[試題] 98下 黃鼎偉 計算機概論 期中考
課程名稱︰計算機概亂
課程性質︰系定必修
課程教師︰黃鼎偉
開課學院:電資學院
開課系所︰電機系
考試日期(年月日)︰99年4月24日
考試時限(分鐘):120 min
是否需發放獎勵金:是,感謝!
試題 :
Computer Science Midterm Examination for Chapter 1-4 & 5.1-5.5
(分ABC三卷防作弊,本試題為B卷)
(2% for each question)
Language description table
(the same as appendix in the textbook)
The following table shows a portion of a machine's memory containing a program
written in the language described in the language table. Answer the questions
below assuming that the machine is started with its program counter containing
00.
address content address content
00 20 07 12
01 03 08 B2
02 21 09 0C
03 01 0A B0
04 22 0B 06
05 00 0C C0
06 52 0D 00
(B) 1. What bit pattern will be in regiser 2 when the machine halts?
(A) 04 (B) 03 (C) 02 (D) 01
(B) 2. How many times will the instruction at address 06 be executed before
the machine halts?
(A) 4 (B) 3 (C) 2 (D) 1
(B) 3. If the machine executes an instruction every 2μs(=10^-6 s), how long
does it take to complete the above program?
(A) 26μs (B) 24μs (C) 22μs (D) 20μs
(A) 4. The primary purpose of which the following is not the enhancement of
security?
(A) ICANN (B) CERT (C) Firewall (D) Encryption
(C) 5. How many different symbols can be encoded using Unicode?
(A) 256 (B) 4,096 (C) 65,536 (D) 1,046,476
(A) 6. The binary search algorithm is an example of an algorithm in which of
the following classes?
(A) lg n (B) n (C) n lg n (D) n^2
(D) 7. The insertion sort algorithm is an example of an algorithm in which of
the following classes?
(A) lg n (B) n (C) n lg n (D) n^2
(B) 8. Which layer of the TCP/IP hierarchy reassembles messages as their
pieces arrive at the destination?
(A) Application (B) Transport (C) Network (D) Link
(B) 9. A section of program that should be executed by at most one process at
a time is called a
(A) Utility (B) Critical region (C) Privileged instruction (D) Interrupt
(C)10. Which of the following lists would not be obtained at some point when
applying the insetrion sort algorithm to list below?
┌───┐
│Sylvia│ (A) Nancy (B) Alice (C) Alice (D) Lois
│Nancy │ Sylvia Lois Syliva Nancy
│Lois │ Lois Nancy Nancy Syliva
│Alice │ Alice Slyvia Lois Alice
└───┘
(B)11. Which of the following values cannet be stored accurately using a
floating-point format in which the most significant bit is the sign
bit, the next three bits represent the exponent field in excess notation
, and the last four bits represent the mantissa?
(A) -1 1/4 (B) 5 1/4 (C) 3/16 (D) 7
(A)12. Which of the folling is a technique for controlling access to a
critical region?
(A) Semaphore (B) Spooling (C) Time sharing (D) Booting
(B)13. The bus in a computer is an example of which form of communication?
(A) Serial (B) Parallel (C) Neither A nor B
(C)14. Multitasking in a computer with only one CPU is accomplished by a
technique called
(A) Bootstrapping (B) Batch processing (C) Time sharing
(C)15. The bit pattern 1101010101101111 can be represented in hexadecimal
notation as
(A) 795C (B) A38D (C) D56F (D) B49F
(B)16. In which of the following locations is information most readily
available for manipulation by the CPU?
(A) Flash drive (B) General-purpose registers
(C) Main memory (D) Mass storage
(D)17. Ethernet is a means of implementing which of the following network
topologies?
(A) Star (B) Ring (C) Tree (D) Bus
(A)18. Which of the following systems is least efficient when encoding numeric
values?
(A) ASCII (B) Two's complement notation
(C) Excess notation (D) Floating-point notation
(C)19. Which of the following is not a means of implementing sever-side
activities?
(A) CGI (B) PHP (C) Applets (D) ASP
(D)20. Using a two's complement notation system in which each value is
represented by a pattern of four bits, represent the value -3.
