2023 Information Technology Academic Proficiency Test Practice System Paper 20 Analysis

Mondo Education Updated on 2024-01-31

OneMultiple choice questions (number of questions: 20 questions, total: 40 marks).

1. In the following description of the characteristics of big data, the incorrect one is ( ).

A. Various data types B. High data value density C. Fast data processing speed D. Large data scale [Answer] B

Analysis: Big data has four characteristics, namely: volume, variety, velocity, and value. The value density of big data is relatively low, and the value density of big data is the amount of valuable information generated by a unit of data. Because the amount of data in big data is too large (much larger than that of traditional data), if all the valuable pieces of information are 10, then the value density in big data is relatively lower. It can be understood in this way: just as there are 10 pearls in the sea (big data) (valuable information) and 10 pearls (valuable information) in a bowl of water (traditional data), the value density of big data is lower (i.e., the proportion of valuable information is low).

2. The three elements of sound digitization will directly affect the quality of the digitized audio and the size of its data, which usually refer to ( ).

a, sampling frequency, number of quantization bits, number of channels b, sampling frequency, number of coding bits, number of channels.

c. Number of sampling bits, quantization frequency, number of channels d, sampling frequency, number of quantization bits, number of codings.

Answer] A Analysis: The three elements of sound digitization usually refer to the sampling frequency, the number of quantization bits, and the number of channels.

3. Among the following options, the one that does not belong to the basic control structure of the computer program is ( ).

A. Sequential structure B. Branching (selective) structure C. Circular structure D. Hierarchy.

Answer] D Analysis: The basic control structure of a computer program includes: sequential structure, branch (selection) structure, and cyclic structure.

First, determine whether a is greater than b, and the result of "8>16" is "false", then execute the branching statement of the selection structure "else", and assign the value of b to m, where m is 16;Then check whether c is greater than m, the result of "32>16" is "true", execute the internal statement of the selection structure, assign the value of c to m, then the value of m is 32, and finally output the value of m is 32.

5. ** is a widely used encoding method, which can store more information and represent more data types. The specified information can be generated through the *** generator software, such as the *** generation tool, the *** corresponding to the text "information center" is generated, and this generation process belongs to ( ).

a. Text recognition b. Image processing c. Information coding d. Speech recognition.

Answer] C Analysis: Information coding is the process of giving information elements the best in order to facilitate the storage, retrieval and use of information. ** is a widely used way of encoding information.

6. In a relational database, a relationship corresponds to a ( ).

A, record B, hierarchical model C, mesh model D, 2D table.

Answer] D Analysis: In the relational model, the data structure is represented as a two-dimensional table, and a relationship is a two-dimensional table. A two-dimensional table can be understood as a ** where rows and columns intersect.

7. Among the following options, the one that does not include big data application technology is ( ).

a. The public security department uses the smart city's monitoring system to assist in capturing criminal suspects.

b. The teacher conducts statistical analysis of the final grades of the students in the class through WPS**.

c. Understand the road conditions in real time through the mobile phone navigation software and plan the best travel route.

d. Through the traffic analysis of the cars on the road, the congestion time and congestion of each road section are carried out.

Answer] B Analysis: The application technology of big data covers all kinds of big data platforms, big data index systems and other big data application technologies. The teacher conducts a statistical analysis of the final grades of the classmates through WPS**, which does not include big data application technology.

8. A solid-state hard disk with a storage capacity of 2TB is approximately equivalent to a mechanical hard disk with a storage capacity of 256GB.

a、2 b、4 c、8 d、12

Answer] C Analysis: Computer information storage units include B (bytes), KB (kilobytes), MB (megabytes) and GB (billion bytes), etc., and their conversion relationship is 1024 times that of the previous level at each level, such as 1KB=1024B, 1M=1024KB. 2tb=2*1024gb=8*256gb。

9. Among the following options, a group of input devices is ( ).

A, Keyboard, Disk, Printer B, Keyboard, Scanner, Mouse C, Hard Disk, Printer, Keyboard D, Keyboard, Mouse, Monitor.

Answer] B Analysis: An input device is a device that inputs data and information to a computer. Common input devices include keyboards, mice, cameras, scanners, light pens, handwriting tablets, joysticks, voice input devices, etc.

The output device is a part of the interaction between people and computers, which is used for the output of data, and the common output devices include monitors, printers, plotters, image output systems, voice output systems, magnetic recording devices, etc.

10. Machine learning is the core of artificial intelligence technology, which allows machines to autonomously simulate the process of human learning, so as to make intelligent decision-making behaviors. The following diagram is a schematic diagram of the formation process of human intelligence and the principles of machine learning, and the correct option corresponding to the content in the machine learning diagram is ( ).

a. Model, historical data, algorithm training

b. Training of historical data, models, and algorithms.

c. Algorithm training, models, and historical data.

d. Historical data, algorithm training, and models.

