logo
  • write-homewrite-home-active首页
  • icon-chaticon-chat-activeAI 智能助手
  • icon-pluginicon-plugin-active浏览器插件
  • icon-subject-activeicon-subject-active学科题目
  • icon-uploadicon-upload-active上传题库
  • icon-appicon-app-active手机APP
  • 医学医学
  • 政治学政治学
  • 管理管理
  • 计算机计算机
  • 教育教育
  • 数学数学
  • 艺术艺术

在深度学习中,卷积神经网络(CNN)的卷积层主要用于提取图像的局部特征,而池化层(PoolingLayer)则用于降低特征的空间维度A. 正确B. 错误

网络安全应具有()和可控性等方面的特征。A. 可用性B. 可靠性C. 完整性D. 保密性

有以下语句:int b;char c[10];,则正确的输入语句是______。A. scanf("% d % s", &b, &c);B. scanf("% d % s", &b, c);C. scanf("% d % s", b, c);D. scanf("% d % s", b, &c);

。(1)。(2)。(3)。(4)。(5)。(6)。(7)。(8)。

灌溉设备属于物联网[1]的哪个层()A. 感知层[2]B. 传输层[3]C. 处理层D. 应用层

字符显示模式缓冲区中的一个字对应于屏幕上的一个字符。每个字的第一个字节为显示字符的______,第二个字节为显示字符的______。 TK63、在串操作程序中,通常在重复前缀指令REPZ或REPNZ后,选用的串操作指令是______或______才有实际意义。TK64、已知:BX=1357H,DI=2000H,DS=2000H,CS=4000H,分别指出下面各指令中存储器操作数的物理地址。JD(1)MOV AL,[BX]21357H(2)MOV CS:[BX+DI],AH43357H65、0P1 DB 1,20P2 DW 3412H,5678H┇MOV AX,OP1+1;字单元(OP1+1) AXMOV BL,OP2+1;字节单元(OP2+1) BL上述二条传送语句有语法错误,请根据注释字段的说明,将其改正。JDMOV AX,WORD PTR(OP1+1)MOV BL,BYTE PTR(OP2+1)66、下列语句在存储器中分别为变量分配多少字节?JD(1)AD2 DW 10 DUP(?),1022(2)AD3 DD 100 DUP(?)40067、简述下面两条指令分别是什么语法错误?JDMOV [BX],[SI]MOV AX,DLMOV指令不能在两个______器操作数之间进行;操作数类型不匹配。68、在指令系统中,段内、段间返回均为RET指令。试回答:JD(1)执行段内返回RET指令时,执行的操作是:栈顶内容→IP,SP+2→SP(2)执行段间返回RET指令时,执行的操作是:①栈顶内容→IP,SP+2→SP②栈顶内容→CS,SP+2→SP69、ARY DW 10 DUP(?)┇MOV AL,TYPE ARYMOV BL,LENGTH ARYMOV CL,SIZE ARY上述MOV指令序列执行后的结果是什么?JDAL=2BL=10CL=2070、设某数据段:JDDATA SEGMENTORG 20HNUM1=8NUM2=NUM1+10HDA1 DB 'COMPUTER'DB 0AH,0DHCOUNT EQU -DA1DA2 DW'CO','MP','UT','ER'DATA ENDS试回答:(1)DA1的偏移地址是:______(2)COUNT的值是______(3)DA2+5字节单元的内容是_________71、已知AX=0FF60H,CF=1MOV DX,96XOR DH,0FFHSBB AX,DX执行上述指令序列后,AX=______,CF=______。 CXFX72、设寄存器AL,BL,CL中内容均为76H,XOR AL,0FHAND BL,0FHOR CL,0FH执行上述指令序列后,AL=______,BL=______CL=______。 