boolean type
B. turing machine
C. von neumann
D, Shannon
Answer: d
2, although the computing discipline has become a widely used discipline, but its fundamental problem is still can't do, can't do the problem refers to ().
A, what problems can be dealt with in order.
B. Any problem can be handled in parallel.
C. Any problem can be handled automatically and effectively.
D. Any problem can be handled intelligently.
Answer: c
3, the following () does not belong to the core technology of information technology.
First, computer technology
B, operation technology
C, microelectronics technology
D, modern communication technology
Answer: b
Information technology is an extension of human organs. In this sense, sensing technology can be considered as an extension of the human body.
First, the thinking organs
B, nerve organs
C, effective organs
D, sensory organs
Answer: d
5, assuming that a computer passed the Turing test, then ().
First, it shows that computers can eventually replace the human brain.
B Turing test is the only criterion to judge intelligence.
C, you can be sure that this computer has real intelligence.
D, I'm not sure this computer has real intelligence.
Answer: d
6, the following narrative about the history of computer development, the error is ().
The first computer in the world was invented by American ENIAC.
B, ENIAC is not a computer controlled by a stored program.
C, ENIAC was invented in 1946, so the world began the computer age from 1946.
D, the world's first computer controlled by stored programs is EDSAC designed and manufactured by the British.
Answer: c
7, the second generation of computer logic components using ().
First, the electron tube
B. transistor
C, small and medium-sized integrated circuits
D, large-scale or ultra-large-scale integrated circuits
Answer: b
8, the following performance indicators about the computer, the index that affects the running speed of the computer is ().
A. main frequency, word length, access period and storage capacity
B. Main frequency, word length, memory capacity and compatibility
C. Main frequency, word length, memory capacity and external memory capacity
D. Main frequency, memory capacity, compatibility and mean time between failures.
A: A.
9, the following discussion about "electronic computer characteristics", the error is ().
First, the operation speed is fast.
B, the operation accuracy is high
C, have memory and logical judgment ability
D, the operation process needs manual intervention.
Answer: d
10, the computer system includes ().
I. Host and External Devices
B, hardware system and system software
C, hardware system and software system
D, system software and application software
Answer: c
1 1, decimal number 0.6875 is converted into binary number, and the correct one is ().
a、0. 1 1 1l
b、0. 1 10 1
c、0. 10 1l
d、0.0 1 1 1
Answer: c
12. If the word length of a computer is 32 bits, it means it ().
A the maximum number that can be processed is 32 decimal digits.
B, the maximum result of running in CPU is 2 to the 32nd power.
Can handle up to 32 English letters.
D. The data transmitted and processed by the CPU as a whole is 4 bytes.
Answer: d
13, the standard ASCII code includes () other characters and control characters * * * besides alphanumeric characters.
A: 64
65 years old
c、66
d、67
Answer: c
14, in scientific calculation, we often encounter "overflow", which means ().
The computer is out of order.
B, the value is beyond the memory range.
C, the value is beyond the range of variable representation.
D, which is beyond the range indicated by the machine bit.
Answer: d
15, people usually use hexadecimal instead of binary to write the numbers in the computer, because ().
First, hexadecimal writing is more convenient than binary.
B, hexadecimal operation rules are simpler than binary.
C. The expression range of hexadecimal number is larger than that of binary number.
D, the computer uses hexadecimal.
A: A.
16, microprocessor is mainly composed of ().
I. Bus and Memory
B, arithmetic unit and controller
C, clock and arithmetic unit
D, controller and memory
Answer: b
17, the cache is configured to solve ().
A, the speed of the host and peripheral does not match.
B, CPU and memory speed mismatch
C, the speed of CPU and auxiliary memory does not match.
D. The speeds of memory and auxiliary memory do not match.
Answer: b
18 has a memory of 32KB, and its address is coded in hexadecimal, so the number can range from 0000H to ().
a、32767H
7FFFH
C, 8000 hours
Eighth week
Answer: b
19, of the following statements, the correct one is ().
