Sunday, December 20, 2020

已完成上一步驟了!立即前往下一步驟。

Riders Template

有任何問題?

可以來信至rider@foodpanda.tw

Unsubscribe

Friday, December 11, 2020

中華電信建置5G開放實驗室(Open Lab)

 

中華電信今年630日以最大頻寬、最佳頻位之國際主流3.5GHz頻譜,採用4G/5G雙連結架構技術,率先5G開台,引領台灣進入5G新時代。面對未來物聯網、AI人工智慧、企業專網等各領域的需求,mmWave (毫米波)頻譜因具有大頻寬,可實現高速率、低延遲特性,被認為是下一波5G重要技術演進方向。

中華電信已經於今年初5G頻譜釋照中取得28GHz毫米波頻段的最大頻寬600MHz,並已陸續完成毫米波技術在實驗室與外場測試。實測結果驗證了毫米波技術可實現5G下載峰值速率Gbps等級、單向延遲ms等級的高速率、低延遲特性。對AR/VR視訊直播、高畫質視訊、智慧監控等需要大量資料高速率、低延遲的5G新應用,提供了更好的發展環境。

同時,為協助國內網通廠發展5G毫米波設備,中華電信也建置5G開放實驗室(Open Lab),提供愛立信(Ericsson)及諾基亞(Nokia)兩套5G網路設備平臺,協助國內廠商研發毫米波基地台與用戶終端設備之互通性開發測試(Interoperability Development Testing, IoDT),共同推動國內5G毫米波產業生態發展,目前已有聯發科、中磊、宏碁、宏達電、亞旭、英華達、啟碁等數家國內廠商開發的5G毫米波晶片或設備於開放實驗室進行測試。

中華電信研究院林昭陽院長表示:「中華電信於28GHz毫米波頻段擁有連續600MHz的最大頻寬,能提供更好的5G高速率、低延遲的應用服務。除實驗室環境的建立外,我們近期也進一步進行5G毫米波企業專網之智慧工廠解決方案實地試驗,於工廠生產線導入AI+AGV智慧無人搬運車、AR遠端協作等應用,逐步推展5G毫米波技術於企業和垂直場域的應用。」

Wednesday, December 9, 2020

中華電信公司 109 年第 22 & 23 次從業人員(具工作經驗)遴選簡章



中華電信CHT 2412公司 109 年第 22 & 23 次從業人員(具工作經驗)遴選簡章
一律採網路報名(https://rmis.cht.com.tw/portal/hrims/prelogin.jsp),

簡章備份:http://cht-exam.blogspot.com/2020/12/httpsdrive.html
(因官方簡章會被刪除,故備份於此供日後參考)

22th:
https://drive.google.com/file/d/1lWThAtMWyluPixQ9tqh-CDroN1Kk8guF/view?usp=sharing

23th:
https://drive.google.com/file/d/1bizBzdTXW5KdcLnqU8mlfb8AMckg6FN-/view?usp=sharing



Sunday, November 15, 2020

109年頂大轉學考考古題-translate-university-exam-paper

除了下列註記的題目外,其他偏容易,高手可以跳過。


http://examsys.oaa.nsysu.edu.tw/exam_joint_retired/109retired/B30/B3091%E8%A8%88%E7%AE%97%E6%A9%9F%E6%A6%82%E8%AB%96.pdf

5, 15,16, 18, 23 這幾題的考題比較新穎,參考看看。


http://www.lib.nthu.edu.tw/library/department/ref/exam/109t/%E8%A8%88%E7%AE%97%E6%A9%9F%E6%A6%82%E8%AB%96.pdf

23,25 考資訊安全,一般計算機概論教科書比較少談到,但在中華電信很重要。

資料結構考很多,但這屬程式設計,投報率低,中華電信網路規劃這組不大會考。


http://examsys.oaa.nsysu.edu.tw/exam_joint_retired/109retired/A06/A0602%E8%A8%88%E7%AE%97%E6%A9%9F%E6%A6%82%E8%AB%96.pdf

數字系統考很多,題型比資料結構單單純,投報率高,可以規則覆蓋題型。

簡答第四題比較難,是OS的題組,比較算考研究所的範圍,可以挑戰看看。







Tuesday, October 27, 2020

109-TAIWAN- Transfer-EXAMINATION-TEST



1. Which of the following is false about database?

A.data stored in database can be linked list, and double linked list.

B. index for a table can speed up the searching speeds

C. SQL is the major language used in database

D.Object-oriented database can provide the data storage and access by intuition

E. Performance of database outperforms that of file structure


(A) 1. 關於數據庫,下列哪項是錯誤的?

