Xem mẫu

  1. MINISTRY OF SCIENCE AND TECHNOLOGY BỘ KHOA HỌC VÀ CÔNG NGHỆ HOÀ LẠC HIGH TECH PARK BAN QUẢN LÝ MANAGEMENT BOARD KHU CÔNG NGHỆ CAO HOÀ LẠC VIETNAM IT EXAMINATION AND TRUNG TÂM SÁT HẠCH CÔNG NGHỆ TRAINING SUPPORT CENTER (VITEC) THÔNG TIN VÀ HỖ TRỢ ĐÀO TẠO (VITEC) SOFTWARE SÁT HẠCH DESIGN AND DEVELOPMENT KỸ SƯ ENGINEER THIẾT KẾ VÀ PHÁT TRIỂN EXAMINATION PHẦN MỀM 26th January 2003 Ngày 26 tháng 1 năm 2003 Afternoon I Phần thi buổi chiều I Do not open the exam booklet until Không mở đề thi trước khi được instructed to do so. phép. Inquiries about the exam questions Các thắc mắc về câu hỏi thi sẽ will not be answered. không được trả lời
  2. 2003 VITEC Software Design and Development Engineer Examination (Afternoon, Part 1) Questions must be answered in accordance with the following: Question Nos. Q1-Q6 Question Selection All questions are compulsory Examination Time 13:00-15:00 (120 minutes) Instructions: 1. Use an HB pencil. If you need to change an answer, erase your previous answer completely and neatly. Wipe away any eraser debris. 2. Mark your examinee information and test answers in accordance with the instructions below. Your test will not be graded if you do not mark properly. Do not mark or write on the answer sheet outside of the prescribed places. (1)Examinee Number Write your examinee number in the space provided, and mark the appropriate space below each digit. (2)Date of Birth Write your date of birth (in numbers) exactly as it is printed on your examination admission card, and mark the appropriate space below each digit. (3)Write each answer in the space specified for that question. Answer can be written in English or Vietnamese. (4) Write your answers clearly and neatly. Answers that are difficult to read will receive a lower score. 3. After the test, you may take this question booklet home with you. Do not open the exam booklet until instructed to do so. Inquiries about the exam questions will not be answered.
  3. 2003 VITEC Class II Information Technology Engineer Examination - Afternoon Sát hạch Kĩ sư Thiết kế và Phát triển phần mềm (Buổi chiều - Phần 1) Các câu hỏi phải được trả lời tuân theo điều sau: Số hiệu câu hỏi 6 câu từ Q1 đến Q6 Câu hỏi lựa chọn Tất cả các câu hỏi đều bắt buộc Thời gian sát hạch 13:00 ~ 15:00 (120 phút) Hướng dẫn: 1. Dùng bút chì HB. Nếu bạn cần đổi câu trả lời, hãy xoá hết câu trả lời trước. Phủi sạch bụi tẩy trên giấy. 2. Đánh dấu thông tin sát hạch và câu trả lời sát hạch của bạn theo hướng dẫn dưới đây. Bài sát hạch của bạn sẽ không được chấm nếu bạn không đánh dấu đúng. Đừng đánh dấu hay viết lên tờ giấy trả lời bên ngoài chỗ đã qui định. (1) Số hiệu thí sinh Hãy viết số hiệu thí sinh ở chỗ đã cho, và đánh dấu vào chỗ thích hợp dưới mỗi chữ số. (2) Ngày sinh Hãy viết ngày sinh của bạn (theo số) đích xác như nó được in trong phiếu dự thi, và đánh dấu vào chỗ thích hợp dưới mỗi chữ số. (3) Hãy viết câu trả lời tại vị trí được dành cho câu hỏi đó. Câu trả lời có thể viết bằng tiếng Anh hoặc tiếng Việt. (4) Hãy trả lời một cách rõ ràng và gãy gọn. Những câu trả lời khó đọc sẽ bị điểm thấp. 3. Cuối giờ thi, bạn có thể giữ lại bộ đề thi này. Không mở tập giấy thi chừng nào chưa được hướng dẫn làm như vậy. Mọi việc hỏi thêm về các câu hỏi sát hạch sẽ không được trả lời.
