当前位置:网站首页>Online assignment of C language program design in the 22nd spring of Western Polytechnic University
Online assignment of C language program design in the 22nd spring of Western Polytechnic University
2022-06-30 05:26:00 【qq_ twenty-four million five hundred and sixty-six thousand and】
West University of Technology 22 In the spring 《C Language programming 》 Online homework
Total score of test paper :100? score :100
One 、 Single topic selection ( common 35 Two questions , common 70 branch )
1. When defining a structure variable , The amount of memory allocated to it by the system is ().
A. The amount of memory required for the first member of the structure
B. The amount of memory required for the last member of the structure
C. The largest amount of memory in a member
D. The total amount of memory required by each member
2. In the macro definition #definePI3.14159 in , Use the macro name PI Replace a ().
A. Constant
B. character string
C. Double precision number
D. Single precision number
3.{ chart }
1
A. Infinite loop
B. The number of cycles is variable
C.4 Time
D.3 Time
4.{ chart }
1
A.D
B.C
C.B
D.A
5. Illegal constants are :().
A.\483
B.’\2’
C.’’
D.””
6. The following incorrect definition statement is ().
A.inty[5]={0,1,3,5,7,9};
B.doublex[5]={2.0,4.0,6.0,8.0,10.0};
C.charc2[]={’\x10’,’\xa’,’\x8’};
D.charc1[]={’1’,’2’,’3’,’4’,’5’};
Aopeng online and offline thesis homework, please add :
7.() yes C The legal data type provided by the language describes the keyword .
A.signed
B.integer
C.Float
D.Char
8. One C The program always starts from () Function starts to run .
A.main
B.int
C.include
D.for
9. It is legal C The language long constant is ().
A.(long)58762
B.5876
C.0L
D.2.0E10
10.{ chart }
1
A. sentence voidprt_char(); There is a mistake , It is a function call statement , Out-of-service void explain
B. Variable names cannot be capitalized
C. There is a contradiction between the function description and the function call statement
D. Function names cannot be underlined
11.{ chart }
1
A.150
B.15
C.100
D.10
12. stay C In language , When defining array elements , The following statement about the array subscript data type is wrong ().
A. Integer expression
B. Integer constant or integer expression
C. integer constants
D. Any type of expression
13.{ chart }11
A.D
B.C
C.B
D.A
14.{ chart }
1
A.D
B.C
C.B
D.A
15.{ chart }
1
A.D
B.C
C.B
D.A
16.C Language policy , The type of the return value of the function is determined by () Decisive .
A. The calling function type when this function is called
B. This function is called by the system temporarily
C. The function type specified when defining the function
D.return Expression type in statement
17. complete C After editing the source file 、 To generate the execution file ,C The steps that a language processing system must perform are ().
A. Connect 、 function
B. Connect 、 compile
C. function
D. compile 、 Connect
18. The lowest priority of the following operators is ().
A.||
B.|
C.&&
D.&
19.{ chart }1
A.26
B.25
C.24
D.23
20. When C When the source program of the language cannot be written on one line , Sure ().
A. Continue lines with commas
B. use \ Line continuation
C. Continue lines with spaces
D. Continue with a semicolon
21. There are program segments :chars[]=”china”;charp;p=s; The following statement is correct ().
A. Array s Contents and pointer variables in p The contents in the are equal
B.s Array length and p The length of the string pointed to is equal
C.s and p Exactly the same
D.p And s[0] equal
22. If you call a function intfun(), And there is no return sentence , The correct statement is ().
A. Returns an indeterminate value
B. This function returns several system default values
C. The function does not return a value
D. It can return a function value desired by the user
23.{ chart }
1
A.int
B.int
C.(int)
D.(*int)
24. Function call statements :fseek(fp,-20L,2) The meaning is ().
A. Move the file position pointer to a distance from the file header 20 Bytes
B. Move the file location pointer to the current location 20 Bytes
C. Move the file position pointer back from the end of the file 20 Bytes
D. Move the file position pointer backward from the current position 20 Bytes
Aopeng online and offline thesis homework, please add :
25. if a=2,b=3, be a|b The value of is ().
A.3
B.2
C.1
D.0
26.{ chart }
1
A.4
B.3
C.2
D.1
27. If so stated :inta[3][4]={0}; Then the correct statement below is ().
A. This statement is incorrect
B. Array a Each element in can get the initial value 0
C. Array a The initial value can be obtained for each element in , But its value is not necessarily 0
D. Only the elements a[0][0] The initial value can be obtained 0
28.1{ chart }
A.D
B.C
C.B
D.A
29.{ chart }
1
A.00011011
B.00011011
C.00011000
30.C The correct way to write the file name in the source program is ().
A.c:user\text.txt
B.c:\user\text.txt
C.c:\user\text.txt
D.c:\user\text.txt
31. Pointer to variable , The meaning of this variable is ().
A. Address
B. name
C. value
D. A sign
32.{ chart }
1
A. A loop is an infinite loop
B. The circular body sentence is executed once
C. Circular body sentences are not executed once
D. A loop is not an infinite loop
33.{ chart }
1
A. There are grammatical mistakes
B.6
C.11
D.10
34. form C The language program is ().
A. The process
B. Subroutines
C. function
D. Main program and subroutine
35. Constitute a C The key to the procedure is ()
A. Several main functions and several non main functions
B. Several main functions and at most one non main function
C. One main function and several non main functions
D. One main function and at most one non main function
Two 、 Multiple choice ( common 5 Two questions , common 30 branch )
36. A computer program should include () The content of .
A. A description of society
B. A description of the data
C. A description of the operation ( Algorithm )
D. Description of the enterprise
37. The three basic program structures are ().
A. Sequential structure
B. Selection structure
C. Tree structure
D. Loop structure
Aopeng online and offline thesis homework, please add :
38. The characteristics of computer algorithms include ().
A. deterministic
B. Zero or more inputs
C. Fineness
D. effectiveness
E. There is one or more outputs
39. Computer algorithms can be divided into () Two categories .
A. Non numerical algorithm
B. Structural operations
C. Numerical algorithm
D. Formal operations
40. Function bodies generally include () Two parts .
A. operation
B. perform
C. form
D. Statement
边栏推荐
- The file has been downloaded incorrectly!
- After reading who moved my cheese
- [typescript] experimentaldecorators of vscode stepping pit
- Unity C trigonometric function, right triangle corner calculation
- 86. 分隔链表
- Log writing specification
- [typescript] cannot redeclare block range variables
- El table lazy load refresh
- Unity limited time use limited trial time and use times
- 9. naive Bayes
猜你喜欢

