精華區beta NTU-Exam 關於我們 聯絡資訊
課程名稱︰計算機概論 課程性質︰ 課程教師︰張璞曾教授 開課系所︰電機系 考試時間︰4/26 試題 : 1.Which of the following representations in two's complement notation represents the largest value? A.00000010 B.11111111 C.00000001 D.11111110 2.Assuming that each of the following bit patterns originally had even parity, which one contains error? A.10110100 B.11000011 C.00011000 D.10001001 3.Which of the following is not contained in a CPU? A.Instruction register B.Program counter C.General-purpose register D.Main memory 4.In which of the following locations is information most available for manupulation by the CPU? A.General-purpose register B.Main memory C.Mass storage 5.Which of the following is not an activity performed entirely within a CPU? A.Fetch instructions B.Perform Boolean operations C.Perform arithmetic operations D.Move data between registers 6.Which of the following is the answer of the following logic problems? 10101010 XOR 11110000 A.10100000 B.11111010 C.01011010 7.Which of the following components of an operating system maitains the directory system? A.Device drivers B.File manager C.Memory manager 8.Which of the following components of an operating system handles the details associated with particular peripheral equipment? A.Device drivers B.File manager C.Memory manager 9.Multitasking in a computer with only one CPU is accomplished by a technique called? A.Bootstraping B.Batch processing C.Time sharing 10.Execution of an operating system is initiated by a program called? A.Window manager B.Scheduler C.Bootstrap 11.Which of the following is not a role of a typical operating system? A.Control the allocation of the machine's resources B.Central Access to the machine C.Maintain records regarding files stored in mass storage D.Assist the computer user in the task of processing digital photographs. 12.Which of the following is not a way of classifying networks? A.WAN versus LAN B.Closed versus open C.Router versus bridge D.Star versus bus 13.The Von Neumann Model defines a computer as 4 subsystems. What are four subsystems? And what are the main features of the Von Neumann Model? 14.What are some differences between a transport layer based on the TCP protocol and another based on UDP protocol? 15.Write down the five-layer TCP/IP internet protocol hierrarchy and describe briefly the major task of each layer. 16.If a domain's network identifier is 192.156.42, how many unique IP address are available for referencing computers within the domain? 17.What is the portocol of Ethernet? And describe the steps followed by a machine wants to transmit a message in a network in a network using this protocol? 18.Suppose two bytes are used to represent a single positive or negative integer, what's the binary representation corresponding to -2006 ? 19.Summarize the difference between a RISC architecture and a CISC architecture. What kind does your personal computer belong to? 20.Express the following bit patterns in hexadicimal notation. 101010011100 10010111010110 21.Convert decimal to binary and binary to decimal 757.25 11100111.1 100.0101 22.Write down the range of above format for n bits. sign and magnitude one's complement two's complement 23.Encode the following values using the eight-bit floating-point format which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa. Indicate each case in which a truncation error occurs. 1/2 -3又3/4 24.Perform each of the following additions assuming the bit strings represent values in two's complement notation. Identify each case in which the answer is incorrect because of overflow. 00111+01100 11111+11111 10111+11010 25.What is deadlock? And give an example to clarify it. -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 140.112.7.59