Answer] D Analysis: Machine learning is a subfield in artificial intelligence, that is, using machines to learn previous experience, through continuous self-learning, continuous optimization of the model, and gradually approaching the goal. That is, learning historical data - algorithm training - forming a model.

11. Big data plays an increasingly important role in social development, not only bringing convenience to life, and more often making decision-making more accurate, but also bringing some social problems

a. Understand the amount of regional ** through the city heat map, and provide reference for travel.

b. Merchants can understand the market and consumer behavior through big data, so as to provide decision-making basis for purchase, production and inventory.

c. The big data generated by shared bicycles allows the transportation department to find the lack of bus stops on some routes, so as to determine a new bus operation route map.

d. The leakage of user data information in the face recognition system has caused losses to tens of millions of users.

Answer] D Analysis: The leakage of user data information in the face recognition system may cause losses to users.

12. The following indicates the management information system ( ).

a、dss b、mis c、es d、tps

Answer] B Analysis: Management Information System (MIS) is a human-oriented, using computer hardware, software, network communication equipment and other office equipment to collect, transmit, process, store, update, expand and maintain information.

13, Feng. In a Neumann-based computer, the data output from the output device comes from ( ).

A, input device B, combinator C, controller D, memory.

Answer] D Analysis: During the operation of the computer, the program to be executed and the data to be processed are first stored in the main memory (memory), and when the computer executes the program, it will automatically take out the instructions from the main memory in order and execute them one by one, this concept is called Feng. Neumann architecture of sequential execution procedures.

14. In the Internet's domain name system, the options corresponding to the meanings of domain names represented by gov, com, and edu are ( ).

a. ** Institution, Business Organization, Educational Institution B. Business Organization, ** Institution, Educational Institution.

c. **Institution, Educational Institution, Business Organization d. Educational Institution, Business Organization, ** Institution.

Answer] A Resolution: Dedicated domain name: Indicates thecom, which represents the network provider'snet, which represents the .. of a non-profit organizationorg, which indicates the teaching and research institution. edu, which means ** department. gov for an international organization. int, etc.

15. A lot of math learning apps are installed on the tablet of mathematics, and he often projects the tablet to the class computer when he is in class, leading the students to experience these interesting apps together. Wireless projection technology is widely used in today's life, and there are many ways to cast the screen, but the projection end and the projection end ( ) must be required when projecting

a. Support the same projection protocol b. It is a product of the same manufacturer.

c. For the same brand product d. Set to the same IP address.

Answer] A Analysis: When projecting the screen, it is necessary to require the projection end and the projected end to support the same projection protocol.

16. The unit that describes the network bandwidth is usually bits per second, and when a student passes through the network software, the speed is displayed as 246mb s, from which it is estimated that the network bandwidth used by the student should be at least ( ).

a、300mb/s b、200mb/s c、100mb/s d、10mb/s

Answer] B Analysis: 246mb s can be converted to bits per second (bps) units. 1 byte is equal to 8 bits, so 246mbs can be converted to 246 * 8 = 196.8 mbps。Therefore, the network bandwidth used by the student should be at least 1968 mbps。

17. On August 9, 2019, Huawei held the Huawei Developer Conference in Dongguan and officially released the operating system HarmonyOS 0s. The English language of the HarmonyOS system is ( ).

a、harmonyos b、windows c、i0s d、centos

Answer] A Analysis: The English language of the HarmonyOS system is harmonyOS.

18. When encountering cyberbullying, the following measures are not advisable ( ).

a. Find an opportunity to take revenge on the other party b. Add the other party to the blacklist c. No longer have any dealings with the other party.

d. Requesting ** to delete malicious remarks, if the circumstances are particularly serious, the victim can call the police, so that the Internet police can lock the perpetrator as soon as possible.

Answer] Analysis: When you are cyberbullied, it is not advisable to look for opportunities to take revenge on the other person.

19. Common factors affecting the security of network information systems do not include ( ).

A. Network Factor B. Human Factor C. Technical Factor D. Noise Factor.

Answer] D Analysis: The common factors that affect the security of network information systems do not include noise factors.

20. Among the following network equipment, there is a kind of device that can build a security protection barrier between the external network and the internal network, between the public network and the private network, and implements the access control policy between the two networks, thereby protecting the internal network from the incursion of illegal users, and this equipment is ( ).

A, switch B, router C, firewall D, controller.