A, the information in the hard disk can be directly processed by the CPU.
B, the information in the floppy disk can be directly processed by CPU.
Only the information in the memory can be directly processed by the CPU.
D all the above statements are correct.
Answer: c
20, the main purpose of the CMOS chip on the motherboard is ().
First, increase the capacity of memory
Manage the communication between memory and CPU.
C. store time, date, hard disk parameters and computer configuration information.
D, storing basic input and output system programs, boot programs and self-checking programs.
Answer: c
2 1, the following computer can directly execute the program is ().
First, the source program
B, machine language program
C, high-level language program
D, assembly language program
Answer: b
22, the following () is the main stage of computer programming language.
1. Machine language, BASIC language and C language
B, machine language, assembly language and C++ language
Machine language, assembly language and high-level language.
D, binary code language, machine language and FORTRAN language
Answer: c
23, the following software belongs to the system software is ().
A, personnel management software
B, salary management software
C and c language compilers
d、Word XP
Answer: c
24, digital camera is connected to the computer through the () interface.
I. Serialization
B, parallel
c、USB
d、SCSI
Answer: c
25, () is called a complete computer software.
I. Procedures available to all
B, all kinds of available programs
C, all instructions that the CPU can execute.
D, procedures, data and related documents
Answer: d
26, China first computer software as intellectual property rights into the national legal protection regulations is ().
A. Copyright Law of People's Republic of China (PRC)
B. computer software protection regulations
C. Regulations on the Implementation of Copyright in People's Republic of China (PRC)
D. Measures for the administration of computer software products
A: A.
27, anti-virus programs can ().
A, to prevent the invasion of all computer viruses
Check and remove all known computer viruses.
Check and remove most known computer viruses.
Repair all data destroyed by computer virus.
Answer: c
28, the computer virus is ().
First, write a computer program with errors
A poorly designed computer program
A computer program that has been destroyed.
A program whose purpose is to affect the function of a computer.
Answer: d
29, the following methods to prevent computer viruses is invalid ().
Minimize the use of computers.
B. Do not illegally copy and use this software.
It is forbidden to use floppy disks without virus detection.
Regularly carry out virus detection on computers with anti-virus software.
A: A.
30, the following narrative about computer viruses, the error is ().
Computer virus is contagious, destructive and latent.
A computer virus will destroy the computer monitor.
A computer virus is a program.
Anti-virus software can remove well-known computer viruses.
Answer: b
3 1, operating system is a kind of system software to control and manage ().
A. Applications
B, all hardware resources
C, all software resources
D, all computer resources
Answer: d
32, Windows XP is a multitasking operating system, which means ().
First, it can be used by multiple users at the same time.
B, running multiple applications in the same time slice.
C, you can run various applications.
D, can manage a variety of resources at the same time
Answer: b
33, the following description about the operating system, is not correct ().
First, the operating system is the most basic system software.
The interface between the operating system and the user must be a graphical interface.
C, the user program must be supported by the operating system to run.
D, the operating system runs directly on bare metal, which is the first expansion of computer hardware.
Answer: b
34, in Windows XP, minimize the window to run the program, and then the program ().
A. Suspension of execution
B. termination of execution
C, still continue to run in the foreground.
D. Go to the background and continue running.
Answer: d
35, in Windows XP, the characteristic of the operation is ().
A, first select the operation object, and then select the operation command.
B, first select the operation command, and then select the operation object.
C, operation object and operation command should be selected at the same time.
D, depending on the specific situation.
A: A.
36. The following files with extension () appear in memory in the form of ASC code and Chinese character built-in code.
a、EXE
b、TXT
c、COM
doctor
Answer: b
37.Windows XP manages and uses disk information in units of ().
A. Documentation
B, CD
C, byte
D, command
A: A.
