→ tdk4:XDy 04/29 00:04
課程名稱︰計算機概論
課程性質︰系訂必修
課程教師︰張璞曾
開課系所︰電機系
考試時間︰95/04/26
試題 :
1.Which of the followsing representations in two's complement notation
represents the largest value?
A.00000010 B.11111111 C.00000001 D.11111110
2.Assuming that each of the following bit patterns originally had even
parity, which one contains an error?
A.10110100 B.11000011 C.00011000 D.10001001
3.Which of the following is not contained in a CPU?
A.Instruction register B.Program counter C.General-purpose register
D.Main memory
4.In which of the following locations is information most readily available
for manipulation by the CPU?
A.General-purpose register B.Main memory C.Mass storage
5.Which of the following is not an active performed entirely within a CPU?
A.Fetch instructions B.Perform Boolean operations
C.Perform arithmetic operations D.Move data between registers
6.Which of the following is the answer of the following logic problems?
10101010
XOR11110000
A.10100000 B.11111010 C.01011010
7.Which of the following components of an operating system maintains the
directory system?
A.Device drivers B.File manager C.Memory manager
8.Which of the following components of an operating system handles the details
associated with particular peripheral equipment?
A.Device drivers B.File manager C.Memory manager
9.Multitasking in a computer with only one CPU is accomplished by a technique
called?
A.Bootstrapping B.Batch processing C.Time sharing
10.Execution of an operating system is initiated by a program called the?
A.Window manager B.Scheduler C.Bootstrap
11.Which of the following is not a role of a typical operating system?
A.Control the allocation of the machine's resources
B.Central access to the machine
C.Maintain records regarding files stored in mass storage
D.Assist the computer user in the task of processing dugutal photographs
12.Which of the following is not a way of classifying networks?
A.WAN versus LAN B.Closed versus open C.Router versus bridge
D.Star versus bus
13.The Von Neumann Model defines a computer as 4 subsystems. What are four
subsystems? And what are the main features of the Von Neumann Model?
14.What are some difference between a transport layer based on the TCP protocol
and another based on UDP protocol?
15.Write down the five-layer TCP/IP internet protocol hierarchy and describe
briefly the major task of each layer.
16.If a domain's network identifier is 192.156.42, how many unique IP adress
are available for referencing computers within the domain?
17.What is the protocol of Ethernet? And decribe the steps followed by a
machine want's to transmit a message in a network using this protocol.
18.Suppose two bytes are used to represent a single positive or negative
integer. What's the binary representation corresponding to -2006?
19.Summarize the difference between a RISC architecture and a CISC
architecture. What kind does your personal computer belong to?
20.Express the following bit patterns in hexadecimal notation:
*101010011100
*10010111010110
21.Convert decimal to binary and then binary to decimal:
*757.25
*11100111.1
*100.0101
22.Write down the range of above format for n bits.
*sign and magnitude
*one's complement
*two's complement
23.Encode the following values using the eight-bit floating- point format
which the most significant bit is the sign bit, the next three bits
represents the exponent field in excess notation, and the last four bits
represent the mantissa? Indicate each case in which a truncation error
occurs. (Ecponent: 111 represents 3, 110 represents 2, 101represents 1....
001 means -3, 000 means -4 )
*1/2
*-3 3/4(考者註:負三又三分之四)
24.Perform each of the following additions assuming the bit strings represent
values in two's notation. Identifiy each case in which the answer is
incorrect because of overflow.
*00111+01100
*11111+11111
*10111+11010
25.What is a deadlock? And give an example to clarify it.
(試題結束)
--
※ 發信站: 批踢踢實業坊(ptt.cc)
◆ From: 140.112.18.5