CSI104 FE

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/301

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

302 Terms

1
New cards

The ________ model is the basis for today's computers.

von Neumann

2
New cards

In a computer, the ________ subsystem stores data and programs.

memory

3
New cards

In a computer, the ________ subsystem performs calculations and
logical operations.

ALU

4
New cards

1-4 In a computer, the ________ subsystem accepts data and programs and
sends processing results to output devices.

input/output

5
New cards

1-5 In a computer, the ________ subsystem serves as a manager of the
other subsystems.

control unit

6
New cards

1-6 According to the von Neumann model, ________ are stored in memory.

data and programs

7
New cards

1-7 A step-by-step solution to a problem is called ________

an algorithm

8
New cards

1-8 FORTRAN and COBOL are examples of ________ .

computer languages

9
New cards

1-9 A 17th-century computing machine that could perform addition and
subtraction was the ________

Pascaline

10
New cards

1-10 ________ is a set of instructions in a computer language that tells the
computer what to do with data.

A program

11
New cards

1-11 ________ is the design and writing of a program in structured form.

Software engineering

12
New cards

1-12 The first electronic special-purpose computer was called ________

ABC

13
New cards

1-13 One of the first computers based on the von Neumann model was called ________ .

EDVAC

14
New cards

1-14 The first computing machine to use the idea of storage and
programming was called ________ .

the Jacquard loom

15
New cards

1-15 ________ separated the programming task from computer operation tasks.

High-level programming languages

16
New cards

2-1 The base of the decimal number system is ________

10

17
New cards

2-2 The base of the binary number system is ________ .

2

18
New cards

2-3 The base of the octal number system is ________ .

8

19
New cards

2-4 The base of the hexadecimal number system is ________ .

16

20
New cards

2-5 When converting a decimal integer to base b, we repeatedly ________

. divide by

21
New cards

2-6 When converting a decimal fraction to base b, we repeatedly ________

multiply by

22
New cards

3-2 In a set of 64 symbols, each symbol requires a bit pattern length of
________ bits.

6

23
New cards

3-3 How many symbols can be represented by a bit pattern with ten bits?

1024

24
New cards

3-4 If the ASCII code for E is 1000101, then the ASCII code for e is
________ . Answer the question without consulting the ASCII table.

1100101

25
New cards

3-5 A 32-bit code called ________ represents symbols in all languages.

Unicode

26
New cards

3-6 An image can be represented in a computer using the ________ method.

either bitmap or vector graphic

27
New cards

3-7 In the ________ graphic method of representing an image in a computer,
each pixel is assigned a bit patterns.

bitmap

28
New cards

3-8 In the ________ graphic method of representing an image in a computer,
the image is decomposed into a combination of geometrical figures.

vector

29
New cards

3-9 In the ________ graphic method of representing an image in a computer,
re-scaling of the image creates a ragged or grainy image.

bitmap

30
New cards

3-10 When we want to store music in a computer, the audio signal must be
________ .

sampled, quantized, and coded

31
New cards

3-11 A floating-point value after normalization is (1.0101) ? 2?4. What is the
value of exponent section in the Excess-127 representation?

123

32
New cards

3-12 Assume a new Excess system uses 17 bits to represent the exponent
section. What is the bias value in this system?

65535

33
New cards

3-13 Which number representation method is often used to store the
exponential value of a fractional part?

Excess

34
New cards

3-14 In an Excess conversion, we ________ the number to be converted.

add the bias number to

35
New cards

3-15 When a fractional part is normalized, the computer stores the ________

the sign, exponent, and mantissa

36
New cards

3-17 The combination of sign and mantissa of a real number in IEEE
standard floating point format is stored as an integer in the ________
representation.

sign-and-magnitude

37
New cards

4-1 ________ is an arithmetic operation.

Subtraction

38
New cards

4-2 ________ is a logical bit operator.

exclusive OR, unary NOT, or binary AND

39
New cards

4-3 The ________ method of integer representation is the most common
method for storing integers in computer memory.

two's complement

40
New cards

4-4 In two's complement addition, if there is a final carry after the left most
column addition, ________ .

discard it

41
New cards

4-5 For an 8-bit allocation, the smallest decimal number that can be
represented in two's complement form is ________

-128

42
New cards

4-6 For an 8-bit allocation, the largest decimal number that can be
represented in two's complement form is ________

127

43
New cards

4-7 In two's complement representation with a 4-bit allocation, we get
________ when we add 1 to 7.

-8

44
New cards

4-8 In two's complement representation with a 4-bit allocation, we get
________ when we add 5 to 5.

-6

45
New cards

4-9 If the exponent in Excess_127 is binary 10000101, the exponent in
decimal is ________ .

6

46
New cards

4-10 If we are adding two numbers, one of which has an exponent value of 7
and the other an exponent value of 9, we need to shift the decimal point of the
smaller number ________ .

two places to the left

47
New cards

4-11 ________ operator (s) takes two inputs to produce one output.

AND, OR, or XOR

48
New cards

4-12 The unary ________ operator inverts its single input.

