2023 Information Technology Academic Proficiency Exam Practice System Paper 14 Analysis

Mondo Education Updated on 2024-01-31

1. Multiple choice questions (number of questions: 20 questions, total: 40 points).

1. In WPS**, the following statements about the function of the chart are incorrect ( ).

a. The column chart visually presents the comparative values across several categories, and the column height reflects the difference in the data.

b. The pie chart presents the proportion of the whole, reflecting the proportion of a certain part in the whole.

c. Line charts show trends by time or category, emphasizing the magnitude of change over time.

d. The radar chart presents the overall relationship between independent data series, and can only map one-dimensional data to the coordinate axis.

Answer] D Analysis: A radar chart is a graphical method of displaying multivariate data in the form of a two-dimensional chart of three or more quantitative variables represented on an axis starting from the same point. Radar charts are also known as network diagrams, spider diagrams, star diagrams, spider web diagrams, irregular polygons, polar diagrams, or kiviat diagrams.

2. When purchasing train tickets, children's fares are divided into preferential standards by age, and if the algorithm is used to describe the problem of children's ticket purchase, the control structure of the fare calculation algorithm is ( ).

A. Sequential structure B. Branching (selection) structure C. Circular structure D. Tree structure.

Answer] B Analysis: The execution of the branch structure is to select the execution path according to certain conditions, rather than strictly following the physical order in which the statement appears. When purchasing train tickets, the age division of children's fares should be judged first, and the control structure of the fare calculation algorithm is a branch (selection) structure.

3. In the Python language, the value obtained by executing the statement min([2, 5, 8, 1]) is ( ).

a、2 b、5 c、8 d、1

Answer] D analysis: The min function is to find the minimum value of the data in the selected region.

4. Among the common symbols in the following flow charts, what is usually used to indicate the end of the program is ( ).

Answer] c

Analysis: In the common symbols of flowcharts, a diamond: indicates judgment or judgment;b Parallelogram: represents input and output;c rounded rectangle: indicates "start" and "end";d rectangle: indicates the processing to be performed.

5. ** is a widely used encoding method, which can store more information and represent more data types. The specified information can be generated through the *** generator software, such as the *** generation tool, the *** corresponding to the text "information center" is generated, and this generation process belongs to ( ).

a. Text recognition b. Image processing c. Information coding d. Speech recognition.

Answer] C Analysis: Information coding is the process of giving information elements the best in order to facilitate the storage, retrieval and use of information. ** is a widely used way of encoding information. Through the *** generation tool, the generation process of *** corresponding to the text "information center" belongs to information encoding.

6. In a relational database, a relationship corresponds to a ( ).

A, record B, hierarchical model C, mesh model D, 2D table.

Answer] D Analysis: In the relational model, the data structure is represented as a two-dimensional table, and a relationship is a two-dimensional table. A two-dimensional table can be understood as a ** where rows and columns intersect.

7. Among the following options, the one that does not include big data application technology is ( ).

a. The public security department uses the smart city's monitoring system to assist in capturing criminal suspects.

b. The teacher conducts statistical analysis of the final grades of the students in the class through WPS**.

c. Understand the road conditions in real time through the mobile phone navigation software and plan the best travel route.

d. Through the traffic analysis of the cars on the road, the congestion time and congestion of each road section are carried out.

Answer] B Analysis: The application technology of big data covers all kinds of big data application technologies such as big data platforms and big data index systems. The teacher conducts a statistical analysis of the final grades of the classmates through WPS**, which does not include big data application technology.

8. Use digital equipment to digitize the analog sound signal, and the usual processing process is ( ).

a, encoding, sampling, quantizing b, sampling, encoding, quantizing c, sampling, quantizing, encoding d, quantizing, sampling, encoding.

Answer] C Analysis: The process of digitizing analog sound signals is sampling, quantization, and encoding.

9. The following files occupy the largest storage space ( ).

A. 8MB audio file B. 512KB image file C. 1024B text file D. 1GB ** file.

Answer] D analysis: computer information storage units include b (bytes), kb (kilobytes), mb (megabytes) and gigabytes (billion bytes), etc., and their conversion relationship is 1024 times that of the previous level for each level, such as 1kb = 1024b and 1m = 1024kb. 1GB of files in the d option takes up the most storage space.

