Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

1/30 Single-answer Question (4 points)

Which of the following descriptions of information and data is wrong?


A. Data is the form and carrier of information, and information is the
connotation of data.
B. When measuring the body temperature, the patient’s body temperature is
39 C, which is information, while the doctor writes 39 C in the medical
record, which is data.
C. Usually, information and data are strictly distinguished.
D. Information is the reflection of the characteristics of various things in the
objective world.

Answer: C. Usually, information and data are strictly distinguished.

Explanation: While there are some conceptual differences between data and
information, the terms are often used interchangeably in practice, and there
is no strict distinction between them. Option A is correct as data is the form
and carrier of information, while information is the connotation of data.
Option B is also correct as the patient's body temperature is information,
while the doctor's recording of 39 C is data. Option D is correct as
information is indeed the reflection of the characteristics of various things in
the objective world.

2/30 Single-answer Question (4 points)


Which of the following descriptions about reasons for the use of binary in
computer system is wrong?
A. Easy to implement physically.
B. It is different from the decimal system used in daily life.
C. Simple operation rules can simplify the hardware structure.
D. "1" and "0" correspond to "true" and "false" to facilitate logical operation.

Answer: B. It is different from the decimal system used in daily life.

Explanation: This statement is incorrect. Binary is not different from the


decimal system used in daily life; it is simply another way of representing
numbers. The use of binary in computer systems has several advantages,
including the ease of implementation, simplified hardware structure due to
simple operation rules, and the ability to facilitate logical operations by using
"1" and "0" to represent true and false values. Therefore, options A, C, and
D are all correct descriptions of reasons for the use of binary in computer
systems.

3/30 Single-answer Question (4 points)


Which of the following is the correct description of the sequence of image
digitization process?
A. image sampling quantization coding digital signal
B. image quantization sampling coding digital signal
C. image sampling coding quantization digital signal
D. image coding quantization sampling digital signal

Answer: A. image sampling quantization coding digital signal

Explanation: The correct sequence of image digitization process is sampling,


quantization, coding, and digital signal. In the first step, the image is
sampled to obtain a discrete set of values representing the original
continuous image. Then, in the quantization step, the sampled values are
mapped to a finite set of discrete values to reduce the amount of data
needed to represent the image. Next, in the coding step, the quantized
values are encoded using a suitable algorithm to further reduce the amount
of data needed to represent the image. Finally, the encoded data is
represented in digital form as a digital signal. Therefore, option A is the
correct description

4/30 Single-answer Question (4 points)


Which of the following descriptions about images is wrong?
A. Resolution and color depth are technical parameters of image.
B. In true color, the color depth is 24 bits, every color component accounts
for 1 byte, and there are 224 colors in all.
C. In black-and-white images, 0 represents pure white and 1 represents
pure black.
D. The digitized image is composed of pixels.

Answer: B. In true color, the color depth is 24 bits, every color component
accounts for 1 byte, and there are 224 colors in all.

Explanation: This statement is incorrect. In true color, the color depth is


indeed 24 bits, but every color component accounts for 8 bits or 1 byte, not
1 bit as mentioned in option B. Therefore, the total number of possible colors
in true color is 2^(8*3) = 16,777,216, not 224. Option B is incorrect and all
other options (A, C, and D) are correct descriptions of images.

5/30 Single-answer Question (4 points)


If the input sequence of a stack is a, b, c, d, which of the following cannot be
the output sequence of the stack?
A. c, b, a
B. d, c, b
C. a, b, d
D. b, c, d

Answer: C. a, b, d

Explanation: A stack follows the Last-In-First-Out (LIFO) principle, which


means that the most recently added item is removed first. Therefore, option
C cannot be the output sequence of the stack because it would require
removing "d" before "a" and "b," which contradicts the LIFO principle.
Options A, B, and D are all valid output sequences of the given input
sequence.

6/30 Single-answer Question (4 points)


Which of the following is the location where the stack is inserted and
deleted?
A. stack bottom
B. stack top
C. anywhere
D. designated location

Answer: B. stack top

Explanation: In a stack data structure, items are inserted and deleted from
the top of the stack. This is because the stack follows the Last-In-First-Out
(LIFO) principle, meaning that the most recently added item is the first to be
removed. Therefore, the location where the stack is inserted and deleted is
the stack top. Options A, C, and D are incorrect.

