搜档网
当前位置:搜档网 › EC课本题库-2008版ec08_tif_ch17

EC课本题库-2008版ec08_tif_ch17

EC课本题库-2008版ec08_tif_ch17
EC课本题库-2008版ec08_tif_ch17

Chapter 17

Legal, Ethical, and Societal Impacts of EC

True-False Questions

1.For many e-businesses, a majority of their customer online traffic comes from search

engines.

Answer:True Difficulty:Easy Page Reference: 772

AACSB:Use of information technology

2.All marketing methods us ed to increase the ranking of a company’s Web site in the search

results are ethical.

Answer:False Difficulty:Easy Page Reference: 772

AACSB:Use of information technology

https://www.sodocs.net/doc/908813840.html,panies use search engine marketing (SEM) methods to increase their chance of “getting

found” among competing Web sites.

Answer:True Difficulty: Medium Page Reference: 772

AACSB:Use of information technology

4.The volume of e-mail spam has decreased because of the widespread use and effectiveness of

antispam software and ISP spam filters.

Answer:F alse Difficulty:Medium Page Reference: 772

AACSB:Use of information technology

5.Spam sent to blogs, cellular phones, or other types of messaging media to promote products

or services is called media spam.

Answer:False Difficulty:Easy Page Reference: 772

AACSB:Use of information technology

6.Web pages that have been created to trick search engines into offering poor-quality results

are referred to as search engine spam.

Answer:True Difficulty:Easy Page Reference: 772 AACSB:Use of information technology

7.Acts or activities that are unethical are also illegal.

Answer:False Difficulty:Easy Page Reference: 773 AACSB:Use of information technology

8.Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and

designs, used in commerce are known as private property.

Answer:False Difficulty:Easy Page Reference: 774 AACSB:Use of information technology

9.Questions or disputes about the legality of spam can be resolved easily by referring to relevant

laws.

Answer:False Difficulty:Medium Page Reference: 774 AACSB:Use of information technology

10.Legal precedents are decisions by judges that may be used as standards in similar legal cases that

follow.

Answer:True Difficulty:Hard Page Reference: 774 AACSB:Use of information technology

11.Political spam, regardless of its content, is legal in the United States because it is a form of

speech protected by the Constitution.

Answer:False Difficulty:Hard Page Reference:774 AACSB:Use of information technology

12.Significant changes in the nature of business or crimes lead to new laws because laws must remain

responsive to new threats or abuses.

Answer:True Difficulty:Medium Page Reference: 775 AACSB:Use of information technology

13.Due process is a legal claim that others not interfere with a protected interest, such as

privacy, intellectual property, or free speech.

Answer:False Difficulty:Medium Page Reference:775 AACSB:Use of information technology

14.Because of intellectual property law, the recording industry can file lawsuits for copyright

infringement against YouTube or MySpace if it profits from the recording industry’s prop erty without authorization and compensa tion.

Answer:True Difficulty:Medium Page Reference:779 AACSB:Ethical understanding and reasoning abilities

15. A company can be sued for libel if its EC site contains a defamatory or untrue statement that

causes damage to a person or another company.

Answer:True Difficulty:Medium Page Reference:781 AACSB:Ethical understanding and reasoning abilities

16. A corporate code of ethics should specify whether the company allows employees to set up their own

Web pages on the company intranet and the rules for private e-mail usage during working hours.

Answer:True Difficulty:Medium Page Reference:783 AACSB:Ethical understanding and reasoning abilities

17.EC web site content needs to be reviewed by attorneys with cyber law expertise to ensure

that there nothing is unethical or illegal and that all required statements and disclaimers are properly included.

Answer:True Difficulty:Medium Page Reference: 783 AACSB:Ethical understanding and reasoning abilities

18.Ethical principles that apply to the collection and use of personal information, such as notifying

customers of information practices before collecting it, do not apply to information collected in e-

commerce.

Answer:False Difficulty:Easy Page Reference: 783 AACSB:Ethical understanding and reasoning abilities

19.As a defense against abusive trackback tactics by profit-motivated spammers, trackback spam filters

are implemented in blog publishing systems.

.

Answer:True Difficulty:Medium Page Reference:790 AACSB:Use of information technology

20.Blocking tools cannot stop adware or software that gets bundled with other popular applications, such

as Kazaa, from delivering pop-up ads because they originate from the desktop, and not the browser.

Answer:True Difficulty:Medium Page Reference:790 AACSB:Use of information technology

21.Unlike hate sites that can cause problems for corporations or lead to lawsuits, fan sites are beneficial

and welcomed by the entertainment industry.

Answer:False Difficulty:Medium Page Reference:791 AACSB:Use of information technology

22.Online merchants reject about 10 percent of incoming orders because of suspicions of fraud; and about

3% of accepted orders turn out to be fraudulent.

Answer:False Difficulty:Medium Page Reference:792 AACSB:Use of information technology

23.Electronic signatures improve EC by helping to distinguish between legitimate and fraud transactions

and build trust and predictability needed by parties doing business online.

Answer:True Difficulty:Medium Page Reference:793 AACSB:Use of information technology

24.Several public organizations and private companies attempt to protect consumers and build users’ trust

and confidence in the Internet through a seal of quality, such as Trustmark and BBBOnline.

Answer: True Difficulty: Medium Page Reference: 796

AACSB:Use of information technology

25.Online sellers can better protect themselves against fraud by requiring customers whose billing

address is different from the shipping address to call their bank and have the alternate address added to

their bank account.

Answer:True Difficulty:Medium Page Reference: 798

AACSB:Use of information technology

Multiple Choice Questions

26.Approximately what percent of Internet shoppers use search engines to find products and

services?

a. 10%

b. 25%

c. 50%

d. 75%

Answer: D Difficulty: Medium Page Reference: 771

AACSB: Use of information technology

27.Sending spam that disguises a sales pitch to look like a personal e-mail so that it will bypass

e-mail spam filters violates the:

a. Controlling the Assault of NonSolicited Pornography and Marketing (CAN-SPAM) Act.

b. Computer Fraud and Abuse Act (CFAA)

c. First Amendment

d. Children’s Internet Prot ection Act (CIPA)

Answer: A Difficulty: Medium Page Reference: 777

AACSB: Ethical understanding and reasoning abilities

28.To defend against unethical and illegal business tactics that exploit EC operations, Google,

MSN Search, and Yahoo have turned to all of the following aggressive measures except:

a. Implemented spam site reporting systems.

b. Built algorithms that check for and penalize deceptive rank-boosting practices.

c. Implemented honeypots.

d. Banned violators’ sites.

Answer: C Difficulty: Medium Page Reference: 773 AACSB: Ethical understanding and reasoning abilities

29.Having control over the collection, storage, and dissemination of personal information is

included in the category of:

a. property

b. rights

c. duties

d. privacy

Answer: D Difficulty: Easy Page Reference: 773 AACSB: Ethical understanding and reasoning abilities

30. A decision by a judge that may be used as a standard in similar cases that follow is referred to as:

a. intellectual property

b. legal precedent

c. common law

d. tort

Answer: B Difficulty: Hard Page Reference:774 AACSB: Use of information technology

31.Critics of political spam are against its use because they believe that:

a. all spam is a nuisance, clogs mail servers, and creates security risks

b. it is illegal

c. it increases candidates’ dependence on wealthy fundraisers,

d. it leads to political favoritism

Answer: A Difficulty: Easy Page Reference: 775 AACSB: Ethical understanding and reasoning abilities

32.Due process is

a. a legal claim that others not interfere with a protected interest.

b. a set of enforceable rules and regulations.

c. a guarantee of basic fairness and fair procedures in legal action.

d. a legal obligation not to interfere with a protected interest

Answer: C Difficulty: Medium Page Reference:775 AACSB: Ethical understanding and reasoning abilities

33. A duty is

a. a legal claim that others not interfere with a protected interest.

b. a set of enforceable rules and regulations.

c. a guarantee of basic fairness and fair procedures in legal action.

d. a legal obligation not to interfere with a protected interest

Answer: D Difficulty: Medium Page Reference:776 AACSB: Ethical understanding and reasoning abilities

34.Property rights relevant to e-commerce include all of the following EXCEPT:

a. The right to bring criminal charges against a violator.

b. Control of the use of the property.

c. The right to benefit, transfer, or sell the property.

d. The right to exclude others from the property.