A. 資料庫中存儲的數據可以是鍊結串列,也可以是雙向鍊結串列

B.資料表的索引可以加快搜索速度

C. SQL是數據庫中主要的使用語言

D.物件導向的資料庫庫可以提供直觀的數據儲存和讀取

E.數據庫的性能優於文件結構 

效能會依儲存資料類型而有所不同,如果在資料庫中儲存大文件就可能會降低性能,一般來說,檔案結構的性能比資料庫要更好。比如以「Select *」來擷取檔名列表的簡單查詢,也會載入檔案資料。但在檔案系統中,存取檔案會非常簡單且迅速。

 
Advantages of OODBMS
◆ OODBMS can handle large collections of complex data including user defined data types.Thus support for aggregation, composition, reference etc. 
◆ Expressive data relationships. 
◆ Version control for evolving classes and projects 
◆ Efficiently handles many-to-many relationships


2. Which of the following is false for the polymorphism of object-oriented programming?

A. the binding of the method of the object related to the polymorphism is determined in compiling time

B. provides a mechanism to process the future and unknown problem in a predefined way

C. object of parent class can reference the object of child class

D. the inheritance relationship should be designed before applying the polymorphism

E. overloading mechanism is different from polymorphism







3. Which of the following is false about the characteristic of object-oriented programming?

A.the inherence mechanism can enhance the code reuse

B. information hiding can speed up the compiling speed

C. static member function works like function library in C

D.object declaration without new did not involve memory allocation for it

E. object name is a reference variable

4. Which is false for TCP/IP protocol?

A.each IP address should be unique worldwide during the communication

B. Domain name server serves the translation from domain name to ip address

C. IP v4 suffers the insufficiency the amount of ip addresses

D.1P v6 is compatible with ip v4 through some (tunneling) technique

E. ping and traceroute are the commands for IP address translation







5. Which one is false for TAM (Technique Acceptance Model) model?

A.it uses a uniform model to assess the acceptable degree of a new system/techniques

B. Jobs Steven of Apple Company uses user experience to survey the technique acceptance degree

C. TAM model focuses on the concept rather than the product detail

D.project manager should use measure tool, like TAM, to evaluate the maturity of the product

E. TAM model can be used as a tool for software testing.


6. Which of the following is false about the semi-conauctor company?

A.Fabless company focuses its energy in designing rather than production

B. Moore's law says the performance of VLSI increases twice around 18 month

C. Wafer foundry focuses on the production of wafer, and the major design is the job of fabless company

D.wafer foundry and fabless cannot be integrated as a company

E. The smaller the logic gate, the higher the performance and the lower power the needed 7. Which of the following is false for the linked list?

A.double linked list provides forward and backward move from a node

B. First come first serve can be implemented by linked list

C. linked list can be implemented by an array with sufficient array size

D.double linked list outperforms the circular link list in searching an element if no index and no sorting

E. a tree can be transformed into a linked list by some traverse algorithm

8. Which is correct for subtraction of two binary numbers?

A.the l's and 2's complement mechanisms are used to transfer the subtraction to addition

B. the look-ahead addition can not be used in the subtraction

C. the carry-bit is of no use in the subtraction

D.the bits addition (or subtraction) can be only performed from the least significant bit toward the most significant bit

E. multiplication can be performed by a sequence of subtraction

9. Which one is false for operating system?

A. it provides basic 1/0 subroutines that can be called by applications

B. before executing operating system, it must be loaded into main memory

C. bootstrap means starting up the operating system

D. memory allocation to process is the job of compiler

E.  process calls interrupt to ask the service provided by operating system

10. Which one is false for web server?

A. web server is software run upon a host, like PC workstation

B. web server and email server can be installed in a same host

C. web server can use work-balance mechanism, providing a number of hosts to process a huge requests from the clients

D. web browser receives the html, JavaScript, iQuery and other web-based language from application server and interpret and react to the above web-based language in client screen

E.  Clients can access database through web server itself only.

11. Which one is false for computer organization?

A. DMA (Direct Memory Access) takes over the job of memory to/from storage device

B. Bios performs the bootstrap jobs

C. Data in RAM lasts unless the power continues

D. Bus connects CPU and memory

E.  CPU has several layers of caches to confirm the data security

12. Which one is false for tree?

A. algorithm of minimum spanning tree is run in the graph structure

B. a tree has no cycle

C. the number of nodes in a tree equals to the number of edges plus one

D. binary search tree is the search path for a sorted data if using the binary search

E.  A tree is a recursive structure

13. Which one is false for graph?

A. the algorithm to find the shortest path from a specific node to another specific node in the graph is a permutation problem

