阿摩線上測驗
登入
首頁
>
學士後西醫◆計算機概論與程式設計
>
111年 - 111 國立中山大學_學士後醫學系招生考試:計算機概論與程式設計#113521
> 試題詳解
48. Which of the following data structures is in LIFO (Last In First Out) order?
(A) Array
(B) General Array
(C) Stack
(D) Queue
(E) Double Queue
答案:
登入後查看
統計:
A(0), B(0), C(7), D(0), E(0) #3081378
詳解 (共 1 筆)
Jane Yen
B1 · 2023/06/11
#5843152
以下哪種資料結構採用LIFO(Last ...
(共 343 字,隱藏中)
前往觀看
0
0
其他試題
44. An image can be represented in HSV color space. Here 'V' means (A) Hue (B) Saturation (C) Brightness (D) Color intensity (E) None of the above
#3081374
45. In machine learning, when the result of testing error is significantly larger than the training error, it is called (A) Underfitting (B) Overfitting (C) Oversampling (D) Training bias (E) None of the above
#3081375
46. Which of the following statements is incorrect for the transport layer? (A) TCP is a reliable and connection-oriented protocol (B) TCP uses the IP address (C) UDP is not a reliable and connection-oriented protocol (D) UDP does not uses the IP address (E) None of the above
#3081376
47. Which of the following statements is incorrect for the Ransomware?(a) It is a type of denial-of-service attack(b) It will encrypt the files to prevent the access(c) It will lock the computer to prevent the normal usage(d) It often uses phishing as an entry point (A) (a) (B) (b) (C) (c) (D) (d) (E) (b), (d)
#3081377
49. If users including individuals, organizations, and enterprises can obtain computing, computing power, and shared software and hardware resource application services through the Internet, which of the following computing modes belong to the above statements? (A) Client/server (B) P2P (C) Broadband (D) Decentralized (E) Cloud
#3081379
50. In application layer protocols including HTTP, SMTP, and FTP, what mechanism is usually used to translate the host name provided by the user into an IP address? (A) FTP (B) Database (C) DNS (D) IMAP (E) None of the above
#3081380
51. Assume the execution time of a running program is 50(logn2) + 8, then what is the most suitable time complexity? (A) O(logn2) (B) O((logn)2) (C) O(logn) (D) O(n) (E) O(n2)
#3081381
52. According to the definition of the major topics of information ethics, "When can information be used for free? Under what circumstances should it be used with a payment or with the consent of the owner?" What does this statement mean? (A) Accessibility (B) Accuracy (C) Privacy (D) Property (E) None of the above
#3081382
53. Which of the following statement is not the responsibility of an operation system? (A) Communicate with the computer user (B) Manage allocation of memory (C) Collect input from input device (D) Execute the program (E) Convey program output to the output device
#3081383
54. Which of the following data type conversion may result in data loss? (A) float to double (B) int to char (C) short to long (D) int to float (E) bool to char
#3081384