A DATABASE TO AID PROBE DESIGN FOR VIRUS IDENTIFICATION
华为认证ICT高级工程师HCIP考试(习题卷1)

华为认证ICT高级工程师HCIP考试(习题卷1)说明:答案和解析在试卷最后第1部分:单项选择题,共43题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]前缀列表:ip ip-prefix Prefix1 permit 160.0.0.0 3 less-equal 16的含义是什么?A)前缀的前三个比特必须为“101”,掩码长度必须在3和16之间B)前缀的前三个比特必须为“101”,掩码长度必须在8和16之间C)前缀号必须为“160”,掩码长度必须在8和16之间D)前缀号必须为“160”,掩码长度必须在3和16之间2.[单选题]以下对LDP的 Advertisement Message描述错误的是哪项?A)Label Mapping Message用来宣告FEC/ Label映射信息B)Label Request Message用来向LDP Peer请求FC的标签映射C)Label Abort Request Message用来终止未完成的Label Request MessageD)Label Withdraw Message用来释放标签,当一个LSR不再需要以前从LDP Peer收到的标签时,就发送一个 Label Release Message给该LDP Peer3.[单选题]MUXVLAN 提供了一种通过 VLAN 进行网络资源控制的机制,以下概念中不属于 MUXVIAN 的是:A)主 VIANB)从 VLANC)GuestVLAND)互通型 VLAN4.[单选题]哪种内存复用技术可以回收虚拟机暂时不用的物理内存,分配给需要复用内存的虚拟机?A)内存置换B)内存气泡C)内存透明大页D)内存共享5.[单选题]在虚拟桌面发放流程中,创建虚拟机时,哪个组件会检查指定的虚拟机组和桌面组是否存在?A)ITAB)HDCC)HDAD)GaussDB6.[单选题]下面关于DISPLAY BGP ROUTING-TABLE命令输出的内容描述正确的是?A)到达目的地址192.168.1.0的路由是通过Network命令注入到BGP路由表中的B)到达目的地址192.168.1.0的路由是通过AS200学到的C)到达目的地址192.168.1.0的路由在BGP路由表中不是最优的D)到达目的地址192.168.1.0的路由的MED值是100A)100msB)1000msC)5sD)10s8.[单选题]Ethernet_II帧中,在源MAC地址后有两个字节的类型字段,用来指明封装的数据报文。
《Linux网络操作系统项目教程(RHEL7.4CentOS7.4)(第3版))》习题与答案

《Linux网络操作系统项目教程(RHEL7.4/CentOS7.4)(第3版)》课后习题答案1.11 练习题一、填空题1.GNU的含义是。
2.Linux一般有3个主要部分:、、。
3.目前被称为纯种的UNIX指的就是以及这两套操作系统。
4.Linux是基于的软件模式进行发布的,它是GNU项目制定的通用公共许可证,英文是。
5.史托曼成立了自由软件基金会,它的英文是。
6.POSIX是的缩写,重点在规范核心与应用程序之间的接口,这是由美国电气与电子工程师学会( IEEE)所发布的一项标准。
7.当前的 Linux常见的应用可分为与两个方面。
8.Linux的版本分为和两种。
9.安装Linux最少需要两个分区,分别是。
10.Linux默认的系统管理员账号是。
1.GNU'sNotUnix的递归缩写(GNU计划一个自由软件组织)2.内核(kernel)、命令解释层(Shell或其他操作环境)、实用工具3.SystemV BSD4.C opyleft(无版权)GeneralPublicLicense,GPL)5.F SF,FreeSoftwareFoundation6.便携式操作系统接口(PortableOperatingSystemInterface)7.企业应用个人应用8.内核版本发行版本9.swap交换分区/(根)分区10.root二、选择题1.Linux最早是由计算机爱好者()开发的。
A.RichardPetersen C.RobPick B.LinusTorvalds D.LinuxSarwar2.下列中()是自由软件。
A.WindowsXP B.UNIX C.Linux D.Windows2008 3.下列中()不是Linux的特点。
A.多任务B.单用户C.设备独立性4.Linux的内核版本 2.3.20是()的版本。
A.不稳定B.稳定的C.第三次修订5.Linux安装过程中的硬盘分区工具是()。
华为认证ICT工程师HCIA考试(习题卷43)

华为认证ICT工程师HCIA考试(习题卷43)第1部分:单项选择题,共39题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]以下关于 CPU 资源和内存资源 Qos 描述不正确的是?A)内存资源 QOS 用于保证关键业务虚拟机能够得到足够的内存资源。
B)CPU 份额和 CPU 预留只在各虚拟机竞争计算资源时才发挥作用。
C)虚拟机的 CPUQoS 用于保证虚拟机的计算资源得到合理分配。
D)只有开启内存复用开关后才能使用内存资源 QoS。
答案:D解析:2.[单选题]DHCPv6客户端发送的DHCPv6请求报文的目的端口号为?A)546B)548C)547D)549答案:C解析:3.[单选题]在深度学习网络中,反向传播算法用于寻求最优参数,在反向传插算法中使用的什么法则进行逐层求导的?A)链式法则B)累加法则C)对等法则D)归一法则答案:A解析:4.[单选题]Spark是以下哪种编程语言实现的?A)CB)C++C)JAVAD)Scala答案:D解析:5.[单选题]以下关于 RAID 的描述,错误的是哪一项?()A)RAID 6 通过镜像的方式来保证用户数据的可靠性B)RAID 0 通过条带化的方式来提升存储的读写性能C)RAID 5 通过奇偶校验的方式来保证用户数据的可靠性D)RAID 1 通过镜像的方式来保证用户数据的可靠性答案:A解析:6.[单选题]<Huawei>system-viewB)修改用户的权限等级为3,并且保存配置C)修改用户视图下的save命令的权限等级为3D)修改某一用户使用的save命令的权限等级为3答案:C解析:7.[单选题]运行STP协议的设备端口处于Forwarding状态,下列说法正确的有?A)该端口端口仅仅接收并处理BPDU,不转发用户流量B)该端口端口既转发用户流量也处理BPDU报文C)该端口端口不仅不处理BPDU报文,也不转发用户流量D)该端口会根据收到的用户流量构建MAC地址表,但不转发用户流量答案:B解析:8.[单选题]在路由表中不包含以下哪项内容?A)MACB)Destination/MaskC)CostD)NextHop答案:A解析:9.[单选题]如图所示,交换机SWA在运行RSTP,管理员将SWA的G0/0/3端口配置为Edge Port后,使用一台交换机替代了主机C,则下面描述正确的是()class="fr-fic fr-dib cursor-hover"A)SWA的G0/0/5端口在接收到BPDU后,将会进行RSTP运算B)所有主机中,只有主机A能够正常发送和接收数据C)SWA的G0/0/3端口收到交换机发送的BPDU后会被关闭D)SWA的G0/0/3端口将会丢弃接收到的BPDU,正常转发数据答案:A解析:10.[单选题]以下哪种镜像是公有云平台提供的标准镜像,所有用户均可见?A)共公镜像解析:11.[单选题]链路本地单播地址的接口标识总长度为多少bit?A)48bitB)32bitC)64bitD)96bit答案:C解析:12.[单选题]当主机采用DHCPv6无状态自动配置时,主机发送哪一个DHCPv6报文请求配置信息?A)Information-RequestB)CONFIRMC)SOLICITD)REBIND答案:A解析:13.[单选题]KVM虚拟化架构中包括模块、QEMU和Libvirt。
华为认证ICT工程师HCIA考试(试卷编号1221)

华为认证ICT工程师HCIA考试(试卷编号1221)1.[单选题]以下关于 OpenStack 中组件的描述,正确的是哪一项?()A)Neutron 用于提供计量服务B)Cinder 用于提供对象存储服务C)Nova 用于提供网络服务D)Heat 用于提供部署编排服务答案:D解析:2.[单选题]下列关于华为FusionCompute中的集群、主机和虚拟机描述不正确的是()A)主机可以在不同集群间移动B)虚拟机可以跨集群迁移C)多个主机否属于同一集群取決于它们是否使用同一共享存储D)集群是由多个主机及其相关联的存储及网络资源组成的答案:C解析:3.[单选题]以下关于 Xen 的描述,正确的是哪一项?()A)Xen 能够支持半虚拟化和全虚拟化B)在一套Xen 架构下可以有多个Dmain0 虚拟机C)Xen 是一种闭源的虚拟化技术D)DomainU 虚拟机需要先于Domain0 虚拟机启动答案:A解析:4.[单选题]在华为AR路由器中,缺省情况下OSPF协议优先级的数值为?A)20B)10C)30D)0答案:B解析:5.[单选题]IPv6地址总长度比IPv4增加了多少bit?A)32B)96C)64D)1286.[单选题]以下哪个IPV6地址可以简写为2FFF:DAC: ABEF :CDAA: 732 ?A)2FFF: ODAC: ABEF: 0000:0000:CDAA: 0732B)2FFF:ODAC: ABEF :0000:0000:0000:CDAA:0732C)2FFF: ODAC:ABEF: 0000:0000:0000:CDAA:7320D)2FFF:DACO: ABEF: 000:0000:0000:CDAA: 0732答案:B解析:7.[单选题]神将网络训练时,常会遇到很多问题,对于梯度消失问题,我们可以通过选择使用以下哪种函数减轻该问题?A)Re lu函数B)Sigmoid函数C)tanh函数D)Soft sign函数答案:A解析:8.[单选题]96XX系列MCU当配置支持FECC DTMF会控时,需要先按()键后,才能进行控制摄像机。
Oracle Database Appliance部署指南说明书

1Register with My Oracle SupportA Verify that your shipment contains the correct power cables for your location.B Obtain your hardware Support Identifier (SI).C Add the hardware SI and new software licenses that you received with Oracle Database Appliance to your My Oracle Support profile. Each SI registration may take up to 24 hours.Note: You must have registered hardware and software SIs to obtain software or support from Oracle.2Plan the Network ConfigurationCollect the following network information from your network administrator:A Generic network information• Domain name (for example, )• (Optional) DNS server addresses• (Optional) Network Time Protocol server addresses• (Optional) VLAN ID• (Optional) NTP server detailsB Select the network interface you want to use for your public network• Oracle Database Appliance provides 10GB/25GB SFP28 optionsC Public network details needed to connect to the system• Host name and IP address (for example, hrsys0 and 192.0.2.18)• Netmask for public network (for example, 255.255.252.0)• Gateway for public network (for example, 192.0.2.1)• (Optional) VLAN ID for public network (for example, 100)Deploying Your Oracle Database Appliance X7-2S/X7-2M3Plan for Oracle ILOM ConfigurationConfigure Oracle Integrated Lights Out Manager (Oracle ILOM) for managing Oracle Database Appliance independently of the operating system. Collect the following ILOM details from your network administrator:• Oracle ILOM Host Name and IP address (for example, hrsysilom1 and 10.0.0.3)• Netmask for the Oracle ILOM network (for example, 255.255.255.0)• Gateway for the