CXFX73、已知AX=0A33AH,DX=0F0F0HAND AH,DLXOR AL,DHNEG AHNOT AL执行上述指令序列后,AH=______,AL=______。 CXFX74、假定(DX)=10111001B,(CL)=0.3,(CF)=1,试确定下列各条指令单独执行后,DX中的值。JD(1)SHR DX,1(2)RCR DL,1(3)RCL DX,CL答:(1) 005CH (2) 00DCH (3) 05CCH75、写出完成下述功能的程序段:JD(1)传送25H到AL寄存器(2)将AL的内容乘以2(3)传送15H到BL寄存器(4)AL的内容乘以BL的内容并请写出最后(AX)=?答:(1)MOV AL, 25H (2)SHL AL, 1 (3)MOV BL, 15H(4)MUL BL 最后,(AX)=612H =155476、写一程序段,求双字长数DX∶bX的相反数。JD答:NEG DXNEG AXSBB DX, 077、在某子程序的开始处要保护AX,BX,CX,DX四个寄存器信息,在子程序结束时要恢复这四个寄存器信息。例如:JDPUSH AXPUSH BX 保护现场PUSH CX /PUSH DX/:}恢复现场试写出恢复现场时的指令序列。答:POP DXPOP CXPOP BXPOP AX78、完成下列操作,选用什么指令:JD(1)将AX的内容,减去0520H,和上次运算的借位; (2)将变量名TABL的段地址送AX;答:(1)SBB AX,0520H(2分) (2)MOV AX,SEG TABL(2分)79、D1 DB 20H DUP(?)D2 DW D1 请写出用一条指令实现取D1的偏移地址=>SI中的三种方法。JD答:①LEA SI,D1②MOV SI,OFFSET D1③MOV SI,D280、A DW 1234HB DW 5678H:PUSH APUSH BPOP APOP B试回答:CXFX①上述程序段执行后(A)=__________,(B)=_____②设执行前SP=200H,执行后SP=____________答:①(A)=5678H(2分)(B)=1234H(2分)②SP=2000H(2分)81、现有下列程序段:CXFXMOV AX,6540HMOV DX,3210HMOV CL,04SHL DX,CLMOV BL,AHSHL AX,CLSHR BL,CLOR DL,BL试问上述程序段运行后, (AX)=________ (BL)=________(DX)=________82、分析下面程序段,CXFXMOV AL,200SAR AL,1MOV BL,ALMOV CL,2SAR AL,CLADD AL,BL试问程序段执行后(BL)=_________(AL)=___________83、DA3 EQU WORD PTR DA4DA4 DB 0ABH,89H┇SHR DA3,1MOV DX,DA3SHL DA4,1MOV CX,DA3上述程序段运行后,CX=______,DX=______。CXFX84、设(SP)=100H,(AX)=0FFFFHSTCPUSH AXADC AX,0PUSH AXPOP BX 上述程序段运行后,(BX)=______,(SP)=______。 CXFX85、STRING DB ‘ABCDEFGHIJ':MOV AH,01 ;从键盘输入字符1~9INT 21HAND AL,0FHDEC ALXOR AH,AHMOV BX,OFFSET STRINGADD BX,AXMOV BL,[BX]MOV AH,02H ;显示输出INT 21H:试回答:(1)上述程序段的功能是什么?CXFX根据从键盘输入的字符‘1’~‘9’,确定在显示器上显示STRING中第几个字符。(2)如从键盘输入字符‘4',程序段有什么结果?显示器显示字符‘D’86、已知:BX=4567HNEG BXINC BXNEG BXDEC BX程序段执行后,BX=______,CF=______。CXFX87、已知数据段中定义DAT1 DB 12H,34H,56H,78HMOV CX,0MOV AX,WORD PTR DAT1MOV CL,DAT1+3当程序段执行完后AX=______,CX=______。CXFX88、DA1 DB 83H,72H,61H,94H,5AH┇MOV CX,WORD PTR DA1AND CX,0FHMOV AL,DA1+3SHL AL,CL上述指令序列执行后,AL=______,CL=______。