[試題] 98下 黃鼎偉 計算機概論 期中考

看板NTU-Exam作者 (艾克薩)時間14年前 (2010/05/25 19:39), 編輯推噓2(200)
留言2則, 2人參與, 最新討論串1/1
課程名稱︰計算機概亂 課程性質︰系定必修 課程教師︰黃鼎偉 開課學院:電資學院 開課系所︰電機系 考試日期(年月日)︰99年4月24日 考試時限(分鐘):120 min 是否需發放獎勵金:是,感謝! 試題 : Computer Science Midterm Examination for Chapter 1-4 & 5.1-5.5 (分ABC三卷防作弊,本試題為B卷) (2% for each question) Language description table (the same as appendix in the textbook) The following table shows a portion of a machine's memory containing a program written in the language described in the language table. Answer the questions below assuming that the machine is started with its program counter containing 00. address content address content 00 20 07 12 01 03 08 B2 02 21 09 0C 03 01 0A B0 04 22 0B 06 05 00 0C C0 06 52 0D 00 (B) 1. What bit pattern will be in regiser 2 when the machine halts? (A) 04 (B) 03 (C) 02 (D) 01 (B) 2. How many times will the instruction at address 06 be executed before the machine halts? (A) 4 (B) 3 (C) 2 (D) 1 (B) 3. If the machine executes an instruction every 2μs(=10^-6 s), how long does it take to complete the above program? (A) 26μs (B) 24μs (C) 22μs (D) 20μs (A) 4. The primary purpose of which the following is not the enhancement of security? (A) ICANN (B) CERT (C) Firewall (D) Encryption (C) 5. How many different symbols can be encoded using Unicode? (A) 256 (B) 4,096 (C) 65,536 (D) 1,046,476 (A) 6. The binary search algorithm is an example of an algorithm in which of the following classes? (A) lg n (B) n (C) n lg n (D) n^2 (D) 7. The insertion sort algorithm is an example of an algorithm in which of the following classes? (A) lg n (B) n (C) n lg n (D) n^2 (B) 8. Which layer of the TCP/IP hierarchy reassembles messages as their pieces arrive at the destination? (A) Application (B) Transport (C) Network (D) Link (B) 9. A section of program that should be executed by at most one process at a time is called a (A) Utility (B) Critical region (C) Privileged instruction (D) Interrupt (C)10. Which of the following lists would not be obtained at some point when applying the insetrion sort algorithm to list below? ┌───┐ │Sylvia│ (A) Nancy (B) Alice (C) Alice (D) Lois │Nancy │ Sylvia Lois Syliva Nancy │Lois │ Lois Nancy Nancy Syliva │Alice │ Alice Slyvia Lois Alice └───┘ (B)11. Which of the following values cannet be stored accurately using a floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation , and the last four bits represent the mantissa? (A) -1 1/4 (B) 5 1/4 (C) 3/16 (D) 7 (A)12. Which of the folling is a technique for controlling access to a critical region? (A) Semaphore (B) Spooling (C) Time sharing (D) Booting (B)13. The bus in a computer is an example of which form of communication? (A) Serial (B) Parallel (C) Neither A nor B (C)14. Multitasking in a computer with only one CPU is accomplished by a technique called (A) Bootstrapping (B) Batch processing (C) Time sharing (C)15. The bit pattern 1101010101101111 can be represented in hexadecimal notation as (A) 795C (B) A38D (C) D56F (D) B49F (B)16. In which of the following locations is information most readily available for manipulation by the CPU? (A) Flash drive (B) General-purpose registers (C) Main memory (D) Mass storage (D)17. Ethernet is a means of implementing which of the following network topologies? (A) Star (B) Ring (C) Tree (D) Bus (A)18. Which of the following systems is least efficient when encoding numeric values? (A) ASCII (B) Two's complement notation (C) Excess notation (D) Floating-point notation (C)19. Which of the following is not a means of implementing sever-side activities? (A) CGI (B) PHP (C) Applets (D) ASP (D)20. Using a two's complement notation system in which each value is represented by a pattern of four bits, represent the value -3. (A) 0101 (B) 1001 (C) 0011 (D) 1101 (A)21. Which of the following is not a protocol used in the basic TCP/IP software hierarchy? (A) POP3 (B) UDP (C) TCP (D) IP (D)22. If the input and output bit patterns in the circuit below are interpreted as binary representations of numeric values, what operation