IRDO Flashcards

1
Q

t or f: Data is the manifestation and carrier of information, and information is the connotation of data. Information is meaningful, while data is meaningless.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

t or f: Hexadecimal is a common base system inside the computer, which can make up for the shortage of long writing digits of binary.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

t or f: In the computer, all information must be digitized into data before it can be stored, processed and transmitted.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

t or f: It is forbidden to use lossy compression method to compress data, because it will make the original data unrecoverable.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

t or f: Data organization refers to organizing data with a certain logical relationship and configuring it in the memory of the computer according to a certain storage representation, so that the computer can meet the requirements of fast processing speed, less memory capacity and low cost.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

t or f: In the queue, the end performing the insertion operation is called the queue head, and the end performing the deletion operation is called the queue tail.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

t or f: Message digest refers to that messages (files) of any length can be converted into hash values of fixed length by means of hash function, and the original information can be inferred from the message digest.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

t or f: HDFS is an abbreviation of Hadoop Distributed File System, which can realize the distributed storage of files on multiple hosts through the network.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

t or f: In asymmetric cryptosystem, the private key is used to verify the signature.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

t or f: In asymmetric cryptosystem, the encryption and decryption keys are the same, and the key distribution management is simple.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

single: Which of the following descriptions of information and data is wrong?

A

Usually, information and data are strictly distinguished.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

single: Which of the following descriptions about reasons for the use of binary in computer system is wrong?

A

It is different from the decimal system used in daily life.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

single: Which of the following is the correct description of the sequence of image digitization process?

A

image sampling quantization coding digital signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

single: Which of the following descriptions about images is wrong?

A

In black-and-white images, 0 represents pure white and 1 represents pure black

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

single: If the input sequence of a stack is a, b, c, d, which of the following cannot be the output sequence of the stack?

A

c,a,b,d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

single: Which of the following is the location where the stack is inserted and deleted?

A

stack top

17
Q

single: If it is known that the input sequence of a stack is 1, 2, 3,… n, and its output sequence is a1, a2, a3,…, an, if a1 = n, which of the following options is ai?

A

n-i+1

18
Q

single: To design an algorithm to judge whether the left and right parentheses in the expression are paired, which of the following data structures is the best solution?

A

stack

19
Q

single: Which of the following descriptions about the common points between stack and queue is correct?

A

insert and delete elements at the endpoint

20
Q

single: Which of the following options is the purpose of data encryption?

A

protect data content

21
Q

single: In order to solve the speed mismatch between the computer and the printer, a print data buffer is usually set. The host writes the data to be printed into the buffer in turn, queue up for printing, and the printer reads the data from the buffer in turn and prints. Which of the following is the logical structure of the buffer?

A

queue

22
Q

single: Which of the following descriptions about the characteristics of big data is wrong?

A

high value density of data

23
Q

single: Which of the following descriptions of the data storage structure is wrong?

A

In computer, the storage structure of data is expressed by linear structure.

24
Q

single: Which of the following options controls the process of data encryption and decryption?

A

key

25
Q

single: Which of the following is not a performance indicator of information compression technology?

A

total compressed information

26
Q

multiple: Which of the following options are coding methods?

A

all are correct answers

27
Q

multiple: Which of the following description of digital signature are wrong?

A
  • RSA algorithm cannot implement digital signature.
  • Digital signature is the digital image of handwritten signature.
  • Only the recipient can use the private key.
28
Q

multiple: Which of the following data structures belong to nonlinear data structures?

A

graph

binary tree

29
Q

multiple: What are the correct items in the following description of stack application scenarios?

A

recursive call
function call
expression evaluation

30
Q

multiple: In the following description of data encryption, which items are wrong?

A
  • The original data that needs to be encrypted is called ciphertext.
  • In asymmetric cryptosystem, the public key is generally used for decryption and the private key is used for encryption.