Small knowledge, big challenge! This article is participating in the creation activity of “Essential Tips for Programmers”.

๐ŸŒผ Data structure

In the case of random distribution of keywords, the binary sorting tree method is used to search, whose search length is equal to ___ magnitude. (Nanjing University of Posts and Telecommunications 2010)

A. Find B in order. I'm going to cut C in half. Find D in chunks. None of that is correctCopy the code

parsing

Answer: B

๐Ÿ“ข In the case of randomness, the average search length of the binary sort tree is O(log2n), the same order of magnitude as the half-search, which is also common sense

๐ŸŒธ Computer network

Network interconnect devices that cannot isolate conflicting domains are ___

A. router B. switch C. hub D. bridgeCopy the code

parsing

Answer: C

๐Ÿ“ข 0x03 talked about specific, offering the old picture:

Repeater/hub Bridge/switch The router
Working layer: The physical layer Physical layer + data link layer Physical layer + data link layer + network layer
Conflict domain/broadcast domain: One collision domain, one broadcast domain Isolate the conflict domain, a broadcast domain Isolate conflict domains, isolate broadcast domains

Only devices at the network layer can divide broadcast domains. However, using switches to implement vlans can isolate conflicting and broadcast domains. A VLAN is a broadcast domain.

๐ŸŒท Operating system

In a blank table, the algorithm that searches the blank space according to its length is called ___ algorithm (Xidian University,2007)

A. best fit B. worst fit C. first fit D. FifOCopy the code

parsing

Answer: A,

๐Ÿ“ข Optimal means that every time you allocate memory for a job, you always allocate the smallest free partition that meets the requirements to the job to avoid being “overqualified”.

In order to speed up the search, the algorithm requires all the free partitions to form a free partition chain in order of their capacity from small to large. In this way, the first found to meet the requirements of the free area must be the best.

๐ŸŒบ Computer composition principle

If the order code is three digits, it is represented by complement code. Mantissa 7 bits, represented by the original code, one of which is a sign bit; Based on 2, the floating-point normalization of the decimal number 27/64 is ___.

A.0101011011 B. 1100110110 C. 1110110110 D. 0001011011Copy the code

parsing

Answer: C

๐Ÿ“ข I silly, this problem a few days ago, specific can see the analysis of day33.

Normalization can directly exclude AD, and the decimal source code indicates the exclusion of B.

The exercises come from @Wangdao Weibo

The analysis is written by myself, if there are any questions or mistakes, please comment.

I am Mancuoj, welcome to pay attention to me and my computer entrance examination column (โ‰งโˆ‡ Blue)