制中枢是__B_。A、数据库、b、数据库管理系统 C、数据库管理员 D、数据库应用系统 3、使用SQL命令将学生表STUDENT中的学生年龄AGE字段的值增加1岁,应该使用的命令是__C_。 A、UPDATE SET AGE WITH AGE+1 B、REPLACE AGE WITH AGE+1 C、UPDATE STUDENT SET AGE=AGE+1 D、UPDATE STUDENT AGE WITH AGE+1 4、在关系数据库中,建立数据库表时,将年龄字段值限制在12~40岁之间的这种约束属于__B__。 A、视图完整性约束 B、域完整性约束 C、参照完整性约束 D、实体完整性约束 5、在SQL 语句中,与X BETWEEN 20 AND 30 等价的表达式是

__D_。A、X>=20 AND X<30 B、X>20 AND X<30 C、X>20 AND X<=30 D、X>=20 AND X<=30 6、在数据库中,概念模型是_D__。A、用于现实的建模,与具体的DBMS有关B、用于信息世界的建模,与具体的DBMS有关C、用于现实的建模,与具体的DBMS无关D、用于信息世界的建模,与具体的DBMS无关 7、数据库的并发操作可能带来的问题包括__B_。A非法用户的使用B丢失更新C数据独立性会提高D增加数据冗余度 8、在关系数据库中,模式对应的是__A___。A、视图和所有基本表B、视图和部分基本表C、基本表D、索引 9、能实现绝对的与平台无关性的Web数据库访问技术是_D_。A、ADO B、ActiveX C、WebbaseAPI D、JDBC 10、在下列描述中,正确的描述是__B___。A、SQL 是一种过程化语言B、SQL 采用集合操作方式

计算机操作系统期末考试题及答案

2016学年度计算机操作系统期末考试题及答案 一、单项选择题(每题1分,共20分) 1。操作系统得发展过程就是(C) A、原始操作系统,管理程序,操作系统 B、原始操作系统,操作系统,管理程序C、管理程序,原始操作系统,操作系统D、管理程序,操作系统,原始操作系统 2.用户程序中得输入、输出操作实际上就是由( B)完成。 A、程序设计语言 B、操作系统C、编译系统D、标准库程序 3.进程调度得对象与任务分别就是( C ). A、作业,从就绪队列中按一定得调度策略选择一个进程占用CPU B、进程,从后备作业队列中按调度策略选择一个作业占用CPU C、进程,从就绪队列中按一定得调度策略选择一个进程占用CPU D、作业,从后备作业队列中调度策略选择一个作业占用CPU 4.支持程序浮动得地址转换机制就是( A) A、动态重定位B、段式地址转换C、页式地址转换D、静态重定位 5。在可变分区存储管理中,最优适应分配算法要求对空闲区表项按( C )进行排列。A、地址从大到小B、地址从小到大C、尺寸从小到大D、尺寸从大到小 6.设计批处理多道系统时,首先要考虑得就是(B)。 A、灵活性与可适应性B、系统效率与吞吐量C、交互性与响应时间D、实时性与可靠性 7。当进程因时间片用完而让出处理机时,该进程应转变为(B)状态。 A、等待 B、就绪C、运行D、完成 8。文件得保密就是指防止文件被(C)。 A、篡改 B、破坏 C、窃取 D、删除 9.若系统中有五个并发进程涉及某个相同得变量A,则变量A得相关临界区就是由( D)临界区构成。 A、2个 B、3个 C、4个D、5个 10.按逻辑结构划分,文件主要有两类:(A)与流式文件。 A、记录式文件B、网状文件C、索引文件D、流式文件 11.UNIX中得文件系统采用(D)。 A、网状文件B、记录式文件C、索引文件D、流式文件 12.文件系统得主要目得就是(A )。 A、实现对文件得按名存取B、实现虚拟存贮器C、提高外围设备得输入输出速度D、用于存贮系统文档 13.文件系统中用(D )管理文件. A、堆栈结构B、指针C、页表D、目录 14。为了允许不同用户得文件具有相同得文件名,通常在文件系统中采用( B)。A、重名翻译B、多级目录C、约定D、文件名 15.在多进程得并发系统中,肯定不会因竞争(C)而产生死锁。 A、打印机 B、磁带机C、CPU D、磁盘 16.一种既有利于短小作业又兼顾到长作业得作业调度算法就是( C )。 A、先来先服务 B、轮转 C、最高响应比优先 D、均衡调度 17.两个进程合作完成一个任务.在并发执行中,一个进程要等待其合作伙伴发来消息,或者建立某个条件后再向前执行,这种制约性合作关系被称为进程得