CXFX89、现有如下程序段:CXFXDATA SEGMENT DA3 EQU 1234HORG 0020H DA4 EQU $-DA2DA1 DW 12H,23H DA5 DB 31H,32HDA2 DB 11H,21H DATA ENDS请回答:(1)该程序段已占有的存储字节数是多少?(2)符号名DA4的值是多少?符号名DA5的值是多少?答:(1) 该程序段已占有的存储字节数是8个字节。(2) 符号名DA4的值为2,符号名DA5的值是0026H。90、执行下列程序段后,回答问题。CXFXORG 1221H MOV BX,OFFSET NUMNUM DW 12H MOV CL,BYTE PTR NUM+1… MOV CH,TYPE NUMMOV AX,NUM HLT请问:(AX)=______,(BX)=______,(CX)=______。答:(AX)=0012H (BX)=1221H (CX)=0200H91、执行下列指令后AX、BX寄存器的内容?CXFXMOV SI,10HMOV AX,1234HMOV [SI+12H],AXLEA BX,[SI]MOV [SI+14H],BX答:AX为1234H,BX为22HLES BX,DWORD PTR [SI+12H]92、试编制一程序段,用串操作指令实现以DA_BY为首址的20H个字节单元中存放相同字符‘Y’(设DA_BY存储区已有ES指向)。BCLEA DI,DA_BYMOV CX,32MOV AL,‘Y’CLDREP STOSB93、在BUF1和BUF2两个数据区中,各定义有10个带符号字数据,试编制一完整的源程序,求它们对应项的绝对值之和,并将和数存入以SUM为首址的数据区中。BCDATA SEGMENTBUF1 DW-56,24,54,-1,89,-8……BUF2 DW45,-23,124,345,-265,……SUM DW10DUP(0)DATA ENDS94、编制程序段实现:将AX寄存器中的16位二进制数分成四组,每组4位,然后把这4组数分别放在AL、BL、CL、和DL中。 BCMOV BH,ALMOV CH,AHMOV AL,AHAND AL,0F0HMOV BL,AHAND BL,0FHMOV CL,BHAND CL,0F0HMOV DL,BHAND DL,0FH95、在NUMW单元存放有一个0-65535范围内的整数,将该数除以500,商和余数分别存入QU1和REM单元,请在空行处各填上一条指令完善该程序。CXTK┇MOV AX,NUMW_____________________XOR DX,DXDIV BXMOV QUI,AX_____________________96、已知数据段中定义DAT1 DB 12H,34H,56H,78HMOV CX,0MOV AX,WORD PTR DAT1MOV CL,DAT1+3当程序段执行完后AX=______,CX=______。CXFX97、DA1 DB 83H,72H,61H,94H,5AH┇MOV CX,WORD PTR DA1AND CX,0FHMOV AL,DA1+3SHL AL,CL上述指令序列执行后,AL=______,CL=______。CXFX98、DA3 EQU WORD PTR DA4DA4 DB 0ABH,89H┇SHR DA3,1MOV DX,DA3SHL DA4,1MOV CX,DA3上述程序段运行后,CX=______,DX=______。CXFX99、编制完整程序实现下列算式:W=X+Y+36-Z。设X、Y、Z、W均为双字长数据,各自的低十六位数和高十六位数分别存放在X、X+2、Y、Y+2、Z、Z+2的存储单元中,结果的低十六位字和高十六位字分别存放在W和W+2两个单元中。BCDATA SEGMENTX DD …Y DD …Z DD …W DD …DATA ENDSCODE SEGMENTASSUME CS:CODE,DS:DATASTART:MOV AX,DATAMOV DS,AXMOV AX,XADD AX,YMOV BX,X+2ADC BX,Y+2ADD AX,36ADC BX,0SUB AX,ZSBB BX,Z+2MOV W,AXMOV W+2,BXCODE ENDSEND START

