感恩的心>試卷(2020/05/25)

教甄◆資訊科技概論專業(電腦科)題庫 下載題庫

109 年 - 109 臺北市市立國民中學正式教師聯合甄選:資訊科技(雙語)科#85971 

選擇:40題,非選:0題
立即測驗 
我要補題 回報試卷錯誤
1.51. A number system uses 7 bits as data and an extra bit for parity check. Which decimal number in this systm is the most possible one indicating a parity error occurred?
(A) 67
(B) 93
(C) 114
(D) 188 .

2.52. When accessing network resources, people like to use memorized domain names instead of numerical IP addresses. Which of the following can be used to translate a domain name to a numerical IP address?
(A) DHCP: Dynamic Host Configuration Protocol
(B) DNS: Domain Name System
(C) BOOTP: Bootstrap Protocol
(D) IMAP: Internet Message Access Protocol .

3.53. ping is a useful network utility used to test the reachability of a host on networks. Which of the following protocols does this utility rely on?
(A) ICMP: Internet Control Message Protocol
(B) TCP: Transmission Control Protocol
(C) UDP: User Datagram Protocol
(D) SNMP: Simple Network Management Protocol .

4.54. Which of the following address is in the same subnet with 192.168.172.4/22?
(A) 192.168.177.95
(B) 192.168.176.253
(C) 192.168.174.84
(D) 192.168.170.5 .

5.55. Freeway tolls in Taiwan are counted by distance a vehicle drive through using e-tag. Which technique is e-tag performed?
(A) Wi-Fi
(B) Bluetooth
(C) 4G
(D) RFID .

6.56. Git is a famous version control system which is developed by Linus Torvalds. Which of the following is not a characteristic of Git?
(A) Centralized development
(B) Pluggable merge strategies
(C) Compatibility with existing systems and protocols
(D) Non-linear development .

7.57. Two’s complement is an approach to represent a signed number. Given an 8-bit number11100100, what is the decimal value of this number?
(A) 27
(B) -27
(C) 28
(D) -28 .

8.58. A deadlock is a situation where a thread is waiting for an object lock that another thread holds, and this second thread is waiting for an object lock that the first thread holds. Which of the following is not a condition for a deadlock to occur?
(A) Mutual exclusion
(B) No preemption
(C) Circular wait
(D) Random early drop .

9.59. Given a binary tree, the result of its 'in-order traversal' is 'BDCAFHEG', and the result of its 'pre-order traversal' is 'ABCDEFHG'. What is the result of its 'post-order traversal'?
(A) DCBHFGEA
(B) DCBAEFGH
(C) GHFEADCB
(D) HFGEDCBA .

10.重新載圖

60. What are the meanings of the following “Creative Common License”?
5ecb67ae5d60d.jpg
(A) Bilinear + Nocorporation + Nodecent
(B) Administration + Noncooperation + ShareAlike
(C) Boycott + Noncompany + Nodelivery
(D) Attribution + Noncommercial + NoDerivatives

.


11.重新載圖

61. What is the output of the following code?
5ecb67c54a8c1.jpg
(A) 11
(B) 15
(C) 19
(D) Compiler Error

.


12.62. Which command can tell the number of routers between your computer and the destination server?
(A) nslookup
(B) ping
(C) telnet
(D) tracert .

13.63. If a subnet uses 255.255.255.240 as netmask, how many network devices could appear in this subnet?
(A) 14
(B) 62
(C) 254
(D) 65534 .

14.重新載圖

64. What is the output of the following code?
5ecb67e36e37a.jpg
(A) 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
(B) 5 2 5 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4
(C) 5 10 15 20
(D) 16 21

.


15.65. Which is not a private IP address?
(A) 192.168.7.235
(B) 172.16.8.241
(C) 140.112.8.116
(D) 10.0.0.254 .

16.66. Which protocol does e-mail apply when exchanging messages between e-mail servers?
(A) DNS
(B) FTP
(C) POP3
(D) SMTP .

17.67. Which technique may achieve the success of “IoT”?
(A) VOD
(B) NFC
(C) VR/AR
(D) IPv6 .

18.68. Which number is different from others?
(A)32767(10)
(B)77777(8)
(C)7EFF(16)
(D)111111111111111(2)  .

19.69. A positional numeral system use 'X' as its radix. In this system, number 252 equals decimal number 209 as following equation: 252(x) = 209(10).What is the value of 'X'?
(A) 6
(B) 7
(C) 8
(D) 9 .

20.重新載圖

70. Which sorting algorithm is applied in following pseudo code?
5ecb6880db81c.jpg
(A) Bubble sort
(B) Insertion sort
(C) Selection sort
(D) Shell sort 

.


21.重新載圖

71. If called Y(450, 925) using following pseudo code, which number will be returned?
5ecb68972c9ce.jpg
(A) 1
(B) 5
(C) 25
(D) 450 

.


22.重新載圖

72. What is the output of the following code?
5ecb68b0d413d.jpg
(A) 1616
(B) 1617
(C) 1716
(D) 1717

.