38, Windows XP operating system stipulated that the file name can't contain symbol set is ().
a 、/ : *? # & lt& gt$
b 、/ *? # & lt& gt$
c 、/ : *? “& lt& gt| @
d 、\ / : *? “& lt& gt|
Answer: d
39. In Windows XP, use the icon () created by Create Shortcut.
First, it can only be a single file
It can be any file or folder.
C. Only programs or program groups can be executed.
D, only program files or document files.
Answer: b
40. There is a shortcut icon of the document on the desktop of Windows XP. The following statement is wrong ().
Deleting the shortcut icon will also delete the document.
B, double-click the shortcut icon to run the associated application before opening the document.
If the path of the document is changed, you can still open the document by double-clicking the shortcut.
D. If you copy shortcut icons to a folder, double-click these icons to open the document.
Answer: c
4 1, for Windows XP, the following statement is correct ().
The recycle bin, like the clipboard, is an area in memory.
Only the currently active window can be moved and resized.
Once the screen saver starts, the active window on the screen will close.
The d icon on the desktop cannot be rearranged according to the user's wishes.
Answer: b
42. "OLE technology" in Windows XP refers to (), which can realize information transmission and * * * sharing among multiple files.
I. Object Link
B, object embedding
C, object linking and embedding
D, object pasting
Answer: c
43, copy the picture of the current window to the clipboard, you can press the () key.
A, Alt+ print screen
B, print the screen
C, Shift+ print screen
D, Ctrl+ print screen
A: A.
44. The control panel can't ().
First, change the screen color
B, cancel the current registered user
C. change CMOS settings.
Adjust the mouse speed
Answer: c
45, the following description about the user account, is not correct ().
A. To use a computer running WindowsXP, users must have their own accounts.
You can log on to the computer as any member and create a new user account.
C you can create a new user by using "users and passwords" in the control panel.
D after a user is added to a group, all the permissions that can be assigned to the group will be granted to the user.
Answer: b
46, the following does not belong to the Word XP find and replace function is ().
First, be able to find and replace formatted text
B. Wildcards can be used for quick and complicated search and replacement.
C, can find graphic objects.
D. You can find and replace the format in the text.
Answer: c
47. In Word XP, () can be displayed in normal view.
I. Header and Footer
B. section break
C, graphic objects
D. form
Answer: d
48. Use the "ellipse" tool on the drawing toolbar of Word XP, press the () key and drag the mouse to draw a circle.
I. Transfer
b、Ctrl
C, Alt
D, tabulation
A: A.
49. Use the "fuzzy search" function provided by Word XP to find a Chinese character scattered in front of "color" in the document. You can enter () in the Find What text box.
A, * color
B, is it? colour
C, is it? Color, and select the Use Wildcards option under the Advanced tab.
D, is it? Color, and select the "Full Word Match" option under the "Advanced" tab.
Answer: c
50. In Office XP, the graphical object ().
First, can't put it on the table.
B, it can only be put in the chart.
C, cannot be combined into one object.
D, it can be placed anywhere you edit the file.
Answer: d
5 1. You can't edit the contents of slides in PowerPoint XP (), but you can add, move, delete and copy slides.
First, the normal view
B, slide browsing view
C, outline view
D, slide show view
Answer: b
52, about PowerPoint XP chart design narrative, the error is ().
A use the insert/chart menu command to add a chart to the slide.
B, double-click the chart placeholder in the slide to add the chart to the slide.
C once the chart is generated, it cannot be set in various ways.
D, the sample chart will change according to the data changes in the sample data table.
Answer: c
53. In PowerPoint XP presentation, the target of the link in the inserted hyperlink cannot be ().
A. documentation for other applications
B, slides of the same presentation
C, an object in the slide
D, another demonstration
Answer: c
54. The file extension of PowerPoint XP is ().
a、txt
b、xls
c、ppt
doctor
Answer: c
55. () refers to the object in the source document is copied to the target document, and keep the direct connection with the source document. If the information in the source document changes, the information in the target document will be automatically updated.
First, paste
B. Links
C. import
D. export
Answer: b
56, according to CCITT's definition of media, audio coding belongs to ().