操作系统试题库简答题

1、什么是操作系统?它有什么基本特征? 操作系统是控制和管理计算机系统内各种硬件和软件资源、有效地组织多道程序运行的系统软件(或程序集合),是用户与计算机之间的接口。 操作系统的基本特征是:并发、共享和异步性。 2、操作系统的含义及其功能是什么? 1)、含义:OS是一组系统软件,它是软硬件资源的控制中心,它以尽量合理有效的方法组织多个用户共享计算机的各种资源。 2)功能:管理计算机的软硬件资源(包括:处理机管理,作业管理,存储管理,设备管理,文件管理)、提高资源的利用率、方便用户。 3、叙述操作系统的含义及其功能,并从资源管理角度简述操作系统通常由哪几部分功能模 块构成,以及各模块的主要任务。 答: 1)、OS是一个系统软件,是控制和管理计算机系统硬件和软件资源,有效、合理地组 织计算机工作流程以及方便用户使用计算机系统的程序集合。 2)功能:管理计算机的软硬件资源、提高资源的利用率、方便用户。 3)组成模块: (1)、处理机管理(或进程管理):对CPU的管理、调度和控制。 (2)、存储管理:管理主存的分配、使用和释放。 (3)、设备管理:管理设备的分配、使用、回收以及I/O控制。 (4)、文件管理:管理外存上文件的组织、存取、共享和保护等。 (5)、作业管理:对作业的管理及调度。(或用户接口,使用户方便的使用计算机) 4、什么是中断向量?什么是多级中断?中断处理的过程一般有哪几步? (1)、中断向量:存放中断处理程序入口地址的内存单元称为中断向量。 (2)、多级中断:为了便于对同时产生的多个中断按优先次序来处理,所以在设计硬件时,对各种中断规定了高低不同的响应级别。优先权相同的放在一级。 (3)、中断处理步骤:响应中断,保存现场;分析中断原因,进入中断处理程序;处理中断;恢复现场,退出中断。 5、什么是多道程序设计技术 多道程序设计技术就是在系统(内存)中同时存放并运行多道相互独立的程序(作业),主机以交替的方式同时处理多道程序。它是一种宏观上并行,微观上串行的运行方式。 6、分时系统和实时系统有什么不同? 答:分时系统通用性强,交互性强,及时响应性要求一般(通常数量级为秒);实时系统往往是专用的,系统与应用很难分离,常常紧密结合在一起,实时系统并不强调资源利用率,而更关心及时响应性(通常数量级为毫秒或微秒)、可靠性等。

操作系统题库答案

第一部分引言 一、选择题 1、下列选择中,哪些不是操作系统关心的主要问题。(浙大2003) (1)管理计算机裸机;(2)设计提供用户与计算机硬件系统间的界面; (3)管理计算机系统资源;(4)高级程序设计语言的编译器。 2、从用户角度看,操作系统是()。 A、计算机资源的管理者; B、计算机工作流程的组织者; C、用户与计算机之间的接口; D、由按层次结构组成的软件模块的集合。 3、引入多道程序技术的前提条件之一是系统具有()(西电00) (1)多个cpu;(2)多个终端;(3)中断功能;(4)分时功能 4、操作系统是一种。 A.系统软件 B.系统硬件 C.应用软件 D.支援软件 5、操作系统允许一台主机上同时连接多台终端,多个用户可以通过各自的终端同时交互地使用计算机。 A.实时 B.分时 C.分布式 D.单用户 6、如果操作系统具有很强的交互性,可同时供多个用户使用,但时间响应不太及时,则属于分时操作系统类型;如果操作系统可靠,时间响应及时但仅有简单的交互能力则属于实时操作系统类型。 二、判断题 1、所谓多道程序设计,即指每一时刻有若干个进程在执行。(错)(南京大学00) 2、采用多道程序设计的系统中,系统的程序道数越多,系统效率越高。(错)(西电01) 3、由于采用了分时技术,用户可以独占计算机的资源。(错) 4、多道程序设计是利用了CPU和通道的并行工作来提高系统利用率的。(错) 5、多道程序设计可以缩短系统中作业的执行时间。(错) 6、在一个兼顾分时操作系统和批处理系统中,通常把终端作业称为前台作业,而把批处理型作业称为后台作业。(错)