Answer: A Difficulty: Medium Page Reference: 776 AACSB: Ethical understanding and reasoning abilities

35. A music company can file a ________ against YouTube and MySpace for any interference with the

ability to profit from its IP or for profiting from the recording industry’s propert y without

authorization and compensa tion

a. criminal charge

b. negligence charge

c. nuisance charge

d. lawsuit or civil charge

Answer: D Difficulty: Medium Page Reference: 777 AACSB: Ethical understanding and reasoning abilities

36.

__________ enable an organization that has suffered a loss due to spammers to bring a lawsuit against spammers responsible for the loss.

a. Criminal laws

b. Civil laws

c. CFAA

d. Common laws

Answer: B Difficulty: Medium Page Reference: 777 AACSB: Use of information technology

37.Intellectual property law is the area of law that is associated with each of the following EXCEPT:

a. business contracts

b. visual and performing arts.

c. patent law, copyright law, trademark law, and trade secret law.

d. electronic databases, advertising, and video games.

Answer: A Difficulty: Medium Page Reference: 778 AACSB: Use of information technology

38.Which of the following is true about copyrights?

a. Copyright protection on artistic property such as a movie or music lasts forever, even

after the death of the author or creator.

b. In the United States, after work is created and in a tangible form such as through writing or

recording, the author can apply for a federal copyright.

c. The Recording Industry Association of America (RIAA) uses lawsuits against universities, but not

students, to stamp out rampant music piracy on university campuses.

d. The entertainment industry, led primarily by the Motion Picture Association of America (MPAA)

and RIAA, is trying technical solutions via the legal system to protect its interests.

Answer: D Difficulty: Medium Page Reference: 779 AACSB: Ethical understanding and reasoning abilities

39.Each of the following statements about digital rights management (DRM) is true EXCEPT:

a. DRM are technology-based protection measures.

b. DRM technologies were developed with strict regard for privacy protection.

c. Typically, the content is a copyrighted digital work to which the vendor holds right.

d. DRM is an umbrella term for any arrangement that allows a vendor of content in electronic form

to control the material and restrict its usage.

Answer: B Difficulty: Medium Page Reference: 780 AACSB: Use of information technology

40.Fair use means

a. that copyrighted material can be used for noncommercial purposes without paying royalties or

getting permission.

b. that a copyright holder has exclusive rights to the invention for a fixed number of years.

c. that the author or creator of a book, movie, or musical composition can use their creations for an

unlimited number of years.

d. that copyrighted material can be digitally protected against misus

e.

Answer: A Difficulty: Medium Page Reference: 780 AACSB: Ethical understanding and reasoning abilities

41.Which of the following is true about the scope of business ethics?

a. The scope of business ethics has expanded to encompass the nature and quality of the

relationships with shareholders, customers, business partners, suppliers, the community,

environment, and future generations.

b. The scope of bus iness ethics has been limited to company’s actions with regard to how it treats

employees and obeys laws.

c. The scope of business ethics has not changed because laws have not change

d.

d. The scope of business ethics has not changed even though laws have expanded.

Answer: A Difficulty: Medium Page Reference: 782 AACSB: Ethical understanding and reasoning abilities

42.An Internet acceptable use policy (AUP) is an important safeguard because:

a. it required by the FTC.

b. it includes a corporate code of ethics.

c. without a formal AUP, it is much more difficult to enforce acceptable behaviors and eliminate

unacceptable behaviors, and punish violators.

d. employees may be using company e-mail to advertise their own businesses.

Answer: C Difficulty: Medium Page Reference: 783 AACSB: Ethical understanding and reasoning abilities

43.Section 5 of the FTC Act does each of the following EXCEPT:

a. prohibits unfair or deceptive EC practices.

b. gives the FTC authority to take action against companies whose lax security practices could

expose customers’ financial information to theft or loss,

c. protects privacy.

d. requires monitoring of employees’ e-mail.

Answer: D Difficulty: Medium Page Reference: 784 AACSB: Ethical understanding and reasoning abilities

https://www.sodocs.net/doc/908813840.html,panies can improve their responsibility as custodians of customers’ personal data by

implementing:

a. Opt in and opt out information practices.

b. AUP.

c. E-mail monitoring.

d. Firewalls.

Answer: A Difficulty: Medium Page Reference: 784 AACSB: Ethical understanding and reasoning abilities

45.Which of the following statements about the rights to privacy and free speech is not correct?

a. Those rights have an increasingly important role in an information society and to EC.

b. As with all rights, the right of free speech is not unlimited.

c. The Internet has destroyed the right to privacy.

d. Defamation laws put restrictions on what may be freely said or published.

Answer: C Difficulty: Medium Page Reference: 784 AACSB: Ethical understanding and reasoning abilities

46.All of the following are ways to use the Internet to find information about an individual EXCEPT:

a. Stealing the individual’s computer.

b. Using cookies, spyware or keystroke loggers.

c. Wiretapping communication lines.

d. R eading an individual’s e-mail, IM, blogs, or text messages.

Answer: A Difficulty: Easy Page Reference: 786 AACSB: Ethical understanding and reasoning abilities

47.Private online communities that are only open to those who belong to them are called:

a. darknets

b. blogs

c. splogs

d. RFIDs

Answer: A Difficulty: Medium Page Reference: 787 AACSB: Use of information technology

48. A domain name is:

a. tangible property protected by law

b. intangible property protected by law

c. tangible property that is not protected by law

d. intangible property that is not protected by law

Answer: B Difficulty: Medium Page Reference: 788

AACSB: Use of information technology

49.The __________________ give law enforcement agencies broader range in their efforts to

protect the public.

a. American Civil Liberties Union (ACLU)

b. Electronic Freedom Foundation (EFF)

c. U.S. Department of Justice (DOJ)

d. USA PATRIOT Act

Answer: D Difficulty: Easy Page Reference: 788 AACSB: Ethical understanding and reasoning abilities

50._________ work on the principle that once Web surfers arrive at their site, a few of them will click on

one of the linked advertisements and earn them a few cents for each click.

a. Sploggers

b. Phishers

c. Spammers

d. Trackbacks

Answer: A Difficulty: Medium Page Reference: 789

AACSB: Ethical understanding and reasoning abilities

51.The least effective method to protect against pop-up ads and their risk is:

a. P op-up blocking software on users’ computers.

b. Minimizing the pop-up window.

c. ISPs using tools that stop pop-ups from appearing.

d. Mozilla and Firefox Web browsers preventing pop-ups.

Answer: B Difficulty: Medium Page Reference: 790 AACSB: Ethical understanding and reasoning abilities

52.All of the following statements apply to hate Web sites EXCEPT:

a. Web sites that contain legitimate complaints that aren’t defamatory, sponsored by competitors, or

infringe upon trademark rights by confusing consumers are usually protected by the First

Amendment.

b. Many hate sites are directed against large corporations such as Wal-Mart, Microsoft, and Nike.

c. Cyberbashing is the registration of a domain name that criticizes an organization or person.

d. The intent of most hate Web sites is to commit fraud.

Answer: D Difficulty: Medium Page Reference: 791 AACSB: Ethical understanding and reasoning abilities

53. A legally binding contract requires a few basic elements. Which of the following is not one

of those elements?

a. an offer

b. acceptance

c. agreement

d. consideration

Answer: C Difficulty: Hard Page Reference: 793 AACSB: Ethical understanding and reasoning abilities

54.Examples of electronic signatures to help distinguish between legitimate and fraud

transactions include all of the following EXCEPT:

a. a name typed at the end of an e-mail message by the sender

b. a digitized image of a handwritten signature attached to an electronic document

c. a secret code or PIN to identify the sender to the recipient

d. a Web site development agreement

Answer: D Difficulty: Medium Page Reference: 793 AACSB: Use of information technology

55.EC sellers need to protect against fraud and each of the following EXCEPT:

a. Public keys.

b. Customers who deny that they placed an order.

c. Customers who give false credit card or bad check information in payment for products and

services provided.

d. Use of their name by imposter sellers.