Oracle ILOM network (for example, 10.0.0.1)4Plan the Software and Database Configuration PropertiesIdentify the following configuration properties:• User and group information• Host Name and master password• Region (for example, America)• Time Zone (for example, America/Los_Angeles)• Data Storage Percentage (for example 80)• Database Name (for example, hrdb)• Database Unique Name• Database Version (for example, 12.2.0.1.0)• Database Edition (SE or EE)• Database Shape (for example, odb1)• Database Class (for example, OLTP)• Database Language (for example, English)• Database Character Set (for example, AL32UTF8)• Database National Character Set (for example: AL16UTF16)• Disk group redundancy for systems with 5 or more NVMe disks (Normal or High)• Database Territory (for example, America)• Container Database (yes or no)• (Optional) PDB Name and Admin User. This is optional if you answer no to Container Database.• Storage Type (ACFS or ASM)• (Optional) Oracle Enterprise Manager Database Express (EM Express) Console for Oracle Database 12.2.0.1,12.1.0.2 or the Database Control Console for Oracle Database 11.2.0.4.5(Optional) Plan for Oracle Auto Service RequestDownload the Oracle Database Appliance Server Patch, GI Clone, and RDBMS DB Clone software to a local computer on the network. Follow the instructions in the Oracle Database Appliance X7-2 Deployment and User's Guide .Find the patch information in the Oracle Database Appliance Release Notes and follow the instructions in the Oracle Database Appliance X7-2 Deployment and User's Guide .Go to /goto/oda/docs and select the release.6Download the SoftwareA Configure Oracle Auto Service Request (ASR), provide the following:• Oracle ASR user name• Oracle online account password• SNMP version (version 2 is recommended)• (Optional) Proxy server name to use for your deployment• (Optional) Proxy server port• (Optional) Proxy user name• (Optional) Proxy passwordB Configure External ASR manager• ASR Manager IP , host name• ASR Manager port• Y our My Oracle Support account user name and password.For more information about ASR, see: /technetwork/systems/asr/overview/index.html7Review Oracle Database Appliance Information 1Rack, Cable and Connect the Network and Power• Ensure that the system hardware is set up and mounted properly. See the Oracle Database Appliance Owner’s Guide for more information: h ttp:///goto/oda/docs and select the release• Important: Follow the instructions on Page 7 to cable Oracle Database Appliance° Connect power to the power supply unit (PSU)° Plug in the network cable for ILOM network management2Start Up the SystemA Once the green SP OK LED (1) is steady ON, push the power button (2)B Wait for the green Power OK LED (3) to turn steady ON. The Power OK LED might blink for several minutes. Do not repeatedly push the power buttonCopyright © 2017, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. E88372-02; Mfg no 7357594321• Review the most recent version of this poster in the Oracle Database Appliance online documentation library: /goto/oda/docs and select the release• Review the Oracle Database Appliance Release Notes for the latest patch information, what's new, and issues • Review the Oracle Database Appliance X7-2 Deployment and User's Guide for how to deploy the appliance and manage the databases• Review the Oracle Database Appliance white papers on OracleTechnology Network: https:///technetwork/server-storage/engineered-systems/database-appliance/index.html • Review the latest information about Oracle software and hardware products: 3Plumb the Network4Update the Repository with the GI and RDBMS FilesA Download the Oracle Database Appliance GI patch and RDBMS Clone files to a local computer on the network.B Unzip the files. If a patch file is split into more than one zip file, concatenate the zip files.C Upload the files to the appliance, then unzip each patch.D Update the repository. Y ou must include the fully qualified directory.# odacli update-repository -f /u01/tmp/patch_file_name.zipIf you have more than one bundle, you can use a comma-separated list. Spaces are not allowed between the filenames.E Check the job status to confirm that the status of the job is Success# odacli list-jobsSee the Oracle Database Appliance X7-2 Deployment and User's Guide for more information.A Use either the 10GBase-T or the 25GbE SFP28 network interface.B Connect to the ILOM remote console, then log in to the system as root.C Run the command configure-firstnet to configure the initial network for btbond1.# configure-firstnet Select the Interface to configure the network on (btbond1): btbond1 Configure DHCP on btbond1 (yes/no): no INFO: Y ou have chosen Static configuration Enter the IP address to configure: 10.1.10.2 Enter the Netmask address to configure: 255.255.255.0 Enter the Gateway address to configure: 10.1.10.1 INFO: Plumbing the IPs now INFO: Restarting the network Shutting down interface btbond1: bonding: btbond1: Removing slave em2. bonding: btbond1: releasing active interface em2 bonding: btbond1: making interface em3 the new active one. bonding: btbond1: Removing slave em3. bonding: btbond1: releasing active interface em3 ::::::::::56Monitor Deployment ProgressDeploy the Oracle Database AppliancePerform the following steps to create Oracle Database ApplianceA In your browser type the following URL: https://<ODA-host-ip-address>:7093/mgmt/index.htmlB Enter the following credentials• Username: oda-admin• Password: password See the Oracle Database Appliance X7-2 Deployment and User’s Guide .C Click Create Appliance on the Appliance pageD Enter the configuration information detailsE Review your configurationF Click Submit to start the deployment• M onitor the progress on the Activity tab.x C abling for Oracle Database Appliance X7-2MNote: You can configure the system to use either the 10 GbE RJ-45 network ports or the 10/25 GbE SFP+ ports.2113445521134455Copyright © 2017, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. E88372-02; Mfg no 7357594。
华为HCIPH12-723安全试卷九