First, feel the media
B. On behalf of the media
C, show the media
D, storage medium
Answer: b
57, () is not the main feature of multimedia technology.
A. Diversity
B. integration
C, interactivity
D. general
Answer: d
58, () is a read-write optical disk drive.
CD
CD writer
c、CD-RW
Optical disc, DVD-ROM
Answer: c
59, the following () is a multimedia material production tool.
I. Authorware
director
c、Visual BASIC
d、Photoshop
Answer: d
60. The following () are the main components of a digital camera.
A: Digital signal processor
LCD
C, charge coupled device
D, optical character recognition
Answer: c
6 1, audio sampling is to intercept the analog sound wave at a certain interval (), so that the analog signal becomes a discrete signal.
I. Time
B, space
C, frequency
D. amplitude
A: A.
62. Except (), the following are all video file formats.
A: AVI
b、DAT
c、WAV
d、MPG
Answer: c
63, the sampling frequency is 22.05KHz, 16-bit quantized two-channel stereo, and its data volume per minute is about ().
a、4 1KB
82KB
2.5 megabytes
d、5MB
Answer: d
64, the following description about CMYK color space, the error is ().
A and k stand for black, which is used to replace the impure black obtained by mixing CMY.
B, CMYK and RGB color spaces cannot be converted to each other.
C, CMYK color space is also called subtractive color system.
D, C, M and Y represent cyan, magenta and yellow respectively.
Answer: b
65, the following waveform audio quality is the best ().
Mono, 16, 44. 1KHz
B, dual channel, 16 bit, 22.05KHz
C, two channels, 8 bits, 44. 1KHz
D, dual channel, 16 bit, 44. 1KHz
Answer: d
66, about the description of graphics and images, the error is ().
A, graphics are also called vector maps, and images are also called bitmaps.
B. Because the graphic file is smaller than the image file, the displayed image is slower than the displayed graphic.
C, the image can realistically reproduce the natural scenery.
D, graphic data is more accurate and effective than image data, and it is easier to move, scale and rotate.
Answer: b
67, the following except (), the others are image file formats.
A: MOV
b、GIF
Bone morphogenetic protein
JPG
A: A.
68, lossy compression is not used for () data compression.
A. Text
sound
C, images
D, video
A: A.
69. An 8: 8 RGB color image with a resolution of 1280×960 has a storage capacity of about ().
A, 2.34 megabytes
3.5 megabytes
c、 10.5MB
d、 1.2MB
Answer: b
70. The sampling of the pattern is based on (), and the result is to convert the analog image into a discrete tiny rectangular area.
I. Time
B, the plane
C, frequency
D. amplitude
Answer: b
7 1, about the role and limitations of the firewall, the mistake is ().
A a firewall can restrict external access to the internal network.
B, the firewall can effectively record the access activities on the network.
C, the firewall can prevent attacks from the inside.
D, firewall will reduce network performance.
Answer: c
72. The computer network connected in the same office building is ().
A. Internet
B. local area network
C. metropolitan area network
D. wide area network
Answer: b
73, the following () does not belong to the three major security brought by digital signature technology.
I. Integrity of information
B. source confirmation
undeniable
D. confidentiality of transmitted information
Answer: d
74, computer network consists of resource subnet and communication subnet, resource subnet is responsible for ().
I. Information transmission
B, data processing
C, information processing
D, data conversion
Answer: c
75, from the perspective of the structure of computer network, computer network is mainly composed of ().
First, wireless networks and wired networks
B, switching network and packet network
C, data network and optical fiber network
D. Resource subnet and communication subnet
Answer: d
76, the following equipment in the network interconnection, can realize the physical layer interconnection, with signal regeneration and amplification function is ().
A. Repeater
B. Router
C. doors
D. bridges
A: A.
77, the following does not belong to the seven OSI reference model is ().
First, the conversation layer
B, data link layer
C, user layer
D, application layer
Answer: c
78. Fast Ethernet supports 100 Base-TX physical layer standard, where the number 100 indicates ().
I. Transmission distance100km
B. the transmission rate is100 MB/s.
C, the transmission rate is100 kb/s.