Answer] C Analysis: Firewall technology is a technology that helps computer networks build a relatively isolated protective barrier between their internal and external networks by organically combining various software and hardware devices used for security management and screening, so as to protect the security of user data and information.

2. True/False Questions (Number of questions: 5, total: 10 points).

1. Known python list a=['Tiangong', Tianhe','Ask the sky','Survey the sky', Tianzhou'], then the value of a[2] is "Wentian".

Answer] True. Parsing: The list uses square brackets as the index operator, and the index starts at 0, i.e. the index of the first element is 0, the index of the second element is 1, and so on. "Ask the sky" is the third element, and the index is 2.

2. The recursive program must have a clear end condition, otherwise it will fall into an infinite recursive state and cannot end the call.

Answer] True. Resolution: A recursive program must have a definite end condition, also known as the base case. Without an explicit end condition, a recursive function can get stuck in an infinitely recursive state, resulting in an inability to end the call. This condition is called a recursive infinite loop or a recursive dead loop.

3. The size of big data not only refers to the large amount of information, but also includes the characteristics of fast generation and many types. Answer] True.

Analysis: Big data has four characteristics, namely: volume (a large number), variety (variety), velocity (high speed), value (value), generally these four characteristics are called 4V.

4. There is an ancient proverb "the south wind blows in the mang, and the rain fills the pond in summer", which means that the south wind blows when the mango is planted, and usually there is more rain in summer, and the ponds outside the village will be full of rain. This proverb belongs to knowledge. Answer] True.

Analysis: Knowledge is the summary and refinement of information.

5. As long as you publish information anonymously on various social networking platforms, you generally do not leave your own digital footprints. Answer: False.

Analysis: Posting information anonymously on online platforms also leaves your own digital footprint.

3. Comprehensive analysis questions (number of questions: 4, total: 50 points).

Question 1 (Question number: 162, 0 points out of 10).

A digital home system network is partially assigned devices and IP addresses as shown in the figure. Based on the diagram, answer the following questions:

Question 1: In order to access the Internet normally, one end of the network cable needs to be connected to the port of the modem and the other end to the port of the router. (Optional: lan, wan).

Answer] lan, wan

Analysis: The WAN port on the router is used to connect to the external network (public network), or to connect the equipment of the broadband operator. For example, when the WAN port is connected to the moden, it is used to connect to the modenWhen using optical fiber to access the Internet, the WAN port is used to connect to the optical modemWhen the network cable enters the home to access the Internet, the WAN port is used to connect to the home network cable.

The LAN port on the router is used to connect devices in the intranet (LAN), mainly to connect computers, switches, printers and other devices.

Question 2: Desktop computers, laptops, mobile phones, and tablets are all connected to the network through wired connections.

Answer: False. Analysis: The desktop computer in the figure is connected to the network through a wired connection. Laptops, mobile phones, and tablets are all connected to the network wirelessly.

Question 3: After the user registers for the Internet access service, the network operator will provide the user with an IP address to access the Internet.

Answer] True. Analysis: Normally, when a user applies for Internet access services, the network operator will provide the user with a public IP address. This IP address is a unique identifier of the user's device on the Internet, which allows the user's device to communicate and exchange data with other devices on the Internet.

Question 4: The IP address of a desktop computer is: 192 168. 1.2. The IP address of the laptop may be ( ).

a、192. 168.1.256 b、192. 168.2.3 c、192.168.1. 5 d、192. 168.0.1

Answer] C Resolution: The IP address consists of two parts, one is the network address and the other is the host address. The IP address of the desktop computer is: 192 168. 1.2, where the network address is 192168.1. If the host address is 2, then the network address of the IP address of the laptop is also 192168.1. However, the host address of the IP address of the laptop computer cannot be the same as the host address of the desktop computer, and the number of the host address cannot exceed 255.

Question 5: When planning the network, the equipment involved in the digital home system network can be divided according to the access layer, the network layer and the terminal layer

A, wireless router B, laptop C, switch D, modem.

Answer] ac

Resolution: The network layer is located in the middle layer of the computer network, which is mainly responsible for the routing and communication of data packets and the communication between networks. The devices that belong to the network layer in the diagram are wireless routers and switches.

Question 2 (Question No.: 182, 10 marks in total).

Smart campus refers to the organic connection between physical space and information space, so that anyone, any time and any place can easily access resources and services. At present, many schools have built smart campuses based on technologies such as the Internet of Things, big data, artificial intelligence, and cloud computing. Its functions are mainly divided into four sections: smart teaching environment, smart teaching resources, smart campus management, and smart campus services.

After reading the above materials, complete the following questions.