7/30 Single-answer Question (4 points)


If it is known that the input sequence of a stack is 1, 2, 3,... n, and its
output sequence is a1, a2, a3,..., an, if a1 = n, which of the following
options is ai?
A. i
B. n-i
C. n-i+1
D. unable to determine

Answer: C. n-i+1

Explanation: Since the input sequence is 1, 2, 3,... n and the output


sequence is a1, a2, a3,..., an, and a1 = n, it follows that the last item
pushed onto the stack is n. Therefore, the first item popped from the stack is
n, which corresponds to a1. The next item popped from the stack
corresponds to a2, and so on. Since the item at position i in the input
sequence is popped from the stack at position n-i+1 in the output sequence,
it follows that ai = n-i+1. Therefore, option C is the correct answer.

8/30 Single-answer Question (4 points)


To design an algorithm to judge whether the left and right parentheses in
the expression are paired, which of the following data structures is the best
solution?
A. sequential storage structure of linear table
B. chain storage structure of linear list
C. queue
D. stack

Answer: D. stack

Explanation: The problem of matching left and right parentheses is a classic


example of a problem that can be solved using a stack data structure. To
check whether the parentheses are correctly paired, we can use a stack to
keep track of the opening parentheses that we encounter while scanning the
expression. Whenever we encounter a closing parenthesis, we can pop the
stack and check whether the opening parenthesis that we just popped
matches the closing parenthesis that we just encountered. If the
parentheses are correctly paired, then the stack should be empty at the end
of the scanning process. Option D, stack, is therefore the best solution for
this problem. Options A, B, and C are not as suitable for this problem
because they do not provide the necessary operations for checking the
pairing of parentheses.

9/30 Single-answer Question (4 points)


Which of the following descriptions about the common points between stack
and queue is correct?
A. first in, first out
B. first in and last out
C. insert and delete elements at the endpoint
D. have nothing in common

Answer: C. insert and delete elements at the endpoint

Explanation: The stack and the queue are both abstract data types that are
used to store and manage collections of elements. They have several
differences, such as the order in which elements are added and removed.
However, they also have one important feature in common: both data
structures allow elements to be inserted and deleted at one or both
endpoints. In a stack, elements are inserted and deleted from the top of the
stack, while in a queue, elements are inserted at the rear and deleted from
the front. Nevertheless, in both data structures, the endpoints are the
locations where insertions and deletions occur. Therefore, option C is the
correct answer.

10/30 Single-answer Question (4 points)


Which of the following options is the purpose of data encryption?
A. protect data content
B. convert the original text into ciphertext
C. change information content
D. improve data transmission efficiency

Answer: A. protect data content

Explanation: The purpose of data encryption is to protect the content of the


data being transmitted or stored from unauthorized access, interception, or
modification. Encryption is the process of converting the original plain text
into an unintelligible form, known as ciphertext, using an algorithm and a
secret key. The ciphertext can only be decrypted back into the original plain
text using the same secret key. Encryption ensures that even if an attacker
gains access to the encrypted data, they cannot read or modify it without
the secret key. This is important in many applications, such as online
banking, e-commerce, and communication between government agencies,
where the security and privacy of the data must be protected. Therefore,
option A is the correct answer.

11/30 Single-answer Question (4 point)


In order to solve the speed mismatch between the computer and the printer,
a print data buffer is usually set. The host writes the data to be printed into
the buffer in turn, queue up for printing, and the printer reads the data from
the buffer in turn and prints. Which of the following is the logical structure of
the buffer?

A. Queue
B. Stack
C. Linear table
D. Ordered list

Answer: A. Queue

Explanation: A queue is a linear data structure that follows a First-In-First-


Out (FIFO) order, where the element that is inserted first is the first one to
be removed. In the case of a print data buffer, the data is written to the
buffer in turn and queued up for printing, and the printer reads the data
from the buffer in turn, which follows the FIFO order of a queue.
12/30 Single-answer Question (4 point)
Which of the following descriptions about the characteristics of big data is
wrong?

A. large data scale


B. various types of data
C. high value density of data
D. fast data processing speed

Answer: D. fast data processing speed

Explanation: Big data is characterized by large data scale, various types of


data, high value density of data, and fast data processing speed. However,
the statement "fast data processing speed" is wrong, as big data requires
significant processing power and time to extract valuable insights and
information.

13/30 Single-answer Question (4 point)


Which of the following descriptions of the data storage structure is wrong?

A. The storage structure of data is closely related to the efficiency of data


processing.
B. The storage structure of data refers to the representation of the logical
structure of data in the computer.
C. In the computer, the storage structure of data is expressed by linear
structure.
D. In the computer, the space occupied by the storage structure of data is
not necessarily continuous.

Answer: C. In the computer, the storage structure of data is expressed by


linear structure.