  4. 2003 VITEC Class II Information Technology Engineer Examination - Afternoon Sát hạch Kĩ sư Thiết kế và Phát triển phần mềm (Buổi chiều - Phần 1) Các câu hỏi phải được trả lời tuân theo điều sau: Số hiệu câu hỏi 6 câu từ Q1 đến Q6 Câu hỏi lựa chọn Tất cả các câu hỏi đều bắt buộc Thời gian sát hạch 13:00 ~ 15:00 (120 phút) Hướng dẫn: 1. Dùng bút chì HB. Nếu bạn cần đổi câu trả lời, hãy xoá hết câu trả lời trước. Phủi sạch bụi tẩy trên giấy. 2. Đánh dấu thông tin sát hạch và câu trả lời sát hạch của bạn theo hướng dẫn dưới đây. Bài sát hạch của bạn sẽ không được chấm nếu bạn không đánh dấu đúng. Đừng đánh dấu hay viết lên tờ giấy trả lời bên ngoài chỗ đã qui định. (1) Số hiệu thí sinh Hãy viết số hiệu thí sinh ở chỗ đã cho, và đánh dấu vào chỗ thích hợp dưới mỗi chữ số. (2) Ngày sinh Hãy viết ngày sinh của bạn (theo số) đích xác như nó được in trong phiếu dự thi, và đánh dấu vào chỗ thích hợp dưới mỗi chữ số. (3) Hãy viết câu trả lời tại vị trí được dành cho câu hỏi đó. Câu trả lời có thể viết bằng tiếng Anh hoặc tiếng Việt. (4) Hãy trả lời một cách rõ ràng và gãy gọn. Những câu trả lời khó đọc sẽ bị điểm thấp. 3. Cuối giờ thi, bạn có thể giữ lại bộ đề thi này. Không mở tập giấy thi chừng nào chưa được hướng dẫn làm như vậy. Mọi việc hỏi thêm về các câu hỏi sát hạch sẽ không được trả lời. 1
  5. 2
  6. 2003 VITEC Software Design and Development Engineer Examination (Afternoon, Part 1) Questions must be answered in accordance with the following: Q1-Q6 Question Nos. Question Selection All questions are compulsory Examination Time 13:00-15:00 (120 minutes) Instructions: 1. Use an HB pencil. If you need to change an answer, erase your previous answer completely and neatly. Wipe away any eraser debris. 2. Mark your examinee information and test answers in accordance with the instructions below. Your test will not be graded if you do not mark properly. Do not mark or write on the answer sheet outside of the prescribed places. (1)Examinee Number Write your examinee number in the space provided, and mark the appropriate space below each digit. (2)Date of Birth Write your date of birth (in numbers) exactly as it is printed on your examination admission card, and mark the appropriate space below each digit. (3) Write each answer in the space specified for that question. (4)Write your answers clearly and neatly. Answers that are difficult to read will receive a lower score. 3. After the test, you may take this question booklet home with you. Do not open the exam booklet until instructed to do so. Inquiries about the exam questions will not be answered. 1
  7. 2
  8. Q1. Read the following text regarding IP address assignments in a corporate network implementation, then answer Sub-Questions 1 through 3. Company K has decided to implement a corporate network based on IP (Internet Protocol Version 4). As shown in Figure 1, this network consists of a total of five LANs, of which one is a main office LAN and four are branch office LANs. The LANs are connected to each other using leased lines via routers. The maximum number of connected hosts (devices, including routers, that perform communication are called hosts) is 50 for the main office LAN, and 20 for each branch office LAN. B r an ch o f f i ce B r an ch o f f i ce LA N 2 LA N 3 ( 20 ho s t s ) ( 2 0 h o sts) B r anch o f fi ce B r a n ch o ff i ce LA N 1 LA N 4 ( 2 0 h o s t s) ( 2 0 ho s t s ) M a i n o ffi c e LA N ( 5 0 h o sts) Fig. 1 Implementation of Company K’s Corporate Network IP addresses are expressed as 32 bits of data to uniquely specify a host connected to the network. As shown in Figure 2, an IP address consists of a network part and a host part. The host part is further divided between a subnet ID and a host ID for purposes such as effective use of addresses. The network ID in the network part, together with the subnet ID of the host part, are also called a subnet address. I P a ddr e s s ( 32 bi t s ) N e t w or k p a rt Ho st p a r t Ne t w o r k I D Subne t I D H o st ID Su bne t a ddr e s s Fig. 2 IP Address Configuration 3
  9. In this case, a subnet address identifies a LAN, and a host ID identifies an individual host in that LAN. One network ID is assigned to Company K’s entire network comprising the five LANs. In addition, one subnet ID is assigned to each LAN, and one unique host ID is assigned to each host within each LAN. It should be noted that it is not necessary to assign subnet addresses to the leased line parts between the LANs. The IP address notation method employed involves expressing every eight bits as values in decimal notation, and delimiting these values with periods (“.”). In this case, a 24-bit network ID, consisting of “223.x.255” (where x is a certain decimal number), is assigned to the Company K network using this notation method. The remaining 8-bit host part is assigned a subnet ID and host ID as appropriate to complete the subnet address assignment for each LAN. In order to express a subnet address, it is necessary to indicate the number of bits it has. Therefore, after the IP address expression in which the host ID is “0”, a forward slash (“/”) is used as a delimiter and the number of bits in the subnet address is expressed as a decimal number. For example, it may be expressed as “223.x.255.16/28”. Any