Answer: A Difficulty: Medium Page Reference: 798 AACSB: Ethical understanding and reasoning abilities

Fill In the Blanks

56.An ethical marketing method to increase the ranking of a Web site in search results is

search engine marketing.

Difficulty: Easy Page Reference: 772 AACSB: Ethical understanding and reasoning abilities

57.Search engine optimization is a technique that takes into consideration how search engines function to

maximize the number of qualified visitors to a Web site.

Difficulty: Easy Page Reference: 772 AACSB: Use of information technology

58.Search engine spam are pages created deliberately to trick the search engine into offering

inappropriate or poor quality search results.

Difficulty: Medium Page Reference: 772 AACSB: Ethical understanding and reasoning abilities

59.A splog, or spam blog, is a Web site created solely for marketing purposes.

Difficulty: Easy Page Reference: 772 AACSB: Use of information technology

60.Ethics define what is good for the individual and society and the nature of duties that people owe

themselves and one another.

Difficulty: Medium Page Reference: 773 AACSB: Ethical understanding and reasoning abilities

https://www.sodocs.net/doc/908813840.html,panies have the duty to not intrude on a person’s privacy because individuals have the right to be

left alone and free of unreasonable personal intrusions.

Difficulty: Easy Page Reference: 773 AACSB: Ethical understanding and reasoning abilities

62.Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and

designs, used in commerce are types of intellectual property.

Difficulty: Medium Page Reference: 774 AACSB: Use of information technology

63.Unsolicited bulk e-mails sent to voters by candidates for political office is known as political spam.

Difficulty:Easy Page Reference:774 AACSB: Use of information technology

64.Due process is a guarantee of basic fairness and fair procedures in legal action.

Difficulty: Medium Page Reference: 775 AACSB: Ethical understanding and reasoning abilities

65. A duty is a legal obligation imposed on individuals and organizations that prevents them from

interfering with another’s protected interes ts or rights.

Difficulty: Medium Page Reference: 776 AACSB: Use of information technology

66.Civil laws are laws that enable an individual or organization that has suffered harm or a loss to bring a

lawsuit against whomever is responsible for the harm or loss, such as spammers.

Difficulty: Medium Page Reference: 777 AACSB: Use of information technology

67.Intellectual property laws are laws that protect creations of the human mind including such diverse

subjects as the visual and performing arts, electronic databases, advertising, and video games.

Difficulty: Medium Page Reference: 778 AACSB: Use of information technology

68.Digital rights management refers to arrangements that allow a vendor of digital content to control the

material and restrict its usage.

Difficulty: Medium Page Reference: 780 AACSB: Use of information technology

69. A tort is a civil wrong, such as negligence, that can be grounds for a lawsuit.

Difficulty: Medium Page Reference: 781 AACSB: Use of information technology

70.Business ethics defines how a company integrates honesty, trust, respect, fairness, and legal standards

into its policies and practices.

Difficulty: Medium Page Reference: 782 AACSB: Ethical understanding and reasoning abilities

71.Opt out is a businesses practice that gives consumers the opportunity to refuse to share information

about themselves.

Difficulty: Medium Page Reference: 784 AACSB: Use of information technology

72.Cookies allow Web sites to collect detailed information about a user’s preferences, interests, and

surfing patterns.

Difficulty: Easy Page Reference: 786 AACSB: Use of information technology

73.Unwanted software programs that violate a user’s privacy and steal confidential data by entering a

computer as a virus or a deceptive pop-up window are called spyware.

Difficulty: Medium Page Reference: 786 AACSB: Ethical understanding and reasoning abilities

74.A darknet is a p rivate online community that is only open to those who belong to it.

Difficulty: Medium Page Reference: 787 AACSB: Use of information technology

75. A blog is a Web site or Web page that displays journal-like entries and often contains links to other

pages, images, music, or videos.

Difficulty: Medium Page Reference: 789 AACSB: Use of information technology

76.Trackback is an acknowledgment or signal from an originating site to a receiving site.

Difficulty: Medium Page Reference: 790 AACSB: Use of information technology

77.Pop-up stoppers (or pop-up blockers) are tools to stop pop-ups from appearing.

Difficulty: Easy Page Reference: 790 AACSB: Use of information technology

78.Cyberbashing is the registration of a domain name that criticizes an organization or person, such as

https://www.sodocs.net/doc/908813840.html,.

Difficulty: Medium Page Reference: 791 AACSB: Use of information technology

79.TRUSTe is a nonprofit group whose mission is to build users’ trust and confidence in the Internet by

promoting the policies of disclosure and informed consent.

Difficulty: Hard Page Reference: 796 AACSB: Use of information technology

80.The Better Business Bureau (or BBB) is a private nonprofit organization supported largely by

membership that provides reports on businesses that consumers can review before making a purchase.

Difficulty: Medium Page Reference: 797 AACSB: Use of information technology

Essay Questions

81.Briefly describe why legal disputes cannot be resolved by simply referring to relevant laws.

Identify one legal conflict associated with EC that has not yet been resolved.

Specific disputes cannot be resolved by simply referring to relevant laws for two reasons.

First, the scope of a law needs to be interpreted by looking at the intent of the lawmakers.

Second, laws may conflict with each other. For example, how companies use information

collected from customers via their Web sites are subject to privacy laws. One privacy law

may prohibit a company from sharing customers’ social security numbers with business

partners, whereas a homeland security law may require revealing the identity of customers.

Examples of legal conflicts associated with EC that are still being resolved are: (1) the

legality of spam; and (2) the debate between free speech and protection of children from

offensive content.

Difficulty: Hard Page Reference: 774 82.Explain the similarities and differences between laws and ethics.

Ethics refers to the acceptable ways individuals interact with one another and for the good of society. Ethics defines the nature of duties that people owe themselves and one another. One duty is to not int rude on a person’s privacy..

Laws embody ethical principals, but acts that are considered unethical may not be illegal. Conversely, the law is not simply the coding of ethical norms, nor are all ethical codes incorporated into public

law. A common agreement in a society as to what is right and wrong determines ethics, but they are not subject to legal sanctions except when they overlap with activities that also are illegal.

Difficulty: Easy Page Reference: 773 83.Define the CAN-SPAM law. List the main provisions of the law and the penalties for

violations.

The CAN-SPAM law makes it a crime to send commercial e-mail messages with false or

misleading message headers or misleading subject lines. Main provisions of the law are: ?Requires marketers to identify their physical location by including their postal address

in the text of the e-mail messages.

?Requires an opt-out link in each message, which must also give recipients the option of

telling senders to stop all segments of their marketing campaigns.

?Allows for suits to be brought by ISPs, state attorneys general, and the federal

government.

The law carries penalties of up to $250 per spammed e-mail message, with a cap of $2

million, which can be tripled for aggravated violations. There is no cap on penalties for e-

mail sent with false or deceptive headers. Those found guilty of violating the law may face up to five years in prison.

Difficulty: Medium Page Reference: 777

84.What is a tort? List and briefly explain three types of torts.

A tort is a civil wrong that can be grounds for a lawsuit. Three types of torts are negligence,

nuisance, and defamation.

Negligence is the failure to exercise reasonable care toward others, or taking action that

results in an accident that causes physical and/or property damage.

Nuisance is the unreasonable, unwarranted, or unlawful use of property that causes

inconvenience or damage to others, either to individuals or the general public.

Defamation is the making of an untrue statement about a person, company, or product that damages their reputation. The statement can be oral or written, including statements posted on a Web site or blog.

Difficulty: Easy Page Reference: 780 85.List and briefly explain three EC safeguards to minimize exposure to the risk of criminal or

civil charges.

1. The Web site should clearly post shipment policies and guarantees and explain what happens if a

missed deadline.

2. The Web site should clearly state procedures for customers to follow when returning gifts or

seeking a refund for services not received.

3. The company should check backgrounds before entering agreements with third-party vendors and

supply chain partners.

4. The company should verify that its third-party ISP or Web-hosting services have safeguards if the

site crashes, is infected by malware, or if bandwidth is insufficient to meet customers' needs.

5. The company should have sufficient customer support staff who are knowledgeable and adequately

trained to respond to customers’ questions.