华为HCIPH12-723安全试卷九华为HCIPH12-723安全试卷九1.【单选题】1分| 以下哪种网络安全威胁仅存在于WLAN网络中?A 驾驶攻击B 泛洪攻击C Dos拒绝服务攻击D MAC地址欺骗2.【多选题】1分| 在Portal认证中,准入控制交换机上必须配置以下哪些参数?(多选)Ashared-keyBPortal服务器IPCPortal页面URLDAAA参数3.【多选题】1分| 为保证用户能够正常通过在浏览器中输入任意域名的方式进行Portal认证,则应在接入认证设备的免认证规则中放通以下哪些项?APortal服务器BDNS服务器C外部网络D用户网关4.【多选题】1分| 通能够给AC-Campus进行桌面管理时,支持以下哪些选项中的管理项?A病毒库管理B资产管理C软件发布管理D补丁管理5.【多选题】1分| 在EAP终结方式下,接入设备向RADIUS服务器发送的AccessRequest中会携带以下哪些attribute?(多选)AMessage-AuthenticatorBCHAP-ChallengeCEAP-MessageDCHAP-Password6.【判断题】1分| 为检测RogueAP的存在,工作在正常模式下的AP需开启空口扫描功能,该功能并不会对WLAN业务的传输速率造成影响。
A对B错7.【判断题】1分| 使用基于MAC方式认证的802.1X认证,该接口下某认证用户离线之后,该接口下的其他终端依旧可以继续访问网络。
A对B错8.【判断题】1分| SACG不支持在无线环境下进行身份认证。
A对B错9.【判断题】1分| Portal服务器通过Portal协议向认证设备获取认证终端的MAC地址、所连接的SSID名称。
A对B错10.【判断题】1分| 用户在Portal页面中输入的账号密码会直接被发送到认证设备上。
A对B错11.【判断题】1分| AC-Campus推送给终端用户的系统补丁只能来自于操作系统官方的补丁中心。
DesignWare ARC EM Overlay Management Unit Datashee

DESIGNWARE IP DATASHEETThe DesignWare ® ARC ® EM Overlay Management Unit (OMU) option enables address translation and access permission validation with minimal power and area overhead while boosting the ability to run larger and more data intensive operations, such as those increasingly prevalent within AIoT, storage and wireless baseband applications, on an ARC EM processor. This hardware-based Overlay Management Unit provides support for virtual memory addressing with a Translation Lookaside Buffer (TLB) for address translation and protection of 4KB, 8KB or 16KB memory pages. In addition, fixed mappings of untranslated memory are supported, enabling the system to achieve increased performance over a large code base residing in a slow secondary storage memory, with the option to be paged in as needed into faster small on-chip page RAM (PRAM) in an efficient way. This is particularly suited for operating environments in which virtual address aliasing is avoided in software.In systems that run all code as a single process (single PID), using a large virtual address space with a one-to-one correspondence between the virtual address and a large selected area of secondary storage space (such as flash memory or DRAM), the address-translation facility of the Overlay Management Unit can be used to detect when a section (or one or more pages) of code is resident in the PRAM and provide the physical address to the page in the PRAM. Virtual address spacePhysical address space Figure 1: Virtual to Physical Address TranslationHighlights• Lightweight hardware-based memorymanagement unit (MMU) enablingaddress translation and accesspermission validation• Fully associative Instruction andData µTLBs• Configurable joint TLB depth of 64, 128 or256 entries• Common address space forinstruction and data• Independent rd/wr/execute flags for user/kernel modes per page• Optimized TLB programming withsoftware managed JTLB and hardwareassisted replacement policy• 32-bit unified instruction/dataaddress space–2GB virtual translated addressspace, mapping to 4GB physicaladdress space• Configurable page size: 4 KB, 8 KB, 16 KB• Per page cache control• Optional ECC for JTLB RAMsTarget Applications• AIoT• Storage• Wireless• NetworkingARC Overlay Management Unit forMemory ModelThe EM processor supports virtual memory addressing when the Overlay Management Unit is present. If the Overlay Management Unit is not present or if it is present but disabled, all the virtual addresses are mapped directly to physical addresses. By default, the Overlay Management Unit is disabled after reset. Note that the data uncached region is always active even if the Overlay Management Unit is disabled.The Overlay Management Unit features a TLB for address translation and protection of 4 KB, 8 KB or 16 KB memory pages, and fixed mappings of an untranslated memory. The upper half of the untranslated memory section is uncached for I/O uses while the lower half of the untranslated memory is cached for a system kernel.With the Overlay Management Unit option enabled, the ARC EM cache-based cores define a common address space for both instruction and data accesses in which the memory translation and protection systems can be arranged to provide separate, non-overlapping protected regions of memory for instruction and data access within a common address space. The programming interface to the Overlay Management Unit is independent of the configuration of the TLB in terms of the associativity of number of entries (Figure 2).Virtual address space Physical address space in secondary storagePhysical address space in on-chip page RAM Figure 2: Memory Address Mapping with Overlay Management ComponentsPage Table LookupThe system management or micro-kernel software tracks the mapping of pages from the program store in the level-3 memory to smaller level-2 memory. The number of entries used/required for this varies based on the Overlay Management Unit page size and the size of the level-2 memory. The Overlay Management Unit acts as a software-controlled cache into this page table, performs hardware address translation, and checks access permissions (Figure 3).Two levels of cache are provided:• The first level consists of micro TLBs (or μTLBs). These are very small, fully associative caches into the second level of the OLM cache. They allow for single-cycle translation and permission checking in the processor pipeline. The μTLBs are updated automatically from the second level of the cache.• The second level of the cache is called the joint TLB (JTLB). This consists of a larger, RAM-based 4-way set-associative TLB. The JTLB is loaded by special kernel mode handlers known as TLB miss handlers.