D, transmission rate 100 MB/S
Answer: b
79, in the network interconnection, the network layer interconnection device is ().
A. Repeater
B. Router
C. doors
D. bridges
Answer: b
80.IP is the () protocol in TCP/IP system.
First, the network interface layer
B, network layer
C, transport layer
D, application layer
Answer: b
8 1, in the Internet protocol family, () protocol is responsible for the reliable transmission of data.
A. Intellectual property rights
b、TCP
remote login
d、FTP
Answer: b
82. The following IP address that can be assigned to the host is ().
a、 127.0.5. 1
255.255.0.0
c、200.20 1. 1 1.255
d、200. 198.85.2
Answer: d
83. Among the following IP addresses, () is a Class B address.
A: 200.55.33.22.
b、98. 1 10.25.44
c、 155.66.88.8
d、233.33
Answer: c
84, the following statement about the domain name system, () is wrong.
First, the domain name is unique
B domain name server DNS is used to realize the conversion of domain name address and IP address.
C generally speaking, websites have nothing to do with domain names.
D the structure of the domain name system is hierarchical.
Answer: c
85.Internet Explorer is ().
I. Dialing software
B. Web browser
C.HTML interpreter
D. fckeditor
Answer: b
86, the following description about the basic nature of the relational model, the error is ().
A the attribute values of the same column in the relationship should be taken from the same value range.
B there cannot be the same tuple in the same relationship.
The order of rows and columns in a relationship is not important.
D, the columns in the relationship can be subdivided.
Answer: d
87. At present, the most commonly used method to describe the conceptual model is E-R diagram, which is a graphical symbol used to represent attributes in k:\Fjexam95\T 1. BMP is ().
A、
B,
C,
d、
Answer: b
88, () only describes the existence and contact of entities in the information world, not involving DBMS.
A. Data model
B. Conceptual model
C, logical model
D, machine model
Answer: b
89. The following () operation can select several attribute columns from a relationship to form a new relationship.
First, choose
B. Inference
C, connection
D, natural connection
Answer: b
90, a teacher can teach multiple courses, a course can be taught by multiple teachers, then there is a connection between teachers and course entities ().
One, one-on-one
B, one-to-many
C, many to many
D, unknown
Answer: c
9 1, the characteristics of the data in the database do not include ().
First, more data types
B. Good data enjoyment and data integrity.
C, low data redundancy
D, high degree of data independence
A: A.
92. Users can use the database management system () to retrieve, modify, delete and count the data in the database.
First, decibels
b、DBS
c、DDL
d、DML
Answer: d
93. Users can easily define data objects in the database by using () of the database management system.
First, decibels
b、DBS
c、DDL
d、DML
Answer: c
94.DBMS is not ().
I. User and computer interface
User and database interface
C, the core of the whole database system.
D, components of the database system
A: A.
95, the development of data management technology is divided into three stages, of which the highest data independence is () management stage.
A, artificial
B, file system
C, database system
D. database
Answer: c
96, the following database software, () has a strong ability to make tables and reports, easy to learn and use interface.
I. Oracle Bone Inscriptions 8
b、SQL Server 2000
C, visit XP
d、MySQL
Answer: c
97, the following () is a large relational database development platform.
a、Turbo C
B. Access
c、SQL Server 2000
Visual FoxPro
Answer: c
98, about the characteristics of SQL language narrative, the error is ().
First, the process of height
B. Set-oriented operation mode
C, can be embedded in high-level languages.
D, the language is concise and powerful
A: A.
99, () is a commonly used desktop database software.
a、Turbo C
Access and Visual FoxPro
c、SQL Server 2000
Oracle Bone Inscriptions 8
Answer: b
100, the development of database technology is divided into three generations, among which the second generation database system supports () data model.
A, reticular type
B, hierarchical type
C, relational type
D, object-oriented
Answer: c