阿摩線上測驗
登入
首頁
>
中山◆資工◆作業系統
>
108年 - 108 國立中山大學_碩士班招生考試_資工系(資安):作業系統#105763
>
題組內容
5. [Security: ]
(5) What is an interrupt war caused by tunneling viruses?
其他申論題
(1) How to launch an attack of stack and buffer overflow?
#450211
(2) Explain the two major types of symmetric encryption.
#450212
(3) Explain how the RSA algorithm works.
#450213
(4) How does the digital-signature algorithm work?
#450214
(I) Given a prefix expression " *+ + (18)x(17)(16) x+x(15)(14) (13) (12)", convert it to an infix expression and calculate the result.
#450216
(2)What is simpl le uniforn rm hash shing? Given a a hash table with m slots that stores n elements, what is the expected time spent by a failed search if hash collisions a ions are solved by chaining?
#450217
(3) Except that every node is either red or black, how do you make a binary search tree become a red- black tree?
#450218
(4) Given n objects to be sorted, show the average-case r running time of the following algorithms: Heap sort, insertion sot, bubble sort, and quick sort.
#450219
(5) Given the adjacency matrix of an undirected graph:Show the sequence of nodes that you visit by using breadth-first search and depth-first scarch. Ifthere are multiple choices to select nodes, just follow the alphabetical order.
#450220
(1) Given a directed graph G = (V, E), what is its strongly connected component?
#450221