0% found this document useful (0 votes)
9 views10 pages

Tong 1-7

The document discusses computer components and systems including the von Neumann model, computer languages, algorithms, operating systems, and data representation methods. It covers topics such as binary, octal, hexadecimal number systems and how integers, fractions, images and audio are represented in computers.

Uploaded by

ht79247
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views10 pages

Tong 1-7

The document discusses computer components and systems including the von Neumann model, computer languages, algorithms, operating systems, and data representation methods. It covers topics such as binary, octal, hexadecimal number systems and how integers, fractions, images and audio are represented in computers.

Uploaded by

ht79247
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Chapter 1 An operating system

The _______ model is the basis for today’s A computer language


computers. An algorithm
Leibnitz
Von Neumann FORTRAN and COBOL are examples of
Pascal _______.
Charles Babbage Hardware
Operating systems
In a computer, the _______ subsystem stores Computer languages
data and programs. Algorithms
ALU
Input/output A 17th-century computing machine that could
Memory perform addition and subtraction was the
Control unit _______.
Pascaline
In a computer, the _______ subsystem Jacquard loom
performs calculations and logical operations. Analytical Engine
ALU Babbage machine
Input/output
Memory _______ is a set of instructions in a computer
Control unit language that tells the computer what to do
with data.
In a computer, the _______ subsystem accepts An operating system
data and programs and sends processing results An algorithm
to output devices. A data processor
ALU A program
Input/output
Memory _______ is the design and writing of a program
Control unit in structured form.
Software engineering
In a computer, the _______ subsystem serves Hardware engineering
as a manager of the other subsystems. Algorithm development
ALU Instructional architecture
Input/output
Memory The first electronic special-purpose computer
Control unit was called _______.
Pascal
According to the von Neumann model, Pascaline
_______ are stored in memory. ABC
Only data ENIAC
Only programs
Data and programs One of the first computers based on the von
Neither data nor programs Neumann model was called _______.
Pascal
A step-by-step solution to a problem is called Pascaline
_______. ABC
Hardware EDVAC
Subtract from
The first computing machine to use the idea of
storage and programming was called _______. When converting a decimal fraction to base b,
The Madeline we repeatedly ____b.
EVAC Divide
The Babbage machine By
The Jacquard loom Multiply
By
_______ separated the programming task from Add to
computer operation tasks. Subtract from
Algorithms
Data processors Which of the following representations is
High-level programming languages erroneous?
Operating systems (10111)2
Chapter 2 (349)8
The base of the decimal number system is (3AB)16
____. 256
2
8 Which of the following representations is
10 erroneous?
16 (10211)2
The base of the binary number system is ____. (342)8
2 (EEE)16
8 145
10
16 Which of the following representations is
erroneous?
The base of the octal number system is ____. (111)2
2 (346)8
8 (EEG)16
10 221
16
Which of the following representations is
The base of the hexadecimal number system is erroneous?
____. (110)2
2 (141)8
8 (EF)16
10 22A
16
Which of the following is equivalent to 12 in
When converting a decimal integer to base b, decimal?
we repeatedly _____ b. (1110)2
Divide (C)16
By (15)8
Multiply None of the above
By
Add to
Which of the following is equivalent to 24 in Only
decimal? Excess system
(11000)2 Only
(1A)16 Either bitmap or vector graphic
(31)8
None of the above In the _______ graphic method of representing
Chapter 3 an image in a computer, each pixel is assigned
A byte consists of _______ bits. a bit pattern.
2 Bitmap
4 Vector
8 Quantized
16 Binary

