Home Database Mysql Tutorial 全国计算机等级考试二级ACCESS冲刺题(3)

全国计算机等级考试二级ACCESS冲刺题(3)

Jun 07, 2016 pm 03:02 PM
access next Level 2 computer

Next J Next I 执行上面的语句后,K的值为______。 A.8 B.10 C.14 D.21 (33)VBA数据类型符号“%”表示的数据类型是______。 A.整型 B.长整型 C.单精度型 D.双精度型 (34)函数Mid("123456789",3,4)返回的值是______。 A.123 B.1234 C.3456 D.456

 Next J

  Next I

  执行上面的语句后,K的值为______。

  A.8

  B.10

  C.14

  D.21

  (33)VBA数据类型符号“%”表示的数据类型是______。

  A.整型

  B.长整型

  C.单精度型

  D.双精度型

  (34)函数Mid("123456789",3,4)返回的值是______。

  A.123

  B.1234

  C.3456

  D.456

  (35)运行下面程序代码后,变量J的值为______。

  Private Sub Fun()

  Dim J as Integer

  J=10

  DO

  J=J+3

  Loop While J

  End Sub

  A.10

  B.13

  C.19

  D.21

  二、填空题(每空2分,共30分)

  请将每一个空的正确答案写在答题卡【1】~【15】序号的横线上,答在试卷上不得分。

  (1)实现算法所需的存储单元多少和算法的工作量大小分别称为算法的 【1】 。

  (2)数据结构包括数据的逻辑结构、数据的 【2】 以及对数据的操作运算。

  (3)一个类可以从直接或间接的祖先中继承所有属性和方法。采用这个方法提高了软件的【3】 。

  (4)面向对象的模型中,最基本的概念是对象和 【4】 。

  (5)软件维护活动包括以下几类:改正性维护、适应性维护、 【5】 维护和预防性维护。

  (6)SQL(结构化查询语言)是在数据库系统中应用广泛的数据库查询语言,它包括了数据定义、数据查询、 【6】 和 【7】 4种功能。

  (7)文本型字段大小的取值最大为 【8】 个字符。

  (8)使用查询向导创建交叉表查询的数据源必须来自 【9】 个表或查询。

  (9)计算型控件用 【10】 作为数据源。

  (10) 【11】 报表也称为窗体报表。

  (11) 【12】 函数返回当前系统日期和时间。

  (12)运行下面程序,其输出结果(str2的值)为 【13】 。

  Dim str1, str2 As String

  Dim i As Integer

  str1 = "abcdef"

  For i = 1 To Len(str1) Step 2

  str2 = UCase(Mid(str1, i, 1)) + str2

  Next

  MsgBox str2

  (13)运行下面程序,其运行结果k的值为 【14】 ,其最里层循环体执行次数为

  【15】 。

  Dim i, j, k As Integer

  i = 1

  Do

  For j = 1 To i Step 2

  k = k + j

  Next

  i = i + 2

  Loop Until i > 8

  全国计算机等级考试二级Access模拟试卷答案

  一、选择题

  (1)C

  知识点:算法的基本概念

  评析:计算机算法是指解题方案的准确而完整的描述,它有以下几个基本特征:可行性、确定性、有穷性和拥有足够的情报。

  (2)C

  知识点:线性表的概念

  评析:栈和队列都是一种特殊的操作受限的线性表,只允许在端点处进行插入和删除。二者的区别是:栈只允许在表的一端进行插入或删除操作,是一种“后进先出”的线性表;而队列只允许在表的一端进行插入操作,在另一端进行删除操作,是一种“先进先出”的线性表。

  (3)A

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to disable background applications in Windows 11_Windows 11 tutorial to disable background applications How to disable background applications in Windows 11_Windows 11 tutorial to disable background applications May 07, 2024 pm 04:20 PM