Question 1: Smart campus uses smart access control, and the passage of vehicles is detected and identified in real time through cameras (

a. Image recognition b. Biometric recognition. c. Voice recognition d. RFID radio frequency identification.

Answer: A Analysis: Computer image recognition technology is a technology that uses computers to process, analyze, and understand images to identify targets and objects in various patterns. The passage of vehicles is detected and identified in real time through cameras, mainly using image recognition technology.

Question 2: In the smart campus, "one **" can realize a number of applications such as student status management, book borrowing, canteen consumption, attendance sign-in, access control, etc., and the following statement about "one **" is incorrect ( ).

a. The "one-first" information system is the product of the combination of information technology and modern management.

b. The "one-first" information system is based on computer technology and network technology.

c. "One **" can achieve multiple applications in multiple locations because the main data is stored on the campus card.

d. Students are an integral part of the "one-first" information system.

Answer] C Analysis: Students can use their cards in the school's canteen and supermarket to consume because the relevant data is stored on the server of the campus information system management center.

Question 3: Information system security in smart campus is very important, mainly including system security and information security. System security mainly refers to physical security and operational security, while information security mainly refers to personnel security and content security. Answer: False.

Analysis: Information security does not only refer to personnel security and content security, but is a broader concept that includes the comprehensive protection of data and information resources. Therefore, system security mainly refers to physical security and operational security, while information security mainly refers to access control and data protection.

Question 4: In order to ensure the information security of the smart campus, a hardware firewall is required. The appropriate location for the firewall is ( ).

a. Between the school's official ** server and other servers b. Between the school's teaching building network and other networks.

c. Between the internal network of the school and the external network d. Between the network of the school finance office and other networks.

Answer] C. Analysis: A firewall is a security protection function, which is generally used on computers to protect computers from illegal connections from the Internet or other networks. Firewalls are divided into two categories: hardware firewalls and software firewalls.

A software firewall, as the name suggests, is a software product installed on a server platform that works at the bottom of the operating system to optimize network management and defense functions.

Hardware firewall, in essence, embeds a software firewall in hardware, uses a dedicated network chip to process data packets, adopts a specialized operating system platform, and performs the protection function of the server by the hardware. Because of the embedded structure, it's faster, more powerful, and more performant.

In order to ensure the information security of the smart campus, a hardware firewall is required. The firewall is located between the school's internal network and the external network.

Question 5: The information technology used in the construction and use of the current smart campus is ( ).

A. Internet of Things B. Big Data C. Artificial Intelligence D. Cloud Computing.

Answer] abcd

Analysis: Smart campus refers to the organic connection between physical space and information space, so that anyone, any time, and any place can easily access resources and services. It is built on the basis of technologies such as the Internet of Things, big data, artificial intelligence, and cloud computing.

Question 3 (Question No.: 197, 15 marks in total).

The final examination of a school adopts a random arrangement of examination rooms (30 people per session) for all students of all grades in a similar form of college entrance examination, among which the marking and registration table of the sophomore mathematics 06 examination room and the student registration table (part) of the sophomore (1) class are shown in the figure.

Question 1: Please fill in the math score column of the entry form for all students included in the registration form. Requirements:

1) Open the 'Candidate folder' colligate 197"Flowchart of Files in Folders. docx", where you will draw a flowchart of the program (you will fill in the blanks to complete the flowchart during the exam), save the file and close the application when you are done.

2) Open the 'Candidate folder' colligate 197"file in the folder "p3py", in the python language environment, improve the program and run to complete the processing task, save the file and close the application software when it is finished.

Program Materials:

Answer:

Question 4 (Question No.: 207, 15 marks).

Complete the following questions as required by the test questions:

Question 1: Open the file "Sales Performance Sheet" in the "Candidate Folder Colligate 207" folder. xlsx", complete the following operations and save.

1) Merge and center the cell range of the header row A1:G1.

2) Use the function to calculate the "total sales" for each employee, and fill in the results in cell F3:F19.

3) Use the function to calculate the "Highest Sales" for each quarter, fill in the results in the b20:e20 cell.

4) Use "Highlight Cell Rules" in the "Conditional Formatting" command to set the data format of "Total Sales" between 3100 and 3200 to "Light Red Fill Color Dark Red Text".

5) Use the rank function to rank all employees according to total sales, and fill in the g3:g19 cell. (Hint: Rank is used to return the ranking of a number relative to other values in a column of numbers.) For example: =rank (e3, $e$3:$e$10) indicates the data rank of the e3 cell data in the locked cell region e3:e10).

6) Save the file and turn off WPS.

File Footage:

Answer:

The test questions in this paper are all derived from the teaching and practice support system of the compulsory course of information technology in high schools in Henan Province).

Related Pages