Difficulty: Hard Page Reference: 782

2008年(下)自考试卷及答案

2008年(下)高等教育自学考试全国统一命题考试 财务管理学试卷及参考答案 第一部分选择题 一、单项选择题(本大题共20小题,每小题1分,共20分)在每小题列出的四个备选项中只有一个是符合题目要求的,请将其代码填写在题后的括号内。错选、多选或未选均无分。 1.企业资金运动的中心环节是 ( ) A.资金筹集 B.资金投放 C.资金耗费 D.资金分配 2.以股东财富最大化作为公司财务管理目标时,主要的评价指标是 ( ) A.每股市价 B.每股利润 C.每股股利 D.每股净资产 3.后付年金终值系数的倒数是 ( ) 丸资本回收系数 B.偿债基金系数 C.先付年金终值系数 D.后付年金现值系数 4.下列可用于衡量投资风险程度的指标是 ( ) A.概率 B.预期收益 C.标准离差率 D.风险价值系数 5.与商业信用筹资方式相配合的筹资渠道是 ( ) A.银行信贷资金 B.政府财政资金

C.其他企业单位资金 D.非银行金融机构资金 6.某企业发行债券,面值为1 000元,票面利率为10 010,每年年末付息一次,五年到期还本。若目前市场利率为8%,则该债券是 ( ) A.平价发行 B.溢价发行 C.折价发行 D.贴现发行 7.企业为满足支付动机所持有的现金余额主要取决的因素是 ( ) A.企业临时举债能力 B.现金收支的可靠程度 C.企业的销售水平 D.企业可承担风险的程度 8.利用存货模型计算最佳现金持有量时,需要考虑的成本是 ( ) A.持有成本与转换成本 B.短缺成本与持有成本 C.取得成本与短缺成本 D.短缺成本与转换成本 9.固定资产按使用情况所作的分类是 ( ) A.生产用固定资产和非生产用固定资产 B.经营用固定资产和管理用固定资产 C.自有固定资产和融资租入固定资产 D.使用中的固定资产、未使用的固定资产和不需用的固定资产 10.下列各项中,属于非贴现投资评价指标的是 ( ) A.净现值 B.获利指数 C.净现值率 D.平均报酬率

SQL_Server_2008数据库试题(C)

SQL Server 2008网络数据库试题C 班级:学号:_________ 姓名:分数 一.单项选择题(每小题2分,共50分) 1. 在概念设计阶段可用E-R图,其中矩形表示实体,()表示实体联系 A. 圆形框 B. 椭圆形框 C. 箭头 D .菱形框 2. 通过使用文件组,可以()。 A. 提高存取数据的效率。 B.提高数据库备份与恢复的效率 C. 简化数据库的维护 D. ABC都可以。 3. 下列四项中不属于数据库特点的是() A. 数据共享 B. 数据完整性 C. 数据冗余高 D. 数据独立性 4. 不同实体间可以有() A. 只有一种联系 B. 可以有多种联系 C .不能有联系 D.只有多对多联系 5. 建立在计算机外部设备上的结构化的有联系的数据集合是() A. 数据库 B. 数据库管理系统 C. 数据结构 D .数据文件 6. 实体间存在多种联系,下面那种数据模型可以描述实体间多对多的联系() A. 层次模型 B. 网状模型 C. 关系模型 D. 对象模型 7. ()是位于用户和操作系统之间的一层数据管理软件。数据库在建立,使用和维护时由其统一管理,统一控制。 A.DBMS(数据库管理系统) B. DB(数据库) C. DBS(数据库系统) D .DBA(数据库管理员) 8. SQL语言允许使用通配符进行字符串匹配的操作,其中‘%’可以表示() A .零个字符 B .1个字符串 C.多个字符串 D. 以上都是 9. 英文缩写DBA代表()

A. 数据库管理系统 B. 数据库管理员 C. 数据定义语言 D. 数据库操纵语言 10 以下不是SQL数据定义语言的是() A. CREATE B .DROP C. SELECT D. ALTER 11. 下面聚集函数中哪个只能用于计算数值类型的数据() A. COUNT( ) B. MIN( ) C .MAX( ) D .SUM( ) 12. 以下哪个关键字用来定义记录在某属性上的约束条件() A. DEFAULT B. CONSTRAINT C. UNIQUE D. CHECK 13. 欲往表中增加一条记录,应该用哪一条SQL语句() A. ALTER TABLE B. INSERT INTO TABLE C. CREA TE TABLE D . DROP TABLE 14. 以下哪一个不是逻辑运算符() A. NOT B .AND C. OR D. IS 15. 在创建表的过程中,哪个关键字用来定义默认值() A. DISTINCT B .UNIQUE C. CHECK D. DEFAULT 16. 以下哪些描述符合数据库阶段的特点() 1) 文件的组织形式可以是顺序的,也可以是随机的 2)数据结构化 3)数据可以共享 4)程序独立于数据 5)统一的数据管理功能 6)数据面向应用 7)数据不保存 A. 1) 2) 7) B. 2) 3) 4) 5) C.2) 4) 5) D .2) 3) 5) 6) 17. 主键约束用来强制数据的()完整性。 A .域 B. 实体 C. 参照 D. ABC都可以 18. 学校中有若干系,每个系有若干班级和教研室,每个教研室有若干教员,其中有的教授和副教授各带若干研究生,每位研究生均只有一名导师,每个班有若干学生,每个学生选修若干课程,每门课可以由若干学生选修。请选出一下描述

2008年高考语文试卷及答案(海南卷)

绝密★启用前 2008年普通高等学校招生全国统一考试 (海南卷) 本试卷分第Ⅰ卷(阅读题)和第Ⅱ卷(表达题)两部分,其中第Ⅰ卷第三、四题为选考题,其他题为必考题。考生作答时,将答案答在答题卡上,在本试卷上答题无效。考试结束后,将本试卷和答题卡一并交回。 注意事项 1、答题前,考生务必先将自己的姓名、准考证号填写在答题卡上,认真核对条形 码上的姓名、准考证,并将条形码粘贴在答题卡的指定位置上。 2、答题时使用0.5 毫米黑色中性(签字)笔或碳素笔书写,字体工整\笔迹清楚. 3、请按照题号在答题卡上各题的答题区域(黑色线框)内作答,超出答题区域书写 的答案无效. 4、保持卡面清洁,不折叠,不破损. 5、做选考题时,考生按照题目要求作答,并用2B铅笔在答题卡上把所选题目对应 的题号涂黑. 第Ⅰ卷阅读题 甲必考题 一、现代文阅读(9分,每小题3分) 阅读下面的文字,完成1~3题。 所谓“变形”,是相对于“常形”而言。“常形”是指显示生活中客观物象的正常自然形态;“变形”是指客观五香反映带艺术中的形态的改变。在显示生活中, 由于种种原因,物象的形态有时会出现变异,例如两头蛇、三脚鸡等,这种“变 形”虽然怪异,但不是艺术美学研究的对象。艺术美学所研究的,是正常的自然 形态在艺术边县中的变化及其美学意义。 艺术上的“变形”氛围广义和狭义两种。从广义上说,任何种类和流派的艺术,不论其创作思想和手法多么不同,它所塑造的形象较之原形都会有某些强调、 选择、集中乃至改变。从这个意义上说,变形乃是不是艺术反映生活的一种普遍 现象。不过一般地说,艺术上关于“变形”的观念是指狭义的“变形”,它表现为 客观物象的几何图形所发生的改变。例如杜甫的《古柏行》:“霜皮溜雨四十围,

SQLServer2008大数据库精彩试题

2009-2010学年第二学期科大讯飞公司 SQL Server 2008数据库试题 合作院校: 班级: : 分数 一、 单项选择题(每题2分,共25题,合计50分) 1. SQL Server 2008是一个( )的数据库 系统。 (A )网状型 (B )层次型 (C )关系型 (D )以上都不是 2.关于主键描述正确的是:( ) (A )包含一列 (B )包含两列 (C )包含一列或者多列 (D ) 以上都不正确 3. SQL Server 2008 采用的身份验证模式有( )。 (A )仅Windows 身份验证模式 (B )仅SQL Server 身份验证模式 (C )仅混合模式 (D )Windows 身份验证模式和混合模式 4. SQL 语言按照用途可以分为三类,下面选项中哪一种不是的:( ) (A )DML (B )DCL (C )DQL (D )DDL 5. 在SELECT 语句的WHERE 子句的条件表达式中,可以匹配0个到多

