看板 ncyu_phyedu 關於我們 聯絡資訊
國立嘉義大學九十八學年度 資訊管理學系碩士班招生考試試題 科目:計算機概論 1. Please briefly describe the function of virtual memory? (5 %) 2. Please briefly describe what means a program is I/O bound? (5 %) 3. Please briefly describe why most PCs adopt DRAM instead of SRAM as their main memory. (5 %) 4. Please briefly describe why single-job processing makes inefficient use of computer resources?(5% ) 5. Please briefly describe the objective of blocking. (5 %) 6. Please briefly describe the difference between CPU registers and Cache. (5 %) 7. Assume that a variable A is a signed 2-byte short integer and A = 32767. What will be the value of A after executing A = A + 1. (5 %) 8. Below is a program coded by C language, please answer the following questions: #include <stdio.h> main() { int i, j, n, k = 0; for (i = 1; i <= n; i++) for (j = 1; j <= i; j++) ++k; printf(“%d\n”, k); } (1) After executing this program, what will be the value of variable k as n = 100? (5 %) (2) What is the time complexity of this program? (5 %) (3) Please improve this program to make its time complexity be O(1). (5 %) 9. Please explain what differences between “unicast”, “multicast”, and “ anycast” are. (5 %) 10. Please briefly illustrate the major features of the “Beyond 3G”. (5 %) 11. Please briefly describe what “Thread” is. (5 %) 12. Consider the following set of processes, with the length of the CPU-burst time given in milliseconds Process Name Arrival Time CPU-Burst Time Priority 1 0 4 3 2 1 6 2 3 3 4 1 4 5 8 5 5 8 5 4 (1) Draw four Gantt charts that illustrate the execution of these processes using FCFS, preemptive SJF, a preemptive priority (a smaller priority number implies a higher priority), and RR (quantum=2) scheduling. (8 %) (2) Which of the schedulers in Part A results in the minimal average waiting time (over all processes)? (2 %) 13. Please illustrate what is different between three broad categories of WWW document: static, dynamic and active. (5 %) 14. Please give briefly comparisons between CISC (complex instruction set computer) and RISC (reduced instruction set computer). (5 %) 15. Please briefly describe the main idea behind the MP3 standard for compressing audio. (5 %) 16. Please briefly distinguish between symmetric-key cryptography and asymmetric-key cryptography. (5 %) 17. Suppose that we want to make use of all spaces in queue. Please show your solution to conquer one space could not be used with empty and full distinguishing problem. (5 %) -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 140.130.189.43