課程名稱︰計算機概論
課程性質︰
課程教師︰張璞曾教授
開課系所︰電機系
考試時間︰4/26
試題 :
1.Which of the following representations in two's complement notation
represents the largest value?
A.00000010 B.11111111 C.00000001 D.11111110
2.Assuming that each of the following bit patterns originally had even
parity, which one contains error?
A.10110100 B.11000011 C.00011000 D.10001001
3.Which of the following is not contained in a CPU?
A.Instruction register B.Program counter C.General-purpose register
D.Main memory
4.In which of the following locations is information most available for
manupulation by the CPU?
A.General-purpose register B.Main memory C.Mass storage
5.Which of the following is not an activity performed entirely within a
CPU?
A.Fetch instructions B.Perform Boolean operations
C.Perform arithmetic operations D.Move data between registers
6.Which of the following is the answer of the following logic problems?
10101010
XOR 11110000
A.10100000 B.11111010 C.01011010
7.Which of the following components of an operating system maitains the
directory system?
A.Device drivers B.File manager C.Memory manager
8.Which of the following components of an operating system handles the
details associated with particular peripheral equipment?
A.Device drivers B.File manager C.Memory manager
9.Multitasking in a computer with only one CPU is accomplished by a
technique called?
A.Bootstraping B.Batch processing C.Time sharing
10.Execution of an operating system is initiated by a program called?
A.Window manager B.Scheduler C.Bootstrap
11.Which of the following is not a role of a typical operating system?
A.Control the allocation of the machine's resources
B.Central Access to the machine
C.Maintain records regarding files stored in mass storage
D.Assist the computer user in the task of processing digital photographs.
12.Which of the following is not a way of classifying networks?
A.WAN versus LAN B.Closed versus open C.Router versus bridge
D.Star versus bus
13.The Von Neumann Model defines a computer as 4 subsystems. What are four
subsystems? And what are the main features of the Von Neumann Model?
14.What are some differences between a transport layer based on the TCP
protocol and another based on UDP protocol?
15.Write down the five-layer TCP/IP internet protocol hierrarchy and
describe briefly the major task of each layer.
16.If a domain's network identifier is 192.156.42, how many unique IP address
are available for referencing computers within the domain?
17.What is the portocol of Ethernet? And describe the steps followed by a
machine wants to transmit a message in a network in a network using
this protocol?
18.Suppose two bytes are used to represent a single positive or negative
integer, what's the binary representation corresponding to -2006 ?
19.Summarize the difference between a RISC architecture and a CISC
architecture. What kind does your personal computer belong to?
20.Express the following bit patterns in hexadicimal notation.
101010011100
10010111010110
21.Convert decimal to binary and binary to decimal
757.25
11100111.1
100.0101
22.Write down the range of above format for n bits.
sign and magnitude
one's complement
two's complement
23.Encode the following values using the eight-bit floating-point format
which the most significant bit is the sign bit, the next three bits
represent the exponent field in excess notation, and the last four bits
represent the mantissa. Indicate each case in which a truncation error
occurs.
1/2
-3又3/4
24.Perform each of the following additions assuming the bit strings represent
values in two's complement notation. Identify each case in which the
answer is incorrect because of overflow.
00111+01100
11111+11111
10111+11010
25.What is deadlock? And give an example to clarify it.
--
※ 發信站: 批踢踢實業坊(ptt.cc)
◆ From: 140.112.7.59