資工期中超渡團

@ComputerScienceNote

超渡被期中考追殺的諸位

Public team

Joined on Apr 6, 2020

  • 作者簡介 如果你是用手機點開這個畫面的,上面有個箭頭可以拉開,然後就會有各個項目了 段考重點會在標題前面標上[IMPORTANT] 如果有小錯誤/建議的話,但又不想協作的話,也可以用上面的辦法聯絡我,或者在筆記的各級標題旁邊留言給我 :::info 作者:藍白 (terry25031069@gmail.com) :::
     Like 1 Bookmark
  • Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5
     Like  Bookmark
  • CH 9 Heap Min-Max heap Definition A mix-max heap is a complete binary tree such that if it is not empty, each element has a field called key. Alternating levels of this tree are min levels and max levels, respectively. Let x be any node in a min-max heap. If x is on a min (max) level then the element in x has the minimum (maximum) key from among all elements in the subtree with root x. We call this node a min (max) node. example 樹中為min-heap的部分,仍需符合min-heap的特性如圖Level 1的節點鍵值,會小於Level為3的子樹(10小於19、13、18、15) 樹中為max-heap的部份,仍需符合max-heap的特性
     Like 3 Bookmark
  • Mid term questions are skipped Progress: 1,2,3,4,5,6,7,8,9,10,11,12,13 (total 13) 1. Device drivers are broadly classified into two basic categories: character devices and block devices. Please individually describe them. (10%) Appeared in 99, 99_2, 101, 102, 104, 105_1, 105_2, 106, 108 Derivation Please simply describe the Device Driver concepts. (10%) 103_2驅動程式,允許High-Level的軟體與硬體溝通的程式,建立了一個硬體與硬體,或硬體與軟體溝通的介面,讓device可以交換資料。
     Like  Bookmark
  •  Like  Bookmark
  •  Like  Bookmark
  • Chapter 4: Network layer(Under Construction) Network layer overview transport segment from sending to receiving host sending: encapsulates segments into datagrams receiving: delivers segments to transport layer network layer protocols in every host and router router examines header field in all IP datagrams passing through it Functions of network-layer forwarding: move packets from router to another appropriate router
     Like  Bookmark
  • *[//]: # (這是一行註解,拿來示範給各位看的)*[//]: # (注意,因為不想讓各位互相抄襲,所以請盡量寫成英文,讓使用者自行翻譯)*[//]: # (因此不要太注意文法,如果文法不對讓你不舒服的話,請自行更正) 1. Explain the following basic requirements of information security (a). The attacker cannot crack/decrypt/decipher the encrypt message (b). The receiver hopes that the message was sent by sender, not forged by the other. (c). The receiver can ensure that the message has not been tampered. (d). The sender can not repudiate the message 2. S-boxes are important components in block ciphers such as DES or AES. In the 4x4 S-box given below(Table 1), 4 input bits are named x1, x2, x3 and x4 from left to right, and output y1, y2, y3, y4, respectively. (a). Known-plaintext
     Like  Bookmark
  • Progress: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11*,12, 13 1. What is Embedded System? Please simply describe the “Embedded System”. Appeared in 99, 01, 02, 03, 04, 05, 06 Answer Any device that includes a programmable computer but not a general purpose computer It includes input and output and control logic. It has to have a specific function.
     Like  Bookmark
  • Chapter 1: Introduction 前言 老師syllabus的配分都是寫開心的,實際上配分沒人知道。 108學年度電腦網路配分:作業ch1-2(16%)、作業ch3-5(12%)、期中期末(30% * 2=60%)、程式小作業(8%)、出席(4%) 107學年度電腦網路配分:作業ch1-2(10%)、作業ch3-5(10%)、期中期末(30% * 2=60%)、程式小作業(10%)、出席(10%) ★109學年開始,陳裕賢已經擺明要跟學生懟著幹了。期中考古題除了必考的FSM和Python程式碼外完全不一樣,有人在導生聚反應考太難他也只是說想要換種(跟考古題不一樣)的方式考。甚至助教改鬆,他還重改扣分。 考試內容均為講義上的題目,每個圖都要記得看,上課說會考的一定會考,上課輕輕帶過的也會有可能考。講義一定要讀熟。109-2期中考題與作業 完全沒有任何關聯 ,請以PPT講義上的內容為準備方向。 這門課的準備方式:請將資工人社群裡面老到爆炸的考古寫過一次,當然這邊已經有學長將社群內的考古期中期末聯集起來變成大補帖,所以看大補帖就好,然後作業請全部搞懂,強烈建議程式小作業在期中考之前寫完,然後請想辦法把程式碼背下來。
     Like  Bookmark