NOT

49
New cards

4-13 ________ operator (s), if the input is two 0s, the output is 0.

In AND, OR, or XOR

50
New cards

4-14 ________ operator (s), if the input is two 1s, the output is 0.

In only XOR

51
New cards

4-15 For the binary AND operation, only an input of ________ gives an
output of 1.

two 1s

52
New cards

4-16 For the binary OR operation, only an input of ________ gives an output of 0.

two 0s

53
New cards

4-17 We use a bit pattern called a ________ to modify another bit pattern.

mask

54
New cards

4-18 To flip all the bits of a bit pattern, make a mask of all 1s and then
________ the bit pattern and the mask.

XOR

55
New cards

4-19 To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s
and then ________ the bit pattern and the mask.

AND

56
New cards

4-20 To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then ________ the bit pattern and the mask.

OR

57
New cards

5-1 The ________ is a computer subsystem that performs operations on
data.

CPU

58
New cards

5-2 ________ is a stand-alone storage location that holds data temporarily.

A register

59
New cards

5-3 ________ is a unit that can add two inputs.

An ALU

60
New cards

5-4 A register in a CPU can hold ________ .

data, instruction, or program counter values

61
New cards

5-5 A control unit with five wires can define up to ________ operations.

32

62
New cards

5-6 A word can be ________ bits.

8, or 16, or 32

63
New cards

5-7 If the memory address space is 16 MB and the word size is 8 bits, then________ bits are needed to access each word.

24

64
New cards

5-8 The data in ________ is erased if the computer is powered down.

RAM

65
New cards

5-9 ________ is a memory type with capacitors that need to be refreshed periodically.

DRAM

66
New cards

5-10 ________ is a memory type with traditional flip-flop gates to hold data.

SRAM

67
New cards

5-11 There are ________ bytes in 16 Terabytes.

2^16

68
New cards

5-12 ________ can be programmed and erased using electronic impulses but can remain in a computer during erasure.

EEPROM

69
New cards

5-13 ________ is a type of memory in which the user, not the manufacturer,
stores programs that cannot be overwritten.

PROM

70
New cards

5-14 Main memory in a computer usually consists of large amounts of________ speed memory.

low

71
New cards

5-15 A ________ is a storage device to which the user can write information only once.

CD-R

72
New cards

5-16 A ________ is a storage device that can undergo multiple writes and erasures.

CD-RW

73
New cards

5-17 The smallest storage area on a magnetic disk that can be accessed at one time is a ________ .

sector

74
New cards

5-18 If the memory has 232 words, the address bus needs to have ________wires.

32

75
New cards

5-19 A control bus with eight wires can define ________ operations.

256

76
New cards

5-20 A ________ controller is a high-speed serial interface that transfers data in packets.

USB and FireWire

77
New cards

5-21 The three steps in the running of a program on a computer are
performed in the specific order ________ .

fetch, decode, and execute

78
New cards

5-23 In the ________ method for synchronizing the operation of the CPU with an I/O device, the CPU is idle until the I/O operation is finished.

programmed I/O

79
New cards

5-24 In the ________ method for synchronizing the operation of the CPU with an I/O device, a large block of data can be passed from an I/O device to memory directly.

DMA

80
New cards

6-1 The TCP/IP model has ________ layers.

five

81
New cards

6-2 The ________ layer of the TCP/IP protocol suite provides services for end users.

application

82
New cards

6-3. The ________ layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.

physical

83
New cards

6-4 The ________ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.

data-link

84
New cards

6-5 The ________ layer of the TCP/IP protocol suite is responsible for
source-to-destination delivery of the entire message.

network

85
New cards

6-6 What is the domain name in the email address kayla@nasa.gov?

nasa.gov

86
New cards

6-7 Which physical topology uses a hub or switch?

star

87
New cards

6-8 IP addresses are currently ________ bits in length.

32

88
New cards

6-9 ________ protocol (s) is one of the protocols in the transport layer.

TCP, UDP, and SCTP

89
New cards

6-10 ________ is a protocol for file transfer.

FTP

90
New cards

6-11 ________ is a protocol for email services.

SMTP

91
New cards

6-12 ________ is a protocol for accessing and transferring documents on the WWW.

HTTP

92
New cards

7-1 ________ is a program that facilitates the execution of other programs.

An operating system

93
New cards

7-2 ________ supervises the activity of each component in a computer
system.

An operating system

94
New cards

7-3 Multi-programming requires a ________ operating-system.

time-sharing

95
New cards

7-4 ________ is multi-programming with swapping.

Demand paging

96
New cards

7-5 ________ is multi-programming without swapping.

Partitioning

97
New cards

7-6 In ________ , only one program can reside in memory for execution.

mono-programming

98
New cards

7-7 ________ is a multi-programming method in which multiple programs are entirely in memory with each program occupying a contiguous space.

Partitioning

99
New cards

7-8 In paging, a program is divided into equally sized sections called________ .

pages

100
New cards

7-9 In ________ , the program can be divided into differently sized sections.

demand segmentation