当前位置:网站首页>MS office level II wrong question record [7]
MS office level II wrong question record [7]
2022-06-11 07:10:00 【percation】
author:precation
date:2021.1.18( repair 2021.1.17)
choice question
In the following description of linear linked list , The right is :
When inserting and deleting , There is no need to move the elements in the table,Just change the pointer field of the nodethat will do .
Generally speaking , In the chain storage structure of linear list ,The storage sequence number of each data structure is discontinuous, alsoThe location relationship and logical relationship of each node in the storage space are also inconsistent.
( Personal understanding : It refers to insertion after various deletion 、 The storage sequence number is likely to be inconsistent ,( It may be logically sequential from top to bottom ), And the actual storage in a certain location of the space may be where the memory space is free , Where to save .
Properties of binary trees 3: stay
Any class binary treein , Degree is 0 The leaf node of ( leaf node )Better thanDegree is 2 The node ofMore than a.
leaf Son junction spot ( individual Count ) = 1 + degree by 2 Of junction spot ( individual Count ) leaf node ( Number ) = 1 + Degree is 2 The node of ( Number ) leaf Son junction spot ( individual Count )=1+ degree by 2 Of junction spot ( individual Count )
total junction spot Count S = leaf Son junction spot ( individual Count ) + degree by 1 Of junction spot ( individual Count ) + degree by 2 Of junction spot ( individual Count ) Sum up points S = leaf node ( Number )+ Degree is 1 The node of ( Number )+ Degree is 2 The node of ( Number ) total junction spot Count S= leaf Son junction spot ( individual Count )+ degree by 1 Of junction spot ( individual Count )+ degree by 2 Of junction spot ( individual Count )
The software process is not standardized
Do not belong toSoftware crisis performance .
Software crisis is mainly manifested in :The growth of software demand cannot be met .The cost and schedule of software development cannot be controlledSoftware quality is difficult to guaranteeThe software is not maintainable or the degree of maintenance is very lowThe cost of software is increasingThe improvement of software development productivity can not catch up with the development of hardware and the growth of application demand .
In the black box test method , The main basis for designing test cases is
Program external functions .
The black box test isThe functions that have been realized by the softwareWhether it meets the needsTest and verify .
Black box testingNot at allThe logic inside a programStructure and internal characteristics, Based onProgram requirements and functional specifications,CheckProgram functionalityWhether it conforms to its function description .
Adopted by a family ADSL Broadband access mode link Internet,ADSL The modem links to a 4 Router of port ,
The router is connected again 4 ComputersRealize Internet sharing , The extension structure of this home network isStar type complementarity.
From the titleIn red, Know all the computersAll throughRouter , If the router is broken , Then all nodes ( Computer ) Unable to communicate .
In the star topology ,Each node is connected to the central node,The central node controls the communication of the whole network, The communication between any two nodes must pass through the central node .
Common network topology structure : Star type 、 ring 、 Bus type 、 Tree and net, etc .
In software design
Unused toolsyesData flow diagram (DFD chart ).
The system structure diagram isThe overall design of the software system structureOfgraphic display.
stayDemand analysis stage, From the perspective of system development , Put the systemPress functionsuccessiveDivisionIn a hierarchical structure , stayOutline design stageUse .PAD chartIs inUsed in the detailed design stage.
The program flow chart isGraphics for program flowExpress , Used in the detailed design .
Data flow diagram (DFD chart ) yesStructural analysis methodTools used in , It graphically depicts the functions of data flow and processing in the system , Because it only reflects the logic function that the system must complete , So it's a functional model , yesIn the feasibility study stage,Not used in software design.
stay
The process of digitizing soundin , Sampling time 、 sampling frequency 、 When the quantization bits and the number of channels are the same ,The storage space occupied is the largestThe sound file format of isWAV Waveform file
because WAV Is the closest to lossless music format , So the file size is relatively large .
Fonts in office software have corresponding font files in the operating system , The Chinese character code stored in the font file is :
The font ( type ) code.
The font ( type ) Code isCode for storing Chinese character font information, It corresponds to the inner code of Chinese characters one by one .
( And the previous wrong question record 6 The outer code in , Put them together to deepen your memory )
In Pinyin input method , Input Pinyin ”zhengchang", Its code belongs to :Outer code.
The Chinese character input code isEnable users to use the Western keyboardCode compiled by inputting Chinese characters , Also calledOuter code.
An operating system can support multiple users at different terminals to use a computer at the same time , They are independent of each other and do not interfere with each other , user feel It seems that a computer is all for him , This operating system belongs to :
Time-sharing operating system.
Time sharing operating system refers to the connection of multiple terminals with display and keyboard on a host , meanwhileAllow multiple usersadoptThe terminal of the host, WithUse the computer interactively,shareIn the hostresources.
The time-sharing operating system isA multi-user interactiveoperating system .
stay Word During document editing , To use a specific computer application window screen as an illustration of a document , The best way to operate is
utilize word Insert “ Screen capture ” function , Insert the desired window directly into Word Specify the location of the document .
Word Provides “ Screen capture ” function , It can directly insert the required window screen into Word Specify the location of the document .
Specific operation method : stay“ Insert ” Tab “ illustrations ” Option groupMiddle click “Screen capture” Pull down button , choice ”Screen editing“ After the options , namelyYou can insert the captured image into the specified location of the document.
Word It provides users with powerful search and replace functions . When replacing ,
wildcardbe used forRealize fuzzy search, among*representativeInstead of 0 Characters or more,? Instead of a character.
Mr. Li has made a cartoon PowerPoint Lesson plans , She hopes that it can be played automatically according to the rhythm of her lectures in class , The best way to operate is :
During the exercise , utilize “ Rehearsal timing ” The function records the appropriate slide switching time , Then play it.
When showing each slide, There must be an appropriate timeFor the presenter to fully express his ideas , So that the audience can understand the content of the slide .
utilize PowerPoint Rehearsal timing function of , The presenter can prepare the presentation while , adoptRehearse to determine the appropriate presentation time for each slide, This is also the requirement for automatic slide show .
If you need to be in PowerPoint Add a watermark containing the company name to each slide of the presentation , The best way to operate is :
Make a watermark background picture with the company name , Then set it as the slide background.
On the slide masterSpecific locationPlace a text box containing the company name . ( The text box should be placed at the bottom , Maybe it's to reduce the impact on the display effect )
边栏推荐
- saltstack部署zabbix状态文件编写
- Janus feature草稿
- Start the Nacos server of shell script
- 一、SQLServer2008安裝(帶密碼)、創建數據庫、C#窗體項目測試
- big.js--使用/实例
- Promises/a+ standard Chinese Translation
- Cv2.rectangle() picture frame
- Shutter restraint container assembly
- Education expert wangzhongze solves students' problems with one move
- Leetcode hot topic 100 topic 11-15 solution
猜你喜欢