23.73. Hackers can insert some code into database query commands, and then obtain the access privilege of the database. Those codes are named as                .
(A) SQL injection
(B) Instruction insertion
(C) Zero-day attach
(D) Phishing code .

24.74. Object-oriented programming (OOP) is a programming paradigm based on the concept of objects, which can contain data and methods. Which of the following properties is not an OOP feature?
(A) Encapsulation.
(B) Type Casting.
(C) Inheritance.
(D) Polymorphism .

25.75. Let A be a one-dimensional array and every element in A needs 4 bytes memory. Suppose the memory address of A[60] is 600. What is the memory address of A[310]?
(A) 3100
(B) 1600
(C) 1240
(D) 1840 .

26.重新載圖

76. What is the output of the following code?
5ecb68e329c6f.jpg
(A) 1 2 3 1 2 3
(B) 3 2 1 3 2 1
(C) 1 2 3 3 2 1
(D) 3 2 1 1 2 3

.


27.77. To speed up the booting process of a Personal Computer, what is the best practice you can do?
(A) Add more RAM
(B) Uninstall DVD Burner
(C) Replace Hard drive with SSD
(D) Remove smart card reader .

28.78. Which programming language uses interpreter to translate its code?
(A) C++
(B) Java
(C) Pascal
(D) Python .

29.79. Given a binary search tree where its node numbers are in [1,1000], now we want to search the number 363. Which one of the following searching orders is impossible
(A) 925, 202, 911, 240, 912, 245, 363
(B) 2, 252, 401, 398, 330, 344, 397, 363
(C) 924, 220, 911, 244, 898, 258, 362, 363
(D) 2, 399, 387, 219, 266, 382, 381, 278, 363 .

30.重新載圖

80. There are three different processors P1, P2, P3 which execute the same instruction set. Their clock rates and CPIs (Cycle Per Instruction) are as the following table. Which processor has the highest performance?
5ecb6914b5bd8.jpg
(A) P1
(B) P2
(C) P3
(D) They have the same performance.

.


31.81. Which of the following is not an NP-complete problem?
(A) Traveling salesman problem
(B) Dominating set problem
(C) Subgraph isomorphism problem
(D) Discrete logarithm problem .

32.重新載圖

82. What is the meanings of the flowchart symbol, 5ecb6932df6b2.jpg , defined by American National Standard Institute (ANSI)?
(A) Predefined process
(B) Multiple Document
(C) Decision
(D) Start/End

.


33.83. RSA trapdoor pseudo random permutation is the most famous tool used in public key cryptography. Now let's see if you know how to derive the trapdoor. Given P=43,q=59, we have n=pq=2537. Let e=13. Please find the trapdoor d that ∀M∈Zn,Med≡M mod n.
(A) 257
(B) 419
(C) 843
(D) 937 .

34.84. How many operations can be defined if a control bus has eight wires?
(A) 8
(B) 16
(C) 256
(D) 512 .

35.重新載圖

85. Assuming P≠NP, which one of the following is true ?
(A) NP-complete = NP
(B) NP-complete 5ecb69877f5a4.jpg
(C) NP-hard = NP
(D) P = NP-complete

.


36.86. A Turing machine is a mathematical model of computation that defines an abstract machine. Which of the following statement is wrong about the Turing machine?
(A)Turing machine uses random-access memory.
(B)In the Turing machine model, it assumes that there is unlimited memory.
(C)Even there are more than one tapes in the Turing machine, it still has the same ability with the original version.
(D)In the Turing machine, there is a head that can read and write symbols on the tape and move the tape left and right one cell at a time. .

37.87. Which one is the lossy compression methods in data compression?
(A) Run-length encoding
(B) Joint photographic experts group (JPEG)
(C) Huffman encoding
(D) Lempel Ziv (LZ) encoding .

38.重新載圖

88. Let f(n)= f(n-1)+(n-1) , where n ≥ 2 , and let f(1) =0 . Then
(A)f(n)=n2-2n+1 
(B)f(n)=n2-n 
(C) 5ecb6ba7516b0.jpg
(D) 5ecb6bbb69ca1.jpg

.


39.89. When taking pictures in reduced lighting (i.e., low illumination), image noise becomes apparent. One simple way to reduce this granular noise is to take several identical pictures and                  them.
(A) XOR (logic operation)
(B) average (arithmetic operation)
(C) OR (logic operation)
(D) AND (logic operation) .

40.90. Which classification (or clustering) method in machine learning field is an unsupervised learning method?
(A) k-means clustering algorithm
(B) convolutional neural network
(C) Naive Bayes classifier
(D) support vector machines .

懸賞詳解

國二社會上第三次

48. 在民主國家,各政黨常會針對重大公共政策,藉由舉辦公聽會來分析利弊,並讓民眾了解政策內容。上述屬於政黨的哪種功能? (A)教育民眾增進知...

50 x

前往解題

109 年 - 109 臺北市市立國民中學正式教師聯合甄選:資訊科技(雙語)科#85971-阿摩線上測驗

109 年 - 109 臺北市市立國民中學正式教師聯合甄選:資訊科技(雙語)科#85971