Explanation: The statement "In the computer, the storage structure of data
is expressed by linear structure" is wrong. In the computer, the storage
structure of data can be expressed by both linear and nonlinear structures.
Linear structures include arrays, linked lists, and queues, while nonlinear
structures include trees and graphs.

14/30 Single-answer Question (4 point)


Which of the following options controls the process of data encryption and
decryption?

A. Ciphertext
B. Key
C. Plaintext
D. Information

Answer: B. Key

Explanation: The key is a parameter that controls the process of data


encryption and decryption. It is used to transform the plaintext into
ciphertext during encryption, and to transform the ciphertext back into
plaintext during decryption.

15/30 Single-answer Question (4 point)


Which of the following is not a performance indicator of information
compression technology?

A. total compressed information


B. ratio of storage capacity before and after compression
C. speed of compression and decompression
D. software and hardware expenditures for compression

Answer: D. software and hardware expenditures for compression

Explanation: The performance indicators of information compression


technology include total compressed information, ratio of storage capacity
before and after compression, and speed of compression and
decompression. The statement "software and hardware expenditures for
compression" is not a performance indicator.

16/30 Multi-answer Question (4 point)


Multiple choice: Which of the following options are coding methods?

A. LDPC
B. ISBN
C. QR code
D. Bar code

Answer: A. LDPC, C. QR code, D. Bar code

Explanation: LDPC (Low-Density Parity-Check) codes are a class of linear


error-correcting codes.

17/30 Multi-answer Question (4 points)


Which of the following description of digital signature are wrong? (Select all
that apply)
A. The purpose of digital signature is to keep secret and prove the identity of
the sender.
B. RSA algorithm cannot implement digital signature.
C. Digital signature is the digital image of handwritten signature.
D. Only the recipient can use the private key.

Answer:
A. The purpose of digital signature is to keep secret and prove the identity of
the sender.
B. RSA algorithm cannot implement digital signature.
C. Digital signature is the digital image of handwritten signature.
D. Only the recipient can use the private key.

Explanation:
A. This statement is false. The purpose of digital signature is not to keep
secret, but to ensure the integrity, authenticity, and non-repudiation of
digital messages or documents by providing a means to verify the identity of
the sender.
B. This statement is false. RSA algorithm is commonly used for
implementing digital signatures.
C. This statement is false. Digital signature is not a digital image of a
handwritten signature. It is a mathematical scheme that is used to verify the
authenticity of digital messages or documents.
D. This statement is false. The sender uses their private key to create a
digital signature, and the recipient uses the sender's public key to verify the
signature. Only the sender should have access to their private key, but the
private key is not limited to use by the recipient.

18/30 Multi-answer Question (4 points)


Which of the following data structures belong to nonlinear data structures?
(Select all that apply)
A. graph
B. queue
C. binary tree
D. stack

Answer:
A. graph
C. binary tree

Explanation: Nonlinear data structures are structures that do not have a


linear, sequential organization of elements. Graphs and binary trees are
examples of nonlinear data structures because they represent a collection of
elements that are organized in a non-linear or hierarchical manner. In
contrast, stacks and queues are examples of linear data structures because
they organize data in a linear, sequential manner.

19/30 Multi-answer Question (4 points)


What are the correct items in the following description of stack application
scenarios? (Select all that apply)
A. recursive call
B. function call
C. expression evaluation
D. directory structure of file system

Answer:
A. recursive call
B. function call
C. expression evaluation

Explanation: Stacks are commonly used in various computer science


applications, including:
A. Recursive call: Stacks are used to store the return address of a function
when it calls itself recursively.
B. Function call: Stacks are used to store the return address of a function
when it calls another function.
C. Expression evaluation: Stacks are used in the evaluation of expressions to
store operators and operands.
D. Directory structure of file system: Stacks are not commonly used to
represent the directory structure of a file system. Instead, file systems are
usually represented using a tree data structure.

20/30 Multi-answer Question (4 points)


In the following description of data encryption, which items are wrong?
(Select all that apply)
A. The process of transforming plaintext into ciphertext is called encryption.
B. The original data that needs to be encrypted is called ciphertext.
C. In asymmetric cryptosystem, different keys are used for encryption and
decryption.
D. In asymmetric cryptosystem, the public key is generally used for
decryption and the private key is used for encryption.

Answer: B. The original data that needs to be encrypted is called ciphertext.

Explanation: Encryption is the process of transforming plaintext into


ciphertext. The original data that needs to be encrypted is called plaintext.
In asymmetric cryptosystem, different keys are used for encryption and
decryption. In asymmetric cryptosystem, the public key is generally used for
encryption and the private key is used for decryption.