• The final level of the hierarchy is the main page table itself. This contains the complete details of each page mapped for use by kernel or user tasks. The μTLBs, JTLB, and miss handlers combine to implement cached access into the OS page table.Figure 3: Overlay Manager Table StructureTranslation Lookaside BuffersTo provide fast translation from virtual to physical memory addresses the Overlay Management Unit contains Translation Lookaside Buffers (TLBs). The TLB architecture of the ARC EM’s Overlay Management Unit can be thought of as a two level cache for page descriptors: “micro-TLBs” for instruction and data (μITLB & μDTLB) as level one, and the “Joint” (J-TLB) as level two. The μITLB and μDTLB contain copies of the content in the joint TLB. The μTLBs may have descriptors not contained in the joint TLB. In addition to providing address translation, the TLB system also provides cache control and memory protection features for individual pages. The ARC EM implementation features a system configured as follows:• The μITLB and μDTLB are fully associative and physically located alongside the instruction cache and data cache respectively, where they perform single-cycle virtual to physical address translation and permission checking. The μITLB and μDTLB are hardware managed. On a μITLB (or μDTLB) page miss, the hardware fetches the missing page mapping from the JTLB.• The JTLB consists of a four-way set associative Joint Translation Lookaside Buffer with 64, 128 or 256 entries and is software managed. On a joint TLB page miss, special kernel-mode TLB miss handlers fetch the missing page descriptor from memory and store it in the JTLB, as well as swapping in the required contents from the main memory store into the level-2 memory. No part of the Overlay Management Unit has direct access to the main memory. The JTLB is filled by software through an auxiliary register interface.DocumentationThe following documentation is available for the DesignWare ARC Overlay Management Unit Option for ARC EM:• ARCv2 ISA Programmers Reference Manual• ARC EM Databook• DesignWare ARC EM Integration GuideTesting, Compliance, and QualityVerification of the ARC EM Overlay Management Unit follows a bottom-up verification methodology from block-level through system-level. Each functional block within the product follows a functional, coverage-driven test plan. The plan includes testing for ARCv2 ISA compliance as well as state- and control-specific coverage points that have been exercised using constrained pseudo-random environments and a random instruction sequence generatorARC EM ProcessorsThe ARC EM processors, built on the ARCv2 instruction set architecture (ISA) are designed to meet the needs of next-generation system-on-chip (SoC) applications and enable the development of a full range of 32-bit processor cores – from low-end, extremely power-efficient embedded cores to very high-performance host solutions that are binary compatible and designed with common pipeline elements. ARC EM processors can be precisely targeted to meet the specific performance and power requirements for each instance on a SoC, while offering the same software programmer’s model to simplify program development and task partitioning.©2021 Synopsys, Inc. All rights reserved. Synopsys is a trademark of Synopsys, Inc. in the United States and other countries. A list of Synopsys trademarks isavailable at /copyright.html . All other names mentioned herein are trademarks or registered trademarks of their respective owners.。
华为认证ICT工程师HCIA考试(习题卷21)

华为认证ICT工程师HCIA考试(习题卷21)说明:答案和解析在试卷最后第1部分:单项选择题,共40题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]在虚拟桌面发放流程中,创建虚拟机时,哪个组件会检查指定的虚拟机组和桌面组是否存在?A)ITAB)HDCC)HDAD)GaussDB2.[单选题]PPPoE客户端使用哪种方式向Server发送PADI报文?A)广播B)单播C)组播D)任播3.[单选题]SMC3.0场景下,部署独立SC需要采用() 操作系统。
A)UNIXB)WindowsC)openEulerD)Linux4.[单选题]以下关于Linux虚拟网络基本概念的描述正确的是哪一项?()A)Linux Bridge支持NAT功能B)Tun模拟了以太网设备, 操作二 层数据包C)Tap模拟了网络层设备,操作三层数据包D)Linux Bridge是虚拟二交换机,不能配置IP地址5.[单选题]以下哪一选项不是FusionCompute中的VRM模块的功能?A)管理集群内的块存储资源B)通过对虚拟资源、用户数据的统一管理,对外提供弹性计算、存储、IP等服务C)管理集群内资源的动态调整D)提供虚拟计算功能6.[单选题]与 FusionCompute 分布式虚拟机交换机端口组的描述,错误的是哪一项?()A)端口组支持配置 IP 与 MAC 绑定提升安全性B)接在同一端口组的虚拟机网卡,具有相同的网络属性C)一个分布式交换机在每个计算节只能创建一个端口组D)端口组是一种策略设置机制,这些策略用于管理与端口组相连的网络7.[单选题]还原系统盘后,链接克隆虚拟机只保留什么数据?A)数据盘数据B)收藏夹数据C)系统盘数据D)桌面数据8.[单选题]下列关于HBase的BloomFilter特性理解不正确的是?A)用来过滤数据B)用来优化随机读取的性能C)会増加存储的消耗D)可以准确判断某条数据不存在9.[单选题]IPv4最后一个选项字段(option)是可变长的可选信息,该字段最大长度为?A)40BB)20BC)60BD)10B10.[单选题]在华为桌面云中,DHCP的作用是?A)为桌面云的基础架构虚拟机分配IP地址、网关、DNS。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
A DATABASE TO AID PROBE DESIGN FOR VIRUS IDENTIFICATIONFENG-MAO LIN1, HSIEN-DA HUANG2, YU-CHUNG CHANG3, PAK-LEONG CHAN1,JORNG-TZONG HORNG1, MING-TAT KO41Department of Computer Science and Information Engineering, National Central University, No.300, Jungda Rd, Jhongli City, Taoyuan, Taiwan 320ChungLi, 320, Taiwan2Department of Biological Science and Technology & Institute of Bioinformatic, National Chiao-Tung University, 1001 Ta Hsueh Road, Hsinchu, Taiwan 300Hsin-Chu, 300, Taiwan3Department of Biotechnology, Ming Chuan University, 250 Chung Shan North Road, Section 5,Taipei, 111, Taiwan4Institute of Information Science, Academia Sinica, 128 Sec. 2, Academia Rd, Nankangm,Taipei, 115, TaiwanViral infection poses a major problem for public health, horticulture and animal husbandry, possiblycausing severe health crises and economic loss. Viral infections can be identified by the specificdetection of viral sequences in two ways, the first is the amplification-based method, such as usingthe polymerase chain reaction (PCR), the reverse transcription-polymerase chain reaction (RT-PCR),or nested-PCR, for example, and the second is the hybridization-based approach, such as the use ofsouthern blotting, northern blotting, dot blotting and DNA chips. The former provides the advantages of fast and specific detection and a lower detection limit, but also has some the followingweakness; (1) the clinicians must assess which viruses are suspected in an infectious event; (2) thenucleotides on the nearest 3’-end of the designed primers are very important to the successful of theextension of the primer; (3) although multiplex PCR can be used to detect many viral sequencessimultaneously, diagnosing the viral sequences of over 20 different species or strains in a singlereaction is currently very difficult. The hybridization-based method can not only tolerate sequencevariations of newly evolved virus strains, but can also