阿摩線上測驗
登入
首頁
>
學士後西醫◆計算機概論與程式設計
>
113年 - 113 學士後醫學系招生考試試題:計算機概論與程式設計#119574
> 試題詳解
12. Given a binary tree whose prefix order is ABCDEF and infix CBDAEF, what is its postfix order?
(A) BCDFEA
(B) CBDFEA
(C) CDBFEA
(D) CDBEFA
(E) Undecided
答案:
登入後查看
統計:
A(0), B(1), C(5), D(1), E(0) #3228170
詳解 (共 1 筆)
MoAI - 您的AI助手
B1 · 2025/10/25
#6967379
1. 題目解析 給定一棵二元樹的前序遍...
(共 1026 字,隱藏中)
前往觀看
0
0
相關試題
2. What is the concept of pipelining in the context of computer architecture and its impact on instruction execution in modern processors? (A) Pipelining refers to the movement of data between memory and the processor. (B) Pipelining involves the parallel execution of instructions within a single stage. (C) Pipelining is the process of creating a pipeline for network communication in processors. (D) Pipelining is a technique where multiple instructions are overlapped in execution stages, improving throughput. (E) Pipelining helps in more complex data executions.
#3228160
3. In computer science, numbers can be represented as either signed or unsigned. Which of the following statements accurately describes a difference between signed and unsigned numbers? (A) Unsigned numbers can represent both positive and negative values, whereas signed numbers can only represent positive values. (B) Signed numbers use a special“sign bit”at the least significant position to indicate whether the number is positive or negative, while unsigned numbers use this bit to extend their range of positive values. (C) The range of values that can be represented by signed and unsigned numbers of the same bit length is the same, but signed numbers use a different encoding to represent negative values. (D) Unsigned numbers are always larger than signed numbers because they use an extra bit to represent the magnitude of the value. (E) Signed numbers use one bit to indicate the sign (positive or negative) of the number, allowing them to represent both positive and negative values. Unsigned numbers do not have a sign bit and can only represent positive values or zero.
#3228161
4. In the context of pipelined CPU architecture, which of the followings best describes how hazards, exceptions, and parallelism interact to affect the performance and correctness of program execution? (A) Data hazards occur when parallel execution of instructions creates a dependency on the outcome of an exception, leading to incorrect program execution unless properly managed. (B) Control hazards are resolved using speculative execution, which relies on predicting exceptions and rerouting data paths in the pipeline to maintain parallelism without stalling. (C) Parallelism enhances the handling of exceptions by allowing the CPU to process multiple exception routines simultaneously, reducing the overall impact on execution time. (D) Exceptions, such as interrupts or faults, are handled by temporarily suspending parallel execution, resolving the exception, and then resuming execution, potentially introducing control hazards. (E) Structural hazards are mitigated by designing a CPU with multiple execution units, allowing for parallel execution of instructions and reducing the likelihood of pipeline stalls due to resource conflicts.
#3228162
5. When a process is being switched out of the CPU, which of the following situations does NOT cause the process that is being added to the wait/ready queue? (A) I/O request (B) Sleep execution (C) Time slice expired (D) Wait for an interrupt (E) Create child process
#3228163
6. In a concurrent computing environment, semaphores are used to control access to shared resources and prevent race conditions. Which of the following statements accurately describes the primary mechanism by which semaphores achieve this? (A) Semaphores expedite process execution by enabling all waiting processes to access the critical section simultaneously if the semaphore count is positive. (B) Semaphores use a counter to manage how many processes can simultaneously access a critical section of code, effectively ensuring mutual exclusion and synchronization. (C) Semaphores eliminate the need for process synchronization by allowing unrestricted access to shared resources, relying on the operating system to manage concurrency. (D) Semaphores utilize hardware interrupts to pause the execution of processes trying to enter a critical section until it becomes available, ensuring orderly access. (E) Semaphores automatically resolve deadlocks by preempting resources from processes, thus allowing other processes to proceed without waiting.
#3228164
7. For the process shown in the table below: [time unit: ms] Please find the average waiting time if the processes are conducted in Preemptive-Priority. (A) 3 (B) 4 (C) 5 (D) 6 (E) 7
#3228165
8. Suppose we have a processor with a base CPI of 1.0, assuming all references hit in the main memory, and the main memory access time of 100 clock cycles, include all the miss handling. Suppose 60% of instructions would access memory, and the miss rate of instruction cache is 0.2%, the miss rate of data instruction cache is 1%. The effective CPI = n. What is the value of round(n) mod 5? (A) 0 (B) 1 (C) 2 (D) 3 (E) 4
#3228166
9. Your company has a class C network 192.168.113.0. Which of the following address pairs is located in the same subnet if you want to divide the network into six useable subnets? (A) (192.168.113.1, 192.168.113.254) (B) (192.168.113.94, 192.168.113.97) (C) (192.168.113.38, 192.168.114.46) (D) (192.168.113.36, 192.168.113.48) (E) (192.168.113.157, 192.168.113.165)
#3228167
10. Which of the following statements is CORRECT for the TCP/IP network protocols? (A) TCP is called a connectionless communication while UDP is called a connection-oriented communication. (B) Router is an OSI Layer 2 device which can only forward data based on the MAC address. (C) ARP (Address Resolution Protocol) can be used to change several private addresses under the LAN (Local Area Network) to a single public IP address. (D) For establishing a reliable connection, UDP uses a three-way handshake to enhance the robustness. (E) The flags in the TCP packet are used to indicate a particular state during the TCP conversation.
#3228168
11. Given a database table named “animal” with four columns, please find out a CORRECT SQL command that can obtain the desired output as below. (A) SELECT category, count(animalid) as countaid FROM animal WHERE born > '2023-02- 14' AND count(animalid)>=2 GROUP BY category ORDER BY count(animalid) DESC, category ASC (B) SELECT category, count(animalid) as countaid FROM animal WHERE born > '2023-02- 14' GROUP BY category HAVING count(animalid)>=2 ORDER BY count(animalid) DESC, category ASC (C) SELECT category, count(animalid) as countaid FROM animal GROUP BY category HAVING count(animalid)>=2 AND born > '2023-02-14' ORDER BY count(animalid), category DESC (D) SELECT category, count(animalid) as countaid FROM animal WHERE count(animalid)>=2 GROUP BY category HAVING born > '2023-02-14' ORDER BY count(animalid) DESC, category ASC (E) SELECT category, count(animalid) as countaid FROM animal WHERE born > '2023-02- 14' GROUP BY category ORDER BY count(animalid) DESC, category ASC
#3228169
相關試卷
114年 - 114 學士後醫學系招生考試試題:計算機概論與程式設計#137105
2025 年 · #137105
113年 - 113 學士後醫學系招生考試試題:計算機概論與程式設計#119574
2024 年 · #119574
112年 - 112 學士後醫學系招生考試試題:計算機概論與程式設計#137106
2023 年 · #137106
111年 - 111 學士後醫學系招生考試試題:計算機概論與程式設計#137107
2022 年 · #137107
111年 - 111 國立中山大學_學士後醫學系招生考試:計算機概論與程式設計#113521
2022 年 · #113521
111年 - 111 學士後醫學系招生考試:計算機概論與程式設計#107630
2022 年 · #107630
110年 - 110 學士後_醫學系︰計算機概論與程式設計#100246
2021 年 · #100246
109年 - 109 高雄醫學大學_學士後醫學系招生考試:計算機概論與程式設計#86938
2020 年 · #86938