7、批处理系统不允许用户随时干预自己程序的运行。(对) 8、Windows操作系统完全继承了分时系统的特点。(对) 9、并发是并行的不同表述,其原理相同。(错)(清华1998) 10、在单处理机系统中实现并发技术后,判断: (1)各进程在某一时刻并行运行,cpu与外设间并行工作;(错) (2)各进程在一个时间段内并行运行,cpu与外设间串行工作;(错) (3)各进程在一个时间段内并行运行,cpu与外设间并行工作。(对)(四川大学01) 11、在单CPU环境下,不宜使用多道程序设计技术。(错) 12、并发性是指若干事件在同一时刻发生。(错) 13、实时操作系统通常采用抢占式调度。(对) 14、UNIX操作系统是著名的()系统。 A.分时 B.多道批处理 C.实时 D.分布式 15、允许在一台主机上同时连接多台终端,多个用户可以通过各自的终端同时交互地使用计算机的操作系统是()操作系统。 A. 网络 B. 分布式 C. 分时 D. 实时 三、计算题 1、若程序A和B单独执行时分别用TA和TB,TA=1h,TB=1.5h,其中处理器工作时间分别为TA=18min,TB=27min。如果采用多道程序设计方法,让A,B并行工作,假定处理器利用率达到50%,另加15min系统开销,请问系统效率提高百分之几? 解: (18+27)/0.5=90 ((60+90)-(90+15))/(60+90)=0.3 0.3*100%=30% 2、在操作系统中引入并发可以提高系统效率,若有两个程序A和B,A程序执行时所做的工作按次序需要用cpu:10s,设备1:5s,cpu:5s,设备2:10s,cpu:10s;程序B执行时所做的工作按次序需要用设备1:10s,cpu:10s,设备2:5s,cpu:5s,设备2:10s。如果在顺序环境下执行两个程序,则cpu的利用率为();如果在并发环境下执行两个程序,则cpu的利用率为()。 3、设某计算机系统有一个cpu、一台输入设备、一台打印机。现有两个进程同时进入就绪

