週三"阿摩用功日",VIP 免費領取 前往領取
感恩的心>試卷(2020/05/25)

教甄◆資訊科技概論專業(電腦科)題庫 下載題庫

109 年 - 109 臺北市市立國民中學正式教師聯合甄選:資訊科技(雙語)科#85971 

選擇:40題,非選:0題
立即測驗 
我要補題 回報試卷錯誤
1.51. A number system uses 7 bits as data and an extra bit for parity check. Which decimal number in this systm is the most possible one indicating a parity error occurred?
(A) 67
(B) 93
(C) 114
(D) 188


2.52. When accessing network resources, people like to use memorized domain names instead of numerical IP addresses. Which of the following can be used to translate a domain name to a numerical IP address?
(A) DHCP: Dynamic Host Configuration Protocol
(B) DNS: Domain Name System
(C) BOOTP: Bootstrap Protocol
(D) IMAP: Internet Message Access Protocol


3.53. ping is a useful network utility used to test the reachability of a host on networks. Which of the following protocols does this utility rely on?
(A) ICMP: Internet Control Message Protocol
(B) TCP: Transmission Control Protocol
(C) UDP: User Datagram Protocol
(D) SNMP: Simple Network Management Protocol


4.54. Which of the following address is in the same subnet with 192.168.172.4/22?
(A) 192.168.177.95
(B) 192.168.176.253
(C) 192.168.174.84
(D) 192.168.170.5


5.55. Freeway tolls in Taiwan are counted by distance a vehicle drive through using e-tag. Which technique is e-tag performed?
(A) Wi-Fi
(B) Bluetooth
(C) 4G
(D) RFID


6.56. Git is a famous version control system which is developed by Linus Torvalds. Which of the following is not a characteristic of Git?
(A) Centralized development
(B) Pluggable merge strategies
(C) Compatibility with existing systems and protocols
(D) Non-linear development


7.57. Two’s complement is an approach to represent a signed number. Given an 8-bit number11100100, what is the decimal value of this number?
(A) 27
(B) -27
(C) 28
(D) -28


8.58. A deadlock is a situation where a thread is waiting for an object lock that another thread holds, and this second thread is waiting for an object lock that the first thread holds. Which of the following is not a condition for a deadlock to occur?
(A) Mutual exclusion
(B) No preemption
(C) Circular wait
(D) Random early drop


9.59. Given a binary tree, the result of its 'in-order traversal' is 'BDCAFHEG', and the result of its 'pre-order traversal' is 'ABCDEFHG'. What is the result of its 'post-order traversal'?
(A) DCBHFGEA
(B) DCBAEFGH
(C) GHFEADCB
(D) HFGEDCBA


10.

60. What are the meanings of the following “Creative Common License”?
5ecb67ae5d60d.jpg
(A) Bilinear + Nocorporation + Nodecent
(B) Administration + Noncooperation + ShareAlike
(C) Boycott + Noncompany + Nodelivery
(D) Attribution + Noncommercial + NoDerivatives



11.

61. What is the output of the following code?
5ecb67c54a8c1.jpg
(A) 11
(B) 15
(C) 19
(D) Compiler Error



12.62. Which command can tell the number of routers between your computer and the destination server?
(A) nslookup
(B) ping
(C) telnet
(D) tracert


13.63. If a subnet uses 255.255.255.240 as netmask, how many network devices could appear in this subnet?
(A) 14
(B) 62
(C) 254
(D) 65534


14.

64. What is the output of the following code?
5ecb67e36e37a.jpg
(A) 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
(B) 5 2 5 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4
(C) 5 10 15 20
(D) 16 21



15.65. Which is not a private IP address?
(A) 192.168.7.235
(B) 172.16.8.241
(C) 140.112.8.116
(D) 10.0.0.254


16.66. Which protocol does e-mail apply when exchanging messages between e-mail servers?
(A) DNS
(B) FTP
(C) POP3
(D) SMTP


17.67. Which technique may achieve the success of “IoT”?
(A) VOD
(B) NFC
(C) VR/AR
(D) IPv6


18.68. Which number is different from others?
(A)32767(10)
(B)77777(8)
(C)7EFF(16)
(D)111111111111111(2)  


19.69. A positional numeral system use 'X' as its radix. In this system, number 252 equals decimal number 209 as following equation: 252(x) = 209(10).What is the value of 'X'?
(A) 6
(B) 7
(C) 8
(D) 9


20.

70. Which sorting algorithm is applied in following pseudo code?
5ecb6880db81c.jpg
(A) Bubble sort
(B) Insertion sort
(C) Selection sort
(D) Shell sort 



21.

71. If called Y(450, 925) using following pseudo code, which number will be returned?
5ecb68972c9ce.jpg
(A) 1
(B) 5
(C) 25
(D) 450 



22.