simultaneously diagnose more viral sequencesin a single reaction than can multiplex PCR. Many chips have so fat been designed for clinical use.Most are designed for special purpose, such as typing enterovirus infection, and compare fewer than30 different viral sequences. None considers all primer design, increasing the likelihood of crosshybridization of similar sequences with other viral sequences. To prevent this possibility, this workestablishes a platform and database that provides users with specific probes of all known viral genome sequences, to designing their diagnostic chips. This work develops a system for designingprobes online. A user can select any number of different viruses and set their experimental conditions. Including, for example, melting temperature, length of probe. The system then return theoptimal sequences to suspected viral infections to be automatically identified from database. Thesystem that supports probe design for identifying virus has been published on our web page .tw. Contact: horng@.tw.1Introduction1.1.MicroarrayMicroarray (also called gene chip, DNA chip, and DNA microarray) technology emerged a few years ago. One of its main applications is in diagnosing pathogens. Typically, a microarray is a slide of glass or a piece of nylon membrane, above which thousands to12tens thousands of DNA sequences can be spotted. Such spotted DNA sequences are called probes. They can be used to detect different viral infections and distinguish which serotypes or strains are simultaneously involved in a hybridization reaction.One of the current challenges of microarray technology is the prevention of cross-hybridization. If a probe is very similar to its non-target sequences, cross-hybridization may occur. An oligonucleotide probe is shorter than cDNA and can be more easily and economically prepare. An oligonucleotide can be better spotted on a microarray than can cDNA for spotting, in solving the problem of cross hybridization and identifying more viruses.1.2.Criteria of probe designProbes were selected according to the criteria of specificity, melting temperature, and sensitivity. The following three main factors that influence virus probe selection are considered. The melting temperature or free energy of the oligonucleotide probe. The length of contiguous identity with any other non-target sequences in the oligonucleotide probe. The identity between each pair of the probe and the non-target sequence.All probes must be treated under the same hybridization conditions. Temperature is one of the most important factors. The melting temperature T m can be obtained using the nearest neighbor model [1].The second factor that influences oligonucleotide probe design is the length of contiguous identity of probe with any other sequence therein the oligonucleotide probe. One report of the sensitivity and specificity of a 50mer oligonucleotide microarrays [2] suggested that all probes with a 75% overall sequence identity with their non-target sequences and contiguous complementary base pairs with a length of under 14 are sufficiently specific to be selected.The third factor that affects probe design is the identity between each probe and its non-target sequence. Although contiguous identity with other sequences is the primary factor that causes cross-hybridization [2], a probe with a high identity with other non-target sequences always definitely causes cross-hybridization. Some tools, such as OligoArray [3], and OligoPicker [4] use the BLAST to find out the probes whose identities with their non-target sequences are high.1.3.Optimal probe for microarrayViral sequence must have at least one identifying probe and each probe must hybridize only a single sequence. The optimal probes should be those that hybridize with their target viral sequences perfectly, but do not hybridize effectively with their non-target sequences.Many algorithms exist for selecting optimal probes, including a method based on the matching frequency of the sequence landscape [5], a method based on a hash table and the BLAST [4], a method based on the longest common factor between probe and non-target sequence [6], a method based on the melting temperature of a probe [7], and a3 method based on unique segments [8]. This study uses the longest increasing subsequence algorithm (LIS), which is faster than the alignment algorithm, to calculate the identity of each probe with its non-target sequence. The set of optimal probe can identify its target viral sequence in a reasonable time. The results section presents a detailed comparison.Probe design is time consuming and few online systems exist. We design a database of candidate probes which contains appropriate probes and the melting temperature of the probe is also calculated. A fast algorithm for calculating identity between the probe and the non-target sequence is proposed so that the process of selection of optimal probe can be finished in a short time. The selection of optimal probe can be processed online and the cross-hybridization will not occur in our optimal probes. Therefore, user can select viral sequences arbitrarily on web and can immediately obtain optimal probe for selected virus. Many studies propose the identity of probe with non-target sequence as the point to evaluate the degree of cross-hybridization. We also apply the alignment of probe with non-target sequence online and the result is shown as graphic table.2System and Methods2.1. Data preparationThe proposed system uses two databases. One is of taxonomic data about viruses, taken from the universal virus database of the International Committee on the Taxonomy of Virus (ICTVDB) [9]. Another is the viral sequence from NCBI GenBank database. We use a data retrieval tool IntKey downloaded from ICTVDB to retrieval virus taxonomy data from ICTVDB. Then we download virus DNA sequences from NCBI GenBank. Virus taxonomy data and data about viral sequences are integrated in the local database, in which three tables (family, genus, species) stores taxonomic