10. In information technology, the English abbreviation of artificial intelligence is usually represented by ( ).

a、mr b、ir c、ar d、ai

Answer] D Analysis: Artificial intelligence (abbreviated as AI) is also known as intelligent machinery and machine intelligence, and the intelligence expressed by machines made by humans. In general, artificial intelligence refers to the technology that presents human intelligence through ordinary computer programs.

11. The basic characteristics of the information society are ( ).

a. Knowledge-based economy, pluralistic society, open city, digital city.

b. Knowledge-based economy, networked society, service-oriented, digital life.

c. Market-oriented economy, digital society, service-oriented, networked life.

d. Market-oriented economy, digital society, open life, networked life.

Answer] B Analysis: The basic characteristics of the information society include: knowledge-based economy, networked society, service-oriented**, and digital life.

12. The information system has a number of constituent elements, among which the material basis of the information system is ( ).

A. Computer software B. Computer hardware C. Data D. Users.

Answer] B Analysis: Information system is a human-computer interaction system composed of people, hardware, software, network and data resources. Among them, the material basis of the information system is computer hardware.

13. Wi-Fi is a network technology that can connect personal computers, handheld devices (such as PDAs, mobile phones) and other terminals to each other wirelessly. The following statement is correct ( ).

a. There is no need to pay for using Wi-Fi technology to access the Internet b. Wi-Fi technology has brought people a more convenient way to access the Internet.

c. The only advantage of using wifi technology is that the Internet speed is fast d. Wi-Fi is the only wireless connection technology.

Answer] B Analysis: Wi-Fi is a wireless LAN access method, which is characterized by high transmission rate, long transmission distance, good confidentiality, reliable communication, etc.

14. After the home wireless LAN equipment is connected, the network must be configured to network normally and safely, and the configuration of the wireless network is mainly to configure ( ).

A, wireless router B, wireless network card C, server D, switch.

Answer] A analysis: The configuration of the wireless network is mainly to configure the wireless router.

15. The classification basis for dividing computer Internet networks into wide area networks and local area networks is ( ).

a. Switching mode B. Topology C. Transmission mode D. Geographic coverage.

Answer] D Analysis: The classification of computer Internet networks into wide area networks and local area networks is based on geographical coverage.

16. * Share learning materials such as python installation packages and teaching courseware on the network disk for students to use, which reflects the sharing of ( ).

a, hardware resources and software resources b, software resources and data resources c, software resources and channel resources d, hardware resources and channel resources.

Answer] B Analysis: The sharing of learning materials such as python installation packages and teaching courseware reflects the sharing of software resources and data resources.

17. Among the following software, the system software is ( ).

a、wps b、linux c、photoshop d、microsoft media player

Answer] B Analysis: Linux belongs to system software, and the other three items are application software.

18. The following options are not intellectual property rights ( ).

a. Patent B. Copyright C. Portrait D. Trademark right.

Answer] C Analysis: Intellectual property rights refer to the exclusive rights enjoyed by natural persons, legal persons or other organizations in accordance with the law for their intellectual creations. Intellectual property rights can be broadly divided into two categories: one is industrial property rights, including patents, trademarks, prohibition of unfair competition, trade secrets, geographical indications, etc.;The other category is copyright (also known as "copyright"), which involves literary, artistic and scientific works, such as poetry, drama, film, song, art, photography, sculpture and architectural design.

"Portrait right" is a kind of personality right exclusive to natural persons. Portrait rights are the right of citizens to consent or disagree with others to use their likeness.

19. Common factors affecting the security of network information systems do not include ( ).

A. Network Factor B. Human Factor C. Technical Factor D. Noise Factor.

Answer] D Analysis: The common factors affecting the security of network information systems do not include noise factors.

20. In the following description of network security, the statement is wrong ( ).

a. System vulnerabilities refer to defects in the specific implementation of hardware, software, network protocols or system security policies.

b. Backdoor programs refer to programs that remain in the computer system for a very small number of special users to bypass security controls and obtain access to programs or systems.

c. System vulnerabilities only exist in the early stage of software application, and can be fully controlled through continuous improvement and patching.

d. Backdoors and system vulnerabilities are easy to be attacked by hackers, resulting in security risks.