个字符的通配符是() (A) * (B)% (C)- (D)? 6. SQL Server提供的单行注释语句是使用()开始的一行容。(A)“/*” (B)“--” (C)“{” (D)“/” 7. 以下那种类型不能作为变量的数据类型()。 (A)text (B)ntext (C)table (D)image 8. 下面不属于数据定义功能的SQL语句是:() A.CREATE TABLE B.CREATE CURSOR C.UPDATE D.ALTER TABLE 9. 如果希望完全安装SQL Server,则应选择()。 A. 典型安装 B. 最小安装 C. 自定义安装 D. 仅连接 10. 在SQL SERVER中局部变量前面的字符为:() (A)* (B)# (C)(D) 11. 假如有两个表的连接是这样的: table_1 INNER JOIN table_2 其中table_1和table_2是两个具有公共属性的表,这种连接会生成哪种结果集?() (A)包括table_1中的所有行,不包括table_2的不匹配行 (B)包括table_2中的所有行,不包括table_1的不匹配行 (C)包括和两个表的所有行 (D)只包括table_1和table_2满足条件的行 12. 对视图的描述错误的是:() (A)是一虚拟的表 (B)在存储视图时存储的是视图的定义

(SQLServer)考试试题及答案

2013年(下)全国信息技术水平考试数据库应用系统设计技术水平证书 (SQL Server)考试试卷 第一大题:单选题(30 分) 1. (1分) 数据模型的三要素不包括()。 (A) 数据结构(B) 数据操作(C) 数据完整性约 束(D) 数据恢复 2. (1分) 数据的存储结构与数据逻辑结构之间的独立性称为数据的 ()。 (A) 结构独立性(B) 物理独立性(C) 逻辑独立 性(D) 分布独立性 3. (1分) 如果对于实体集A中的每一个实体,实体集B中可有多个实体与之联 系;反之,对于实体集B中的每一个实体,实体集A中也可有多个实体与之联系。则称实体集A与B具有()。 (A) 1:1联系(B) 1:n联系(C) n:m联 系(D) 多种联系 4. (1分) 当对关系R和S使用自然联接时,一般要求R和S至少含有一个共同的()。 (A) 元组(B) 关键字(C) 记 录(D) 属性 5. (1分) 若关系模式R(A,B,C,D,E)上的函数依赖集F={AB->C,A->D,A->E},为了满足BCNF,可以将R分解为()。 (A) R1(A,B,C,D) R2(A,E) (B) R1(A,B,C) R2(A,D,E) (C) R1(A,B,C) R2(D,E) (D) R1(A,B) R2(A,C,D,E) 6. (1分) SQL语言查询一次的结果是一个()。 (A) 元组(B) 表(C) 属性(D) 数据

库 7. (1分) 在关系模式R(U,F)中,如果X→Y,且存在X的真子集X1,使X1→Y,则称函数依赖X→Y为()。 (A) 平凡函数依赖 (B) 部分函数依赖 (C) 完全 函数依赖 (D) 传递函数依赖 8 . (1分) 在Transact-SQL中,下列命令能让程序完全跳出循环的是( )。 (A) CASE (B) WAIT (C) BREAK (D) CONTINU E 9 . (1 分) 在Transact-SQL中,下列选项不属于数值型数据类型的是( )。 (A) NUMERIC (B) DECIMAL (C) INTEGER (D) DATE 10. (1分) 下列选项中,可以正确表达姓“张”的通配符是( )。 (A) 张 _ (B) 张 % (C) 张 ^ (D) 张& 1 1. (1 分) 下列聚合函数中正确的是( )。 (A) SUM (*) (B) MAX (*) (C) COUNT (*) (D) AVG (*) 12. (1 分) 如果某一列的数据类型是FLOAT,则不允许对该列使用的函数是( )。 (A) SUM (B) ABS (C) LEFT (D) ROUND 13 . (1 分 ) 在SQL的SELECT语句中,与投影运算对应的子句是( )。 (A) SELECT (B) FROM (C) WHERE (D) GROU P BY 14. (1 分) 在SQL语言中,给表起别名应使用( )。 (A) AS (B) RENAME (C) SET (D) FOR 15. (1分) 在SELECT语句中使用GROUP BY SNO时,SNO必须() 。 (A) 在WHERE中出现 (B) 在FROM中出现

2008年考研英语试题及答案

2008年全国硕士研究生入学统一考试英语试题 Section I Use of English Directions: Read the following text.Choose the best word(s)for each numbered blank and mark A,B,C or D on ANSWER SHEET1.(10points) The idea that some groups of people may be more intelligent than others is one of those hypotheses that dare not speak its name.But Gregory Cochran is大1家to say it anyway.He is that大2家bird, a scientist who works independently大3家any institution.He helped popularize the idea that some diseases not大4家thought to have a bacterial cause were actually infections,which aroused much controversy when it was first suggested. 大5家he,however,might tremble at the大6家of what he is about to do.Together with another two scientists,he is publishing a paper which not only大7家that one group of humanity is more intelligent than the others,but explains the process that has brought this about.The group in大8家are a particular people originated from central Europe.The process is natural selection. This group generally do well in IQ test,大9家12-15points above the大10家value of100,and have contributed大11家to the intellectual and cultural life of the West,as the大12家of their elites,including several world-renowned scientists,大13家.They also suffer more often than most people from a number of nasty genetic diseases,such as breast cancer.These facts,大14家,have previously been thought unrelated.The former has been大15家to social effects, such as a strong tradition of大16家education.The latter was seen

SQL-Server-2008中文版基础教程测精彩试题(一套)问题详解

SQL Server 2008基础教程测试题(一套) 答案 一填空题(每题2分,共22分) 1.SQL Server 2008的数据库管理程序分为服务器程序和客户端程序两部分,两部分 可以安装在同一台计算机上,也可以分别安装在不同的计算机上。 2.SQL Server的数据文件有逻辑名称和操作系统文件名两种名称。 3.表是反映现实世界某类事物的数学模型,表由行和列组成。现实世界中事物的属性对应 表的列,表中的一行代表一类事物中的一个特例。 4.主键是唯一能够区分表中每一行记录的一个或多个列。 5.在select子句中代表全部列的通配符是*。 6.常用的聚合函数有:计算最大值的max,计算最小值的min,统计总和的sum,统计 记录总数的count和计算平均值的avg。 7.视图和表都是数据库中的对象,视图的结构虽然与表相同,但视图是虚表。 8.联接查询的含义是指两个存在关联关系的表A和B,表A与表B联接的查询结果为C, 结果集C中只能包括表A与表B中满足关联条件的记录。 9.左联接查询的含义是指两个存在关联关系的表A和B,表A与表B左联接的查询结果 为C。C的列可以来自于A和B的列,C的记录中允许包括表A的全部记录以及表A 中与表B满足关联条件的记录,C中A与B不满足关联条件的列值为空值。 10.全联接的含义是指两个存在关联关系的表A和B,表A与表B全联接的查询结果为C。

C的列可以来自于A和B的列,C的记录中可以包括表A和表B的全部记录,C中B 与A以及A与B不满足关联条件的部分为空值。 11.SQL Server的导入、导出数据操作也称为数据移植,是指在SQL Server数据库之间、 SQL Server数据库与其他异构数据库之间、SQL Server数据库与Excel文件和文本文件之间互相传递数据的操作。 二选择题(每题2分,共20分) 1.同一台计算机上可以运行(D)个实例。 A.一个 B.两个 C.三个 D.多个 2.每一个数据库都有(A)的标识,这个标识就是数据库名称。 A.一个唯一 B.多个 C.两个 D.不同 3.表是反映现实世界中一类事务的数学模型,现实世界中一类事务的属性是表中的(A)。 A.列 B.行 C.记录 D.数值 4.如果一个表中记录的物理存储顺序与索引的顺序一致,则称此索引为(B)。

