Current location - Training Enrollment Network - Mathematics courses - 20 12 spring math exam
20 12 spring math exam
20 12 Dalian ordinary high school students' academic level examination (simulation volume)

information technology

Note: This article is divided into multiple-choice questions in Volume I and non-multiple-choice questions in Volume II. Full volume ***8 pages, full mark 100. The examination time is 50 minutes.

Volume one multiple-choice questions

Precautions:

1. The first volume is required for candidates.

Candidates must scribble their name, admission ticket number and exam subjects on the answer sheet before answering the answer sheet 1.

3. After choosing the answer for each question, use 2B pencil to black the answer label of the corresponding question on the answer sheet, so that it cannot be answered on the test paper.

First, multiple-choice questions (2.5 points per question, 20 questions, ***50 points)

1. Resource Manager is an information resource management tool of Windows system. It uses ()

A. Tree directory B. Network directory C. Cross directory D. Linear directory

2. There is a computer configured as: Intel Core i52300/1GB/1TB/50x/19', where () is usually used to indicate the memory size.

a . 2300 b . 1TB c . 1GB d . 50×

3. The following does not belong to the application software is ()

A, cool editor Pro2000 B, Windows Vista

C, Ulead GIF animator D, Adobe Premiere

4. There is a computer configured as: Intel Core i52300/1GB/1TB/50x/19', where () is usually used to indicate the memory size.

a . 2300 b . 1GB c . 1TB d . 50×

5. Xiaohong downloaded a video file from the Internet, so the format of this video file can't be ().

A.rm B. mpg C. mp3 D. mov

6. generally, obtaining information needs to go through the following basic processes: ()-> determine the source of information->; Collect information-> save information.

A. determine the information type B. determine the information demand C. determine the information collection method D. determine the goal.

7. The following is not a download tool ()

A. electric donkey B. Photoshop C. thunder D. QQ whirlwind

8. Suppose a teacher inputs information on the Internet, enters "High School Information Technology Test Questions" in the search bar, and then clicks the "Search" button. Excuse me, does this information resource retrieval method belong to ()?

A. professional vertical search B. multimedia information search C. full-text search D. classified search

14.WPS is a kind of () software. A. Animation processing B. Word processing C. Spreadsheet D. Games

15. When a student's report form is stored in the database, a row of data is called a ().

A. Line B. Record C. Information D. Field

16. Chen Ming wants to send the completed math exercise *** 15 file to the math teacher by email, and each file has a capacity of about 20KB. A more appropriate way is ().

A. Send 15 files as email attachments at one time. B put the 15 file into the "Math Homework" folder and send it as an attachment at one time. C compress and package the 15 file into a file and send it as an email attachment. D. send the 15 file.

17. A classmate wants to send an email to a friend studying abroad to discuss an electronic draft. If there is no Chinese character processing system in the other party's computer, the effective and quick method that can be used is ().

Please translate the manuscript into English and send it by email. B, print the manuscript in Chinese characters and scan it into jpeg format. C, use PhotoShop and other software to make the manuscript file into jpeg format and mail it. Send mail in hanyu pinyin.

18. There are 10000 true-color (32-bit) historical pictures of World War II in He Laoshi with a resolution of 1024×768. He wants to burn these photos to a CD. Assuming that each CD can store 700MB of information, He Laoshi needs a CD ().

A.7 B.8 C.70 D.7 1。

19. The following files belong to the webpage file ().

A. Index. doc

B.index.txt

C.index.htm

D. index. ppt

20. Effective access to information, generally go through the following () process.

A determine the information demand → determine the information source → collect information → save information.

B determine the information source → determine the information demand → collect information → save information.

C determine the form of information → collect information → process information → save information.

D, determine the information form → determine the information source → collect information → save information.

Volume 2 Non-multiple choice questions

Precautions:

1. Volume II is divided into two parts, the first part is compulsory module test questions, and the second part is elective module test questions. The first part is the required content; The second part is to choose the content of the answer. Candidates choose an elective module to answer, and multiple answers do not accumulate points.

2. Before answer sheet 2, candidates must write their names, admission ticket numbers and exam subjects in the sealed position of the answer sheet.

3. After each question is answered, write the answer in the corresponding position on the answer sheet with a ballpoint pen (or carbon pen), not on the test paper.

