单选

●已知一棵二叉树的前序序列为

  • ABDECF,中序序列为D
  • BEAF
  • C,则对该树进行后序遍历得到的序列为 (46) 。    (46) A.
  • DEBAFC
  • B.DEFBCA
  • C.DEBCFA
  • D.DEBFCA
参考答案
您可能感兴趣的试题

●TCP service is obt

  • ained
  • by having both the sender and the re
  • ceiver create an
  • d points,which are called (75) .    (75) A.Network address
  • B.supenet address
  • C.socket
  • D.IP address

● (74) is

  • a contiguous,num
  • bered set of variables of a given base type,whi
  • ch can be use
  • d and passed to functions as a unit.    (74) A.Record
  • B.Array
  • C.Parameter
  • D.File

●In C l

  • anguage,the usual expression statements are&n
  • bsp;(73) or fun
  • ction calls.    (73) A.I/Os
  • B.operations
  • C.assignments    
  • D.evaluations

  • An instruction is made up of operations that&n
  • bsp;(68) the fun
  • ction to be performe
  • d and operands that represent the data to be operated on.For example,if an instruction is to perform. the operation of  (69) two numbers,it must know  (70) the two numbers are.The processor′s job is to  (71) in
  • B.skip
  • C.smoke
  • D.specify    (69) A.add
  • B.added
  • C.adding
  • D.additional    (70) A.when

● (67) is

  • a sequence of letters and digits,the first character must
  • be a letter.    (67) A.An identifier
  • B.A string    
  • C.An array    
  • D.A program

The CPU is composed of two components,which are () .

  • A.asthmatics logic unit and controller  
  • B.arithmetic logic unit and memory  
  • C.memory and controller  
  • D.controller and storage

●依法受到保护的计算机软件作品必须符合下述条件 (65) 。

(65)

  • A.可被感知
  • B.逻辑合理
  • C.独立创作
  • D.A、B和C

●网络安全的基本目标是实现信息的 (62) 。

(62)

  • A.完整性、机密性、可用性、合法性    &n
  • bsp;  B.保密性、完整性、有效性、防病毒保护    
  • C.保密性、完整性、合法性、防病毒保护    
  • D.机密性、可用性、实用性、有效性
¥

订单号:

遇到问题请联系在线客服

订单号:

遇到问题请联系在线客服