1/294
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The ___ model is the basis for today's computers.
a. Leibnitz
b. von Neumann
c. Pascal
d. Charles Babbage
von Neumann
In a computer, the ___ subsystem stores data and programs.
a. ALU
b. input/output
c. memory
d. control unit
memory
In a computer, the ___ subsystem performs calculations and logical operations.
a. ALU
b. input/output
c. memory
d. control unit
ALU
In a computer, the ___ subsystem accepts data and programs and sends processing results to output devices.
a. ALU
b. input/output
c. memory
d. control unit
input/output
In a computer, the ___ subsystem serves as a manager of the other subsystems.
a. ALU
b. input/output
c. memory
d. control unit
control unit
According to the von Neumann model, ___ are stored in memory.
a. only data
b. only programs
c. data and programs
d. neither data nor programs
data and programs
A step-by-step solution to a problem is called ___.
a. hardware
b. an operating system
c. a computer language
d. an algorithm
an algorithm
FORTRAN and COBOL are examples of ___.
a. hardware
b. operating systems
c. computer languages
d. algorithms
computer languages
A 17th-century computing machine that could perform addition and subtraction was the ___.
a. Pascaline
b. Jacquard loom
c. Analytical Engine
d. Babbage machine
Pascaline
___ is a set of instructions in a computer language that tells the computer what to do with data.
a. An operating system
b. An algorithm
c. A data processor
d. A program
A program
___ is the design and writing of a program in structured form.
a. Software engineering
b. Hardware engineering
c. Algorithm development
d. Instructional architecture
Software engineering
The first electronic special-purpose computer was called ___.
a. Pascal
b. Pascaline
c. ABC
d. ENIAC
ENIAC
One of the first computers based on the von Neumann model was called ___.
a. Pascal
b. Pascaline
c. ABC
d. EDVAC
EDVAC
The first computing machine to use the idea of storage and programming was called ___.
a. the Madeline
b. EDVAC
c. the Babbage machine
d. the Jacquard loom
the Jacquard loom
___ separated the programming task from computer operation tasks.
a. Algorithms
b. Data processors
c. High-level programming languages
d. Operating systems
High-level programming languages
The base of the decimal number system is ___.
a. 2
b. 8
c. 10
d. 16
10
2. The base of the binary number system is ___.
a. 2
b. 8
c. 10
d. 16
2
The base of the octal number system is ___.
a. 2
b. 8
c. 10
d. 16
8
The base of the hexadecimal number system is ___.
a. 2
b. 8
c. 10
d. 16
16
When converting a decimal integer to base b, we repeatedly ___ b.
a. divide
b. multiply
c. add to
d. subtract from
divide
When converting a binary fraction to decimal, we repeatedly ____.
a. divide
b. multiply
c. add to
d. subtract from
multiply
Which of the following representations is erroneous?
a. (10111)2
b. (349)8
c. (3AB)16
d. 256
(349)8
Which of the following representations is erroneous?
a. (10211)2
b. (342)8
c. (EEE)16
d. 145
(10211)2
Which of the following representations is erroneous?
a. (111)2
b. (346)8
c. (EEG)16
d. 221
(EEG)16
Which of the following representations is erroneous?
a. (110)2
b. (141)8
c. (EF)16
d. 22A
22A
Which of the following is equivalent to 12 in decimal?
a. (1110)2
b. (C)16
c. (15)8
d. None of the others
(C)16
Which of the following is equivalent to 24 in decimal?
a. (11000)2
b. (1A)16
c. (31)8
d. None of the others
(11000)2
Convert the binary number 1001 to decimal. The answer is:
a. 7
b. 9
c. 11
d. 15
9
Convert the binary number 101010 to hexadecimal:
a. 1A
b. 1B
c. 2A
d. 2B
2A
Convert the hexadecimal number 1B to decimal:
a. 21
b. 23
c. 27
d. 29
27
A byte consists of ___ bits.
a. 2
b. 4
c. 8
d. 16
8
In a set of 64 symbols, each symbol requires a bit pattern length of ___ bits.
a. 4
b. 5
c. 6
d. 7
6
How many symbols can be represented by a bit pattern with ten bits?
a. 128
b. 256
c. 512
d. 1024
1024
If the ASCII code for E is 1000101, then the ASCII code for e is ___. Answer the question without consulting the ASCII table.