72. What is the output of the following code?
5ecb68b0d413d.jpg
(A) 1616
(B) 1617
(C) 1716
(D) 1717



23.73. Hackers can insert some code into database query commands, and then obtain the access privilege of the database. Those codes are named as                .
(A) SQL injection
(B) Instruction insertion
(C) Zero-day attach
(D) Phishing code


24.74. Object-oriented programming (OOP) is a programming paradigm based on the concept of objects, which can contain data and methods. Which of the following properties is not an OOP feature?
(A) Encapsulation.
(B) Type Casting.
(C) Inheritance.
(D) Polymorphism


25.75. Let A be a one-dimensional array and every element in A needs 4 bytes memory. Suppose the memory address of A[60] is 600. What is the memory address of A[310]?
(A) 3100
(B) 1600
(C) 1240
(D) 1840


26.

76. What is the output of the following code?
5ecb68e329c6f.jpg
(A) 1 2 3 1 2 3
(B) 3 2 1 3 2 1
(C) 1 2 3 3 2 1
(D) 3 2 1 1 2 3



27.77. To speed up the booting process of a Personal Computer, what is the best practice you can do?
(A) Add more RAM
(B) Uninstall DVD Burner
(C) Replace Hard drive with SSD
(D) Remove smart card reader


28.78. Which programming language uses interpreter to translate its code?
(A) C++
(B) Java
(C) Pascal
(D) Python


29.79. Given a binary search tree where its node numbers are in [1,1000], now we want to search the number 363. Which one of the following searching orders is impossible
(A) 925, 202, 911, 240, 912, 245, 363
(B) 2, 252, 401, 398, 330, 344, 397, 363
(C) 924, 220, 911, 244, 898, 258, 362, 363
(D) 2, 399, 387, 219, 266, 382, 381, 278, 363


30.

80. There are three different processors P1, P2, P3 which execute the same instruction set. Their clock rates and CPIs (Cycle Per Instruction) are as the following table. Which processor has the highest performance?
5ecb6914b5bd8.jpg
(A) P1
(B) P2
(C) P3
(D) They have the same performance.



31.81. Which of the following is not an NP-complete problem?
(A) Traveling salesman problem
(B) Dominating set problem
(C) Subgraph isomorphism problem
(D) Discrete logarithm problem


32.

82. What is the meanings of the flowchart symbol, 5ecb6932df6b2.jpg , defined by American National Standard Institute (ANSI)?
(A) Predefined process
(B) Multiple Document
(C) Decision
(D) Start/End



33.83. RSA trapdoor pseudo random permutation is the most famous tool used in public key cryptography. Now let's see if you know how to derive the trapdoor. Given P=43,q=59, we have n=pq=2537. Let e=13. Please find the trapdoor d that ∀M∈Zn,Med≡M mod n.
(A) 257
(B) 419
(C) 843
(D) 937


34.84. How many operations can be defined if a control bus has eight wires?
(A) 8
(B) 16
(C) 256
(D) 512


35.

85. Assuming P≠NP, which one of the following is true ?
(A) NP-complete = NP
(B) NP-complete 5ecb69877f5a4.jpg
(C) NP-hard = NP
(D) P = NP-complete



36.86. A Turing machine is a mathematical model of computation that defines an abstract machine. Which of the following statement is wrong about the Turing machine?
(A)Turing machine uses random-access memory.
(B)In the Turing machine model, it assumes that there is unlimited memory.
(C)Even there are more than one tapes in the Turing machine, it still has the same ability with the original version.
(D)In the Turing machine, there is a head that can read and write symbols on the tape and move the tape left and right one cell at a time.


37.87. Which one is the lossy compression methods in data compression?
(A) Run-length encoding
(B) Joint photographic experts group (JPEG)
(C) Huffman encoding
(D) Lempel Ziv (LZ) encoding


38.

88. Let f(n)= f(n-1)+(n-1) , where n ≥ 2 , and let f(1) =0 . Then
(A)f(n)=n2-2n+1 
(B)f(n)=n2-n 
(C) 5ecb6ba7516b0.jpg
(D) 5ecb6bbb69ca1.jpg



39.89. When taking pictures in reduced lighting (i.e., low illumination), image noise becomes apparent. One simple way to reduce this granular noise is to take several identical pictures and                  them.
(A) XOR (logic operation)
(B) average (arithmetic operation)
(C) OR (logic operation)
(D) AND (logic operation)


40.90. Which classification (or clustering) method in machine learning field is an unsupervised learning method?
(A) k-means clustering algorithm
(B) convolutional neural network
(C) Naive Bayes classifier
(D) support vector machines


懸賞詳解

國二社會上第二次

41.( )附圖是上地理課時老師所出 示的季風形成示意圖。請問:下列 敘述何者正確? (A)這是冬季時的天氣型態 (B)海洋上氣壓低,空氣下沉 (C)為中國主要...

50 x

前往解題

109 年 - 109 臺北市市立國民中學正式教師聯合甄選:資訊科技(雙語)科#85971-阿摩線上測驗

109 年 - 109 臺北市市立國民中學正式教師聯合甄選:資訊科技(雙語)科#85971