bit pattern other than all zeroes or all ones may be used as the host ID specifying a host. Likewise, any bit pattern other than all zeroes or all ones may be used as the subnet ID. The router to be used is a model with the functions required for this problem. Sub-Question 1 What are the appropriate words to insert in blanks and in the a b paragraph below, which pertains to IP addresses and routers? In order to send IP packets to a receiver across LANs, a router is used in connecting the LANs together. The router looks at the receiver ’s IP address in the received IP packets to determine the next destination for the IP packets. If the subnet address of the receiver ’s IP a address specifies LAN , then it is sent directly to the receiver’s host; otherwise, b it is sent to the next appropriate . 4
  10. Sub-Question 2 In assigning a subnet address, first the subnet ID was considered as having a fixed length (the same number of bits for all LANs). What are the appropriate integers to insert in c d blanks and in the paragraph below? In Company K’s case, there are five LANs, so the subnet IDs must have a minimum of c bits. Therefore, given the number of bits that can be used in the host IDs, the maximum number of host IDs for which IP addresses can be assigned in each LAN is d . Sub-Question 3 With the method in Sub-Question 2, it is not possible to assign IP addresses to all of the hosts in the main office LAN, so the method which was adopted assigns subnet IDs that have different numbers of bits in each LAN. What are the appropriate integers to insert in e m blanks through in the paragraph and table below? Based on the number of hosts requiring IP address assignments, the host IDs for the main e office LAN must have a minimum of bits. Likewise, the host IDs for the f branch office LANs must have a minimum of bits. Subnet addresses were assigned to each LAN, taking care to maintain the uniqueness of the IP addresses. The results of these assignments are shown in the table below. In this case, the smallest possible subnet address was assigned to the main office LAN. Table Subnet Addresses in Company K’s LANs LAN Subnet address Main office LAN 223 . x . 255 . / g h 223 . x . 255 . / i j 223 . x . 255 . / k j Branch office LANs 223 . x . 255 . / j l m 223 . x . 255 . / j 5
  11. Q2. Read the following text regarding the evaluation of the number of bugs during system development, then answer Sub-Questions 1 through 4. Mr. U, who is a quality control manager at Company T, a software developer, has checked the average number of bugs per 1,000 lines of code in 30 past system development projects in order to estimate the number of bugs that will occur in the future. The mean value of bugs per 1,000 lines of code was 5.1; variance was 2.8; and standard deviation was 1.7. In this case, the number of bugs is the number of bugs discovered in a system test. A histogram of the number of bugs is presented in Figure 1. On the horizontal axis, “1–2” denotes the number of cases in which the number of bugs was 1 or more but less than 2. 8 F r e que nc y o f o c c u r r e nc e 7 ( numb e r o f s y s t e m s ) 6 5 4 3 2 1 0 0 -1 1 -2 2 -3 3 -4 4 -5 5 -6 6 -7 7 -8 8 -9 Fig. 1 Histogram of Number of Bugs per 1,000 Lines of Code Sub-Question 1 Assuming the number of bugs in systems developed by Company T in the future follows the above parameters, what would be the expected value for the total number of bugs in a system with a scale of 60,000 lines of code? Give your answer as an integer value, counting fractions of .5 and over as a unit and cutting away the rest. Sub-Question 2 Assuming the occurrence of bugs has a normal distribution following the above parameters, which of the following is the most appropriate description of the probability that the number of bugs per 1,000 lines of code would be equal to or greater than a given value? Select one answer only. a) The probability that the number of bugs will be seven or more is approximately 15%. b) The probability that the number of bugs will be seven or more is approximately 30%. c) The probability that the number of bugs will be eight or more is approximately 15%. d) The probability that the number of bugs will be eight or more is approximately 30%. 6
  12. Sub-Question 3 Next, Mr. U expressed the relationship between system sizes and the number of bugs per 1,000 lines of code for the past 30 projects in the form of a scatter plot. The results are shown in Figure 2. Based on this information, Mr. U decided that the following relationship exists between the number of bugs and system size. Number of bugs per 1,000 lines of code = 3.4 + 0.05 × system size (unit: 1,000 lines of code) 10 8 N u mbe r o f b ug s p e r 1, 000 l i n e s o f c ode 6 4 2 0 0 20 40 60 80 S y s t e m s i z e ( u n it: 1 , 000 l i n e s o f c o de ) Fig. 2 Scatter Plot of System Size and Number of Bugs Using this relation expression, determine the total number of bugs expected in a system with a size of 60,000 lines of code. Give your answer as an integer value, counting fractions of .5 and over as a unit and cutting away the rest. Sub-Question 4 a g What are the appropriate words to insert in blanks through in the following paragraph? Select the appropriate words from the set of answers