does the circuit perform? (except for the case of the input being 000) (圖用BBS很難表現) (A) The circuit adds one. (B) The circuit AND with 001. (C) The circuit OR with 001. (D) The circuit substrates one. (A)23. The following is a routine encoded in the machine language described in the language description table. Explain (in a single sentence) what the routine does. (Explain what the entire routine does as a unit rather than reciting what each instruction does.) (A) It places 0s in the four least significant bits of memory cell A0 without disturbing the other four bits. (B) It places 1s in the four least significant bits of memory cell A0 without disturbing the other four bits. (C) It places 0s in the four most significant bits of memory cell A0 without disturbing the other four bits. (D) It places 0s in the four most significant bits of memory cell A0 without disturbing the other four bits. (B)24. Which of the following identifies the application to which a message arriving from the Internet should be given? (A) Protocol (B) Port number (C) Domain (D) Hop count (B)25. Which of the following events is determinal to an operating system's performance? (A) Interrupt (B) Deadlock (C) Booting (D) Spooling (A)26. What value is represented by the bit pattern, 11011100 when using the floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation , and the last four bits represent the mantissa? (A) -1 1/2 (B) 3/8 (C) -3/8 (D) 1 1/2 (B)27. Which of the following is a task that is not performed by the kernel of an operating system? (A) Schedule processes (B) Communicate with the user (C) Allocate resourses (C) Avoid deadlock (D)28. The following are messages that were originally encoded with the same rule of parity. Which one has definitely error? (A) 11110000 (B) 11010001 (C) 11111111 (D) 10110101 (C)29. Suppose regesters E and F contained AA and CC, respectively, What bit pattern would be in register D after executing 9DEF (see language description table)? (A) EE (B) 88 (C) 66 (D) CC (C)30. Which of the following set of instructions defines an algorithm in the formal, strict sense? (A) X ← 3; (B) X ← 3; (C) X ← 3; while (X < 5) do while (X < 5) do while (X < 5) do (X ← X) (X ← X - 1) (X ← X + 1) 31. In the following table, connect the term to each phrase that gives the best description of the term. (40%) Term ASCII (D)A.A digital circuit capable of holding a single digit recursion (T)B.A numeric value used to identify a memory cell RISC (H)C.An informal notation for representing algorithms floating-point notation(E)D.A system developed by the American Standards Institute for encoding text register (I) E.A means of encoding numeric valus that may involve firewall (P) fractions kernel (L)F.A means of processing more than one instruction at a time address (B) G.The ability of a peripheral device to communicate DMA (G) directly with a computer's main memory pseudocode (C)H.A computer whose machine language contains reduced sets of simple instructions Op-code (J) I.A location within a CPU for temporary data storage Ethernet (S) J.The part of a machine instruction that identifies pipelining (F) the basic operation to be performed flip-flop (A)K.The program first executed when a computer is turned on router (R) L.The heart of an operating system primitive (M) M.A basic building block (for representing an bootstrap (K) algorithm) IP address (O)N.Extended storage space created by the memory manager virtual memory (N) O.Identifies a machine on the Internet packet (Q) P.A means of blocking undesired messages Q.A message segment that is transmitted over the Internet independently R.A means of connecting networks to form an internet S.A means of implementing a network with the bus topology T.The technique of applying a program segment within itself -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 140.112.239.17 ※ 編輯: acsa 來自: 140.112.239.17 (05/25 19:40)

05/26 02:37, , 1F
已收入精華區
05/26 02:37, 1F

06/23 13:13, , 2F
比我們簡單好多= =+
06/23 13:13, 2F
文章代碼(AID): #1B-xSBjA (NTU-Exam)