data and one table stores the DNA sequences of viruses. The sequence table contains 1,535 virus complete genomes. The sequence table provides the genomes of the viral sequences and the natural hosts of the virus.2.2. Generating probe candidatesA viral sequence is divided into many fragments by sliding a window in steps of five nucleotides. The size of the window is from 20 to 60 nucleotides. Sequence fragments are stored in the local database, if and only if the sequence fragment satisfies all the following criteria [5]. The number of occurrences of any single base (As, Cs, Ts or Gs) does not exceed half of the length of the fragment. The length of any section of contiguous As, Cs, Ts or Gs does not exceed a quarter of the length of the fragment. The GC-content of the sequence fragment ranges from 40% to 60%. The sequence fragments is not at all self-complementary.The database includes about ten million probe candidates. The melting temperature of each probe is calculated by MELTING [10]. A user selects a set of viral sequences and4inputs the length and the experimental temperature for probe design, all the probe candidates belong to the set of viral sequences and satisfy the conditions are selected from the probe candidate database.2.3. System flowThe system has four main phases.Data preparation: Viral sequences and viral taxonomies are downloaded from the GenBank (NCBI) and ICTVDB, respectively.Generating candidate probes: Viral sequences are divided into fragments by sliding a window five nucleotides at a time. The fragments are preselected by the probe filter [5] and inserted into the database of candidate probes. Then, the melting temperatures of all candidate probes are calculated using MELTING [10].Selecting the optimal probe: After a user has selected the target sequences for designing the viral probe, all of the candidate probes are selected according to the input parameters (melting temperature, range of melting temperature and length of probe). The optimal probes are those that are not very similar to their non-target sequences. The longest increasing subsequence algorithm is used to find out the optimal probe.Verification optimal probe: As the optimal probes are selected by using the LIS algorithm, the optimal probes are verified by two processes. One is the alignment of probe to the other probes. This process makes sure that the optimal probes will not match the same region of the target sequence. The other is the alignment of each probe to its non-target sequences. If the alignment score is high, the optimal probe can be discarded. 3Algorithm and Implementation3.1.Longest increasing subsequence algorithmThe most time consuming part for probe design is to find out the most similar regions between probe and its non-target sequence. Many methods use alignment tool like the BLAST to calculate the identity of each probe with its non-target sequence. However the method of calculation of the identity of probe with its non-target is not efficient. We apply a fast method to calculate the identity of probe to its non-target sequence. An investigation of the alignment of the whole genomes [11] applied a suffix tree and the longest increasing subsequence algorithm to find the parts of two sequences that were most similar to each other. Recently, a fast method of alignment, based on BLAST and longest increasing subsequence algorithm (LIS) was published [12]. It used the BLAST to identify some conserved regions in the two sequences and applied LIS to combine these conserved regions. The two sequences can thus be globally aligned. Both methods efficiently determine the identity between two sequences. The LIS algorithm used in above two studies is applied herein to valuate efficiently the identity between the probe and its non-target sequence. The algorithm is very fast so that the process of calculating the identity between probe and its non-target sequence can be finished in a short time and5 the results can be published to a web page.The algorithm for determining the longest increasing subsequence is the LIS algorithm. For example, the longest increasing subsequence of a sequence S=(7, 9, 1, 6, 2, 4, 8) is (1, 2, 4, 8). There are two major implementations of LIS algorithm. One is dynamic programming technique and its time complexity is O(n2). By using binary search, time complexity of generating LIS can be reduced to O(n log n) [13], where n is the number of elements in the sequence of numbers. A program called findLIS in C programming language is implemented to identify the most similar parts of a probe and a non-target sequence, using the LIS algorithm. This program first generates a suffix array for one of the sequences selected by a user. Each probe candidate is divided into fragments called tags, by sliding the window one nucleotide at a time along the whole probe. The length of tag is set to four. If a tag matches the first four nucleotides of the suffix in the suffix array, then both the number of the tag and the number of suffix of the sequence are recorded. A long sequence of numbers is generated when all the tags compare with suffixes of the sequence. Since the suffixes of the sequence are sorted lexically, we can make use of binary search to find out the matching positions of tags of probe and suffixes of sequence. When the matching positions of tags of probe and suffixes of sequence is generated, the LIS can be found in the sequence of number generated by the matching positions of tags of probe and suffixes of sequence. The most significant region is the subsequence in which the longest increasing subsequence located and the size of the longest increasing subsequence is within the length of the probe. The regions of the sequence covered by LIS all parts that are matched by most tags of the probe. That is, the most similar region of probe to its non-target sequence is within the LIS. The LIS of each pair of the probe and the non-target sequence can be obtained by comparing the tags of a probe with the suffixes of non-target