which follows the paragraph. Sub-Question 1 and Sub-Question 3 both estimate the number of bugs based on actual data a from 30 past projects. The result in Sub-Question 1 ignored , while the result in Sub-Question 3 did not. The relation expression in Sub-Question 3 is called a recursive b expression. Methods such as the method are used to calculate the answer of this expression. In this recursive expression, the coefficient of system size (unit: 1,000 a lines of code) is positive. This means that as increases, the number of bugs per c 1,000 lines of code . Based on the information in Figure 2, it is reasonable to a think that the number of bugs per 1,000 lines of code is affected by , and it d seems more appropriate to use the result of Sub-Question . In addition, in this type of statistical analysis, it is important to assess the overall trend while simultaneously investigating the causes related to cases (outlier values) that exhibit 7
  13. characteristics differing considerably from other cases. For example, in cases where the number of bugs is considerably greater than the estimated value at the end of the test, there may have been problems such as complex system functions and configuration, or e insufficient . Conversely, in cases where the number of bugs is quite low, it f could be that program quality is extremely high, or it could be that is insufficient, so caution is needed. In addition, it is known heuristically that the cumulative bug count curve plotted against test progress is a unique curve in many cases. For this reason, there are methods whereby a cumulative bug count curve is prepared and compared against a curve derived using, for example, a model, in order to assess test progress. g Answer set: a) 1 b) 3 c) Moving average d) Decreases e) Computer processing capability f) Gompertz g) Least squares h) System size i) System particularity j) System complexity k) Increases l) Test m) Program developers’ capability n) Poisson o) Runge-Kutta 8
  14. Q3. Read the following text regarding a VPN, then answer Sub-Questions 1 through 4. A VPN (Virtual Private Network) is one method for conducting secure communication between two sites A and B. Figure 1 shows a system configuration for conducting communication using IP through VPN units A and B. Assume that the information required for communication between VPN units A and B, such as encryption keys and routing information, has been set appropriately in advance. Si te A S ite B Rout e r A In te rn e t R oute r B V PN VP N Ho s t A Ho s t B U n it A U n it B Fig. 1 System Configuration Diagram When a VPN unit in Figure 1 receives an IP packet addressed to a site conducting VPN communication from a host inside its own site, it performs the following transformation, then sends the packet to the VPN unit of the remote site. (1) It encrypts the entire received IP packet using a secret key cryptosystem. (2) It adds, to the encrypted packet, an IP header, which is addressed from itself to the VPN unit at the remote site. (3) It calculates the hash function value from the IP header and the entire encrypted packet, then sets it in the packet as authentication data. Figure 2 shows the configuration of the transmitted packet after this transformation. A u t h en t i cat io n I P h e ad er E n cryp t e d I P p acket da t a Fig. 2 Transmitted Packet 9
  15. When a VPN unit receives the packet from the VPN unit of a remote site, it performs the following processes. (4) It confirms that the packet is from the VPN unit of a site engaging in VPN communication, then checks whether the authentication data is correct. (5) If the authentication data is correct, it removes and decrypts the encrypted packet from the received packet, then it transfers it to the receiver's address in the decrypted IP packet. Sub-Question 1 Answer the following questions regarding VPN unit packet transformation. (1) What does packet encryption serve to prevent, in terms of security? Answer in 10 words or less. (2) What does adding a hash function value to the packet prevent, in terms of security? Answer in 10 words or less. Sub-Question 2 When a packet is sent from host A to host B using a VPN, what sender ’s address and receiver ’s address appear in the IP header for each interval shown in the table below? Provide the appropriate words to enter in blanks through in the a d table. Table Sender ’s Address and Receiver ’s Address in Each Interval Interval Sender ’s address Receiver ’s address Host A → VPN unit A a Host A VPN unit A → VPN unit B b c VPN unit B → Host B d Host B 10
