課程名稱︰計算機概論
課程性質︰選修
課程教師︰查士朝
開課系所:工管系
考試時間︰
試題 :
A 基本資料題(6分)
0.你的網頁位置 URL:
你的 E-mail address:
B 單選題(一題2.5分)
1.Which of the following is the binary representation of 4 5/8?
A. 100.11 B. 10.011 C. 110.101 D. 100.101
2.Which of the following bit patterns represents the value 5 in two's
complement notation?
A. 00011010 B. 11111011 C.00000101 D.11111011
→題目本身出錯,答案若為B或D則寫B或D皆可
3.Which of the following bit patterns represents the value -5 in two's
complement notation?
A.00011010 B. 11111011 C.00000101 D.11111011
→題目本身出錯,答案若為B或D則寫B或D皆可
4.In whichof the following addition problems(using two's complement notation)
does an overflow error occur?
A. 0011 B. 0100 C. 1100
+ 1010 + 0100 + 1100
──── ──── ────
5.Which of the following representations in two's complement notation
represents the lagerest value?
A. 00000010 B. 11111111 C. 00000001 D. 11111110
6.Which of the following bit patterns (represented in hexadecimal notation)
represents a negative number in two's complement notation?
A. 7F B. 55 C. A6 D. 08
7.What value is represented by the bit pattern 01011100 when interpreted using
floating-point format in which the most significant bit is the sign bit, the
next three bits represent the exponent field in excess notation, and the last
four bits represent the mantissa?
A. -1 1/2 B. 1 1/2 C. -3/8 D. 3/8
8.Which of the following values cannot be stored accurately using a
floating-point format in which the most significant bit is the sign bit, the
next three bits representt the exponent field in excess notation, and the
last four bits represent the mantissa?
A. 2 1/2 B. 3/16 C. 7 D. 6 1/4
9.Which of the following bit-patterns represents the smallest value using the
floating-point format in which the most signisicant bit is the sign bit, the
next three bits represent the exponent field in excess notation, and the last
four bits represent the mantissa?
A. 01001000 B. 01011000 C. 00101000 D. 01111000
10.Assuming that each of the following bit patterns originally had even parity,
which one contains an error?
A. 10110100 B. 11000011 C. 00011000 D. 10001001
11.Which of the following is not contained in a CPU?
A. Instruction register B. Program counter C. General-purpose register
D. Memory cell
12.In which of the following locations is information most readily available
for manipulation by the CPU?
A. General-purpose register B. Main memory C. Mass storage
13.Which of the following is not an activity performed entirely within a CPU?
A. Fetch instructions B. Perform Boolean operations
C. Perform arithmetic operations D. Move data between registers
14.Which of the following is the answer of the following logic problems?
10101010
XOR 11110000
───────
A. 10100000 B. 11111010 C. 01011010
15.Which of the following components of an operating system maintains the
directory system?
A. Device drivers B. File manager C. Memory manager
16.Which of the following components of an operating system handles the details
associated with particular peripheral equipment?
A. Device drivers B. File manager C. Memory manager
17.Which of the following components of an operating system is not part of the
kernel?
A. Shell B. File manager C. Scheduler
18.Multitasking in a computer with only one CPU is accomplished by a technique
called?
A. Bootstrapping B. Batch processing C. Time sharing
19.Execution of an operating system is initiated by a program called the?
A. Window manager B.Scheduler C.Bootstrap
20.A section of a program that should be executed by at most one process
at a time is call a ?
A. Utility B. Critical region C. Privileged instruction
21.Which of the following is a technique for controlling access to a critical
region?
A. Spooling B. Time sharing C. Semaphore D. Booting
22.Which of the following is not a roal of a typical operating system?
A. Control the allocation of the machine's resources
B. Contral access to the machine
C. Maintain records regarding files stored in mass storage
D. Assist the computer user in the task of processing digital photographs
23.Which of the following is a task that is not performed by the kernel of an
operating system?
A. Communicate with the user B. Schedule process
C. Allocate resources D. Avoid deadlock
24.Which of the following is not a way of classifying networks?
A. WAN versus LAN B. Closed versus open C. Router versus bridge
D. Star versus bus
25.Ethernet is a means of implementing which of the following network
topologies?
A. Star B. Ring C. Bus D. Irregular
26.Which of the following is a protocol for controlling the right to transmit
a message in a network?
A. UDP B. CSMA/CD C. TCP D. FTP
27.Which of the following is not a means of performing interprocess
communication over a network?
A. Client/server B. ICANN C. Peer-to-peer
28.Which of the following is not an application of the Internet?
A. FTP B. E-Mail C. Telnet D. CERT
29.Which of the following is not a means of referencing entities on the
Internet?
A. URL B. IP address C. Anonymous FTP D. Host address
30.Which of the following is not a means of connecting networks?
A. Gateway B. Server C. Router D. Bridge
31.Which layer of the TCP/IP hierarchy actually transmits a message?
A. Application B. Transport C. Network D. Link
32.Which layer of the TCP/IP hierarchy chops messages into units whose size
is compatible with the Internet?
A. Application B. Transport C. Network D. Link
33.Which layer of the TCP/IP hierarchy decides the direction in which message
segments are transferred across the Internet?
A. Application B. Transport C. Network D. Link
34.Which layer of the TCP/IP hierarchy decides which application should receive
an incoming message?
A. Application B. Transport C. Network D. Link
35.Which layer of the TCP/IP hierarchy presents incoming messages to the
computer user?
A. Application B. Transport C. Network D. Link
36.Which layer of the TCP/IP hierarchy reassembles messages as thair pieces
arrive at the destination?
A. Application B. Transport C. Network D. Link
37.Which layer of the TCP/IP hierarchy is responsible for obtaining the
correct address for a message's destination?
A. Application B. Transport C. Network D. Link
38.Which of the following identifies the application to which a message
arriving from the Internet should be given?
A. Protocol B. Port number C. Domain D. Hop count
39.Which of the following is an Internet application that is named after its
underlying protocol?
A. E-Mail B. World Wide Web C. FTP D. UDP
40.Which of the following is not a protocol used in the basic TCP/IP software
hierarchy?
A. POP3 B. UDP C. TCP D. IP
考試時可以帶任何的參考資料!
--
※ 發信站: 批踢踢實業坊(ptt.cc)
◆ From: 140.112.239.115