Fw: [試題] 101上 周承復 計算機概論 期末考

看板b04902xxx作者 (阿甯)時間8年前 (2016/01/09 21:11), 8年前編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
※ [本文轉錄自 NTU-Exam 看板 #1GzdO4P2 ] 好像有些不是這次考試範圍 大家斟酌看ㄅ 作者: knightwins (翔) 看板: NTU-Exam 標題: [試題] 101上 周承復 計算機概論 期末考 時間: Wed Jan 16 17:42:26 2013 課程名稱︰計算機概論 課程性質︰選修 課程教師︰周承復 開課學院:電機資訊學院 開課系所︰資工系 考試日期(年月日)︰2013.1.7 考試時限(分鐘):120分鐘 是否需發放獎勵金:是 (如未明確表示,則不予發放) 試題 : 1. (10%) Search a) At most, how many entries in a list of 5000 names will be interrogated when using the binary search algorithm ? b) At most, how many entries in a list of 5000 names will be interrogated when using the sequential search algorithm ? 2. (20%) Transition Process in Programming Language a) (10%) Briefly describe the task of each of the following. Lexical analyzer, Parser, Code Generator. b) (10%) Draw the parse tree for the expression x+y*z/x+y based on the syntax diagrams in the appendix. 3. (10%) Rewrite the following routine using a prettest while statement. repeat (print the value of X; X ← X+1 ) until (X > 5) 4. (10%)Encrypt the message "this is an exercise" using a simple transposition cipher with the following key : Encryption ↓ 1234 ↑ Decryption 4321 Ignore the space between words.Decrypt the message to get the original plaintext. 5. (10%) a) What are two protocols for implementing the transport level in the "TCP/IP" hierarchy ? b) Identify a protocol used in the implementation of the network layer in the TCP/IP hierarchy. 6. (15%) Where would be the most likely place to put a firewall to provide each of the following services ? a) Protect an entire domain from attacks from the cloud. b) Protect an entire domain from spam mail. c) Protect an individual machine from worms and viruses. 7. (10%) In object-oriented concepts, please explain (a) Inheritance, and (b) Polymorphism 8. (5%) True or False (if False, please explain) a) The peer-to-peer model involves processes that provide service to and receive service from each other. The peer-to-peer model usually involves processes that execute continuously. b) When using the CSMA/CD protocol, the machine wait before trying again if collision occurs after they start transmission. c) N-unicast forces the server to send multiple copies of each message (one to each client), whereas multicast allows the server to send only one copy, which is distributed to each of the clients. d) UDP actually confirms that the entire message made it to the destination whereas TCP does not. However, TCP is more efficient. e) Public-key encryption is a system by which messages can be encrypted using a publicly known encoding key but deciphered only by using a private decoding key. 9. (10%) Which algorithm method (iteration or recursive) would you use to get a big number in Fibonacci sequence when you want to write an effective program to solve it ? Why ? 10. (10%) procedure Modify (Y) Y ← X+1; print the value of X; print the value of Y. Also suppose that X is a global variable. If parameters are passed by value, what will be printed when the following program segment is executed ? What if parameters are passed by reference ? X ← 5; print the value of X; apply the procedure Modify to X; print the value of X; -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 140.112.239.243 ※ 發信站: 批踢踢實業坊(ptt.cc) ※ 轉錄者: w4a2y4 (140.112.16.140), 01/09/2016 21:11:17 ※ 編輯: w4a2y4 (140.112.16.140), 01/09/2016 21:14:13
文章代碼(AID): #1MaGRsi6 (b04902xxx)