  16. Sub-Question 3 Which of the following describe characteristics of the method for establishing a VPN as presented in the problem text? Select all answers that are applicable. a) Applications that use a VPN must link special libraries. b) In order to use a VPN, it is necessary to connect leased lines between the sites. c) Secure communication can be achieved even using a frame relay network or telephone network over the public communication network. d) Even if the method for communication between sites is changed from a method which does not use VPN to a method which does use VPN, it is not necessary to make application changes. e) The method is a method for establishing a VPN wherein tunneling is performed in the data link layer (Layer 2). f) A VPN can only be used by specific applications. Sub-Question 4 In order to prevent the exposure of host addresses in sites A and B to the Internet, it was decided that routers A and B would be provided with a NAT function, whereby they would translate specific internal addresses in the IP packets into addresses on the Internet side. Furthermore, it was decided that addresses would be exposed to the Internet for VPN units A and B only. However, VPN communication between sites A and B stopped working due e to the introduction of the NAT function. Enter the appropriate words in blanks g through in the following description of the reasons for this problem. Give each answer in 20 words or less. In this case, assume that the Internet-side IP addresses of VPN units A and B are VPN unit AX and VPN unit BX, respectively. When the NAT function is introduced, the addresses in the IP header of a packet sent from e site A to site B are for the receiver and VPN unit A for the sender, at the time of sending from VPN unit A. In addition, the addresses in the IP header at the time of f reception by VPN unit B are VPN unit B for the receiver and for the sender. g Thus the information in the IP header is changed, and at VPN unit B fails, so VPN communication no longer works. 11
  17. Q4. Read the following text regarding system performance, then answer Sub-Questions 1 through 3. Company C has studied replacing its server in order to improve system performance when the lease of its currently used Internet server ends. The new server comprises a main unit (CPU, memory, and related peripheral devices) and a disk system. There are two kinds of candidates for each of them. Company C will select one main unit and one disk system from the candidates, and will build the server by combining them. A condition for the new server is that CPU utilization be 10% or less when existing programs are executed. Disk capacity is estimated at 60 GB for storing data and programs. The specifications and performance for these candidates are as follows: (1) Main unit specifications Main unit A has just one CPU. Main unit B is based on a symmetric multiprocessor system. It has one CPU in its minimum configuration, but CPUs can be added one at a time. Memory can be added as needed. (2) Main unit performance In order to determine the performance of main units A and B in case of each containing one CPU, they were equipped with sufficient memory and test disks, and existing programs were executed. The performance results are shown in Table 1. Test disks with a fast access speed were used. Table 1 Main Unit Performance Main unit CPU utilization A 10% B 40% The CPU utilization Pn of main unit B when it is equipped with n CPUs and executes existing programs is given by the following equation, where P1 is the utilization when there is one CPU. Pn = P1 ( 1 + 0.05( n – 1))/ n 12
  18. (3) Disk system specifications and performance Both disk systems X and Y are RAID systems. X is RAID1 and Y is RAID5. The operation rates and access times of the individual disks forming these systems are equivalent to each other. Sub-Question 1 Answer the following questions regarding the main units. (1) If main unit B is selected, how many CPUs are needed to build a multiprocessor configuration of the same or lower CPU utilization rate as main unit A? (2) When a program to run as a single thread is executed, throughput is not improved much on main unit B even when more CPUs are added. What is the reason for this (answer in 30 words or less)? Sub-Question 2 Table 2 shows the operation rates calculated taking into account minimum configurations assuming 60 GBs as the effective capacity of disk systems X and Y, and taking into account reliability in the event of a failure. Enter a numerical value for , and a enter equations for and . In this case, the operation rate of a single b c disk is d in all cases. Table 2 Disk System Configuration Number of disks (count) in Capacity (GB) Disk system Operation rate minimum configuration per disk b X 2 60 a c Y 30 13
  19. Sub-Question 3 The following text is part of a report to be used in selecting each candidate. What are the appropriate words to insert in blanks through ? d h (1) Disk system Both disk systems X and Y can operate even if one of their disks fails. When a failure occurs, the average access time of hardly changes, but access may slow d down for . e Disk utilization (capacity for storing data or programs divided by total disk capacity) is higher for . f Based on Company C’s operation methods, faster access time even in the event of a failure is more important than disk utilization, so is the more suitable g choice. (2) Main unit If CPU utilization is the only factor considered, A could be used, or B could be used with more CPUs. However, B is better if one considers cases where the amount of data handled increases. (3) Overall system expandability When CPUs are added, memory and disk system performance become bottlenecks. Assuming sufficient memory can be installed, elimination of the disk bottleneck requires that disk systems be added, and the positioning of must be taken h into account so that all disk systems are accessed equally. 14
nguon tai.lieu . vn