阿摩線上測驗
登入
首頁
>
中山◆資工◆作業系統
>
108年 - 108 國立中山大學_碩士班招生考試_資工系(資安):作業系統#105763
>
題組內容
5. [Security: ]
(4) How does the digital-signature algorithm work?
其他申論題
(4) What is conflict serializable for a non-serial schedule?
#450210
(1) How to launch an attack of stack and buffer overflow?
#450211
(2) Explain the two major types of symmetric encryption.
#450212
(3) Explain how the RSA algorithm works.
#450213
(5) What is an interrupt war caused by tunneling viruses?
#450215
(I) Given a prefix expression " *+ + (18)x(17)(16) x+x(15)(14) (13) (12)", convert it to an infix expression and calculate the result.
#450216
(2)What is simpl le uniforn rm hash shing? Given a a hash table with m slots that stores n elements, what is the expected time spent by a failed search if hash collisions a ions are solved by chaining?
#450217
(3) Except that every node is either red or black, how do you make a binary search tree become a red- black tree?
#450218
(4) Given n objects to be sorted, show the average-case r running time of the following algorithms: Heap sort, insertion sot, bubble sort, and quick sort.
#450219
(5) Given the adjacency matrix of an undirected graph:Show the sequence of nodes that you visit by using breadth-first search and depth-first scarch. Ifthere are multiple choices to select nodes, just follow the alphabetical order.
#450220