The principle for a stack memory to store data is(72).A.FIFOB.randomC.FILOD.other way

The principle for a stack memory to store data is(72).

A.FIFO

B.random

C.FILO

D.other way


相关考题:

●A firewall is a (71) system designed to (72) an organization′s network against threats.(71) A.operatingB.programmingC.securityD.data(72) A.preventB.protectC.examineD.exploit

Which statements about the MEMORY_TARGET initialization parameter are true?() (Choose all that apply.) A. MEMORY_TARGET can be increased up to the value of MEMORY_MAX_TARGET, if MEMORY_MAX_TARGET is set to a value greater than zeroB. MEMORY_MAX_TARGET defaults to a value of zero if MEMORY_TARGET is not setC. MEMORY_TARGET represents the total amount of memory that can be allocated to SGA and PGA memory structures.D. MEMORY_TARGET is static and cannot be modified without shutting down the instance

The "main storage" normally means that part of internal storage into which instructions and other data must be loaded for subsequent execution or processing. In large computing systems, the term "main storage" is(71) to "memory". "Buffer" mainly indicates a special-purpose storage or storage area allowing, through(72) storage, the data transfer between two functional units having different transfer characteristics. A buffer storage is used between non-synchronized devices or where one is(73) and the other is parallel or between those having different trans far rates. "(74) (memory)" is also a special-purpose buffer storage, smaller and faster than main storage, used to hold a copy of instructions and data obtained from main storage and likely to be needed next by the processor. "Register" is commonly composed of a part of internal storage having a specified storage(75) and usually intended for a specific purpose.A.suitableB.optionalC.choiceD.preferred

A firewall is a(71)system designed to(72)an organization's network against threats.A.operatingB.programmingC.securityD.data

阅读以下说明和C语言函数,将应填入(n)处的语句写在对应栏内。【说明】本程序利用非递归算法实现二叉树后序遍历。【函数】include<stdio.h>include<stdlib.h>typedef struct node{/*二叉树的结点数据结构类型*/char data;struct node *left;struct node *right;}BTREE;void SortTreelnsert(BTREE **tree, BTREE *s){if(*tree==NULL)*tree=s;elseif(s->data<(*tree)->data)SortTreelnsert((1),s);else if(s->data>=(*tree)->data)SortTreelnsert((2),s);}void TraversalTree(BTREE *tree){BTREE *stack[1 000],*p;int tag[1000],top=0;p=tree;do{while(p !=NULL){stack[++top]=p;(3);tag[top]=0; /*标记栈顶结点的左子树已进行过后序遍历*/}while(top>0(4))/*栈顶结点的右子树是否被后序遍历过*/{p=stack[top--];putchar(p->data);}if(top>0)/*对栈顶结点的右子树进行后序遍历*/{(5);tag[top]=1;}}while(top>0);}void PrintSortTree(BTREE *tree){if(tree !=NULL){printSortTree(tree->left);putchar(tree->data);pdntSortTree(tree->right);}}main(){BTREE *root=NULL, *node;char ch;ch=getchar();while(ch !=''){node=(BTREE*)malloc(sizeof(BTREE));node->data=ch;node->left=node->right=NULL;SortTreelnsert(root, node);ch=getchar();}PrintSortTree(root);putchar('\n');TraversalTree(root);}

●The (72) tells the computer what to do.(72) A.diskB.memoryC.programD.data

Acustomerrequiresan8-way16GBAIXsystem.Theyareevaluatingthefollowingthreesystems:?p5-570?p5-570Express?p650ThepSeriestechnicalspecialisthasbeenaskedtoexplaintheprosandconsofthethreesolutions.Whatinformationwillhelpthecustomerdecideonthebestsolutionfortheirenvironment?()A.Thep5-570ExpresscansupportDDR2memory.B.Thep650andp5-570Expressprovidefasterprocessors.C.Thep5-570Expressislimitedtoeight1.5GHzprocessors.D.Neitherthep5-570northep5-570ExpresssupportsCapacityonDemand.

Oneofthekeydecisionmakingfactorsinaverycompetitiveopportunitywillbecost. CompanycomneedsanaggregaterPerfratingof120.Whatisthebestsolution?() A.Twop557016way1.9MHzmachinesB.Onep559032way1.65MHzmachinesC.Onep559532way1.65MHzmachinesD.Twop557016way1.65MHzmachines

The(72) is the primary device for entering information into the computer.A.diskB.keyboardC.USBD.memory

In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71)between sending the notification and notification arriving at the source,thousands of additional(72)may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.pathB.routC.circuitD.way