2008年高考理综试题及答案(浙江卷)

绝密★启用前试卷类型:B 2008年普通高等学校招生全国统一考试 理科综合能力测试 本试卷共12页,满分360分,考试时间150分钟。 注意事项: 1.答卷前,考生务必将自己的姓名,准考证号填写在试题卷和答题卡上,并将准考证号条 形码粘巾在答题卡上指定位置。 2.选择题每小题选出答案后,用2B铅笔将答题卡上,对应题目的答案标号涂写,如写改 动,用橡皮擦干净后,再选涂其它答案标号,答在试题卷上无效。 3.非选择题用0.5毫米的黑色墨水签字夂答在答题卡上每题对应的答题区域内,答在试题 卷上无效。 4.考试结束,请将本试题卷和答题卡一并上交。 选择题共21小题,第小题6分,共126分。 以下数据可供解题时参考: 相对原子质量(原子量):H l C 12 O 16 Na 23 K 39 Mn 55 Cu 64 Zn 65 Ag 108 Pb 207 一、选择题(本题共13小题,在每小题给出的四个选项中,只有一项是符合题目要求的。) 1.为了验证胰岛素具有降低血糖含量的作用,在设计实验方案时,如果以正常小鼠每次注射药物前后小鼠症状的变化为观察指标,则下列对实验组小鼠注射药物的顺序。正确的是 A.先注射胰岛素溶液,后注射葡萄糖溶液 B.先注射胰岛素溶液,再注射胰岛素溶液 C.先注射胰岛素溶液,后注射生理盐水 D.先注射生理盐水,后注射胰岛素溶液 2.某水池有浮游动物和藻类两个种群,其种群密度随 时间变化的趋势如图,若向水池中投放大量专食浮游 动物的某种鱼(丙),一段时期后,该水池甲、乙、丙 三个种群中公剩一个种群。下列关于该水池中上述三 个种群关系及变化的叙述,正确的是 A.甲和丙既有竞争关系又有捕食关系,最终仅剩下甲种群 B.甲和乙既有竞争关系又有捕食关系,最终仅剩下丙种群 C.丙和乙既有竞争关系又有捕食关系,最终仅剩下甲种群 D.丙和乙既有竞争关系又有捕食关系,最终仅剩下丙种群 3.下列关于细菌的叙述,错误 ..的是 A.硝化细菌能以NH,作为氮源和能源物质 B.某些细菌可以利用光能因定CO2合成有机物 C.生长因子是某些细菌生长过程中需要额外补弃的营养物质 D.含伊红和美蓝试剂的培养基不能用来签别牛奶中的大肠杆菌 4.已知某种限制性内切酶在一线性DNA分子上有3个酶切位点,如图中箭头所指,如果该线性DNA分子在3个酶切位点上都被该酶切断,则会产 生a、b、c、d四种不同长度的DNA片段。现在多个上述 线性DNA分子,若在每个DNA分子上至少有1个酶切位 点被该酶切断,则从理论上讲,经该酶切后,这些线性

《SQL Server数据库技术》试卷J

健雄职业技术学院 考试试卷 说明:本次考试 120 分钟, 42 道小题,共计 5 页,总分 100 分 J 考试科目 SQL Server 数据库技术 考试类型 高职期末考试 『闭卷』 学年学期 适用专业 年 级 教研室主任

(装订线内不准做答) Ⅰ理论题部分 (注意:所有答案都应按要求回答在试卷最后一页答题卷上,在试卷上直接作答的无效) 一、选择题(在每个小题四个备选答案中选出一个正确答案) (本大题共10小题,每小题1分,总计10分) 1.SQL Server 2000 属于()数据库系统。 A .层次模型 B .网状模型 C .关系模型 D .面向对象模型 2.关系数据表的关键字可由()字段组成。 A .一个 B .两个 C .多个 D .一个或多个 3.字符串常量使用()作为定界符。 A .单引号 B .双引号 C .方括号 D .花括号 4.下列叙述错误 ..的是()。 A .ALTER TABLE 语句可以添加字段 B .ALTER TABLE 语句可以删除字段 C .ALTER TABLE 语句可以修改字段名称 D .ALTER TABL E 语句可以修改字段数据类型 5.表设计器的“允许空”单元格用于设置该字段是否可输入空值, 实际上就是创建该字段的()约束。 A .主键 B .外键 C . 非空 D . 检查 6.下列语句中正确 ..的是()。 表 score(sti_id,names,math,English,VB) A.select stu_id,sum(math) from score B.select sum(math),avg(VB) from score C.select * ,sum(english) from score D.delete * from score 7.SQL server 数据库文件有三类,其中主数据文件的后缀为()。 A . .ndf B . .ldf C . .mdf D . .idf 8.表达式 Datepart ( yy,‘2004-3-13’) +2 的结果是()。 A . ' 2004-3-15 ' B . 2004 C . '2006' D . 2006 9.下列途径哪个不是 ..实现值域完整性()。 A . rule( 规则) B . primary key C . not null D . default

2008年安徽省高考语文试卷及答案

2008年普通高等学校招生全国统一考试(安徽卷) 语文 第Ⅰ卷(选择题共30分) 一、(12分,每小题3分) 语言知识仍然是4题,语音在多年停考后又回归了,成语、病句还是必考题,第四题考查的应该是属于句式知识。总体难度不是很大。 1.下列各组词语中,斜线“/”前后加点字的读音完全相同的一组是 A.清澈/掣肘殷红/湮没瞠目/螳臂当车 B.箴言/斟酌蛊惑/商贾船舷/扣人心弦 C.联袂/抉择整饬/炽烈辍学/风姿绰约 D.徘徊/脚踝戏谑/琐屑惬意/锲而不舍 2.下列各句中,加点的成语使用恰当的一句是 A.时间真如行云流水,申奥成功的情景仿佛就在昨天,转眼间,举世瞩目的北京奥运会距离我们已经不到一百天了。 B.眼下,报刊发行大战硝烟渐起,有些报纸为了招徕读者而故意编造一些骇人听闻的消息,其结果却往往弄巧成拙。 C.著名学者季羡林先生学贯中西,兼容百家,在诸多研究领域都卓有建树,被人们誉为学界泰斗,真可谓实至名归。 D.有段时间,沪深股市指数波动非常大,有时一天上涨几百点,有时一天下跌几百点,涨跌幅度之大令人叹为观止。 3.下列各句中,没有语病、句意明确的一句是 A.诚信教育已成为我国公民道德建设的重要内容,因为不仅诚信关系到国家的整体形象,而且体现了公民的基本道德素质。 B.以“和谐之旅”命名的北京奥运火炬全球传递活动,激发了我国各族人民的爱国热情,也吸引了世界各国人民的高度关注。 C.今年4月23日,全国几十个报社的编辑记者来到国家图书馆,参观展览,聆听讲座,度过了一个很有意义的“世界阅日”。 D.塑料购物袋国家强制性标准的实施,从源头上限制了塑料袋的生产,但要真正减少塑料袋污染,还需消费者从自身做起。 4.下列各句中,语气最委婉的一句是 A.只关注孩子的学习成绩而忽视他们的心理健康,这是不是应该引起我们认真思考呢?B.只关注孩子的学习成绩而忽视他们的心理健康,这难道不应该引起我们认真思考吗?C.只关注孩子的学习成绩而忽视他们的心理健康,这无疑应该引起我们认真思考的。D.只关注孩子的学习成绩而忽视他们的心理健康,这恐怕不能不引起我们认真思考了。 二、(9分,每小题3分) 选文应该说是科学类文章,这是一大改变,前几年一直是社会科学类的文章。但文章总体阅读难度不打,也没有什么难以读懂的专业术语。题目设置的总体难度也不是很大,第6题稍微难一些。 阅读下面的文字,完成5-7题。 我们的宇宙外面是什么 在宇宙学中,有一个非常重要的常数、叫做宇宙学常数。这个常数在我们的宇宙中起着一种

