全国计算机等级考试二级ACCESS冲刺题(3)
Next J Next I 执行上面的语句后,K的值为______。 A.8 B.10 C.14 D.21 (33)VBA数据类型符号“%”表示的数据类型是______。 A.整型 B.长整型 C.单精度型 D.双精度型 (34)函数Mid("123456789",3,4)返回的值是______。 A.123 B.1234 C.3456 D.456
Next I
执行上面的语句后,K的值为______。
A.8
B.10
C.14
D.21
(33)VBA数据类型符号“%”表示的数据类型是______。
A.整型
B.长整型
C.单精度型
D.双精度型
(34)函数Mid("123456789",3,4)返回的值是______。
A.123
B.1234
C.3456
D.456
(35)运行下面程序代码后,变量J的值为______。
Private Sub Fun()
Dim J as Integer
J=10
DO
J=J+3
Loop While J
End Sub
A.10
B.13
C.19
D.21
二、填空题(每空2分,共30分)
请将每一个空的正确答案写在答题卡【1】~【15】序号的横线上,答在试卷上不得分。
(1)实现算法所需的存储单元多少和算法的工作量大小分别称为算法的 【1】 。
(2)数据结构包括数据的逻辑结构、数据的 【2】 以及对数据的操作运算。
(3)一个类可以从直接或间接的祖先中继承所有属性和方法。采用这个方法提高了软件的【3】 。
(4)面向对象的模型中,最基本的概念是对象和 【4】 。
(5)软件维护活动包括以下几类:改正性维护、适应性维护、 【5】 维护和预防性维护。
(6)SQL(结构化查询语言)是在数据库系统中应用广泛的数据库查询语言,它包括了数据定义、数据查询、 【6】 和 【7】 4种功能。
(7)文本型字段大小的取值最大为 【8】 个字符。
(8)使用查询向导创建交叉表查询的数据源必须来自 【9】 个表或查询。
(9)计算型控件用 【10】 作为数据源。
(10) 【11】 报表也称为窗体报表。
(11) 【12】 函数返回当前系统日期和时间。
(12)运行下面程序,其输出结果(str2的值)为 【13】 。
Dim str1, str2 As String
Dim i As Integer
str1 = "abcdef"
For i = 1 To Len(str1) Step 2
str2 = UCase(Mid(str1, i, 1)) + str2
Next
MsgBox str2
(13)运行下面程序,其运行结果k的值为 【14】 ,其最里层循环体执行次数为
【15】 。
Dim i, j, k As Integer
i = 1
Do
For j = 1 To i Step 2
k = k + j
Next
i = i + 2
Loop Until i > 8
全国计算机等级考试二级Access模拟试卷答案
一、选择题
(1)C
知识点:算法的基本概念
评析:计算机算法是指解题方案的准确而完整的描述,它有以下几个基本特征:可行性、确定性、有穷性和拥有足够的情报。
(2)C
知识点:线性表的概念
评析:栈和队列都是一种特殊的操作受限的线性表,只允许在端点处进行插入和删除。二者的区别是:栈只允许在表的一端进行插入或删除操作,是一种“后进先出”的线性表;而队列只允许在表的一端进行插入操作,在另一端进行删除操作,是一种“先进先出”的线性表。
(3)A

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



1. Open settings in Windows 11. You can use Win+I shortcut or any other method. 2. Go to the Apps section and click Apps & Features. 3. Find the application you want to prevent from running in the background. Click the three-dot button and select Advanced Options. 4. Find the [Background Application Permissions] section and select the desired value. By default, Windows 11 sets power optimization mode. It allows Windows to manage how applications work in the background. For example, once you enable battery saver mode to preserve battery, the system will automatically close all apps. 5. Select [Never] to prevent the application from running in the background. Please note that if you notice that the program is not sending you notifications, failing to update data, etc., you can

DeepSeek cannot convert files directly to PDF. Depending on the file type, you can use different methods: Common documents (Word, Excel, PowerPoint): Use Microsoft Office, LibreOffice and other software to export as PDF. Image: Save as PDF using image viewer or image processing software. Web pages: Use the browser's "Print into PDF" function or the dedicated web page to PDF tool. Uncommon formats: Find the right converter and convert it to PDF. It is crucial to choose the right tools and develop a plan based on the actual situation.

Oracle can read dbf files through the following steps: create an external table and reference the dbf file; query the external table to retrieve data; import the data into the Oracle table.

The Java reflection mechanism allows programs to dynamically modify the behavior of classes without modifying the source code. By operating the Class object, you can create instances through newInstance(), modify private field values, call private methods, etc. Reflection should be used with caution, however, as it can cause unexpected behavior and security issues, and has a performance overhead.

Common exception types and their repair measures in Java function development During the development of Java functions, various exceptions may be encountered, which affect the correct execution of the function. The following are common exception types and their repair measures: 1. NullPointerException Description: Thrown when accessing an object that has not been initialized. Fix: Make sure you check the object for non-null before using it. Sample code: try{Stringname=null;System.out.println(name.length());}catch(NullPointerExceptione){

Yesterday, BotanixLabs announced that it has completed a total of US$11.5 million in financing, with participation from Polychain Capital, Placeholder Capital and others. Financing will be used to build the decentralized EVM equivalent of BTCL2Botanix. Spiderchain combines the ease of use of EVM with the security of Bitcoin. Since the testnet went live in November 2023, there have been more than 200,000 active addresses. Odaily will analyze Botanix’s characteristic mechanism and testnet interaction process in this article. Botanix According to the official definition, Botanix is a decentralized Turing-complete L2EVM built on Bitcoin and consists of two core components: Ethereum Virtual Machine

The Java reflection mechanism allows classes to be dynamically loaded and instantiated at runtime, and class metadata can be manipulated through classes in the java.lang.reflect package, including Class, Method, and Field. Through practical cases of loading the Example class, instantiating objects, obtaining and calling methods, you can demonstrate its application in dynamically loaded classes, thereby solving programming problems and improving flexibility.

Access Violation error is a run-time error that occurs when a program accesses a memory location beyond its memory allocation, causing the program to crash or terminate abnormally. Solutions include: checking array boundaries; using pointers correctly; using appropriate memory allocation functions; freeing freed memory; checking for memory overflows; updating drivers and systems; checking third-party libraries; using a debugger to trace execution; contacting the software vendor for support.