sequence. Figure 1 shows the algorithm of findLIS and Fig. 2 shows the example of using the findLIS program to identify the most similar region of the probe and the non-target sequence.3.2.Selecting optimal probeLIS-Identity is defined as the number of nucleotides of a probe matches the non-target sequence in the longest increasing subsequence. The LIS-Identity can be obtained form the LIS of the number sequence generated by the program findLIS. The optimal probe is the one whose LIS-identity is low.3.3.Verifying the selection of optimal probeTwo processes are required to confirm the optimal probes selected by the proposed system. The first process is the alignment of any two optimal probes. If optimal probes with high identity are selected, then the probes will identify the same region of the target sequence or the neighboring regions. That is, the probes overlap in the region of the target sequence. The result of the alignment of probes reveals that probe with high identity with the other probes can be discarded, ensuring that the optimal probes will6base-pair with the extensible regions of the target sequence. The second process is the local alignment of the probe with its non-target sequences. The local alignment tool MATCER [14] is user to verify the quality of the optimal probes. If the identity of probeto its non-target sequences calculated by MATCHER is high, the cross hybridization will occur. If the identity of probe with its non-target sequence is high, the user can discardthe probes from the result set of optimal probes. Both processes are implemented in web service so the user can verify optimal probes using the web interface.Input: File containing virus sequences selected by the user File containing probe candidates of sequences selected by userOutput: File containing identity of each pair of probe to its non-target sequence1. For each virus sequence of the input file2. Generate suffix array from the sequence3. For each probe candidate of input file4. Divide probe to 4 nucleotides subsequence (tag) by sliding window one nucleotide a time5. Compare the tag with the first four nucleotides of suffixes of sequence6. if (tag matches the suffix of the sequence)7. Add the number of tag and the position of non-target sequence to a number sequence S from which themaximum LIS will be generated.8. end if9. Find the maximum LIS in each position of S10. Calculate the identity of probe to its non-target sequence from the maximum LIS11. The identity of probe to its non-target sequence is the element of result set12. Next13. NextFig. 1.The findLIS algorithm.4ResultsA web interface was designed. Users may select probe sequences to identify these virusesof interest. The system takes about 180 minutes to design probes for 100 sequences including selecting candidate probes and selecting the optimal probes. Although some methods and tools exist for designing probes for microarrays, few online systems have been developed and few can allow users to select sequences dynamically across different virus genera and virus families. Table 1 compares the tools and methods for designing oligonucleotide probes.One hundred sequences were randomly selected and the experimental melting temperature of 75oC to 78oC was used to confirm that the LIS_Identity of a probe withits non-target sequence is directly proportional to similarity between the probe and its non-target sequence. 27,377 probe candidates with lengths of 50mer were selected. TheLIS_Identity of each pair of probe and its non-target sequences were calculated by the program findLIS. The Correlation between LIS-Identity and identity are shown in Fig. 3. Fig. 3 compares the identity between the probe and its non-target sequence with the average LIS_Identity that is obtained by the program findLIS. When the identity of probe with its non-target sequence is large, the average LIS_Identity of probe with its non-target sequence is also large. It is obvious when the identity of probe to its non-target sequence over 70%. A threshold sequence similarity of approximately 70% sequence can7 be considered as the threshold for cross-hybridization [2]. According to Fig. 3, the average LIS_Identity that corresponds to a 70% similarity between the probe and its non-target sequence is about 25mer (indicating a match to the non-target sequence over 25mer).Fig. 2. Example of using findLIS program to determine region of greatest similarity between probe and the non-target sequence.In Fig. 3, we compare the similarity of the probe to its non-target sequence with the average LIS_Identity that is counted by our program findLIS. When the similarity of probe to its non-target sequence is large the average LIS_Identity of probe to its non-target sequence is large also. It is obviously agrees when the similarity of probe to its non-target sequence over 70%. A threshold of around 70% sequence similarity can be considered as cross-hybridization [2]. According to Fig. 3, the average LIS_Identity corresponding to 70% similarity of probe to its non-target sequence is about 25mer (match non-target sequence with 25mer).5Discussion and ImplementationMost methods use the BLAST program as the primary tool to avoid cross-hybridization.8They spend much time to calculate the identity of the probe with its non-target sequences. The presented approach first generates the probe candidates in the database and then uses the LIS algorithm to evaluate the identity between the probe and its non-target sequence more efficiently. The database technique and the algorithm can be used to finish the process of designing probes for 100 sequences in three hours. The optimal probes are verified by alignment tool. Because of the efficient algorithm and database technology, the virus probe design can carry out in a web for online using. Although the program findLIS can efficiently calculate the identity of probe with its non-target sequence, in some cases the program findLIS will fail to calculate the identity of probe to its non-target sequence