21/30 True or False Question (2 points)


True/False: Data is the manifestation and carrier of information, and
information is the connotation of data. Information is meaningful, while data
is meaningless.

Answer: True

Explanation: Data and information are related concepts, but they have
different meanings. Data refers to raw facts or figures that have not been
processed or analyzed, and therefore have no meaning in themselves.
Information, on the other hand, is data that has been processed and given
meaning, context, and relevance. In other words, data is the manifestation
and carrier of information, while information is the connotation of data.
Therefore, data is considered to be meaningless, while information is
considered to be meaningful.

22/30 True or False Question (2 points)


True/False: Hexadecimal is a common base system inside the computer,
which can make up for the shortage of long writing digits of binary.

Answer: True

Explanation: Hexadecimal is a base-16 numbering system that uses 16


different symbols to represent numbers. It is commonly used in computing
as it allows for compact representation of binary data, as each hexadecimal
digit represents 4 binary digits (bits). This makes it easier to read and write
binary numbers, which can be quite long and difficult to work with directly.

23/30 True or False Question (2 points)


True/False: In the computer, all information must be digitized into data
before it can be stored, processed and transmitted.

Answer: True

Explanation: Computers operate using digital signals, which means that all
information must be converted into digital data before it can be stored,
processed, and transmitted by a computer. This is achieved through a
process called analog-to-digital conversion (ADC) which converts analog
signals (such as sound, images, and video) into digital data that can be
processed by a computer.
24/30 True or False Question (2 points)
True/False: It is forbidden to use lossy compression method to compress
data, because it will make the original data unrecoverable.

Answer: False

Explanation: Lossy compression methods are commonly used in multimedia


data compression, such as compressing images, audio, and video. These
methods can achieve high compression ratios by selectively discarding
information that is less perceptible to the human senses. While this results in
some loss of data, the loss is usually acceptable for the intended use of the
data. For example, compressed images may have slightly lower resolution or
color fidelity, but are still recognizable and useful. However, lossy
compression is not suitable for data that requires exact replication, such as
scientific or financial data, where even a small loss of accuracy can be
significant.

25/30 True or False Question (2 points)


True/False: Data organization refers to organizing data with a certain logical
relationship and configuring it in the memory of the computer according to a
certain storage representation, so that the computer can meet the
requirements of fast processing speed, less memory capacity and low cost.

Answer: True

Explanation: Data organization refers to the process of arranging data in a


logical and structured way, such that it can be efficiently stored, accessed,
and processed by a computer system. The aim of data organization is to
optimize the use of computer memory and processing speed, while
minimizing the cost and resources required for data storage and retrieval.

26/30 True or False Question (2 points)


True/False: In the queue, the end performing the insertion operation is
called the queue head, and the end performing the deletion operation is
called the queue tail.

Answer: False

Explanation: In the queue, the end performing the insertion operation is


called the queue tail, and the end performing the deletion operation is called
the queue head. This is because a queue follows the "First In, First Out"
(FIFO) principle, where the first element inserted into the queue is the first
one to be removed.
27/30 True or False Question (2 points)
True/False: Message digest refers to that messages (files) of any length can
be converted into hash values of fixed length by means of hash function, and
the original information can be inferred from the message digest.

Answer: True

Explanation: Message digest refers to the output of a hash function, which


takes messages of any length and converts them into fixed-length hash
values. It is computationally infeasible to infer the original message from the
message digest, making it a one-way function. Message digests are
commonly used in cryptography and digital signatures.

28/30 True or False Question (2 points)


True/False: HDFS is an abbreviation of Hadoop Distributed File System,
which can realize the distributed storage of files on multiple hosts through
the network.

Answer: True

Explanation: HDFS (Hadoop Distributed File System) is a distributed file


system designed to store and manage large amounts of data in a distributed
computing environment. It can store large files across multiple machines
and provides redundancy to ensure data availability even if some machines
fail.

29/30 True or False Question (2 points)


True/False: In asymmetric cryptosystem, the private key is used to verify
the signature.

Answer: False

Explanation: In asymmetric cryptosystem, the private key is used for


decryption and signing while the public key is used for encryption and
verifying signatures.

30/30 True or False Question (2 points)


True/False: In asymmetric cryptosystem, the encryption and decryption keys
are the same, and the key distribution management is simple.

Answer: False

Explanation: In asymmetric cryptosystem, also known as public-key


cryptography, the encryption and decryption keys are not the same. Two
different keys are used, a public key for encryption and a private key for
decryption. The key distribution management is more complex than in
symmetric cryptography, where the same key is used for both encryption
and decryption.

You might also like