(完整版)全国2008年10月高等教育自学考试试题及答案

全国2008年10月高等教育自学考试 中国近现代史纲要试题 课程代码:03708 一、单项选择题(本大题共30小题,每小题1分,共30分) 在每小题列出的四个备选项中只有一个是符合题目要求的,请将其代码填写在题后的括号内。错选、多选或未选均无分。 1.鸦片战争前中国封建社会的主要矛盾是() A.地主阶级和农民阶级的矛盾 B.帝国主义和中华民族的矛盾 C.资产阶级和工人阶级的矛盾 D.封建主义和资本主义的矛盾 2.中国封建社会产生过诸多“盛世”,出现在清代的是() A.文景之治 B.贞观之治 C.开元之治 D.康乾盛世 3.将中国领土台湾割让给日本的不平等条约是() A.《南京条约》 B.《北京条约》 C.《马关条约》 D.《瑗珲条约》 4.西方列强对中国的侵略,首先和主要的是() A.政治控制 B.军事侵略 C.经济掠夺 D.文化渗透 5.1839年组织编写成《四洲志》,向中国人介绍西方情况的是() A.林则徐 B.魏源 C.马建忠 D.郑观应 6.19世纪末,在帝国主义列强瓜分中国的狂潮中提出“门户开放”政策的国家是() A.俄国 B.日本 C.美国 D.德国 7.太平天国农民起义爆发的时间是() A.1851年 B.1853年 C.1856年 D.1864年 8.太平天国由盛而衰的转折点是() A.永安建制 B.北伐失利 C.天京事变 D.洪秀全病逝 9.最早对兴办洋务的指导思想作出完整表述的人是() A.冯桂芬 B.马建忠 C.王韬 D.郑观应 10.洋务运动时期最早创办的翻译学堂是() A.同文馆 B.广方言馆 C.译书局 D.译书馆 11.1898年发表《劝学篇》一文,对抗维新变法的洋务派官僚是() A.李鸿章 B.左宗棠 C.张之洞 D.刘坤一

SQL_Server数据库试题五及答案

SQL Server数据库试卷5 CCDDA BBBAB CBACD 一、单项选择题(每题2分,共15题) 1、SQL Server 2000是一个( C )的数据库系统。 (A)网状型(B)层次型(C)关系型(D)以上都不是 2、SQL Server 2000 企业版可以安装在操作系统上。C (A)Microsoft Windows 98 (B)Microsoft Windows 2000 Professional (C)Microsoft Windows 2000 Server (D)Microsoft Windows XP 3、SQL Server 2000 采用的身份验证模式有( D )。 (A)仅Windows身份验证模式 (B)仅SQL Server身份验证模式 (C)仅混合模式 (D)Windows身份验证模式和混合模式 4、SQL Server 2000提供了一整套管理工具和实用程序,其中负责启动、暂停和停止SQL Server的4种服务的是( D )。 (A)企业管理器(B)导入和导出数据(C)事件探察器(D)服务管理器 5、SQL Server 2000中的数据以页为基本存储单位,页的大小为( A )。 (A)8KB (B)16KB (C)32KB (D)64KB 6、新安装SQL Server后,默认有六个内置的数据库,其中的两个范例数据库是Pubs和( B )。 (A)master (B)NorthWind (C)msdb (D)bookdb 7、在SQL Server 2000中,当数据表被修改时,系统自动执行的数据库对象是(B )。(A)存储过程(B)触发器(C)视图(D)其他数据库对象 8、SQL Server的字符型系统数据类型主要包括(B)。 A. Int、money、char B. char、varchar、text C. datetime、binary、int D. char、varchar、int 9、在SQL Server 2000中,索引的顺序和数据表的物理顺序相同的索引是(A )。(A)聚集索引(B)非聚集索引(C)主键索引(D)唯一索引 10、要查询book表中所有书名中包含“计算机”的书籍情况,可用( B)语句。(A) SELECT * FROM book WHERE book_name LIKE ‘计算机*’ (B) SELECT * FROM book WHERE book_name LIKE ‘计算机%’ (C) SELECT * FROM book WHERE book_name = ‘计算机*’ (D) SELECT * FROM book WHERE book_name = ‘计算机%’ CBACD 11、SELECT语句中与HA VING子句通常同时使用的是(C)子句。 A.ORDER BY B.WHERE C.GROUP BY D.无需配合 12、要删除mytable表中的myindex索引,可以使用( B)语句。

SQL Server 数据库试题与答案B卷

《SQL Server 数据库》B卷系别:________班级:________学号:________姓名:________ 1.本试卷为闭卷考试。 2.考试时间:120分钟 3.本试卷满分:100分 4.试卷适用班级:09高职软件技术班 一、单选题:(共2分,共30题,每小题的四个备选项中,只有一项是正确的,不选,错选均不得分) 1、Microsoft SQL Server是一种基于客户机/服务器的关系型数据库管理系统,它使用( B )语言在服务器和客户机之间传送请求。 A)TCP/IP B)T-SQL C)C D)ASP 2、( A )是一个图形界面的查询工具,用它可以提交T—SQL语言,然后发送到服务器,并返回执行结果,该工具支持基于任何服务器的任何数据库连接。 A)SQL Server Management Studio B)事件探查器 C)SQL管理对象D)DTS 3、( A )是用于存储、处理和保护数据的核心组件。 A)数据库引擎B)集成服务 C)报表服务D)通知服务 4、( A )是一个具有访问网络资源权限的Windows操作系统账户。 A)本地系统账户B)网络服务账户 C)本地服务账户D)域用户账户 5、数据库系统中负责数据库系统的建立、维护和管理的人员是( D ) A)最终用户 B)应用程序员 C)系统分析员 D)数据库管理员 6、数据库设计过程中,( C )将E—R图转换为关系模式并进行关系规范化。 A)需求分析阶段 B)概念结构设计阶段 C)逻辑结构设计阶段D)物理结构设计阶段 7、强制关系中的主属性不能为空,满足以下( A ) A)实体完整性B)参照完整性 C)用户定义完整性D)域完整性 8、数据库设计规范化的第三范式除了要满足第一、第二范式外,还要满足( C )A)每个记录的列只能有一个值 B)所有非主键列的值都只能由主键列中决定

SQL_Server_2008数据库试题(B)

SQL Server 2008网络数据库试题B 班级:学号:_________ 姓名:分数 一、单项选择题(每题1分,共15题,合计30分) 1.SQL的视图是从()中导出的。 A. 基本表 B. 视图 C. 基本表或视图 D. 数据库 2. SQL 语言按照用途可以分为三类,下面选项中哪一种不是的:() A.DML B.DCL C.DQL D.DDL 3. 在SELECT语句的WHERE子句的条件表达式中,可以匹配0个到多个字符的通配符是() A. * B.% C.- D.? 4. SQL Server提供的单行注释语句是使用()开始的一行内容。 A. “/*” B. “--” C. “{” D. “/” 5. 以下那种类型不能作为变量的数据类型()。 A.text B.ntext C.table D.image 6. 下面不属于数据定义功能的SQL语句是:() A.CREATE TABLE B.CREATE CURSOR C.UPDATE D.ALTER TABLE 7. 假如有两个表的连接是这样的: table_1 INNER JOIN table_2 其

中table_1和table_2是两个具有公共属性的表,这种连接会生成哪种结果集?() A. 包括table_1中的所有行,不包括table_2的不匹配行 B. 包括table_2中的所有行,不包括table_1的不匹配行 C. 包括和两个表的所有行 D. 只包括table_1和table_2满足条件的行 8. 对视图的描述错误的是:() A. 是一张虚拟的表 B. 在存储视图时存储的是视图的定义 C. 在存储视图时存储的是视图中的数据 D. 可以像查询表一样来查询视图 9. 在T-SQL语言中,若要修改某张表的结构,应该使用的修改关键字是()。 A.ALTER B.UPDATE C.UPDAET D.ALLTER 10. SQL Server 2008提供了一整套管理工具和实用程序,其中负责启动、暂停和停止SQL Server的4种服务的是()。 A.企业管理器 B.导入和导出数据 C.事件探察器 D.服务管理器 11.在Transact-SQL语法中,SELECT语句的完整语法较复杂,但至少包括的部分(___)。 A.SELECT,INTO B.SELECT,FROM C.SELECT,GROUP D.仅SELECT

