【文章內(nèi)容簡介】
____。 A) 多令牌協(xié)議 B) 單令牌協(xié)議 C) 隨機訪問協(xié)議 D) HDLC協(xié)議 (56) 在局域網(wǎng)中,以下哪種傳輸介質(zhì)既可以用于物理層10BASET協(xié)議,又可以適用于100BASET協(xié)議? ____。 A) 同軸電纜 B) 3類非屏蔽雙絞線 C) 5類非屏蔽雙絞線 D) 光纖電纜 (57) 如果兩個局域網(wǎng)LAN A與LAN B互連,它們的傳輸層協(xié)議不同,而其它層協(xié)議均相同, LAN A與LAN B的互連設(shè)備應(yīng)該選擇____。 A) repeater B) bridge C) router D) gateway (58) 。 A) B) C) D) (59) 城市地區(qū)網(wǎng)(MAN)主要使用的技術(shù)是交換多兆位數(shù)據(jù)服務(wù)SMDS、分布隊列雙總線DQDB和____。 A) FDDI B) CSMA/CD C) Token Bus D) Token Ring (60) 在計算機集成制造系統(tǒng)(CIMS)中,存在著辦 公自動化(OA)與生產(chǎn)過程控制(MC)兩種環(huán)境,它們對網(wǎng)絡(luò)通信的要求也不相同。在CIMS環(huán)境中,根據(jù)MAP/TOP協(xié)議選擇局域網(wǎng)協(xié)議標(biāo)準(zhǔn)時,應(yīng)采用以下哪種方案? ____。(2分) A) B) , C) , D) 全部采用HDLC協(xié)議標(biāo)準(zhǔn) (61) An instrucion that uses indirect addressing must contain an address of memory where____. A) data is stored B) another address is stored C) a page fault is addressed D) a pepeline stall will be executed (62) Let R be a binary relation on a set S such that for each x,y,z∈S, if xRy and xRz then y =z. Which of the following must be true? ____.(2分) A) R is antisymmetric B) R is transitive C) R is an equivalence relation D) R is a function (63) If p and q are Boolean variables, which of the following formulas is (are) tautological?____. ?、? (┐p→q)? (p∨q) ?、? ((p→q))∧(q→r))→(p→r)) A) none B) Ⅰ only C) Ⅱ only D) Ⅰ and Ⅱ (64) Which of the following statements is (are) true? ____. ?、? The number of cyclic subgroups of the additive group of integers is infinite. Ⅱ. The number of cyclic subgroups of the additive group of real numbers is infinite. A)amp。nb sp。Neither B) Ⅰ only C) Ⅱ only D) Ⅰ and Ⅱ Questions 65 66 refer to the space requirements of different methods of storing graphs. The choices for these questions are binations of the following statements. ?、? The space required depends on the number of vertices. ?、? The space required depends on the number of edges. (65) When the adjacency matrix method is used to store a graph, which of the statements is (are) true? ____. A) None B) Ⅰ only C) Ⅱ only D) Ⅰ and Ⅱ (66) When the adjacency list method is used to store a graph, which of the statements is (are) true?____. A) None B) Ⅰ only C) Ⅱ only D) Ⅰ and Ⅱ Questions 6768 are based on the following information, A hash table with hash function h1(k)=k mod 13 is shown below. 0 1 2 3 4 5 6 7 8 9 10 11 12 35 33 48 25 Collision is resolved using the hash function h2(k)=(k mod 11)+1. (67) How many key parisons occur in searching for key 35 in the given hash table?____. (2分) A) 0 B) 1 C) 2 D) 3 (68)amp。 If a new key 67 is inserted into the given hash table, what will be its address?____. (2分) A) 3 B) 4 C) 5 D) 6 (69) Suppose the contents of the DOS file on the hard disk is as follows. @ECHO OFF MEMFILE1 SORTFILE2 DEL FILE1 @DATE @TIME IF EXIST %1 ECHO % IF FOUND If all of the mands are successfully executed after IF1 FILE1 is typed, then the screen displays?____. A) None B) Date and time C) FILE1 IS FOUND D) FILE2 IS FOUND (70) If the files in the current directory are aac, abc, acb,acc, aca, ao, al, a2, ab, ac, aa, and the mand ls a?[bc] is executed, how many files will be listed?____. (2分) A) 3 B) 4 C) 5 D) 6 B) (71) In order to append a standard output to an existing file, which of the following operators is used in the UNIX system? ____. A) | B) amp。 C) D) (72) Consider the following figure, where the shaded parts represent already assigned blocks of memory, and the unshaded parts represent free blocks. (2分) If there is a request for 40KB of memory and the bestfit algorithm is used, then the beginning add