高级持续性威胁( APT )是利用先进的攻击手段对特定目标进行短期、快速的网络攻击的一种攻击形式。()A. 对B. 错

设散列表的地址范围为0~17,散列函数为:H(key) = key%16。用线性探测法处理冲突,输入关键字序列: (10, 24,32, 17,31,30,46, 47,40,63, 49),构造散列表,试回答下列问题:①画出散列表的示意图。②若查找关键字63,需要依次与哪些关键字进行比较?③若查找关键字60,需要依次与哪些关键字进行比较?④假定每个关键字的查找概率相等,求查找成功时的平均查找长度[1]。

as a control program it serves two major functions: (1) supervision of the execution of user programs to prevent errors and improper use of the computer, and (2) manage- ment of the operation and control of i/o devices.? 环境提供者,为计算机用户提供一个环境,使得能够在计算机硬件[1]上方便、高效的执行程序 ? 资源分配者,为解决问题按需分配计算机的资源,资源分配[2]需尽可能公平、高效 ? 控制程序监控用户程序的执行,防止出错和对计算机的不正当使用管理i/o设备的运行和控制1.6 define the essential properties of the following types of operating systems: a. batchb. interactive c. time sharing d. real time e. networkf. distributeda. batch. jobs with similar needs are batched together and run through the computer as a group by an operator or automatic job sequencer. performance is increased by attempting to keep cpu and i/o devices busy at all times through buffering, off-line operation, spooling, and multiprogramming. batch is good for executing large jobs that need little interaction; it can be submitted and picked up later.b. interactive. this system is composed of many short transactions where the results of the next transactionmay be unpredictable. response time needs to be short (seconds) since the user submits and waits for the result.c. time sharing.thissystemsuses cpu scheduling and multiprogramming to provide economical interactive use of a system. the cpu switches rapidly from one user toanother. instead of having a job de?ned by spooled card images, each program readsits next control card from the terminal, and output is normally printed immediately to the screen.d. real time. often used in a dedicated application, this system reads information from sensors and must respond within a ?xed amount of time to ensure correct perfor- mance.e. network.f. distributed.this system distributes computation among several physical processors. the processors do not share memory or a clock. instead, each processor has its own local memory. they communicate with each other through various communication lines, such as a high-speed bus or telephone line.a. batch相似需求的job分批、成组的在计算机上执行,job由操作员或自动job程序装置装载;可以通过采用 buffering, off-line operation, spooling, multiprogramming 等技术使cpu 和 i/o不停忙来提高性能批处理[3]适合于需要极少用户交互的job。 b. interactive由许多短交易组成,下一次交易的结果可能不可预知需要响应时间短 c. time sharing使用cpu调度和多道程序[4]提供对系统的经济交互式使用,cpu快速地在用户之间切换 一般从终端读取控制,输出立即打印到屏幕 d. real time在专门系统中使用,从传感器读取信息,必须在规定时间内作出响应以确保正确的执行 e. network 在通用os上添加 联网、通信功能 远程过程调用[5] 文件共享f. distributed 具有联网、通信功能 提供远程过程调用提供多处理机的统一调度调度 统一的存储管理[6] 分布式文件系统[7]2.3 what are the differences between a trap and an interrupt? what is the use of each function?answer: an interrupt is a hardware-generated change-of-?ow within the system. aninterrupt handler is summoned to deal with the cause of the interrupt; control is then re-turned to the interrupted context and instruction. a trap is a software-generated interruptan interrupt can be used to signal the completion of an i/o to obviate the need for device polling. a trap can be used to call operating system routines or to catch arithmetic errors.an interrupt是硬件产生的系统内的流的改变 a trap是软件产生的“中断”。interrupt可以被i/o用来产生完成的信号,从而避免cpu对设备的轮询[8] a trap可以用来调用os的例程[9]或者捕获算术错误2.5 which of the following instructions should be privileged? a. set value of timer. b. read the clock. c. clear memory.d. turn off interrupts.e. switch from user to monitor mode.answer: the following instructions should be privileged: a. set value of timer. b. clear memory.c. turn off interrupts.d. switch from user to monitor mode.3.7 what is the purpose of system calls?answer: system calls allow user-level processes to request services of the operating sys- tem.