In a set of 64 symbols, each symbol requires a In the _______ graphic method of representing
bit pattern length of _______ bits. an image in a computer, the image is
4 decomposed into a combination of geometrical
5 figures.
6 Bitmap
7 Vector
Quantized
How many symbols can be represented by a bit Binary
pattern with ten bits?
128 In the _______ graphic method of representing
256 an image in a computer, re-scaling of the image
512 creates a ragged or grainy image.
1024 Bitmap
Vector
If the ASCII code for E is 1000101, then the Quantized
ASCII code for e is _______. Answer the Binary
question without consulting the ASCII table.
1000110 When we want to store music on a computer,
1000111 the audio signal must be _______.
0000110 Sampled
1100101 Only
Quantized only
A 32-bit code called _______ represents Coded
symbols in all languages. Only
ANSI Sampled, quantized, and coded
Unicode
EBCDIC A floating-point value after normalization is
Extended ASCII (1.0101) ´ 2-4.
What is the value of the exponent section in
An image can be represented in a computer the Excess-127 representation?
using the _______ method. 4
Bitmap graphic -4
Only 127
Vector graphic 123
Assume a new Excess system uses 17 bits to _______ is a logical bit operator.
represent the exponent section. What is the bias The exclusive OR
value in this system? The unary NOT
17 The binary AND
16 Exclusive OR, unary NOT, or binary AND
65535
65536 The _______ method of integer representation
is the most common method for storing integers
Which number representation method is often in computer memory.
used to store the exponential value of a Sign-and-magnitude
fractional part? One’s complement
Unsigned integers Two’s complement
Two’s complement Unsigned integers
Excess
Ten’s complement In two’s complement addition, if there is a final
carry after the leftmost column addition,
In an Excess conversion, we _______ the _______.
number to be converted. Add it to the rightmost column
Add the bias number to Add it to the leftmost column
Subtract Discard it
The bias number from Increase the bit length
Multiply the bias number by For an 8-bit allocation, the smallest decimal
Divide number that can be represented in two’s
The bias number by complement form is _______.
The precision of the fractional part of a number -8
stored in a computer is defined by the _______. -127
Sign -128
Exponent -256
Mantissa
Last digit For an 8-bit allocation, the largest decimal
number that can be represented in two’s
The combination of sign and mantissa of a real complement form is _______.
number in IEEE standard floating point format 8
is stored as an integer in the ____________ 127
representation. 128
Unsigned 256
Sign-and-magnitude
Two’s complement In two’s complement representation with a 4-
One’s complement bit allocation, we get _______ when we add 1
to 7.
Chapter 4 8
_______ is an arithmetic operation. 1
The exclusive OR -7
The unary NOT -8
Subtraction
The binary AND
In two’s complement representation with a 4- In only AND
bit allocation, we get _______ when we add 5 In only OR
to 5. In only XOR
-5 In AND, OR, or XOR
-6
-7 For the binary AND operation, only an input of
10 _______ gives an output of 1.
Two 0s
If the exponent in Excess_127 is binary Two 1s
10000101, the exponent in decimal is _______. One 0 and one 1
6 Two 2s
7
8 For the binary OR operation, only an input of
9 _______ gives an output of 0.
Two 0s
If we are adding two numbers, one of which Two 1s
has an exponent value of 7 and the other an One 0 and one 1
exponent value of 9, we need to shift the Two 2s
decimal point of the smaller number _______.
One place to the left We use a bit pattern called a _______ to modify
One place to the right another bit pattern.
Two places to the left Mask
Two places to the right Carry
Float
_______ operator (s) takes two inputs to Byte
produce one output.
Only AND To flip all the bits of a bit pattern, make a mask
Only OR of all 1s and then _______ the bit pattern and
Only XOR the mask.
AND, OR, or XOR AND
OR
The unary _______ operator inverts its single XOR
input. NOT
AND
OR To un-set (force to 0) all the bits of a bit
NOT pattern, make a mask of all 0s and then
XOR _______ the bit pattern and the mask.
AND
_______ operator (s), if the input is two 0s, the OR
output is 0. XOR
In only AND NOT
In only OR
In only XOR To set (force to 1) all the bits of a bit pattern,
In AND, OR, or XOR make a mask of all 1s and then _______ the bit
pattern and the mask.
_______ operator (s), if the input is two 1s, the AND
output is 0. OR
XOR 32
NOT
Chapter 5 The data in _______ is erased if the computer
The _______ is a computer subsystem that is powered down.
performs operations on data. RAM
CPU ROM
Memory A tape drive
I/O hardware A CD-ROM
Bus subsystem
_______ is a memory type with capacitors that
_______ is a stand-alone storage location that need to be refreshed periodically.
holds data temporarily. SRAM
An ALU DRAM
A register ROM
A control unit CROM
A tape drive
_______ is a unit that can add two inputs. _______ is a memory type with traditional flip-
An ALU flop gates to hold data.
A register SRAM
A control unit DRAM
A tape drive ROM
CROM
A register in a CPU can hold _______.
Only data There are _______ bytes in 16 Terabytes.
Only instructions 216
Only program countervalues 240
Data, instruction, or program counter values 244
256
A control unit with five wires can define up to
_______ operations. _______ can be programmed and erased using
5 electronic impulses but can remain in a
10 computer during erasure.
16 ROM
32 PROM
EPROM
A word can be _______ bits. EEPROM
Only 8
Only 16 _______ is a type of memory in which the user,
Only 32 not the manufacturer, stores programs that
8, or 16, or 32 cannot be overwritten.
ROM
If the memory address space is 16 MB and the PROM
word size is 8 bits, then _______ bits are EPROM
needed to access each word. EEPROM
8
16 Main memory in a computer usually consists of
24 large amounts of ______ speed memory.
High The three steps in running a program on a
Medium computer are performed in the specific order
Low _______.
Very high speed Fetch, execute, and decode
Decode, execute, and fetch
A _______ is a storage device to which the user Fetch, decode, and execute
can write information only once. Decode, fetch, and execute
CD-ROM
CD-R In the _______ method for synchronizing the
CD-RW operation of the CPU with an I/O device, the
CD-RR I/O device informs the CPU when it is ready
for data transfer.
A _______ is a storage device that can undergo Programmed I/O
multiple writes and erasures. Interrupt-driven I/O
CD-ROM DMA
CD-R Isolated I/O
CD-RW
CD-RR In the _______ method for synchronizing the
operation of the CPU with an I/O device, the
The smallest storage area on a magnetic disk CPU is idle until the I/O operation is finished.
that can be accessed at one time is a _______. Programmed I/O
Track Interrupt-driven I/O
Sector DMA
Frame Isolated I/O
Head
In the _______ method for synchronizing the
If the memory has 232 words, the address bus operation of the CPU with an I/O device, a
needs to have _______ wires. large block of data can be passed directly from
8 an I/O device to memory.
16 Programmed I/O
32 Interrupt-driven I/O
64 DMA
Isolated I/O
A control bus with eight wires can define Chapter 6
_______ operations. The TCP/IP model has _______ layers.
8 Five
16 Six
256 Seven
512 Eight