1. Open settings in Windows 11. You can use Win+I shortcut or any other method. 2. Go to the Apps section and click Apps & Features. 3. Find the application you want to prevent from running in the background. Click the three-dot button and select Advanced Options. 4. Find the [Background Application Permissions] section and select the desired value. By default, Windows 11 sets power optimization mode. It allows Windows to manage how applications work in the background. For example, once you enable battery saver mode to preserve battery, the system will automatically close all apps. 5. Select [Never] to prevent the application from running in the background. Please note that if you notice that the program is not sending you notifications, failing to update data, etc., you can

How to convert deepseek pdf How to convert deepseek pdf Feb 19, 2025 pm 05:24 PM

DeepSeek cannot convert files directly to PDF. Depending on the file type, you can use different methods: Common documents (Word, Excel, PowerPoint): Use Microsoft Office, LibreOffice and other software to export as PDF. Image: Save as PDF using image viewer or image processing software. Web pages: Use the browser's "Print into PDF" function or the dedicated web page to PDF tool. Uncommon formats: Find the right converter and convert it to PDF. It is crucial to choose the right tools and develop a plan based on the actual situation.

How to read dbf file in oracle How to read dbf file in oracle May 10, 2024 am 01:27 AM

Oracle can read dbf files through the following steps: create an external table and reference the dbf file; query the external table to retrieve data; import the data into the Oracle table.

How does the Java reflection mechanism modify the behavior of a class? How does the Java reflection mechanism modify the behavior of a class? May 03, 2024 pm 06:15 PM

The Java reflection mechanism allows programs to dynamically modify the behavior of classes without modifying the source code. By operating the Class object, you can create instances through newInstance(), modify private field values, call private methods, etc. Reflection should be used with caution, however, as it can cause unexpected behavior and security issues, and has a performance overhead.

Common exception types and their repair measures in Java function development Common exception types and their repair measures in Java function development May 03, 2024 pm 02:09 PM

Common exception types and their repair measures in Java function development During the development of Java functions, various exceptions may be encountered, which affect the correct execution of the function. The following are common exception types and their repair measures: 1. NullPointerException Description: Thrown when accessing an object that has not been initialized. Fix: Make sure you check the object for non-null before using it. Sample code: try{Stringname=null;System.out.println(name.length());}catch(NullPointerExceptione){

Interpretation of Botanix: decentralized BTC L2 for network asset management (with interactive tutorial) Interpretation of Botanix: decentralized BTC L2 for network asset management (with interactive tutorial) May 08, 2024 pm 06:40 PM

Yesterday, BotanixLabs announced that it has completed a total of US$11.5 million in financing, with participation from Polychain Capital, Placeholder Capital and others. Financing will be used to build the decentralized EVM equivalent of BTCL2Botanix. Spiderchain combines the ease of use of EVM with the security of Bitcoin. Since the testnet went live in November 2023, there have been more than 200,000 active addresses. Odaily will analyze Botanix’s characteristic mechanism and testnet interaction process in this article. Botanix According to the official definition, Botanix is ​​a decentralized Turing-complete L2EVM built on Bitcoin and consists of two core components: Ethereum Virtual Machine

How does the Java reflection mechanism implement dynamic loading of classes? How does the Java reflection mechanism implement dynamic loading of classes? May 04, 2024 pm 03:42 PM

The Java reflection mechanism allows classes to be dynamically loaded and instantiated at runtime, and class metadata can be manipulated through classes in the java.lang.reflect package, including Class, Method, and Field. Through practical cases of loading the Example class, instantiating objects, obtaining and calling methods, you can demonstrate its application in dynamically loaded classes, thereby solving programming problems and improving flexibility.

How to solve access violation error How to solve access violation error May 07, 2024 pm 05:18 PM

Access Violation error is a run-time error that occurs when a program accesses a memory location beyond its memory allocation, causing the program to crash or terminate abnormally. Solutions include: checking array boundaries; using pointers correctly; using appropriate memory allocation functions; freeing freed memory; checking for memory overflows; updating drivers and systems; checking third-party libraries; using a debugger to trace execution; contacting the software vendor for support.

See all articles