Answer] C Analysis: System vulnerabilities do not only exist in the early stage of software applications, they may appear throughout the life cycle of software. Vulnerabilities can originate from various stages of design, coding, testing, deployment, and maintenance. Comprehensive security policies and measures can help reduce the impact of system vulnerabilities on system security.

2. True/False Questions (Number of questions: 5, total: 10 points).

1. Octal numbers and hexadecimal numbers can be directly converted into binary numbers by bits, without the need to convert to decimal numbers for transition.

Answer] True. Analysis: Octadecimal numbers and hexadecimal numbers can be directly converted into binary numbers bitwise, for octal numbers, each bit can be represented by a three-digit binary number, and for a hexadecimal number, each bit can be represented by a four-digit binary number table.

2. If the car license plate number is arranged by 5 pure numbers, the first digit can be composed of numbers or English capitals, and the last 4 digits are also composed of pure numbers, then theoretically 260,000 license plates can be added. Answer] True.

Analysis: 5-digit pure digital car license plate arrangement has 10 10 10 10 10 = 100,000 license plates, if the first digit is composed of numbers or English capital letters, the last 4 digits are composed of pure numbers, and the car license plate is arranged with (26 + 10) 10 10 10 10 = 360,000 license plates, which can theoretically increase 260,000 license plates.

3. In WPS**, to display the proportional relationship between each item in the data series and the sum of the values of the series, you should select a pie chart.

Answer] True. Analysis: A pie chart is often used to show the proportion of data in the sum of the data.

4. Nowadays, many communities have installed intelligent access control systems, and residents in the jurisdiction can enter and exit the community through intelligent identification to realize the unattended gate. It follows that people are not included in the constituent elements of information systems. Answer: False.

Analysis: Information system is a human-computer interaction system composed of people, hardware, software, network and data resources. People are the users, maintainers, managers and designers of information systems.

5. A complete information system is usually a human-computer interaction system composed of hardware, software, network, data and people.

Answer] True. Analysis: Information system is a human-computer interaction system composed of people, hardware, software, network and data resources.

3. Comprehensive analysis questions (number of questions: 4, total: 50 points).

Question 1 (Question number: 149, 10 marks in total).

The following is a network diagram of a digital home system, using the diagram to answer the following questions:

Question 1: According to the above figure, the family is connected to the network through ( ).

a, ** line b, optical fiber.

Answer] B analysis: The operator provides an optical modem, which shows that the home is connected to the network through optical fiber.

Question 2: As shown in the figure above, the device is ( ).

A, switch B, wireless router.

c, modem d, controller.

Answer] B Analysis: A wireless router is a router with wireless coverage function.

Question 3: If the household needs to connect to the network for multiple mobile terminals as shown in the figure above, the most suitable connection method is ( ).

A, wired connection B, wireless connection C, Bluetooth D, hotspot.

Answer] B Analysis: Multiple mobile terminals are connected to the network, and the most suitable connection method is wireless connection.

Question 4: When a desktop is connected to a device via wire, the most suitable transmission medium is . (Fill: twisted pair coaxial cable).

Answer] Twisted pair.

Analysis: Twisted pair is used for the connection of general electrical appliances or socket leads, and the best choice for the network transmission medium laid in the home is twisted pair.

Question 5:The printer shown in the figure above is a network terminal device.

Answer] True. Analysis: A network terminal is a terminal device dedicated to the network environment. It obtains resources over the network, and applications and data are stored on servers. The printer shown in the figure above is a network terminal device.

Question 2 (Question No.: 177, 10 marks in total).

Intelligent parking lot refers to the entrance and exit of the parking lot are automatically released or self-service release by the owner, in the case of no human intervention, through the intelligent management system can achieve non-stop, card-free, convenient vehicle access and other functions.

Question 1: The main technology used in unattended parking is ( ).

a, virtual reality b, deep learning c, Internet of Things d, augmented reality.

Answer] C Analysis: The Internet of Things (English: Internet of Things, abbreviation: IoT) refers to the connection of any object with the network through information sensing equipment and the agreed agreement, and the object exchanges and communicates information through the information transmission medium to achieve intelligent identification, positioning, tracking, supervision and other functions. The main technology used in unattended parking is the Internet of Things.