《操作系统》选择题大全

第1章绪论 3、操作系统负责管理计算机系统的(),其中包括处理机、存储器、设备和文件。 A.程序 B.文件 C.资源 D.进程 4、没有下列()设备计算机无法工作。 A.硬盘 B.软盘 C.内存 D.打印机 5、操作系统是计算机系统的核心软件。按功能特征的不同,可把操作系统分为[1]、[2]、[3]、网络操作系统 和分布式操作系统基本类型。其中[1]的主要目标是提高系统的吞吐率和效率,而[2]是一旦有处理请求和要求处理的数据时,CPU就应该立即处理该数据并将结果及时送回,例如[4]等。供选择的答案: [1][2][3] A、单用户系统 B、批处理系统 C、分时系统 D、微机操作系统 E、实时系统 [4] A、计算机激光照排系统 B、办公自动化系统 C、计算机辅助设计系统 D、航空订票系统 6、操作系统是一种()。 A.应用软件 B. 系统软件 C.通用软件 D. 工具软件 7、在下列性质中,哪一个不是分时系统的特征。() A. 交互性 B. 多路性 C. 成批性 D. 独占性 8、实时操作系统追求的目标是()。 A.高吞吐率 B.充分利用内存 C. 快速响应 D. 减少系统开销 9、操作系统是为了提高计算机的[1]和方便用户使用计算机而配置的基本软件。它负责管理计算机系统中的 [2],其中包括[3],[4],外部设备和系统中的数据。操作系统中的[3]管理部分负责对进程进行管理。操 作系统对系统中的文件进行管理的部分通常叫做[5]。 供选择的答案: [1] A、速度 B、利用率 C、灵活性 D、兼容性 [2] A、程序 B、功能 C、资源 D、进程 [3][4] A、主存储器 B、虚拟存储器 C、运算器 D、控制器 E、微处理器 F、处理机 [5] A、数据库系统 B、文件系统 C、检索系统 D、数据库 E、数据存储系统 F、数据结构 G、数据库管理系统 10、现代操作系统的两个基本特征是()和资源共享。 A.多道程序设计 B. 中断处理 C.程序的并发执行 D. 实现分时与实时处理 11、以下()项功能不是操作系统具备的主要功能。 A.内存管理 B.中断处理 C.文档编辑 D.CPU调度 12、批处理系统的主要缺点是()。 A.CPU的利用率不高 B.失去了交互性 C.不具备并行性 D.以上都不是 13、引入多道程序的目的在于()。 A.充分利用CPU,减少CPU等待时间 B. 提高实时响应速度 C.有利于代码共享,减少主、辅存信息交换量 D.充分利用存储器 14、DOS是磁盘操作系统的缩写。 15、在分时系统中,时间片一定,(),响应时间越长。 A.内存越多 B.用户数越多 C.后备队列 D.用户数越少 16、操作系统是一组()。 A.文件管理程序 B.中断处理程序 C.资源管理程序 D.设备管理程序

数据库期末考试试题及答案

一、选择题(每题1分,共20分) 1.在数据管理技术的发展过程中,经历了人工管理阶段、文件系统阶段和数据库系统阶段。在这几个阶段中,数据独立性最高的是( A )阶段。 A. 数据库系统 B. 文件系统 C. 人工管理 D.数据项管理 2.数据库三级视图,反映了三种不同角度看待数据库的观点,用户眼中的数据库称为(D)。 A. 存储视图 B. 概念视图 C. 内部视图 D. 外部视图 3.数据库的概念模型独立于(A)。 A.具体的机器和DBMS B. E-R图 C. 信息世界 D. 现实世界 4.数据库中,数据的物理独立性是指(C)。 A. 数据库与数据库管理系统的相互独立 B. 用户程序与DBMS的相互独立 C. 用户的应用程序与存储在磁盘上的数据库中的数据是相互独立的 D. 应用程序与数据库中数据的逻辑结构相互独立 5.关系模式的任何属性(A)。 A. 不可再分 B. 可再分 C. 命名在该关系模式中可以不惟一 D.以上都不是 6.下面的两个关系中,职工号和设备号分别为职工关系和设备关系的关键字: 职工(职工号,职工名,部门号,职务,工资) 设备(设备号,职工号,设备名,数量) 两个关系的属性中,存在一个外关键字为( C )。 A. 职工关系的“职工号” B. 职工关系的“设备号” C. 设备关系的“职工号” D. 设备关系的“设备号” 7.以下四个叙述中,哪一个不是对关系模式进行规X化的主要目的( C )。 A. 减少数据冗余 B. 解决更新异常问题 C. 加快查询速度 D. 提高存储空间效率 8.关系模式中各级X式之间的关系为( A )。 A. B. C. D. 9.保护数据库,防止未经授权或不合法的使用造成的数据泄漏、非法更改或破坏。这是指数据的( A )。 A. 安全性 B.完整性 C.并发控制 D.恢复 10.事务的原子性是指( B )。 A. 事务一旦提交,对数据库的改变是永久的 B. 事务中包括的所有操作要么都做,要么都不做 C. 一个事务内部的操作及使用的数据对并发的其他事务是隔离的 D. 事务必须使数据库从一个一致性状态变到另一个一致性状态 11.下列哪些运算是关系代数的基本运算( D )。 A. 交、并、差 B. 投影、选取、除、联结 C. 联结、自然联结、笛卡尔乘积 D. 投影、选取、笛卡尔乘积、差运算

相关主题
文本预览
相关文档 最新文档