当前位置:网站首页>MS office level II wrong question record [7]

MS office level II wrong question record [7]

2022-06-11 07:10:00 percation

author:precation
date:2021.1.18( repair 2021.1.17)


choice question

In the following description of linear linked list , The right is : When inserting and deleting , There is no need to move the elements in the table , Just change the pointer field of the node that will do .
Generally speaking , In the chain storage structure of linear list , The storage sequence number of each data structure is discontinuous , also The location relationship and logical relationship of each node in the storage space are also inconsistent .
( Personal understanding : It refers to insertion after various deletion 、 The storage sequence number is likely to be inconsistent ,( It may be logically sequential from top to bottom ), And the actual storage in a certain location of the space may be where the memory space is free , Where to save .

Properties of binary trees 3: stay Any class binary tree in , Degree is 0 The leaf node of ( leaf node ) Better than Degree is 2 The node of More than a .
leaf Son junction spot ( individual Count ) = 1 + degree by 2 Of junction spot ( individual Count ) leaf node ( Number ) = 1 + Degree is 2 The node of ( Number ) leaf Son junction spot individual Count =1+ degree by 2 Of junction spot individual Count
total junction spot Count S = leaf Son junction spot ( individual Count ) + degree by 1 Of junction spot ( individual Count ) + degree by 2 Of junction spot ( individual Count ) Sum up points S = leaf node ( Number )+ Degree is 1 The node of ( Number )+ Degree is 2 The node of ( Number ) total junction spot Count S= leaf Son junction spot ( individual Count )+ degree by 1 Of junction spot ( individual Count )+ degree by 2 Of junction spot ( individual Count )

The software process is not standardized Do not belong to Software crisis performance .
Software crisis is mainly manifested in :
The growth of software demand cannot be met .
The cost and schedule of software development cannot be controlled
Software quality is difficult to guarantee
The software is not maintainable or the degree of maintenance is very low
The cost of software is increasing
The improvement of software development productivity can not catch up with the development of hardware and the growth of application demand .

In the black box test method , The main basis for designing test cases is Program external functions .
The black box test is The functions that have been realized by the software Whether it meets the needs Test and verify .
Black box testing Not at all The logic inside a program Structure and internal characteristics , Based on Program requirements and functional specifications , Check Program functionality Whether it conforms to its function description .

Adopted by a family ADSL Broadband access mode link Internet,ADSL The modem links to a 4 Router of port , The router is connected again 4 Computers Realize Internet sharing , The extension structure of this home network is Star type complementarity .
From the title In red , Know all the computers All through Router , If the router is broken , Then all nodes ( Computer ) Unable to communicate .
In the star topology , Each node is connected to the central node , The central node controls the communication of the whole network , The communication between any two nodes must pass through the central node .
Common network topology structure : Star type 、 ring 、 Bus type 、 Tree and net, etc .

In software design Unused tools yes Data flow diagram (DFD chart ).
The system structure diagram is The overall design of the software system structure Of graphic display .
stay Demand analysis stage , From the perspective of system development , Put the system Press function successive Division In a hierarchical structure , stay Outline design stage Use .
PAD chart Is in Used in the detailed design stage .
The program flow chart is Graphics for program flow Express , Used in the detailed design .
Data flow diagram (DFD chart ) yes Structural analysis method Tools used in , It graphically depicts the functions of data flow and processing in the system , Because it only reflects the logic function that the system must complete , So it's a functional model , yes In the feasibility study stage , Not used in software design .

stay The process of digitizing sound in , Sampling time 、 sampling frequency 、 When the quantization bits and the number of channels are the same , The storage space occupied is the largest The sound file format of is WAV Waveform file
because WAV Is the closest to lossless music format , So the file size is relatively large .

Fonts in office software have corresponding font files in the operating system , The Chinese character code stored in the font file is : The font ( type ) code .
The font ( type ) Code is Code for storing Chinese character font information , It corresponds to the inner code of Chinese characters one by one .
( And the previous wrong question record 6 The outer code in , Put them together to deepen your memory )
In Pinyin input method , Input Pinyin ”zhengchang", Its code belongs to : Outer code .
The Chinese character input code is Enable users to use the Western keyboard Code compiled by inputting Chinese characters , Also called Outer code .

An operating system can support multiple users at different terminals to use a computer at the same time , They are independent of each other and do not interfere with each other , user feel It seems that a computer is all for him , This operating system belongs to : Time-sharing operating system .
Time sharing operating system refers to the connection of multiple terminals with display and keyboard on a host , meanwhile Allow multiple users adopt The terminal of the host , With Use the computer interactively , share In the host resources .
The time-sharing operating system is A multi-user interactive operating system .

stay Word During document editing , To use a specific computer application window screen as an illustration of a document , The best way to operate is utilize word Insert “ Screen capture ” function , Insert the desired window directly into Word Specify the location of the document .
Word Provides “ Screen capture ” function , It can directly insert the required window screen into Word Specify the location of the document .
Specific operation method : stay “ Insert ” Tab “ illustrations ” Option group Middle click “ Screen capture ” Pull down button , choice ” Screen editing “ After the options , namely You can insert the captured image into the specified location of the document .

Word It provides users with powerful search and replace functions . When replacing , wildcard be used for Realize fuzzy search , among * representative Instead of 0 Characters or more ,? Instead of a character .

Mr. Li has made a cartoon PowerPoint Lesson plans , She hopes that it can be played automatically according to the rhythm of her lectures in class , The best way to operate is : During the exercise , utilize “ Rehearsal timing ” The function records the appropriate slide switching time , Then play it .
When showing each slide , There must be an appropriate time For the presenter to fully express his ideas , So that the audience can understand the content of the slide .
utilize PowerPoint Rehearsal timing function of , The presenter can prepare the presentation while , adopt Rehearse to determine the appropriate presentation time for each slide , This is also the requirement for automatic slide show .

If you need to be in PowerPoint Add a watermark containing the company name to each slide of the presentation , The best way to operate is : Make a watermark background picture with the company name , Then set it as the slide background .
On the slide master Specific location Place a text box containing the company name . ( The text box should be placed at the bottom , Maybe it's to reduce the impact on the display effect )


原网站

版权声明
本文为[percation]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/03/202203020522591748.html