首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
The Turing machine is an abstract(71)of computer execution and storage introduced in 1936 by Alan Turing to give a mathematicall
The Turing machine is an abstract(71)of computer execution and storage introduced in 1936 by Alan Turing to give a mathematicall
admin
2009-02-15
45
问题
The Turing machine is an abstract(71)of computer execution and storage introduced in 1936 by Alan Turing to give a mathematically precise definition of(72). or ’mechanical procedure’. As such it is still widely used in theoretical computer science, especially in(73)theory and the theory of computation. The thesis that states that Turing machines indeed capture the informal notion of effective or mechanical method in logic and mathematics is known as Turing’s thesis.
Every Turing machine computes a certain(74)partial function over the strings over its alphabet. In that sense it behaves like a computer with a fixed program. However, as Alan luring already described, we can encode the action table of every Turing machine in a string. Thus we might try to construct a Turing machine that expects on its tape a string describing an action table followed by a string describing the input tape, and then computes the tape that the encoded Turing machine would have computed. As Turing showed, such a luring machine is indeed possible and since it is able to simulate any other Turing machine it is called a(75)Turing machine.
A universal Turing machine is Turing complete. It can calculate any recursive function, decide any recursive language, and accept any recursively enumerable language. According to the Church-Turing thesis, the problems solvable by a universal Turing machine are exactly those problems solvable by an algorithm or an effective method of computation, for any reasonable definition of those terms.
选项
A、universal
B、special
C、complete
D、changeable
答案
A
解析
转载请注明原文地址:https://jikaoti.com/ti/XSa7FFFM
本试题收录于:
软件设计师上午基础知识考试题库软考中级分类
0
软件设计师上午基础知识考试
软考中级
相关试题推荐
在系统转换的过程中,旧系统和新系统并行工作一段时间,再由新系统代替旧系统的策略称为(19);在新系统全部正式运行前,一部分一部分地代替旧系统的策略称为(20)。
页式存储系统的逻辑地址是由页号和页内地址两部分组成。假定页面的大小为4K,地址变换过程如下图所示,图中逻辑地址用十进制表示。图中有效地址经过变换后,十进制物理地址a应为(17)。
Traditional Internet access methods like dial-up were so slow that host computers were connected to the dial-up(71)at the custom
在进行金融业务系统的网络没计时,应该优先考虑(69)原则。在进行企业网络的需求分析时,应该首先进行(70)。
在Windows环境下,DHCP客户端可以使用(35)命令重新获得IP地址,这时客户机向DHCP服务器发送一个(36)数据包来请求租用IP地址。
利用VLAN技术可以把物理上连接的网络从逻辑上划分为多个不同的虚拟子网,可以对各个子网实施不同的管理策略。图5-4示意了交换机SW1和交换机SW2相连把6台计算机配置成2个VLAN。阅读SW1的部分配置信息,为(56)空缺处选择合适的命令/参数,实现交换机
从文字方面对新系统逻辑模型进行描述的系统分析工具是(7)。
一项网络工程的建设流程通常由①对现有网络的体系结构进行分析,②网络需求分析,③确定网络物理结构,④确定网络逻辑结构,⑤安装、测试和维护等5阶段组成,根据网络开发设计的过程,对这5个阶段的先后排序正确的是(59)。
Withhundredsofmillionsofelectronictransactionstakingplacedaily,businessesandorganizationshaveastrongincentiveto
随机试题
Thereisonepartofwomen’smagazinesthateverymanreads.Itisthesectionpopularlyknownasthe"agonycolumns",wherewo
心功能不全患者,应用洋地黄过程中出现频发室早,应首先考虑诊断为
下列不属于矿井透水前预兆的是()。
学习所引起行为或行为潜能的变化是短暂的。
越级上访:是指信访人越过依法有权处理的本级和上一级机关,到更高机关走访的行为。根据以上定义,下列四项中属于越级上访的是()。
2013年有电子商务活动的企业占所在行业企业数比重最大的是:
井冈山农村革命根据地的建立具有深远的历史意义,主要是
关闭表单的程序代码是ThisForm.Release,Release是( )。
SlaveryhasplayedasignificantroleinthehistoryoftheU.S.ItexistedinalltheEnglishmainlandcoloniesandmostofth
•YouwillhearaconversationbetweenajournalistandClintonDines,presidentofBHPBillitoninChina.•Foreachquestion23-
最新回复
(
0
)