阿摩線上測驗
登入
首頁
>
學士後西醫◆計算機概論與程式設計
>
111年 - 111 國立中山大學_學士後醫學系招生考試:計算機概論與程式設計#113521
> 試題詳解
42. Which one of the following is a loopback address?
(A) 127.0.0.1
(B) 255.255.255.255
(C) 0.0.0.0
(D) 168.5.16.8
(E) 224.3.16.8
答案:
登入後查看
統計:
A(6), B(0), C(1), D(0), E(0) #3081372
詳解 (共 1 筆)
Jane Yen
B1 · 2023/06/11
#5843142
下列哪一個是loopback地址? (A...
(共 208 字,隱藏中)
前往觀看
0
0
其他試題
38. Given a row-major array A(i,j) is defined as -2 ≤ i ≤6, -6 ≤ j ≤ -2, where the location of A(2,-4) is 100 as the base address and the location of A(4,-3) is 122. Which of the following is the correct storage size for an element stored in the array?(A)1(B)2(C)3(D) 4 (E) None of the above
#3081368
39. According to Amdahl's Law, what is the speedup gain for an application that is 60% parallel and we run it on a machine with 6 processing cores (compared to the machine with 1 core)? (A)1.2(B) 2 (C) 2.5 (D) 3.6 (E) 6
#3081369
40. Given the relation below what values will be retrieved by the following SQL statement?SELECT A, B FROM X WHERE X.B = x.C (A) 2,2 (B) 2,5 (C) 3,3 (D) 3.6 (E) 6.2
#3081370
41. Which of the following bit patterns violates odd parity check? (A) 00011111 (B) 01010101 (C) 01100111 (D) 10000000 (E) 10100001
#3081371
43. Which one of the following is NOT considered as a basic concept in object-oriented programming (OOP)? (A) Parallelism (B) Inheritance (C) Encapsulation (D) Polymorphism (E) Data abstraction
#3081373
44. An image can be represented in HSV color space. Here 'V' means (A) Hue (B) Saturation (C) Brightness (D) Color intensity (E) None of the above
#3081374
45. In machine learning, when the result of testing error is significantly larger than the training error, it is called (A) Underfitting (B) Overfitting (C) Oversampling (D) Training bias (E) None of the above
#3081375
46. Which of the following statements is incorrect for the transport layer? (A) TCP is a reliable and connection-oriented protocol (B) TCP uses the IP address (C) UDP is not a reliable and connection-oriented protocol (D) UDP does not uses the IP address (E) None of the above
#3081376
47. Which of the following statements is incorrect for the Ransomware?(a) It is a type of denial-of-service attack(b) It will encrypt the files to prevent the access(c) It will lock the computer to prevent the normal usage(d) It often uses phishing as an entry point (A) (a) (B) (b) (C) (c) (D) (d) (E) (b), (d)
#3081377
48. Which of the following data structures is in LIFO (Last In First Out) order? (A) Array (B) General Array (C) Stack (D) Queue (E) Double Queue
#3081378