第1题:
As an important phase in software development, software design is the continuation of software requirement analysis phasE.
Ⅰ.software structure
Ⅱ.software procedure
Ⅲ.software module
Ⅳ.software document
which of the following should be included in software design phase?
A.Ⅰand Ⅱ
B.Ⅱand Ⅲ
C.Ⅰ,Ⅱ and Ⅲ
D.All
第2题:
How does Booth's Algorithm improve binary multiplication?
A.It prevents overflow.
B.It prevents underflow.
C.It preserves the sign of the multiplication operation.
D.It enhances the speed of the operation significantly.
第3题:
●Configuration and (1)testing are typically good choices for outsourcing. They usually require a large test lab containing many different hardware and software (2)and a staff of several people to manage it. Most small software companies can’t(3)the overhead and expense for maintaining these test labs, so it makes more sense for them to (4) this testing to companies who make it their (5) to perform. configuration and compatibility tests.
(1)A. compact B. compatibility C. compare D. comparison
(2)A. combarloy B. enquiringly C. warehouse D. combinations
(3)A. afford B. consciousness C. imagine D. accord
(4)A. insource B. trade C. outsource D. marketing
(5)A. business B. distribution C. trade D. reject
第4题:
A. The tape I/O performed is asynchronous
B. The tape buffer is allocated from the System Global Area (SGA)
C. The tape buffer is allocated from the Program Global Area (PGA)
D. Oracle I/O uses an interrupt mechanism to determine when each I/O completes
第5题:
Interrupts are an important part of embedded
systems. Consequently, many compiler vendors
offer an extension to standard C to support interrupts.
Typically, the keyword is __interrupt. The following
code uses __interrupt to define an interrupt service
routine (ISR). Point out problems in the code.
__interrupt double compute_area (double radius)
{
double area = PI * radius * radius;
printf("\nArea = %f", area);
return area;
}
第6题:
Interrupt Service Routines (ISR) are the )ortions of the program code that handle the interrupt requests. When an Interrupt is triggere i (either a hardware or software interrupt), the processor breaks away from the current task. moves the (72) to the ISR, and then continues operation. When the ISR has comr Leted, the processor retums execution to the previous location.
A.memory
B.function
C.instruction pointer D variable
第7题:
第8题:
On a Cisco Aironet 1130 Series autonomous access point, the status indicator is blinking dark blue. What does this indicate?()
第9题:
The nfsstat -c command shows zero badxid, but retrans and timeouts are sizeable, what is the most probable cause of the problem?()
第10题:
There is a file I/O bottleneck.
There are too many open files.
There appears to be a buffer shortage.
There is a paging space I/O bottleneck.
第11题:
Too many nfsd’s running
Client and server with different buffer sizes
Bridges, routers or gateways are receiving too many fragmentated packets
Too few nfsd’s running
第12题:
第13题:
Software document is an important part of software and a basis of software's development phase.It also influnces software's
A.Reusability
B.Maintanence
C.Expansibility
D.Portability
第14题:
● Maintenance activities include(74).
①making enhancements to software products
②developing a new software product
③correcting problems
④adapting products to new environments
(74)
A.①②
B.①③④
C.②③④
D.①②③④
第15题:
A.创建
B.休眠
C.中断
D.启动
第16题:
An application accesses a small lookup table frequently. You notice that the required data blocks are getting aged out of the default buffer cache.How would you guarantee that the blocks for the table never age out?()
A. Configure the KEEP buffer pool and alter the table with the corresponding storage clause.
B. Increase the database buffer cache size.
C. Configure the RECYCLE buffer pool and alter the table with the corresponding storage clause.
D. Configure Automata Shared Memory Management.
E. Configure Automatic Memory Management
第17题:
A. 900 seconds
B. 1200 seconds
C. 3000 seconds
D. 65535 seconds
第18题:
第19题:
Which item is the great majority of software vulnerabilities that have been discovered?()
第20题:
Which of the following malicious software types will create multiple pop-ups on a computer?()
第21题:
The BACKUP_TAPE_IO_SLAVES parameter is set to FALSE for the database instance. Which statement is true while performing a tape backup in an RMAN session?()
第22题:
exclusive
comprehensive
extensive
intensive
第23题:
The tape I/O performed is asynchronous
The tape buffer is allocated from the System Global Area (SGA)
The tape buffer is allocated from the Program Global Area (PGA)
Oracle I/O uses an interrupt mechanism to determine when each I/O completes