精華區beta NTU-Exam 關於我們 聯絡資訊
課程名稱︰計算機概論 課程性質︰選修 課程教師︰查士朝 開課系所:工管系 考試時間︰ 試題 : A 基本資料題(6分) 0.你的網頁位置 URL: 你的 E-mail address: B 單選題(一題2.5分) 1.Which of the following is the binary representation of 4 5/8? A. 100.11 B. 10.011 C. 110.101 D. 100.101 2.Which of the following bit patterns represents the value 5 in two's complement notation? A. 00011010 B. 11111011 C.00000101 D.11111011 →題目本身出錯,答案若為B或D則寫B或D皆可 3.Which of the following bit patterns represents the value -5 in two's complement notation? A.00011010 B. 11111011 C.00000101 D.11111011 →題目本身出錯,答案若為B或D則寫B或D皆可 4.In whichof the following addition problems(using two's complement notation) does an overflow error occur? A. 0011 B. 0100 C. 1100 + 1010 + 0100 + 1100 ──── ──── ──── 5.Which of the following representations in two's complement notation represents the lagerest value? A. 00000010 B. 11111111 C. 00000001 D. 11111110 6.Which of the following bit patterns (represented in hexadecimal notation) represents a negative number in two's complement notation? A. 7F B. 55 C. A6 D. 08 7.What value is represented by the bit pattern 01011100 when interpreted using floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa? A. -1 1/2 B. 1 1/2 C. -3/8 D. 3/8 8.Which of the following values cannot be stored accurately using a floating-point format in which the most significant bit is the sign bit, the next three bits representt the exponent field in excess notation, and the last four bits represent the mantissa? A. 2 1/2 B. 3/16 C. 7 D. 6 1/4 9.Which of the following bit-patterns represents the smallest value using the floating-point format in which the most signisicant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa? A. 01001000 B. 01011000 C. 00101000 D. 01111000 10.Assuming that each of the following bit patterns originally had even parity, which one contains an error? A. 10110100 B. 11000011 C. 00011000 D. 10001001 11.Which of the following is not contained in a CPU? A. Instruction register B. Program counter C. General-purpose register D. Memory cell 12.In which of the following locations is information most readily available for manipulation by the CPU? A. General-purpose register B. Main memory C. Mass storage 13.Which of the following is not an activity performed entirely within a CPU? A. Fetch instructions B. Perform Boolean operations C. Perform arithmetic operations D. Move data between registers 14.Which of the following is the answer of the following logic problems? 10101010 XOR 11110000 ─────── A. 10100000 B. 11111010 C. 01011010 15.Which of the following components of an operating system maintains the directory system? A. Device drivers B. File manager C. Memory manager 16.Which of the following components of an operating system handles the details associated with particular peripheral equipment? A. Device drivers B. File manager C. Memory manager 17.Which of the following components of an operating system is not part of the kernel? A. Shell B. File manager C. Scheduler 18.Multitasking in a computer with only one CPU is accomplished by a technique called? A. Bootstrapping B. Batch processing C. Time sharing 19.Execution of an operating system is initiated by a program called the? A. Window manager B.Scheduler C.Bootstrap 20.A section of a program that should be executed by at most one process at a time is call a ? A. Utility B. Critical region C. Privileged instruction 21.Which of the following is a technique for controlling access to a critical region? A. Spooling B. Time sharing C. Semaphore D. Booting 22.Which of the following is not a roal of a typical operating system? A. Control the allocation of the machine's resources B. Contral access to the machine C. Maintain records regarding files stored in mass storage D. Assist the computer user in the task of processing digital photographs 23.Which of the following is a task that is not performed by the kernel of an operating system? A. Communicate with the user B. Schedule process C. Allocate resources D. Avoid deadlock 24.Which of the following is not a way of classifying networks? A. WAN versus LAN B. Closed versus open C. Router versus bridge D. Star versus bus 25.Ethernet is a means of implementing which of the following network topologies? A. Star B. Ring C. Bus D. Irregular 26.Which of the following is a protocol for controlling the right to transmit a message in a network? A. UDP B. CSMA/CD C. TCP D. FTP 27.Which of the following is not a means of performing interprocess communication over a network? A. Client/server B. ICANN C. Peer-to-peer 28.Which of the following is not an application of the Internet? A. FTP B. E-Mail C. Telnet D. CERT 29.Which of the following is not a means of referencing entities on the Internet? A. URL B. IP address C. Anonymous FTP D. Host address 30.Which of the following is not a means of connecting networks? A. Gateway B. Server C. Router D. Bridge 31.Which layer of the TCP/IP hierarchy actually transmits a message? A. Application B. Transport C. Network D. Link 32.Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet? A. Application B. Transport C. Network D. Link 33.Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet? A. Application B. Transport C. Network D. Link 34.Which layer of the TCP/IP hierarchy decides which application should receive an incoming message? A. Application B. Transport C. Network D. Link 35.Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? A. Application B. Transport C. Network D. Link 36.Which layer of the TCP/IP hierarchy reassembles messages as thair pieces arrive at the destination? A. Application B. Transport C. Network D. Link 37.Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message's destination? A. Application B. Transport C. Network D. Link 38.Which of the following identifies the application to which a message arriving from the Internet should be given? A. Protocol B. Port number C. Domain D. Hop count 39.Which of the following is an Internet application that is named after its underlying protocol? A. E-Mail B. World Wide Web C. FTP D. UDP 40.Which of the following is not a protocol used in the basic TCP/IP software hierarchy? A. POP3 B. UDP C. TCP D. IP 考試時可以帶任何的參考資料! -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 140.112.239.115