一起答
单选

设某种二叉树有如下特点;结点的子树数目不是两个,则是0个。这样的一棵二叉树中有m(m>0)个子树为0的结点时,该二叉树上的结点总数为(30)。

  • A.2m+1
  • B.2m-1
  • C.2(m-1)
  • D.2m
参考答案
查看试卷详情
相关试题
  1. (59)

    • A.procedure
    • B.program
    • C.programmer
    • D.process
  2. (57)

    • A.chips
    • B.frame
    • C.structure
    • D.cell
  3. Programmers test a program by running it to ensure that the(74)are correct and that the program produces the desired outcome. If errors do occur, the programmer must make the appropriate change and recheck the program until it produces the correct results. This(75)is called testing and debugging.

    • A.commands
    • B.software
    • C.instructions
    • D.measure
  4. Computer hardware engineers research, design, develop, and test computer hardware and supervise its manufacture and(72). Hardware refers to computer(73), circuit boards, computer systems, and related equipment such as keyboards, modems, and printers.

    • A.fixing
    • B.building
    • C.setting
    • D.installation
  5. (55)

    • A.protocol
    • B.specification
    • C.prescript
    • D.rule
  6. The major goal of USB was to define an external expansion bus which makes adding(70)to a PC as easy as hooking up a telephone to a wall-jack. USB 2.0 is an evolution of the USB 1.1(71), providing a higher performance interface.

    • A.peripherals
    • B.outside
    • C.inside
    • D.beside
  7. Like personal computers, most workstations are(72)computers

    • A.single-user
    • B.single user
    • C.multi-user
    • D.multi user
  8. The term data is often used to distinguish()machine-readable information from textual human-readable information.

    • A.binary
    • B.hex
    • C.octal
    • D.decimal
  9. (50)

    • A.回溯
    • B.回归
    • C.返回
    • D.合成
  10. The major technical areas of computer security are usually represented by the initials CIA:(66), integrity, and authentication or availability.

    • A.confidentiality
    • B.confident
    • C.secret
    • D.safety