A _______ controller is a high-speed serial The _______ layer of the TCP/IP protocol suite
interface that transfers data in packets. provides services for end users.
SCSI Data-link
USB Transport
Firewire Application
USB and firewire Physical
The _______ layer of the TCP/IP protocol suite Only SCTP
transmits a bit stream over a physical medium. TCP, UDP, and SCTP
Physical
Data-link _______ is a protocol for file transfer.
Network FTP
Transport SMTP
The _______ layer of the TCP/IP protocol suite TELNET
is responsible for node-to-node delivery of a HTTP
frame between two adjacent nodes.
Transport _______ is a protocol for e-mail services.
Network FTP
Data-link SMTP
Session TELNET
HTTP
The _______ layer of the TCP/IP protocol suite
is responsible for the source-to-destination _______ is a protocol for accessing and
delivery of the entire message. transferring documents on the WWW.
Transport FTP
Network SMTP
Data-link TELNET
Session HTTP

Chapter 7
What is the domain name in the e-mail address _______ is a program that facilitates the
[email protected]? execution of other programs.
Kayla An operating system
[email protected] Hardware
Nasa.gov A queue
Gov An application program

Which physical topology uses a hub or switch? _______ supervises the activity of each
Bus component in a computer system.
Ring An operating system
Star Hardware
Bus and ring A queue
An application program
IP addresses are currently _______ bits in
length. Multi-programming requires a _______
4 operating system.
8 Batch
32 Time-sharing
40 Parallel
Distributed
_______ protocol (s) is one of the protocols in
the transport layer. _______ is multi-programming with swapping.
Only TCP Partitioning
Only UDP Paging
Demand paging Demand segmentation
Queuing
A process in the _______ state can go to either
_______ is multi-programming without the ready, terminated or waiting states.
swapping. Hold
Partitioning Virtual
Virtual memory Running
Demand paging Hold or running
Queuing
A process in the ready state goes to the running
In _______, only one program can reside in state when _______.
memory for execution. It enters memory
Mono-programming It requests I/O
Multi-programming It gets access to the CPU
Partitioning It finishes running
Paging
A program becomes a _______ when it is
_______ is a multi-programming method in selected by the operating system and brought to
which multiple programs are entirely in the hold state.
memory with each program occupying a Job
contiguous space. Process
Partitioning Deadlock
Paging Partition
Demand paging
Demand segmentation Every process is _______.
Only a job
In paging, a program is divided into equally Only a program
sized sections called _______. Only a partition
Pages A job and a program
Frames
Segments The _______ scheduler creates a process from
Partitions a job and changes a process back to a job.
Job
In _______, the program can be divided into Process
differently-sized sections. Virtual
Partitioning Queue
Paging
Demand paging The _______ scheduler moves a process from
Demand segmentation one process state to another.
Job
In _______, the program can be divided into Process
equally sized sections called pages, but the Virtual
pages need not be in memory at the same time Queue
for execution.
Partitioning To prevent _______, an operating system can
Paging put resource restrictions on processes.
Demand paging Starvation
Synchronization
Paging
Deadlock

_______ can occur if a process has too many


resource restrictions.
Starvation
Synchronization
Paging
Deadlock

The _______ manager is responsible for


archiving and backup.
Memory
Process
Device
File

The _______ manager is responsible for access


to I/O devices.
Memory
Process
Device
File

You might also like