(A) 0101 (B) 1001 (C) 0011 (D) 1101
(A)21. Which of the following is not a protocol used in the basic TCP/IP
software hierarchy?
(A) POP3 (B) UDP (C) TCP (D) IP
(D)22. If the input and output bit patterns in the circuit below are
interpreted as binary representations of numeric values, what operation
does the circuit perform? (except for the case of the input being 000)
(圖用BBS很難表現)
(A) The circuit adds one.
(B) The circuit AND with 001.
(C) The circuit OR with 001.
(D) The circuit substrates one.
(A)23. The following is a routine encoded in the machine language described in
the language description table. Explain (in a single sentence) what the
routine does. (Explain what the entire routine does as a unit rather
than reciting what each instruction does.)
(A) It places 0s in the four least significant bits of memory cell A0
without disturbing the other four bits.
(B) It places 1s in the four least significant bits of memory cell A0
without disturbing the other four bits.
(C) It places 0s in the four most significant bits of memory cell A0
without disturbing the other four bits.
(D) It places 0s in the four most significant bits of memory cell A0
without disturbing the other four bits.
(B)24. Which of the following identifies the application to which a message
arriving from the Internet should be given?
(A) Protocol (B) Port number (C) Domain (D) Hop count
(B)25. Which of the following events is determinal to an operating system's
performance?
(A) Interrupt (B) Deadlock (C) Booting (D) Spooling
(A)26. What value is represented by the bit pattern, 11011100 when using the
floating-point format in which the most significant bit is the sign
bit, the next three bits represent the exponent field in excess notation
, and the last four bits represent the mantissa?
(A) -1 1/2 (B) 3/8 (C) -3/8 (D) 1 1/2
(B)27. Which of the following is a task that is not performed by the kernel of
an operating system?
(A) Schedule processes (B) Communicate with the user
(C) Allocate resourses (C) Avoid deadlock
(D)28. The following are messages that were originally encoded with the same
rule of parity. Which one has definitely error?
(A) 11110000 (B) 11010001 (C) 11111111 (D) 10110101
(C)29. Suppose regesters E and F contained AA and CC, respectively, What bit
pattern would be in register D after executing 9DEF (see language
description table)?
(A) EE (B) 88 (C) 66 (D) CC
(C)30. Which of the following set of instructions defines an algorithm in the
formal, strict sense?
(A) X ← 3; (B) X ← 3; (C) X ← 3;
while (X < 5) do while (X < 5) do while (X < 5) do
(X ← X) (X ← X - 1) (X ← X + 1)
31. In the following table, connect the term to each phrase that gives the best
description of the term. (40%)
Term
ASCII (D)A.A digital circuit capable of holding a single digit
recursion (T)B.A numeric value used to identify a memory cell
RISC (H)C.An informal notation for representing algorithms
floating-point notation(E)D.A system developed by the American Standards
Institute for encoding text
register (I)
E.A means of encoding numeric valus that may involve
firewall (P) fractions
kernel (L)F.A means of processing more than one instruction at
a time
address (B)
G.The ability of a peripheral device to communicate
DMA (G) directly with a computer's main memory
pseudocode (C)H.A computer whose machine language contains reduced
sets of simple instructions
Op-code (J)
I.A location within a CPU for temporary data storage
Ethernet (S)
J.The part of a machine instruction that identifies
pipelining (F) the basic operation to be performed
flip-flop (A)K.The program first executed when a computer is
turned on
router (R)
L.The heart of an operating system
primitive (M)
M.A basic building block (for representing an
bootstrap (K) algorithm)
IP address (O)N.Extended storage space created by the memory
manager
virtual memory (N)
O.Identifies a machine on the Internet
packet (Q)
P.A means of blocking undesired messages
Q.A message segment that is transmitted over the
Internet independently
R.A means of connecting networks to form an internet
S.A means of implementing a network with the bus
topology
T.The technique of applying a program segment within
itself
--
※ 發信站: 批踢踢實業坊(ptt.cc)
◆ From: 140.112.239.17
※ 編輯: acsa 來自: 140.112.239.17 (05/25 19:40)
推
05/26 02:37, , 1F
05/26 02:37, 1F
推
06/23 13:13, , 2F
06/23 13:13, 2F