教育专家王中泽老师一招解决学生问题

saltstack部署lnmp

Starting from scratch (IV) enemy aircraft flying out of the border disappear automatically

Duality-Gated Mutual Condition Network for RGBT Tracking

1266_FreeRTOS调度器启动代码实现分析

生物序列智能分析平台blog(1)

【LeetCode】-- 17. Letter combination of telephone number

Detailed explanation of mutationobserver

Flutter Container组件

Leetcode hot topic 100 topic 6-10 solution
随机推荐
@JsonProperty注解
WPF data binding (IV)
农房一体脚本的心得记录
Promise. All capture error
Interview question 02.06 Palindrome linked list
Leetcode-104. Maximum Depth of Binary Tree
byte和bit的区别
Set center alignment
模块化笔记
No response from win10 explorer when dragging files
This comprehensive understanding
Education expert wangzhongze solves students' problems with one move
Esp32 learning notes (49) - esp-wifi-mesh interface use
Leetcode-647. Palindromic Substrings
pycharm出现error.DeprecatedEnv: Env FrozenLake-v0 not found (valid versions include [‘FrozenLake-v1‘])
[MATLAB image encryption and decryption] chaotic sequence image encryption and decryption (including correlation test) [including GUI source code 1862]
Nodejs database (Part 2)
Cv2.rectangle() picture frame
Graph Attention Tracking
一、SQLServer2008安装(带密码)、创建数据库、C#窗体项目测试