The first part of the compulsory module test questions

Two, comprehensive application problems (20 points)

Zhang Ying is doing research on "Teenager Vision" and processing the collected information with spreadsheet software. Among them, Figure 1 and Figure 2 are screenshots of some contents in the document "Overview of Teenagers' Vision". Please cooperate with Zhang Ying to handle this document according to the following requirements.

2 1. The button that can center the table title "Summary of Adolescent Vision" is ().

A.B. C. D。

22. As shown in figure 1, the function used to calculate the average visual acuity of students in each school should be ().

A. Minimum average cost maximum

23. The chart type shown in Figure 2 is ().

A. Line chart B. Area chart C. Column chart D. Column chart

24. In the following operations, it is () that you can copy the chart shown in Figure 2 into a Word document.

A. Cut and paste B. Copy and paste

C. Cutting and copying D. Cutting and formatting brushes

25. Please provide Zhang Ying with an Internet-based instant messaging tool, and describe the basic operation method of the tool to help her and her team members exchange information with each other.

The second part elective module test questions

Elective module: algorithm and program design

Three. True or false questions (65,438+0.5 points for each question, 65,438+00 points for each question, * * * 65,438+05 points, tick X for true or false)

1. algorithm is the method and steps to solve the problem. ( )

2. The program we wrote in VB can be compiled into EXE files, and can be directly executed without VB environment. ( )

3. An algorithm can be implemented in multiple programming languages. ( )

4. Exhaustion method is only suitable for solving problems with finite solutions. ( )

5.Visual Basic is a program language that can be directly recognized by computers. ( )

Number of cycles in 6.6. The FOR loop statement is int ((final value-initial value) /step+1). ( )

7. In Visual Basic, a string is a string enclosed in single quotation marks. ( )

8. When setting the title of VB form, you should change the Name property value of the form. ( )

9. in Visual Basic, let a=2, b=3, and the expression not(a >;; B) the value is true. ( )

10. When using method of bisection method to find data, the data to be found must be orderly. ( )

Iv. Practical analysis questions (15)

Please read and analyze the following Visual Basic program code carefully, and complete the topic as required.

Dim a( 1 to 6) is an integer.

Dim n, i, j and k are integers.

Private subcommand 1_Click ()

For i = 1 to n-1

For j = (1) to n

If a (i) <: A(j) then

k = a(i): (2) : a(j) = k

If ... it will be over.

Next J.

Next, I

For i = 1 to n

Listing 2. AddItem string (a(i))

Next, I

End joint

Private subtext1_ keypress (keyascii is an integer)

If KeyAscii = 13, then

n = n + 1

a(n) = Val( (3))

List 1。 AddItem string (a(n))

Text 1。 Text = "": Text 1。 SetFocus

If ... it will be over.

End joint

1 1. There are two kinds of controls: text and list, in which the Chinese name of the list control is list box and the Chinese name of the text control is.

12. The function of str () is:

13. Enter the data in list 1 in turn: 2, -7, 9, 8, -3, 12, and run the program. The result displayed in list2 is ().

A. 12 B. 12 9 8 2 -3 -7

C.-7 -3 2 8 9 12 D

14. Add appropriate sentences in the three blank spaces with serial numbers in the above program segments to improve the program.

Elective module: multimedia technology application

Three. True or false (65,438+0.5 points for each sub-question, 65,438+00 points for sub-questions, * * * 65,438+05 points, tick right, and x for wrong).

The 1. layer is the basic component of Flash movies. ( )

2. Video conference system is a centralized multimedia information management system. ()

3.MIDI is the abbreviation of musical instrument digital interface, which belongs to the international standard of digital music. ( )

4. The role of the wand is in 4. Photoshop is to produce magical image effects. ( )

5. In order to make a Flash animation moving along a complex path, it is necessary to adopt the animation technology of the motion guidance layer. ( )

6. The recording software that comes with 6.Windows can record 60 minutes of wav files. ( )

7. Vector image files are small in capacity and will not be distorted after amplification, so it is easy to make images with too many color changes. ( )

8. Save the same picture in BMP format and JPEG format respectively, and the two files are different in size. ( )

9. Bitmaps can be made by drawing programs, directly grabbed on the screen, or obtained by scanners. ( )

10. In PowerPoint browse view, hold down the CTRL key and drag the slide to move. ( )

Iv. Practical analysis questions (15)

When Dandan traveled to Beijing in the summer vacation, he took a group of satisfactory digital photos. She wants to DIY a photo with the multimedia processing technology she has learned, and also wants to synthesize the tourist scene into an MTV. There are some problems in the production process, please help her solve them.