pytorch中常用损失函数总结

Unity project hosting platform plasticscm (learn to use 2)

Unity- the camera follows the player

Unity scroll view element drag and drop to automatically adsorb centering and card effect

中文版PyCharm改为英文版PyCharm

旋转框目标检测mmrotate v0.3.1入门

Unityshader learning notes - Basic Attributes
![[note] usage model tree of the unity resource tree structure virtualizingtreeview](/img/3e/fe5610c797a14554ad735172c3ab54.jpg)
[note] usage model tree of the unity resource tree structure virtualizingtreeview

14x1.5cm竖向标签有点难,VFP调用BarTender来打印

剑指 Offer 18. 删除链表的节点
随机推荐
终端便捷ssh(免密)连接
Unity 3D model operation and UI conflict Scrollview
3D rotation album
9. naive Bayes
Unity ugui text value suspended enlarged display add text background
How to use js to control the scroll bar of moving div
Fifty years ago, the go code first submitted by the inventor of Hello world was as long as this
东塔攻防世界—xss绕过安全狗
Database SQL language 03 sorting and paging
Promise知识点拾遗
Nestjs入门和环境搭建
Records of problems encountered in unity + hololens development
Database SQL language 04 subquery and grouping function
C # uses monopinvokecallback to directly call back C # function
[Blue Bridge Road -- bug free code] analysis of AT24C02 storage code
Operation of JSON file
企事业单位源代码防泄露工作该如何进行
East Tower attack and defense world - XSS bypasses the safety dog
Revit Secondary Development - - Project use Panel features not opened
网络变压器怎么判断好坏?网络滤波变压器坏了一般是什么症状?