Introduction to computer speed reading questions

--- --- restore content begins

P16 write a book on the 1 "computing is a discipline (lower tool)," what tools for higher definition is low? 2 How to use the calculator will bring a specific ethical issues?

1 computer programming on two common binary, decimal common everyday, the four, octal and other value is which? 2 decimal binary relative superiority in computer terms is which?

3 (1) Since that person can not be limited machine to represent the infinite world, and that the defect lies in which analog data? Value Gap 2 analog data and digital data is which?

1 used on a four-carry essentially the door, and the door is how to achieve a carry of energy efficiency? 2 Operating principle of full adders

Principle 2 run parallel architecture of the difference between SSDs and mechanical hard disk v. 1

Six 1 virtual machine and real machine What is the difference in functionality? 2 Why invent pseudo-code can not be replaced by another language?

1 Why not use all seven specific steps? 2 incidentally affect play for both sides?

1 is a list of eight tree can do? 2 Why commonly used "two" tree?

1 application gap paradigm nine functional design and object-oriented design and object-oriented paradigm differences of process-oriented 2

Ten computer can run multiple systems at the same time? You need to pay what price?

Whether eleven 1 binary files belonging to a text file? 2 Why can change the file type directly by modifying the extension?

1 versatility twelve information systems? 2 different spreadsheet software and information systems

Merits thirteen equivalence criteria 1 2 breadth-first and depth-first method Method parties surface

Gap 44 1. purely logical simulation model credibility 2 game engine (the creation of computer games software) and general system

1 fifteen different network types respective strengths weaknesses 2 packet switching whether damage the integrity of the file

Sixteen 1Internet with 2 different intelligence web search engines is caused by how?

What are the criteria for risk assessment 27 1. Information security is? 2 anti-virus software will not be one-sided for killing malicious code?

28 1. 2 walkthrough and review methods to improve software quality differences in the efficiency and accuracy?

Guess you like

Origin www.cnblogs.com/liujiaqi20191309/p/11609788.html