阿摩線上測驗
登入
首頁
>
學士後西醫◆計算機概論與程式設計
>
111年 - 111 國立中山大學_學士後醫學系招生考試:計算機概論與程式設計#113521
> 試題詳解
3.How many bits in length are used for IP address in IPv4?
(A) 4
(B) 8
(C) 16
(D) 32
(E) 64
答案:
登入後查看
統計:
A(0), B(0), C(1), D(6), E(0) #3081333
詳解 (共 1 筆)
Jane Yen
B1 · 2023/06/06
#5836703
3.How many bits in l...
(共 138 字,隱藏中)
前往觀看
1
0
其他試題
89.In fall 2017, clouds of ruthenium-106 (106Ru) radioactive contamination appeared over Eastern Europe. Scientists measured the airborne radio-ruthenium isotope ratio (103Ru/106Ru) and confirmed its concentration. Which of the following techniques is the most suitable for the detection of the103Ru/106Ru ratio? (A) Inductively coupled plasma mass spectrometry (ICP-MS) (B) Matrix-assisted laser desorption/ionization-time of flight mass spectrometry (C) Electrospray ionization mass spectrometry (D) Fourier-transform ion cyclotron resonance mass spectrometry (E) Elemental analyzers
#3081329
90, Capillary electrophoresis is powerful in detecting various genetic diseases, such as Thalassemia and Spinal Muscular Atrophy. Which of the following modes in capillary electrophoresis is the most suitable for diagnosing genetic disease (i.e., separation of DNA molecules)? (A) Capillary zone electrophoresis (B) Capillary isoelectric focusing (C) Micellar electrokinetic chromatography (D) Capillary electrochromatography (E) Capillary gel electrophoresis
#3081330
1.Which of the following is the binary representation of (6.625) 10? (A) 101.101 (B) 101.11 (C) 110.101 (D) 110.11 (E) 111.11
#3081331
2.If you have a disk that has a capacity of Petabyte (PB), that is equal to (A) 2 to the 20th power of bytes (B) 2 to the 30th power of bytes (C) 2 to the 40th power of bytes (D) 2 to the 50th power of bytes (E) 2 to the 60th power of bytes
#3081332
4.Which of the following statement about the Unicode is not true? (A) An extended version of the ASCII (B) It contains 256 characters (C) It is not only for English but also international use (D) It is designed to be a superset of ASCII (E) Each character is encoded with 16 bits
#3081334
5.Three security goals are_________. (A) Confidentiality, cryptography, and nonrepudiation (B) Confidentiality, encryption, and reliability (C) Confidentiality, integrity, and availability (D) Confidentiality, denial of service, and masquerading (E) Reliability, nonrepudiation, and masquerading
#3081335
6.If the longest path in a binary tree contained exactly four nodes, what is the minimum number of nodes that could be in the entire tree? (A) 4 (B) 5 (C)7 (D)8(E) 15
#3081336
7.Which of the following data structures is static in the sense that it does not change size as data items are inserted or deleted? (A) Array (B) Singly linked list (C) Queue (D) Stack (E) Tree
#3081337
8.Which one of the following is NOT the characteristic of TCP protocol? (A) Connection-oriented (B) Connectionless (C) Congestion control (D) Error control (E) 3-way handshaking
#3081338
9.Which of the following methods is suitable for preventing the falsification of medical records? (A) Natural Language Process (B) Neural Network (C) Blockchain (D) Information Retrieval (E) Data Compression
#3081339