Skip to main content

数据结构与算法 Data Structures and Algorithms 概论


Question 1

下列不属于线性结构的是:
Your Answer
Score Explanation



队列


二叉树 Correct 1.00



Total
1.00 / 1.00

Question 2

以下哪种结构是逻辑结构,而与存储和运算无关:
Your Answer
Score Explanation
单链表


散列表


线性表 Correct 1.00
顺序表


Total
1.00 / 1.00

Question 3

计算运行下列程序段后m的值:
n = 10; m = 0;
for (i =1; i<=n; i++)
    for (j = 2*i; j<=n; j++) 
        m = m+1;


You entered:
Your Answer
Score Explanation
25 Correct 1.00
Total
1.00 / 1.00

Question 4

关于算法特性描述正确的有:
Your Answer
Score Explanation
算法保证计算结果的正确性。 Correct 0.25
组成算法的指令可以有限也可能无限。 Correct 0.25
算法描述中下一步执行的步骤不确定。 Correct 0.25
算法的有穷性指算法必须在有限步骤内结束。 Correct 0.25
Total
1.00 / 1.00

Question 5

由大到小写出以下时间复杂度的序列:
(1) 2n2
(2)n3
(3)nlog10n
(4)2n
(5)22n
答案直接写标号,如:(1)(2)(3)(4)(5)
You entered:
Your Answer
Score Explanation
(5)(4)(2)(1)(3) Correct 1.00
Total
1.00 / 1.00

Question 6

下列说法正确的有:
Your Answer
Score Explanation
函数fnOgn,当常数a足够大时,一定有函数gnOafn Inorrect 0.00
如果函数fnOhngnOhn,那么fn+gnOhn Correct 0.25
a>b>1,函数loganOlogbn,但logbn不一定是Ologan Correct 0.25
如果函数fnOgngnOhn,那么fnOhn Inorrect 0.00
Total
0.50 / 1.00

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...