  • ★109學年開始,陳裕賢已經擺明要跟學生懟著幹了。期中考古題除了必考的FSM和Python程式碼外完全不一樣,有人在導生聚反應考太難他也只是說想要換種(跟考古題不一樣)的方式考。甚至助教改鬆,他還重改扣分。 考試內容均為講義上的題目,每個圖都要記得看,上課說會考的一定會考,上課輕輕帶過的也會有可能考。講義一定要讀熟。 109-2期中考題與作業 完全沒有任何關聯 ,請以PPT講義上的內容為準備方向。 1. Suppose two hosts, A and B, are separated by 100,000 kilometers and are connected by a direct link of R = 2 Mbps. Suppose the propagation speed over the link is $2.5\times10^8 meters/sec$. a. Calculate the bandwidth‐delay product, $R\times D_{prop}$ b.Consider sending a file of 800,000 bits from Host A to Host B. Suppose the file is sent continuously as one large message. What is the maximum number of bits that will be in the link at any given time? (year 96, 97) ANS A
     Like  Bookmark
  • Chapter 2: Application layer Application architectures Client-server arch. 伺服器端:永遠在線且有常駐ip位址 客戶端:和伺服器連結、可能會間歇性的鏈接、可能為動態ip、客戶端與客戶端彼此不互相連接 P2P(peer-to-peer) arch. 無隨時在線的伺服器,點對點傳輸,越多點會使得傳輸速度更快 Process communicating
     Like 1 Bookmark
  • What is the general procedure of computer vision recognition paradigm?C(input from camera) -> G(grab image) -> P(preprocess) -> R(recognize) List three Thresholding techniques 3.2 Basic Global Thresholding 3.3 Adaptive Thresholding 3.4.1 Variance-Based Thresholding 3.4.2 Entropy-Based Thresholding Describe the main procedure of Canny Edge Detection Algorithm
     Like  Bookmark
  • 題目 1. For each type of the following attacks, list all information and/or encryption/decryption programs the attacker of a cryptosystem can have? 102, 106, 107, 109 12% Ciphertext-only attack 攻擊者僅有密文。 攻擊者有encryption/decryption program Known-plaintext attack
     Like 2 Bookmark
  • Chapter 2 Internal architecture BIU (Bus Interface Unit) Performing external bus operations e.g. Fetch Instruction and data EU (Execution Unit) perform operations BIU prefetch instructions into instruction queue
     Like  Bookmark
  • 問答題 What is softmax used for? What are three supervised cnn model usage? What are the three major issues you need to learn when you study a neural network model? Network Architecture Activation function Learning rule Basic CNN architecture can be divided into two stages, what are these stages? What are the functions of the corresponding two stages? Convolutional layers+ pooling layerFeature extraction(特徵擷取)
     Like  Bookmark
  • Chapter 1 Computer Abstractions and Technology 1.1 Intro Algorithm Determines both the number of source-level statements and the number of I/O operations executed Not in this class Programming language, compiler, and architecture Determines the number of computer instructions for each source-level statement
     Like  Bookmark
  • Setup ACL, OSPF 1. Basic setup 20% Given a subnet 192.168.x.0/24; x is your group number. R100 IP is 172.168.1.254; R3's IP is 172.168.1.x, WAN: 172.168.1.0/24 Web1 is web server; IP: 172.168.1.100 PC1 & S1 is in a subnet with 60 hosts; same as PC2 & S2 Go into Router5 and open CLI Go into CopyRouter1 and open CLI Router>en
     Like  Bookmark
  • 1. VLSM: 70% Given a subnet 192.168.x.0/24, x is your group number, R100 IP is 172.168.1.254, R3's IP is 172.168.1.x, WAN: 172.168.1.0/24 Setup VLSM for LANs of S1~S6 for the following numbers of users: S1: 60, S2: 30, S3: 6, S4: 12, S5: 12, S6: 12 Go into Router5 and open CLI Router>en Router#conf t Router(config)#int fa0/0 Router(config-if)#ip addr 192.168.1.1 255.255.255.192
     Like  Bookmark
  • Setup STP, ether channel setup topology p1 - s1 / \ s2 = s3 s: switch, p: pc Options > Preferences > Port Labels Always Shown 1. stp config 40%
     Like  Bookmark