B. the algorithm to find the shortest path from a specific node to all other nodes in the graph can adopt the greedy method

C. the adjacent matrix for a graph is simple but costs a lot of memory

D. the adjacent list for a graph is simple and saves a lot of memory

E.  the costs of an edge between two nodes cannot be quantified

14. Which one is false for a social network?

A. it can be represented as a tree

B.it can use the graph theory to compute me most signmcant persons

C.an isolated sub social network has no links connecting to the nodes outside the isolated sociall

network

D.         Facebook is a type of social network existing in computer virtual space

E. The six-degree separation theory claims that any two persons can know each other across around six hops (i.e., friends) at most amid the two friends

15. Which is false for the IOT (intemet of thing)?

A.the sensor performs a probe to sense the change of the environment

B. the sensor generates a lot of data pipelined to the storage for processing

C. the program can actively enquire the sensor or be passively interrupted to get the data

D.self-driving car equips a lot of sensors to dictate the driving of the car

E. IOT needs data visualization to guide how to collect the data

16. Which is false for big data?

A.   data visualization makes the data being sensed by perception of sights, color and trend

B.   outlier detection is also the job of the big data

C.   data structure, data base, data mining and big data use the same technique's to process the different data

D.   data warehouse performs the job of data aggregation in big data

E.    parallel processing associated with the related storage can increase computing of the SI& data

17. Which one is false for the image?

A.   Jpee, is a format of images, whose image edge remains smooth if enlarged.

B.    bitmap is also an image fonnat, whose image edge will become saw-teeth if enlarged

C.    pixel is the unit of the precision of the image; the higher the pixel amount, the higher the precision

D.   assume a pixel is represented by 3 bytes, a 800x600 image needs 1.44M bytes

E.    Lossless compression cannot restore its original precision after compression

18. Which one is false for electronic commercial (EC)?

A.EC can be classified as C2C, B2C, B2C, and so on

B. reputation of a service in EC can be got from the rating by the involved actors in the EC transaction

C. 020 used in EC is the abbreviation of "office to office"

D.encrypted communication is important in EC

E. The data collected from the transaction of EC can be used to mine valuable information to facilitate the operation of EC.

l9. Which of the following is false for constructor and destructor in Object-oriented programming?


D.it is possible to have more than one destructor in a class

E. overloading mechanism allow different constructors of a class exists simultaneously

4   0. Which of the following is false for the browser?

A.   a browser can be seen as an interpreter interpreting the data received from the web server

B.   some tag in html is meta data describing the visual effects of the data

C.   JavaScript is a client language, which is performed by web server

D.   JQuery is a client language, which provides a lot of commands working on the Dom (Document Object Model) -tree of the web page

E.    CSS (Cascading Style Sheets) is a client language to provide a way to use predefined visual effects of some elements in a web page.

4   I. Which of the following is false for the algorithm?

A.     Binary search can be classified as divide-and-conquer approach

B.      Minimum spanning tree can be classified as greedy approach

C.      The worst case of bubble sort occurs when the order of the data is aligned in the reverse order against the desired order

D.     Finding the shortest path from a specific node to another specific node can be resolved by the dynamic programming

E. To find the next best move in a chess play can be performed well by binary search approach 22. Which of the following is false for the hosts working in intemet?

A.client-server structure generally means a server providing service to clients through applications

B. web-based structure generally means a server providing service to the client through the browser

C. peer-to-peer structure means that each host can perform client and server roles simultaneously

D.3-tier structure means a job being finished needs three tiers' cooperation. Normally, the three tiers are the client, application and database tiers

E. host-terminal structure should be disappeared

13. Which of the following is false about artificial intelligence (AI)?

A.Rule-base system can be classified as a branch of AI

B. deep-learning is a type of rule-base system

C. neural network can learn the experience through computing

D.AI can be used to replace the well-documented jobs worked by human

E. Computer vision, natural language, machine learning, pattern recognition, robot, automatic control,

24. Which of the following is false for the terms? 

A. Database focuses on the data store and retrieval from the computer 

B. Data structure focuses on the efficiency and economics in storage for data arrangement

 C. Big data focuses on the capacity and capability in process huge data 

D. data warehouse focuses on data correctness of the data storage E. data mining focuses on finding the unknown but useful rules from the data. 



25.A.network protocol focuses on the agreement, en-or-proof, enpr-recovery, etc in data communication

B. intranet is a smaller Internet but working in a company-like scale

C. Internet is a collection of the local area network who can communicate with each other

D.web application focuses on the web server's programming

E. app coding focuses on data structure in the cell phone.


熱門必看