让用户级进程可以请求操作系统所提供的服务6.3 consider the following set of processes, with the length of the cpu-burst time given inmilliseconds: processbursttime priorityp110 3 p21 1 p323 p41 4 p55 2the processes are assumed to have arrived in the order p1, p2, p3, p4, p5, all at time 0. a. draw four gantt charts illustrating the execution of these processes using fcfs, sjf, a nonpreemptive priority (a smaller priority number implies a higher priority), and rr (quantum = 1) scheduling.b. what is the turnaround time of each process for each of the scheduling algorithms in part a?c. what is the waiting time of each process for each of the scheduling algorithms in part a?d. which of the schedules in part a results in the minimal average waiting time (over allprocesses)?6.4 suppose that the following processes arrive for execution at the times indicated. each process will run the listed amount of time. in answering the questions, use nonpreemptive scheduling and base all decisions on the information you have at the time the decision must be made.a. what is the average turnaround time for these processes with the fcfs scheduling algorithm? b. what is the average turnaround time for these processes with the sjf scheduling algorithm? c. the sjf algorithm is supposed to improve performance, but notice that we chose to run process p1 at time 0 because we did not know that two shorter processes would arrive soon. compute what the average turnaround time will be if the cpu is leftcarefully in the following settings: a. mainframe or minicomputer systems b. workstations connected to serversc. handheld computersanswer:a. mainframes:memory and cpu resources, storage, network bandwidth.b. workstations: memory and cpu resoucesc. handheld computers: power consumption, memory resources.1.3 under what circumstances would a user be better off using a timesharing system rather than a pc or single-user workstation?answer: when there are few other users, the task is large, and the hardware is fast, time-sharingmakes sense. the full power of the system can be brought to bear on the user’s problem. the problemcan be solved faster than on a personal computer. another case occurs when lots of other users need resources at the same time.a personal computer is best when the job is small enough to be executed reasonably on it and when performance is sufficient to execute the program to the user’s satisfaction.idle for the first 1 unit and then sjf scheduling is used. remember that processes p1 and p2 are waiting during this idle time, so their waiting time may increase. this algorithm could be known as future-knowledge scheduling.a. 10.53 ((8-0)+(12-0.4)+(13-1.0))/3 = 10.53 b. 9.53 ((8-0)+(13-0.4)+(9-1.0))/3 = 9.53c. 6.86 ((14-0)+(6-0.4)+(2-1.0))/3 = 6.877.8 the sleeping-barber problem. a barbershop consists of a waiting room with n chairsand the barber room containing the barber chair. if there are no customers to be served,the barber goes to sleep. if a customer enters the barbershop and all chairs are occupied, then the customer leaves the shop.if the barber is busy but chairs are available, then the customer sits in one of the free chairs. if the barber is asleep, the customer wakes up the barber. write a program to coordinate the barber and the customers.理发师和顾客同步,理发师必须由顾客唤醒,理发师给一个顾客理发完,要让理发完的顾客退出,让等待顾客进入,顾客互斥的占用n个位置/共享变量semaphore scuthair, snumchair;/ scuthair制约理发师, snumchair制约顾客 scuthair=0; snumchair=0;barber: do (wait(scuthair);/检查是否有顾客,无就睡眠给某个顾客理发signal(snumchair);/让理发完的顾客退出,让等待的一个顾客进入) while (1);customer i:wait(snumchair);/申请占用椅子signal(scuthair);/给理发师发一个信号 坐在椅子上等着理发/共享变量semaphore scuthair, mutexchair;/ scuthair给理发师, mutexchair制约顾客对椅子的互斥占领int number = 0;/顾客的共享变量,记录已经有的顾客数 scuthair=0; mutexchair =1;customer i:wait(mutexchair);/申请对共享变量number的操作(申请占用椅子) if(number = = n-1)(signal(mutexchair); exit;) number = number +1;signal(scuthair);/给理发师发一个信号 signal(mutexchair); 等待理发? 理发完毕?wait(mutexchair);/申请对共享变量number的操作 number = number -1; signal(mutexchair); 离开理发店barber: do (wait(scuthair);/检查是否有顾客,无,就睡眠给某个顾客理发 ) while (1);8.13consider the following snapshot of a system:p0 p1 p2 p3 p4allocation a b c d 0 0 1 2 1 0 0 0 1 3 5 4 0 6 3 2 0 0 1 4max a b c d 0 0 1 2 1 7 5 0 2 3 5 6 0 6 5 2 0 6 5 6available a b c d 1 5 2 0answer the following questions using the banker’s algorithm: a. what is the content of the matrix need? b. is the system in a safe state?[篇三:操作系统概念第七版4-6章课后题答案(中文版)]举两个多线程[10]程序设计的例子来说明多线程不比单线程方案提高性能