Question 2: When the vehicle enters the parking lot, the license plate number is automatically recognized by the camera at the entrance, and the artificial intelligence technology used is ( ).

a, machine learning b, pattern recognition c, expert system d, deep learning.

Answer] B Analysis: Pattern recognition technology is an important application field of computers, which is based on the recognition and classification of certain characteristics of the research object, including image recognition, voice recognition, text recognition, fingerprint recognition, etc. When the vehicle enters the parking lot, the license plate number is automatically recognized by the camera at the entrance, and the image pattern recognition technology of artificial intelligence technology is used.

Question 3: If you want to use ETC (Electronic Toll Collection) to pay for your car when you leave the parking lot, you need to use technology. (Fill: RFID Bluetooth).

Answer] RFID

Analysis: Radio frequency identification (RFID) technology is a communication technology, commonly known as electronic tags. Radio signals can be used to identify specific targets and read and write relevant data without the need to establish mechanical or optical contact between the identification system and the specific target.

Question 4: When the vehicle leaves the parking lot, if the parking fee is paid by scanning the payment *** provided by the car owner, then the scanning device needs to be installed ( ).

A, light sensor B, thermal sensor C, pressure sensor D, sound sensor.

Answer] A analysis: The light-sensitive sensor can sense the light intensity of the surrounding environment, and when the light intensity changes, the sensor will produce the corresponding electrical signal.

Question 5: Compared with traditional parking lots, the advantages of unattended parking systems include ( ).

a. It can prevent arbitrary charging and wrong billing b. Save the labor cost of the parking lot.

c. Improve the entry and exit rate d. Improve the user experience.

Answer] ABCD

Analysis: The unattended parking system provides a more convenient and efficient solution for the management of parking lots and the parking of car owners through the advantages of automation, 24-hour operation, reducing labor costs, improving safety, improving user experience and data analysis.

Section3 questions (15 marks in total).

King Shehan of ancient India intended to reward the prime minister Sisa, the inventor of chess. Cesar begged the king, "Your Majesty, I would like to ask you for a little food and then distribute it to the poor people." The king happily agreed. "Send for one grain of wheat in the first square of this board, two in the second, and four ...... in the thirdIn this way, the number of cells in each square is doubled compared to the previous one. Your Majesty, give these grains of wheat that fill all 64 squares on the chessboard to your servantThat's all I need. The king granted the vizier's seemingly insignificant request. But when people brought bags of wheat and began to count, they found that even if they brought wheat grains from all over the country and even the world, they could not meet his requirements. So, how much wheat did the minister ask for?Please program to solve this problem.

Question 1: As shown in the figure, the program flowchart solves the problem of calculating the number of wheat grains in the nth checkerboard, and the core algorithm involved in this flowchart is ().

a, enumeration algorithm b, accumulation algorithm c, sorting algorithm d, multiplication algorithm.

Answer] B Analysis: The accumulation algorithm is a method used to calculate the sum of a set of numbers. Usually an accumulation algorithm adds a series of numbers one after the other to get the sum of them.

Question 2: Open the file "Wheat Calculation" in the "Candidate Folder co1ligatel171" folder. py", improve the program according to the flow chart, and make the program run successfully.

Program Materials:

Answer:

Section4 questions (15 marks in total).

Open the file "Seventh National Population Census Questionnaire" in the folder "e: etstuop 10101000230138110101000230138lco1ligate 198". x1sx", do the following and save:

1) Merge and center the cell range of the header row A1:E1 in the table, and set the font to bold, 16 number;

2) Calculate the total population with the formula, placing the results in the d4:d23 cell area;

3) According to the data given in **, calculate the sex ratio of the population by age group in the corresponding position (population sex ratio = number of males and number of females) and set it to a percentage format, keeping 1 decimal place;

4) Set the data in the table with a sex ratio of more than 103% as "red text".

5) In the sheet1 worksheet, use the vlookup function to count the number of men and women in the corresponding cells for two age groups;

6) Save the file and turn off WPS.

File Footage:

Worksheet "Questionnaire" Answers:

Worksheet "sheet1" answer:

The test questions in this paper are all derived from the teaching and practice support system of the compulsory course of information technology in high schools in Henan Province).

Related Pages