【正文】
為什么?(10分)。論點(diǎn)2正確嗎?為什么?(10分)⑶ 有一臺主機(jī)的IP地址是“”。試根據(jù)你對IP協(xié)議的理解,討論以下問題:⑴ 論點(diǎn)1:Internet中沒有兩臺或兩臺以上的主機(jī)或路由器可以同時使用同一個IP地址。(8分)⒉ 何時可進(jìn)行進(jìn)程調(diào)度?(8分)⒊ 進(jìn)程調(diào)度算法解決以何種次序?qū)Ω骶途w進(jìn)程進(jìn)行處理機(jī)的分配以及按何種時間比例讓進(jìn)程占用處理機(jī)。(8分)⒊ 實(shí)施快速原型法的前提和條件。(14分)⑵ 給出下列查詢的SQL語句:(16分,每小題4分)a) 當(dāng)前未借用的會議室(房間號)和容量:b) 2000年4月8日有哪些部門(部門名稱)在開會?他們的主管是誰?c) 2000年4月8日‘信息中心’在哪個會議室(房間號)開會?會議名稱和主題是什么?d) 當(dāng)前能夠適合‘信息中心’開會的有哪些會議室(房間號)?論述題2原型化方法或稱快速原型化方法是一種當(dāng)前常用的軟件工程方法,盡管其特征民傳統(tǒng)的結(jié)構(gòu)化生命周期法有所不同,但從原型化方法的演變仔細(xì)分析,仍可看出它與結(jié)構(gòu)化方法的內(nèi)在聯(lián)系,試回顧兩種方法的發(fā)展特征和演進(jìn)歷史并論述下述問題:⒈ 兩種方法的基本特征和內(nèi)在聯(lián)系。l 當(dāng)前房間狀態(tài)取值為‘1’表示該會議室當(dāng)前正在開會,取值為‘0’表示該會議室當(dāng)前未被借用。為了簡化問題做如下假定:l 會議以部門召開,但一個部門在同一會議室不能重復(fù)召開同一個會議。 Cost analysis of software developmentⅢ.Adjustment of software development progressA) Ⅲ only B) Ⅱ and Ⅲ C) Ⅰ and Ⅱ D) all(63) Prototype method is one of the software engineering methods frequently used, which of the following item is the necessary condition for implementing prototype method?Ⅰ.Can acquire the user requirement quicklyⅡ.Have the tools for building software fastⅢ.Have a certain accumulation of prototype systemsA) Ⅰ only B) Ⅰand Ⅱ C) Ⅱ and Ⅲ D) all(64) ORACLE RDBMS is a distributed DBMS. Which of the following techniques adapted ensure atomicity of distributed transaction?A) remote procedure call (RPC) B) Two _phases mit (2PC)C) Snapshots D) triggers(65) In order to get names of schoolboys(SEX=‘M’)whose age=22, from a relation S(SNO,SNAME,SEX,AGE),which of the following expressions is (are) correct?Ⅰ.πsname(σsex=’M’^age=22(S))Ⅱ.σsex=’M’^age=22(πsname(S))A) Ⅰ only B) Ⅱ only C) Ⅰand Ⅱ D) neither(66) In order to improve the performance of a network server, you need to select bus or local bus. The appropriate local bus isA) VESA B) PCI C) EISA D) ISA(67) In terms of ’s taxonomy, the systolic array falls intoA) SISD B) MIMD C) SIMD D) MISD(68) In the WAN, when a pointtopoint subnet is used, an important design issue is the roucer interconnectionA) topology B) puter C) service D) lines(69) In the Ethernet LAN, an algorithm was chosen to dynarnically adapt to the number of stations trying to send. It is calledA) backward learning B) binary exponential backoffC) spanning tree D) CRC(70) The typical firewall consists of two packet filters and a (an)A) router B) bridge C) application D) ser