[試題] 102上 周承復 計算機概論 期末考

看板NTU-Exam作者時間10年前 (2014/01/06 10:39), 編輯推噓1(100)
留言1則, 1人參與, 最新討論串1/1
課程名稱︰計算機概論 課程性質︰選修 課程教師︰周承復 開課學院:電機資訊學院 開課系所︰資工系 考試日期(年月日)︰2014.1.6 考試時限(分鐘):120分鐘 是否需發放獎勵金:是 (如未明確表示,則不予發放) 試題 : 1.(20%) Database System a) (10%)Given the two relations X and Y below X: A B Y: C D ------- ------- 2 s t 1 5 z r 3 w 2 draw the relation Result that would be produced by the following staements? Temp ← JOIN X and Y where X.A > Y.DC Result ← PROJECT X.B, Y.C from Temp b) (10%)Given the relation Parts containing the attributes PartName, PartNumber, and SupplierID as well as the relation Suppliers containing the attributes SupplierID, Address, FaxNumber, write an SQL statement to obtain the supplier identifications and fax numbers for all the suppliers that suppliers that supply the part whose part number is X4J26 2.(30%) Transition Process in Programming Language a) What are the major steps in the translation process b) Draw the parse tree for the expression x+y*z-x based on the syntax diagrams in the appendix. c) What clause would produce the resolvent (P OR R OR S) when resolved with the clause (P OR ~Q) 3.(25%) Networks(choose the correct one) a) Which of the following is not a means of performing interprocess communication over a network? 1.Client/server 2.ICANN 3.Peer-to-peer b) Which of the following is assigned the task of providing individual users access to the Internet? 1.Tier-1 ISPs 2.Tier-2 ISPs 3.Access ISPs 4.ICANN c) Which of the following is not an application of the Internet? 1.FTP 2.Email 3.Telnet 4.CERT d) Which of the following is not a way of classifying networks? 1.WAN versus LAN 2.Closed versus open 3.Router versus bridge 4.Star versus bus e) Which of the following is used to translate between IP addresses and mnemonic address? 1.File server 2.Mail Server 3.Name server 4.FTP server 4.(15%) Security A small private club has only 50 members. Answer the following questions: a) How many secret keys are needed if all members of the club need to send secret messages to each other? b) How many secret keys are needed in the following scenario? Everyone trusts the president of the club. If a member needs to send a message to another member, they first send it to the president, and the president then sends the message to the other member. c) How many secret keys are needed if the president decides that the two members who need to communicate should contact him first. The president then creates a temporary key to be used between the two. The temporary key is encrypted and sent to both members. 5.(10%) Rewrite the following program segment using a while structure rather than a repeat structure. Be sure the new version prints the same values as the original. FinalCtr ← 5; repeat (print the value assiged to FinalCtr and FinalCtr ← FinalCtr - 1) until(FinalCtr = 0) 6.(20%) Answer the following questions in terms of the list: Alice, Byron, Carol, Duane, Elaine, Floyd, Gene, Henry, Iris. a) Which search algorithm (sequential or binary) will find the name Gene more quickly? b) Which search algorithm (sequential or binary) will find the name Alice more quickly? c) Which search algorithm (sequential or binary) will detect the absence of the name Bruce more quickly? d) Which search algorithm (sequential or binary) will detect the absence of the name Sue more quickly? e) How many entries will be interrogated when searching for the name Elaine when using the sequential search? How many will be interrogated when using the binary search? -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 140.112.16.132 ※ 編輯: kazewind22 來自: 140.112.16.132 (01/06 11:05)

01/24 09:39, , 1F
推原po帥哥
01/24 09:39, 1F
w4a2y4:轉錄至看板 b04902xxx 01/09 21:09
文章代碼(AID): #1IoXTK2l (NTU-Exam)