accurately. Three main factors affect the accuracy of LIS_Identity calculation. In the above assessment herein, probes with an LIS_Identity of four to ten are selected, and most have identities with the non-target sequence of below 70%. However, in some cases, the identity of probe with its non-target sequence is exceeds 70%. The first factor is the uncovered region. The length of the tag is set to four, so the tags failed to cover many regions in the non-target sequence several regions in the non-target sequence are not covered by the tags. The program findLIS cannot accurately calculate the identity of probes with its non-target sequence.Table 1. shows the comparison of different tools and methods for oligonucleotide probeJournal ReferencesequenceCrossHybridizationdetectionAccessibilitySelect viralsequencearbitrarilyon webVerificat-ion onlineUsage[15]humancDNAtranscriptsequencesBLASTweb(OligoDB)NO NODetecttranscriptionprofiling humangene[4] RefSeq,\TIGRBLASTTool(Oligopicker)N/A N/Adetect RNAexpression[16] Virus fromGenBankBLAST, hash techniqueWeb(VirOligo)NO NOvirus sequencesidentification[3]mRNA,CDS, exonBLASTTool(OligoArray)N/A N/Adetect geneexpression[8] TIGR humanTHC andmouse TCunique segmentToolN/A N/Adetect geneexpression[7]virussequenceSuffix tree(preselection)Tm (Optimal Selection)Tool N/A N/Avirus sequencesidentification[5]Phagegenomesuffix arraysequencelandscapeWeb NO NOgeneexpression[6] General suffix array(LCF)tool N/A N/Ageneexpression[17] General jump in LCF,free energytool N/A N/Ageneexpression9 Ourapproac h virus sequence fromGenBank selection of minimum similarity calculated by the longest increasing subsequence Web YES YES virus sequencesidentificationFig. 3. Correlation between LIS-Identity and similarityFigure 4 shows the case of failure of calculating identity of probe with its non-target sequence. The actual identity of probe to its non-target sequence is 82% but the LIS_Identity calculated by findLIS is 26%. Some matching regions with shorter than four nucleotides are omitted. However, if the length of the tag decreases, the time for calculating the identity of probe to its non-target sequence will increase. The second factor is multi matching positions in non-target sequence of one tag. When one tag matches more than one position in a non-target sequence, one of various sequences of number may be generated by the comparison of the tag with the suffix. In this study, one of the possible paths is randomly selected. If there are many possible paths, the accuracy of calculation of probe with its non-target sequence will be affected. The third factor is the uniqueness of LIS. Unfortunately LIS is not unique in a number sequence. For example, consider a number sequence S = (9, 8, 1, 7, 2, 5, 3). The LIS is either (1, 2, 3) or (1, 2, 5). This maximum LIS_Identity can be found in one of the possible LIS. This study considers only one of the possibilities.Fig. 4. Problem of uncovered region. The LIS_Identity is 6 (26%identity) but the actual identity is 82%.The uncovered region problem is the major failure in calculating identity of probe with its non-target sequence. Although the three factors will affect the accuracy of10calculation of probe to its non-target sequence, the optimal probes can be verified by the two alignment methods. These processes make sure that the specificity of the optimal probes is high. In this assessment, when the LIS_Identity is set between four and ten, the probability of selecting a cross hybridization probe is 0.0034%. When user select probes with a low LIS_Identity (4 to 15), the probes are specific enough to identify the sequences selected by the user.References1. SantaLucia J, Jr. A unified view of polymer, dumbbell, and oligonucleotideDNA nearest-neighbor thermodynamics. Proc Natl Acad Sci U S A, 95(4):1460-1465, 1998.2. Kane MD, Jatkoe TA, Stumpf CR, Lu J, Thomas JD, Madore SJ Assessment ofthe sensitivity and specificity of oligonucleotide (50mer) microarrays. NucleicAcids Res, 28(22):4552-4557, 2000.3. Rouillard JM, Herbert CJ, Zuker M OligoArray: genome-scale oligonucleotidedesign for microarrays. Bioinformatics, 18(3):486-487, 2002.4. Wang X, Seed B Selection of oligonucleotide probes for protein codingsequences. Bioinformatics, 19(7):796-802, 2003.5. Li F, Stormo GD Selection of optimal DNA oligos for gene expression arrays.Bioinformatics, 17(11):1067-1076, 2001.6. Rahmann s Rapid large-scale oligonucleotide selection for microarrays. Inproceeedings of the First IEEE Computer Society Bioinformatics Conference(CSB) 2002.7. Kaderali L, Schliep A Selecting signature oligonucleotides to identify organismsusing DNA arrays. Bioinformatics, 18(10):1340-1349, 2002.8. Chang PC, Peck K Design and assessment of a fast algorithm for identifyingspecific probes for human and mouse genes. Bioinformatics, 19(11):1311-1317,2003.9. Buechen-Osmond C, Dallwitz M Towards a universal virus database - progressin the ICTVdB. Arch Virol, 141(2):392-399, 1996.10. Le Novere N MELTING, computing the melting temperature of nucleic acidduplex. Bioinformatics, 17(12):1226-1227, 2001.11. Delcher AL, Kasif S, Fleischmann RD, Peterson J, White O, Salzberg SLAlignment of whole genomes. Nucleic Acids Res, 27(11):2369-2376, 1999.12. Zhang H Alignment of BLAST high-scoring segment pairs based on the longestincreasing subsequence algorithm. Bioinformatics, 19(11):1391-1396, 2003.13. Gusfield D: Algorithms on Strings, Trees and Sequences: Cambridge UniversityPress; 1997.14. Rice P, Longden I, Bleasby A EMBOSS: the European Molecular BiologyOpen Software Suite. Trends Genet, 16(6):276-277, 2000.15. Mrowka R, Schuchhardt J, Gille C Oligodb--interactive design of oligo DNAfor transcription profiling of human genes. Bioinformatics, 18(12):1686-1687,2002.11 16. Onodera K, Melcher U VirOligo: a database of virus-specific oligonucleotides.Nucleic Acids Res, 30(1):203-204, 2002.17. Rahmann S Fast and Sensitive Probe Selection for DNA Chips Using Jumps inMatching Statistics. IEEE Computer Society Bioinformatics Conference (CSB'03) 2003.。