域名分为四段:计算机名.机构名.二级域名.顶级域名[1],对应的IP地址也是四段,他们之间的关系()。A. 是一一对应的关系B. 是逆序一一对应关系C. 不是一一对应的关系D. 以上都不对

  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374

热门问题

  • 3.判断题K-means聚类算法对数据的尺寸敏感。()A. 对B. 错

  • 7、 加强电脑安全防护,及时升级病 毒库,安装防火墙,及时查杀病毒和木马,是防范 电信网络诈骗的有效做法。A. 正确B. 错误

  • 以下哪种方法属于卷积神经网络的基本组件()。A. 卷积层B. 池化层C. 激活函数D. 复制层

  • 4/5 以下属于人工智能实际应用的是()。A. 机器视觉B. 人脸识别C. 计算机辅助自动规划D. 智能工业机器人E. 刷卡门禁

  • 下列哪项不是求解对抗搜索问题的基本算法( ) A.反向传播算法 B.广度优先排序算法 C.Alpha-Beta剪枝算法D.最小最大搜索算法

  • 下列哪项关于监督学习算法的描述正确()A. 强化学习的训练效果一定优于监督学习B. 主要的监督学习方法包括生成方法和判别方法C. 广度优先搜索算法是一种监督学习算法

  • 在决策树建立过程中,使用一个属性对某个结点对应的数集合进行划分后,结果具有高信息熵(highentropy),对结果的描述,最贴切的是()。A. 纯度高B. 纯度低C. 有用D. 无用E. 以上描述都不贴切

  • AdaBoosting采用多个单一分类器组成一个强分类器()A. 错误B. 正确

  • 网络安全包括物理安全[1]、逻辑安全、操作系统安全及联网安全,其中逻辑安全包括访问控制[2]、加密、安全管理及用户身份认证。A. 正确B. 错误

  • 下列哪个方法属于知识图谱推理方法()A. 路径排序算法B. 深度学习推断C. 广度优先搜索D. 归纳逻辑程序设计

  • Windows中“复制”操作的快捷键是Ctrl+V。

  • 由脸书(Facebook)公司开发的深度学习编程框架是()A. TensorFlowB. PaddlePaddleC. PyTorchD. Mindspore

  • 2.单选题 讯飞星火可以实现多种文案类型和语言风格的文本写作。讯飞星火(网页版)“内容写作”功能可选的“语言风格”不包括( )。A. 口语化B. 高情商C. 专业D. 热情

  • 下列哪项属于因果推理模型()A. 因果图B. 神经符号推理C. 符号推理模型D. 结构因果模型

  • 程序=算法+()A. 数据结构B. 程序结构C. 控制结构[1]D. 体系结构

  • 下列不属于量子机器学习算法的是()A. 量子支持向量机B. 量子主成分分析C. 薛定谔方程求解D. 深度量子学习

  • 下列哪项贪婪最佳优先搜索算法的描述正确()A. 贪婪最佳优先搜索不属于启发式搜索算法B. 贪婪最佳优先搜索是一种A*搜索算法C. 贪婪最佳优先搜索是一种广度优先搜索算法D. 贪婪最佳优先搜索属于有信息搜索算法

  • 下列哪个方法属于知识图谱推理方法()A. 广度优先搜索B. 深度学习推断C. 路径排序算法D. 归纳逻辑程序设计

  • 网络诈骗中常见的“钓鱼网站”目的是()?A. 传播病毒B. 窃取个人信息C. 提供免费电影

  • 网络安全包括物理安全[1]、逻辑安全、操作系统安全及联网安全,其中逻辑安全包括访问控制[2]、加密、安全管理及用户身份认证。A. 正确B. 错误

logo
广州极目未来文化科技有限公司
注册地址:广州市黄埔区揽月路8号135、136、137、138房
关于
  • 隐私政策
  • 服务协议
  • 权限详情
学科
  • 医学
  • 政治学
  • 管理
  • 计算机
  • 教育
  • 数学
联系我们
  • 客服电话: 010-82893100
  • 公司邮箱: daxuesoutijiang@163.com
  • qt

©2023 广州极目未来文化科技有限公司 粤ICP备2023029972号    粤公网安备44011202002296号