1 1. Dandan chose a bareheaded front photo and wanted to make it into a one-inch red background photo. The correct operation step is ().

① Fill the background color into red with the paint bucket tool; ② Hook the head image out of the background with the polygonal lasso tool; ③ Open the digital photo with Photoshop; ④ Click Select/Inverse Select to select the background other than the head image; ⑤ Cut the photo into one-inch photos and print them in typesetting.

A.③④①②⑤ B.②④③①⑤ C. ③②④①⑤ D. ③②①④⑤

12. Dandan made an animation with Flash, in which the word "Beijing" became "I'm coming", but the result was not successful. The error shown in the following figure appears, and the reason may be:.

Figure 3

The meaning of "stop all sounds" in 13. The flashing action is ().

A. stop all sounds. B. jump to the hyperlink address URL.

C. Send the FSCommand command D. Load the movie.

14. Common image formats are _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _; Midi formats are _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.

Elective module: application of network technology

Three. True or false questions (65,438+0.5 points for each question, 65,438+00 points for each question, * * * 65,438+05 points, tick X for true or false)

1. The abbreviation of Uniform Resource Locator on the World Wide Web is HTTP. ( )

2. The 2.IP address 127.233. 13.34 is a class C address. ()

3. Hub is a network device to realize the interconnection between different networks. ( )

The lowest layer of 4.OSI/RM reference model is the physical layer. ( )

5. The firewall in computer network is mainly to avoid the fire of network equipment. ( )

6. Twisted pair is the transmission medium with the strongest anti-interference ability in computer network. ()

Labels in 7.HTML Language

8. In the Internet, an IPV6 address consists of 4 bytes. ( )

9. The "Network Neighborhood" using Windows system can access the * * * resources in the local area network. ( )

10. The abbreviation of Internet Domain Name Service System is DNS. ()

Iv. Practical analysis questions (15)

Teacher Zhang hopes that both computers at home can access the Internet. A friend helped him apply for an Internet account at ISP, got an ADSL modem, bought four routers, network cards, network cables and connectors, and connected the computer, ADSL modem and router. Please make the necessary settings on the basis of correct hardware connection, and realize teacher Zhang's desire to surf the Internet as soon as possible.

1 1. Router belongs to () in computer network system.

A. Computing equipment B. Network protocol C. Communication line D. Connecting equipment

12. The following can be used as the IP address of the router ().

A. 192. 168.0.258

C. 192. 168. 1. 1

13.ISP means ().

A. Internet service protector B. Internet service provider

C.d. international joint service

14. Please set the relevant parameters to realize Mr. Zhang's desire to surf the Internet through an ADSL modem.

Elective module: data management technology

Three. True or false questions (65,438+0.5 points for each question, 65,438+00 points for each question, * * * 65,438+05 points, tick X for true or false)

1. A database can contain multiple tables. ( )

2. In a relational database, the data types of the same field can be different. ( )

3. In the two-dimensional data table of relational database, columns are called records and rows are called fields. ( )

4. When querying multiple tables, related tables must be associated. ( )

5. The initial stage of data management technology is the text stage. ( )

6. The abbreviation of structured query language is SQL. ( )

7. Only 1 primary keyword can be set in the same data table. ( )

8. After modifying a record in the data table, the related query results will also change. ( )

9. The contact types between entity sets can be one-to-one, one-to-many, many-to-one and many-to-many. ( )

10. When querying, you can use the Count () function to calculate how many records are in * * * *. ( )

Four, practice analysis (15 points)

In the relational database of school information technology curriculum management, there are the following data tables. Each row in the table records the data of a student, except the header.

Student number name class course number course name score

100753 Chen Yuanyuan Senior Two (Class 7) XX03 Multimedia Technology Application B

10 1025 data management technology a of class XX05 in Aric (10)

100 132 XX02 algorithm and program design of class b in Zhang Yong senior high school (1)

… … … … … …

Please read the above table carefully and complete the following questions.

The first line in the 1 1. table corresponds to the database term ().

A. File B. Database C. Field D. Record

12. In the above table, the most suitable keyword is ().

A. Student ID B. Name C. Course ID D. Results

13. If you want to count the number of students studying data management technology, the function you should choose is ().

A. the maximum b count, the sum of c and the average value of d

14. According to the analysis of course selection information, someone designed the E-R diagram as shown in Figure 4.

Figure 4

The relationship patterns that can be transformed by this E-R diagram are: