IT数码 购物 网址 头条 软件 日历 阅读 图书馆
TxT小说阅读器
↓语音阅读,小说下载,古典文学↓
图片批量下载器
↓批量下载图片,美女图库↓
图片自动播放器
↓图片自动播放器↓
一键清除垃圾
↓轻轻一点,清除系统垃圾↓
开发: C++知识库 Java知识库 JavaScript Python PHP知识库 人工智能 区块链 大数据 移动开发 嵌入式 开发工具 数据结构与算法 开发测试 游戏开发 网络协议 系统运维
教程: HTML教程 CSS教程 JavaScript教程 Go语言教程 JQuery教程 VUE教程 VUE3教程 Bootstrap教程 SQL数据库教程 C语言教程 C++教程 Java教程 Python教程 Python3教程 C#教程
数码: 电脑 笔记本 显卡 显示器 固态硬盘 硬盘 耳机 手机 iphone vivo oppo 小米 华为 单反 装机 图拉丁
 
   -> C++知识库 -> 系统编程辅导-cse13s - Computer Systems and C Programming-ucsc -> 正文阅读

[C++知识库]系统编程辅导-cse13s - Computer Systems and C Programming-ucsc

一些没涉及的内容:密码学,哈希,bit vector

Recursion can be simulated using a queue. F

You can use the modulo operator (%) using two pointers as the operands. F

Bytes have endianness. F
字节本身是没有端序的,端序是针对整数的几个bytes来说的。小端序是指一个整数的msb(most significant bytes)在低的地址上。
下面这道题很经典:也就是说,按照从小到大排列数据,如果是整数,一下子需要4个bytes,这4个bytes排列有小端和大端之分。但是首地址不是按照小端和大端拿地址,而是直接给高位地址?如果小端,高地址就是lsb,就是1.
在这里插入图片描述

There are some integers that you cannot write in binary. T
显然可以,因为所有的整数都是加1加1加1,那二进制也加就可以,无穷大的数,那写无穷多的1和0,一样可以表示。

There are more real numbers than there are integers. T

哈希函数这里还需要再看。
Hash functions provide a one-to-one mapping from keys to non- negative integers.

Resolving hash collisions in a hash table using chaining with binary search trees yields, on average, near-balanced binary search trees. T

In the best case, hash tables provide O(1) access.T

A good hash function changes about 1/2 of its output bits even if a single input bit changes.T

The smaller the hash table, the faster the access.

Given a Bloom filter of size n that uses k hash functions, what is the time complexity of inserting an element into the filter? O(k)

Recursive algorithms are always very inefficient. F
递归效率
A tree is a form of directed acyclic graph (DAG). T 有向无环图

You can convert any regular expression into an equivalent NFA. T

Non-Deterministic Finite Automata(NFA) 任何正则表达式都可以表示为非确定有限自动机

Regular expressions are more powerful than non-deterministic finite automata. F

C uses call-by-value. T 值传递

Any adjacency matrix is usually a square matrix.T和图有关系

密码学:
Using Diffie-Hellman, Alice (A) can securely share a secret with Bob(B) or Mallory (M) but not be sure which one she shared the secret with. T

There are more floating-point numbers than there are integers. F

It is easy to build a queue using linked lists. T

regular expression :

Our security goals are: Confidentiality, integrity, and availability

bit vector的内容:
在这里插入图片描述

在这里插入图片描述

Part of the job of the Compiler is to break down source code into lexemes, or tokens.

The Linker combines object files and libraries into an executable.

Which tree traversal is best suited for freeing all nodes in a tree
(deleting a tree)? Postorder traversal

这个很好理解,从下往上遍历。

calloc()会初始化为0,malloc()随机值,之前是啥还是啥。

What is the purpose of a constructor? To allocate memory and return a pointer to an initialized data structure

The one-time pad is secure because:Guessing the wrong key can produce any message.

Select the message, the sequence of symbols, that exhibits
the most entropy. abcdefg

What command in vim will replace all occurrences of the word “hello” with “goodbye”? :%s/hello/goodbye/g

Which function should be used to safely compare two strings? strncmp()

A priority queue always returns The smallest element

If you reuse your key when employing a one-time pad, then you:Lose your security.

Select the answer that lists, from left to right, the correct order in which the 4 phases of the C program compilation process occur. Preprocessor, Compiler, Assembler, Linker

Given the plaintext message “BANANA” to encrypt, what would be the resulting ciphered text if a 3-right-shift Caesar cipher was used?
EDQDQD

What is true about NFAs and DFAs? NFAs have the same expressive power as DFAs.

In C, the result of performing -5 % 7 is: complier dependent

RSA is believed to be secure because: It is hard to factor large composites.

在这里插入图片描述

In what order does C store arrays?
Row major

An unbreakable code is called: One-time pad

  C++知识库 最新文章
【C++】友元、嵌套类、异常、RTTI、类型转换
通讯录的思路与实现(C语言)
C++PrimerPlus 第七章 函数-C++的编程模块(
Problem C: 算法9-9~9-12:平衡二叉树的基本
MSVC C++ UTF-8编程
C++进阶 多态原理
简单string类c++实现
我的年度总结
【C语言】以深厚地基筑伟岸高楼-基础篇(六
c语言常见错误合集
上一篇文章      下一篇文章      查看所有文章
加:2022-03-17 21:52:22  更:2022-03-17 21:55:58 
 
开发: C++知识库 Java知识库 JavaScript Python PHP知识库 人工智能 区块链 大数据 移动开发 嵌入式 开发工具 数据结构与算法 开发测试 游戏开发 网络协议 系统运维
教程: HTML教程 CSS教程 JavaScript教程 Go语言教程 JQuery教程 VUE教程 VUE3教程 Bootstrap教程 SQL数据库教程 C语言教程 C++教程 Java教程 Python教程 Python3教程 C#教程
数码: 电脑 笔记本 显卡 显示器 固态硬盘 硬盘 耳机 手机 iphone vivo oppo 小米 华为 单反 装机 图拉丁

360图书馆 购物 三丰科技 阅读网 日历 万年历 2024年11日历 -2024/11/24 2:33:59-

图片自动播放器
↓图片自动播放器↓
TxT小说阅读器
↓语音阅读,小说下载,古典文学↓
一键清除垃圾
↓轻轻一点,清除系统垃圾↓
图片批量下载器
↓批量下载图片,美女图库↓
  网站联系: qq:121756557 email:121756557@qq.com  IT数码