首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
The Turing machine is an abstract(71)of computer execution and storage introduced in 1936 by Alan Turing to give a mathematicall
The Turing machine is an abstract(71)of computer execution and storage introduced in 1936 by Alan Turing to give a mathematicall
admin
2009-02-15
58
问题
The Turing machine is an abstract(71)of computer execution and storage introduced in 1936 by Alan Turing to give a mathematically precise definition of(72). or ’mechanical procedure’. As such it is still widely used in theoretical computer science, especially in(73)theory and the theory of computation. The thesis that states that Turing machines indeed capture the informal notion of effective or mechanical method in logic and mathematics is known as Turing’s thesis.
Every Turing machine computes a certain(74)partial function over the strings over its alphabet. In that sense it behaves like a computer with a fixed program. However, as Alan luring already described, we can encode the action table of every Turing machine in a string. Thus we might try to construct a Turing machine that expects on its tape a string describing an action table followed by a string describing the input tape, and then computes the tape that the encoded Turing machine would have computed. As Turing showed, such a luring machine is indeed possible and since it is able to simulate any other Turing machine it is called a(75)Turing machine.
A universal Turing machine is Turing complete. It can calculate any recursive function, decide any recursive language, and accept any recursively enumerable language. According to the Church-Turing thesis, the problems solvable by a universal Turing machine are exactly those problems solvable by an algorithm or an effective method of computation, for any reasonable definition of those terms.
选项
A、fixed
B、steady
C、variational
D、changeable
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/6HxZ777K
本试题收录于:
软件设计师上午基础知识考试题库软考中级分类
0
软件设计师上午基础知识考试
软考中级
相关试题推荐
在路由表中设置一条默认路由,目标地址应为(46),子网掩码应为(47)。
Windows网络操作系统通过域模型实现网络安全管理策略。下列除(34)以外都是基于域的网络模型。在一个域模型中不允许包含(35)。
Linux是目前较为流行的网络操作系统,如同Unix操作系统一样,它也可以通过手工编辑配置文件达到对系统进行配置的目的。在Linux网络配置文件中的几个较为重要的配置文件如下: (61)用于存放本机主机名以及经常访问IP地址的主机名,在对IP进行域名解析时
传统的交换机作为第二层设备,只能识别并转发(26)地址,要支持VLAN间的通信只能借助于具有(27)功能的网络设备。具有这种功能的设备有路由器和三层交换机。当用路由器解决VLAN通信时,路由器得到一个VLAN包后,根据目的IP地址,获得目的MAC地址及相应
SNMPv2表的状态列有6种取值,以下哪个选项不是响应管理站的查询而返回的状态?(43)
Pharmingisascammingpracticeinwhichmaliciouscodeisinstalledonapersonalcomputerorserver,misdirectingusersto(71)
The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable(6)of the technical re
Thepurposeoftherequirementsdefinitionphaseistoproduceaclear,complete,consistent,andtestable(66)ofthetechnical
软件设计中划分模块的一个准则是(61)。两个模块之间的耦合方式中,(62)耦合的耦合度最高,(63)耦合的耦合度最低。一个模块内部的内聚种类中,(64)内聚的内聚度最高,(65)内聚的内聚度最低。
随机试题
TheBestPlacetoBeBornintheWorldLastyear,theEIU(EconomistIntelligenceUnit),asistercompanyoftheEconomist,
OnedaywhenIwashavingaheartylunchatafast-foodrestaurant,anoldcoupleentered.They【C1】______amealatthecounter.
A.排卵后B.初级卵泡C.次级卵泡D.成熟卵泡E.闭锁卵泡放射冠出现于
《公共场所管理条例》所指的“公共场所”,不包括
下列关于资产组认定的表述中,正确的有()。
下列哪些属于越剧的经典剧目?()
变与乱似乎是一对孪生兄弟,凡是剧烈变动的时代,往往也是混乱失序的时代。不过,变与乱的结果往往差别很大:有些社会最终走过动荡的变革时期.逐步确立了新的体制和秩序:有些社会则缺乏变革因素的增量积累机制,无法形成新的体制和秩序,只能通过恢复旧秩序而结束混乱局面。
中共十六届五中全会提出,建设社会主义新农村的要求是生产发展和()。
表达式1/2*(int)3.7/(int)(2.4*(1.5+2.5))值的数据类型为______。
Hundredsofbuildingswere(wrecked)bytheearthquake.
最新回复
(
0
)