阿摩線上測驗
登入
首頁
>
學士後西醫◆計算機概論與程式設計
>
111年 - 111 國立中山大學_學士後醫學系招生考試:計算機概論與程式設計#113521
> 試題詳解
62. Polymorphism is implemented through:
(A) Non-const functions.
(B) Member functions.
(C) Non-virtual functions.
(D) virtual functions and dynamic binding.
(E) inline functions.
答案:
登入後查看
統計:
A(0), B(0), C(1), D(5), E(0) #3081392
詳解 (共 1 筆)
Jane Yen
B1 · 2023/06/11
#5843164
多型性是透過哪種方式實現的? (A) 非...
(共 347 字,隱藏中)
前往觀看
0
0
其他試題
58. Which one of the following methods is NOT considered as a solution for preventing the overfiting problem in AI training? (A) Collect more training data (B) Use regularization (C) Increase model complexity (D) Data augmentation (E) Use ensemble method
#3081388
59. Given a postfix expression is abcde*-*fg/+=, where b=2, c=3, d=4, e=5, f=6, and g=3. Which of the following is the value of a? (A) 31 (B) -31 (C) 32 (E) None of the above (D) -32
#3081389
60. Which of the following statement about sorting algorithm is not true? (A) A sorting algorithm puts elements of a list into an order (B) For Quick sort, the average complexity is n logn to sort n elements (C) For Bubble sort, the average complexity is n2 to sort n elements (D) For Insertion sort, the average complexity is n2 to sort n elements (E) For Selection sort, the average complexity is n log n to sort n elements
#3081390
61. Which of the following is not a correct way to initialize an array? (A) int n[5]={0, 1, 2, 3, 4, 5}; (B) int n[]={0, 1, 2, 3, 4, 5}; (C) int n[5]={1}; (D) int n[5]={1, 5, 9}; (E) int n[5]={0};
#3081391
63. A copy constructor must receive its argument by reference instead of by value because: (A) Otherwise the constructor will only make a copy of a pointer to an object. (B) The copy of the argument passed by value has function scope. (C) The pointer needs to know the address of the original data, not a temporary copy of it. (D) Otherwise infinite recursion occurs. (E) Otherwise the constructor will never be called.
#3081393
64.What will be the output of the following program? (A) i=1,j=2 (B)i=2, j=1 (C) i=1, j=1 (D) i=2, j=2 (E) i=0, j=0
#3081394
65. Which of the following conditions correctly describes the output of this code in Python? (A) first=[1,2,3,4,5],second=[1,2,3,4,5,6] (B) first=[1,2,3,4,5,6] ,second = [1,2,3,4,5] (C) first=[1,2,3,4,5] ,second = [1,2,3,4,5] (D) first=[1,2 ,3,4,5,6] , second = [1,2,3,4,5,6] (E) None of these
#3081395
66. The definition char stringl[] = "bird" ;is equivalent to: (A)(B)(C) (D) (E)
#3081396
67. Consider the following C code fragment: What output will be generated? (A) 25 62 (B) 25 62 155 (C) 2562.5 (D) 25 62.5 156.25 (E) None of the above
#3081397
68. Call-by-reference can achieve the security of call-by-value when: (A) A large argument is passed in order to improve performance. (B) A pointer to the argument is used. (C) The const qualifier is used. (D) The value being passed is small. (E) The argument is an array.
#3081398