水力学06,07.08年试卷及答案

2007年 一 ,名词解释: 1.连续介质:流体质点完全充满所占空间,没有间隙存在,其物理性质和运动要素都是连续分布的介质。 2.流线: 某一确定时刻t ,在流场中一定有这样的曲线存在,使得曲线上各点处的流体质点的流速都在切 线方向,这样的曲线就叫做该时刻t 的流线。 3.长管:在水力计算中,管道沿程阻力远远大于局部阻力,局部阻力可以忽略不计的管道。 4.水跃:明渠水流从急流过渡到缓流状态时,会产生一种水面突然跃起的特殊局部水里现象,既在较短的 渠段内水深从小于临界水深急剧地跃到大于临界水深的现象。 5。渗流模型: 在保持渗流区原有边界条件和渗透流量不变的条件下,把渗流看成是由液体质点充满全部 渗流区的连续总流流动。 二,解答题 1. 温度对流体粘性系数有何影响原因何在 答:温度升高时液体的粘滞系数降低,流动性增加,气体则相反,粘滞系数增大。这是因为液体的粘性主要由分子间的内聚力造成的。温度升高时,分子间的内聚力减小,粘滞系数就要降低。造成气体粘性的主要原因则是气体内部分子的运动,它使得速度不同的相邻气体层之间发生质量和动量的变换。当温度升高时,气体分子运动的速度加大,速度不同的相邻气体层之间的质量交换随之加剧,所以,气体的粘性将增大。 2. 写出总流伯努利方程,解释各项及方程的物理意义。 答:总流伯努利方程为:l h g V P Z g V P Z ++ + =+ + 222 222 22 111 1 αγ αγ 其中:Z 表示总流过流断面上某点(所取计算点)单位重量流体的平均位置势能 γ P 表示总流过流断面上某点(所取计算点)单位重量流体的平均压强势能。 g V 22 α 表示总流过流断面上某点(所取计算点)单位重量流体的平均动能。 l h 表示总流过流断面上某点(所取计算点)单位重量流体的平均机械能损失,称为总流水头损 失 γP Z H P + = 代表总流过流断面上单位重量流体的平均势能 g V P Z H 22 αγ + + = 代表总流过流断面上单位重量流体的平均机械能 3. 长度比尺为40的传播模型实验,测得船速为1.2m/s 时模型受到的波浪阻力为,试求原型船速和原型 船舶所受到的波浪阻力(以重力作用为主) 答:根据牛顿一般相似原理:力的比例尺:2222 p p p p F m m m m F l v F l v ρλρ== 弗罗特数法则 22 p m r p m v v F gL gL ==

SQL_Server_2008数据库试题(A)

石家庄职业技术学院 SQL Server 2008网络数据库试题A 班级:学号:_________ 姓名:分数 一、单项选择题(每题2分,共15题,合计30分) 1. SQL Server 2008是一个()的数据库系统。 A.网状型 B.层次型 C.关系型 D.以上都不是 2.关于主键描述正确的是:() A.包含一列 B.包含两列 C.包含一列或者多列 D.以上都不正确 3. SQL Server 2008 采用的身份验证模式有()。 A.仅Windows身份验证模式 B.仅SQL Server身份验证模式 C.仅混合模式 D.Windows身份验证模式和混合模式 4. 如果希望完全安装SQL Server,则应选择()。 A. 典型安装 B. 最小安装 C. 自定义安装 D. 仅连接 5. 在SQL SERVER中局部变量前面的字符为:() A.* B.# C.@@ D.@

6. 在T-SQL语言中,若要修改某张表的结构,应该使用的修改关键字是()。 A.ALTER B.UPDATE C.UPDAET D.ALLTER 7. 要查询book表中所有书名中以“计算机”开头的书籍的价格,可用()语句。 A. SELECT price FROM book WHERE book_name = ‘计算机*’ B. SELECT price FROM book WHERE book_name LIKE ‘计算机*’ C. SELECT price FROM book WHERE book_name = ‘计算机%’ D. SELECT price FROM book WHERE book_name LIKE ‘计算机%’8.SQL server 数据库文件有3类,其中日志文件的后缀为_____。 A. .ndf B..ldf C. .mdf D. .idf 9.根据关系数据基于的数据模型——关系模型的特征判断下列正确的一项:(___) A.只存在一对多的实体关系,以图形方式来表示。 B.以二维表格结构来保存数据,在关系表中不允许有重复行存在。 C.能体现一对多、多对多的关系,但不能体现一对一的关系。 D.关系模型数据库是数据库发展的最初阶段。 10.关系数据库中,主键是(__)。 A.为标识表中唯一的实体 B.创建唯一的索引,允许空值 C.只允许以表中第一字段建立 D.允许有多个主键的 11.表在数据库中是一个非常重要的数据对象,它是用来(__)各种数据内容的

2008年国家公务员考试试题及答案

2008年国家公务员考试行政能力测验试题和答案详解 第一部分言语理解与表达 (共40题,参考时限30分钟) 本部分中每道题包含一段话或一个句子,后面是一个不完整的陈述,要求你从四个选项中选出一个来完成陈述。注意:答案可能是完成对所给文字主要意思的提要,也可能是满足陈述中其他方面的要求,你的选项应与所提要求最相符合。 请开始答题: 1.在古典传统里,和谐的反面是千篇一律。“君子和而不同,小人同而不和”,所以和谐的一个条件是对于多样性的认同。中国人甚至在孔子之前就有了对于和谐的经典认识与体现。中国古代的音乐艺术很发达,特别是一些中国乐器,像钟、磬、瑟等各种完全不同的乐器按照一定的韵律奏出动听的音乐,但如果只有一种乐器就会非常单调。 对这段文字概括最准确的是: A.和谐观念源于中国古代音乐B.差异是和谐的一个必要条件 C.中国人很早就产生了和谐观念D.音乐是对和谐的经典认识与体现 2.“黑马”一词其实是从英语舶来的,原指体育界一鸣惊人的后起之秀,后指实力难测的竞争者或在某一领域独树一帜的人,无贬义或政治含义。首先在英文中使用“黑马”的人,是英国前首相狄斯累利,他在一本小说中这样描写赛马的场面:“两匹公认拔尖的赛马竟然落后了,一匹…黑马?,以压倒性优势飞奔。后台上的观众惊呼:…黑马!黑马!?”从此,“黑马”便成了一个有特殊意义的名词。 这段文字的主要意思是: A.论证“黑马”词义的起源B.阐释“黑马”一词的内涵 C.分析“黑马”的词义演变D.介绍“黑马”的感情色彩 3.中国的沙漠为科学家提供了与火星环境最为相似的实验室。科学家们已经去过地球上最为寒冷的南极洲,也去过地球上最为干燥的智利阿塔卡马沙漠,但他们真正需要的是将这两者结合起来的极端环境。科学家们相信,假如生命能够在地球上这些最极端的环境中生存,那么人们也有理由期待在外星球上发现生物。 这段文字意在说明: A.中国沙漠为外星研究提供了理想的场所 B.中国沙漠比南极洲更适合进行生物研究 C.科学家为何选择中国沙漠作为研究对象 D.具有最极端的环境是中国沙漠的主要特点 4.中国古人将阴历月的大月定为30天,小月定为29天,一年有12个月,即354天,比阳历年少了11天多。怎么办呢?在19个阴历年里加7个闰月,就和19个阳历年的长度几乎相等。这个周期的发明巧妙地解决了阴阳历调和的难题,比希腊人梅冬的发明早了160年。 这段文字主要阐明的是: A.中国古代阴历年中闰月设定的规律与作用 B.中国古代的历法在当时具有世界先进水平 C.阴阳历调和问题在古代是一个世界性难题 08 国家公务员考试第2 页共25 页 D.中国古人如何解决调和阴阳历差异的问题 5.湿地指的是陆地和水体之间的过渡带,和森林、海洋一并称地球三大生态体系,在维护生物多样性、调节气候、抵御洪水等方面起着重要作用。1998年那次长江大洪水让人们终于意识到湿地(尤其是和长江相通的许许多多湖泊和沼泽地)能够对洪水起到缓冲的作用。可是,许多湖泊因为围湖造田的需要而被人为隔离了,只留下一个很少开启的水闸和长江相通。

相关主题