1. <tt id="5hhch"><source id="5hhch"></source></tt>
    1. <xmp id="5hhch"></xmp>

  2. <xmp id="5hhch"><rt id="5hhch"></rt></xmp>

    <rp id="5hhch"></rp>
        <dfn id="5hhch"></dfn>

      1. 易安信筆試題

        時間:2020-12-06 18:24:38 筆試題目 我要投稿

        2012年易安信筆試題

        不定向選擇

        2012年易安信筆試題

          1 在C++中,變量用時聲明是為啥

          2 命名空間的作用

          3 protected成員函數能被腫么調用

          4 “has-a” relationship是指的啥,答案有instance, reference, pointer等。。。

          5 int, char, short, long的字節數

          6 int a[10][10];

          int *b[10];

          以下哪個正確

          a[3][4] = 91;

          b[3][4] = 91;

          a[1] =NULL;

          b[1] = a[2];

          7 12&&10, 12||10, 12&10, 3>>1, 3>1的結果

          8 x86_64系統下

          struct

          {

          int i;

          char c;

          double d;

          };

          union

          {

          int i;

          char c;

          double d;

          };

          char s[100];

          long c;

          sizeof的.值

          10. An employee has one or two managers, and one manager manages one or more employees. In database conceptual design, the relationship between entity sets employee and manager is

          A one to one

          B one to many

          C many to one

          D many to many

          E none of the above

          11 There are two relations R1(A, B, C) and R2(B, D, E). Which of following techniques CANNOT be used to improve the performance of the natural join of the two relations?

          A make use of multiple parallel processes on a multi-core machine to implement the join algorithm

          B increase the CPU L2 cache hit ratio of the join algorithm implementation

          C partition the relations to different machines by using join attributes and execute the join on many machines in parallel

          D when the number of tuples in R2 is large and the number of tuples in R1 is small, build and index on R1 and use index join method

          E none of the above

          12 Which of the following statements about checkpoints(with log-based recovery schemes) in databases are/is NOT correct?

          A checkpoints are used to decrease the time used for failure recovery

        B checkpoints are done periodically in database to assure ACID properties of transactions

          C periodic checkpoints decreased the number of log entries that need to be redone during recovery

          D during checkpointing, updated disk blocks are written to disk

          E none of the above

          13 There is a huge relation R(A,B,C) of size M and A is the primary key. The tuples in R are sorted by using A and no index is built for R. Each disk block size of b, and each block read takes N seconds. To find a tuple in R with A =17954 the estimated optimized cost is

          A M*N/b

          B N*log(M/b)

          C M*N/(2b)

          D (M+N)/b

          E log(M*N)/b

          14 Which of the following descriptions of reader/writer locks are/is wrong?

          A caller cannot upgrade its read lock(already obtained) to write lock

          B caller can downgrade its write lock(already obtained) to read lock

          C caller can get read lock if there is no write lock held by others

          D multiple callers can hold a read lock at the same time

          E only one caller can hold a write lock at a time

          15 兩頁的內存,四頁的文件,讀取順序為 1 2 1 3 1 2 4 2 1 3 1 2 4 2 1 2 3 4 3 1,FIFO,問cache hit ratio為多少

          16 線程

          選項 contained with a process

          share an address space

          share signals

          share errno

          swith的速度比process快

          17 which one is not above IP

          DNS, SNMP, HTTP, ARP, NTP

          18 Map-Reduce Framework

          19 Buffer overflow

          20 system virtualization

          VM, VMM, IO, memory space

          21 process & thread

          virtual memory space

          kernel register, stack

          fork

          copy-on-write

          大題

          22

          #include

          using namespace

          void main()

          {

          cout << “hello world” << endl;

          }

          修改程序,不能修改主程序,使其輸出為

          initiate

          hello world

          destroy

          23spinlock 與mutex

          1. explain

          2. write the struct definition of spinlock and mutex

          3. write the release function of mutex

          4. implement the reader/writer locks

         

         

          更多相關的筆試題目,大家敬請關注筆試欄目!

        【2012年易安信筆試題】相關文章:

        中國電信筆試題綜合08-02

        中國電信筆試題及答案11-27

        最新中國電信筆試題目01-17

        網絡通信筆試題工程質量類12-09

        名企大唐電信筆試及面試題08-23

        2015中國電信筆試試題01-15

        安信證券武漢筆試題目06-27

        北京誠創易通筆試題01-09

        偉易達筆試題-Windows開發11-14

        2016安全評價師安評總論試題10-07

        国产高潮无套免费视频_久久九九兔免费精品6_99精品热6080YY久久_国产91久久久久久无码

        1. <tt id="5hhch"><source id="5hhch"></source></tt>
          1. <xmp id="5hhch"></xmp>

        2. <xmp id="5hhch"><rt id="5hhch"></rt></xmp>

          <rp id="5hhch"></rp>
              <dfn id="5hhch"></dfn>