a. 1000110
b. 1000111
c. 0000110
d. 1100101
1100101
A 32-bit code called ___ represents symbols in all languages.
a. ANSI
b. Unicode
c. EBCDIC
d. Extended ASCII
Unicode
An image can be represented in a computer using the ___ method.
a. bitmap graphic
b. vector graphic
c. only
d. either bitmap or vector graphic
either bitmap or vector graphic
In the ___ graphic method of representing an image in a computer, each pixel is assigned a bit patterns.
a. bitmap
b. vector
c. quantized
d. binary
bitmap
In the ___ graphic method of representing an image in a computer, the image is decomposed into a combination of geometrical figures.
a. bitmap
b. vector
c. quantized
d. binary
vector
In the ___ graphic method of representing an image in a computer, re-scaling of the image creates a ragged or grainy image.
a. bitmap
b. vector
c. quantized
d. binary
vector
When we want to store music in a computer, the audio signal must be ___.
a. sampled only
b. quantized only
c. coded only
d. sampled, quantized, and coded
sampled, quantized, and coded
A floating-point value after normalization is (1.0101) * 2^-4.What is the value of exponent section in the Excess-127 representation?
a. 4
b. -4
c. 127
d. 123
123
Assume a new Excess system uses 17 bits to represent the exponent section. What is he bias value in this system?
a. 17
b. 16
c. 65535
d. 65536
65535
Which number representation method is often used to store the exponential value of a fractional part?
a. unsigned integers
b. two's complement
c. Excess
d. ten's complement
Excess
In an Excess conversion, we ___ the number to be converted.
a. add the bias number to
b. the bias number from
c. multiply the bias number by
d. divide
add the bias number to
When a fractional part is normalized, the computer stores the ___.
a. only the sign
b. only the exponent
c. only the mantissa
d. the sign, exponent, and mantissa
the sign, exponent, and mantissa
The precision of the fractional part of a number stored in a computer is defined by the ___.
a. sign
b. exponent
c. mantissa
d. last digit
mantissa
The combination of sign and mantissa of a real number in IEEE standard float-ing point format is stored as an integer in the ___ representation.
a. unsigned
b. sign-and-magnitude
c. two's complement
d. one's complement
sign and magnitude
___ is an arithmetic operation.
a. The exclusive OR
b. The unary NOT
c. Subtraction
d. The binary AND
Subtraction
___ is a logical bit operator.
a. The exclusive OR
b. The unary NOT
c. The binary AND
d. exclusive OR, unary NOT, or binary AND
exclusive OR, unary NOT, or binary AND
The ___ method of integer representation is the most common method for storing integers in computer memory.
a. sign-and-magnitude
b. one's complement
c. two's complement
d. unsigned integers
two's complement
In two's complement addition, if there is a final carry after the left most column addition, ___.
a. add it to the right most column
b. add it to the left most column
c. discard it
d. increase the bit length
discard it
For an 8-bit allocation, the smallest decimal number that can be represented in two's complement form is ___.
a. -8
b. -127
c. -128
d. -256
-128
For an 8-bit allocation, the largest decimal number that can be represented in two's complement form is ___.
a. 8
b. 127
c. 128
d. 256
127
In two's complement representation with a 4-bit allocation, we get ___ when we add 1 to 7.
a. 8
b. 1
c. -7
d. -8
-8
8. In two's complement representation with a 4-bit allocation, we get ___ when we add 5 to 5.
a. -5
b. -6
c. -7
d. 10
-6
If the exponent in Excess - 127 is binary 10000101, the exponent in decimal is ___.
a. 6
b. 7
c. 8
d. 9
6
If we are adding two numbers, one of which has an exponent value of 7 and the other an exponent value of 9, we need to shift the decimal point of the smaller number ___.
a. one place to the left
b. one place to the right
c. two places to the left
d. two places to the right
two places to the right
___ operator (s) takes two inputs to produce one output.
a. Only AND
b. Only OR
c. Only XOR
d. AND, OR, or XOR
AND, OR, or XOR
The unary ___ operator inverts its single input.
a. AND
b. OR
c. NOT
d. XOR
NOT
___ operator (s), if the input is two 0s, the output is 0.
a. In only AND
b. In only OR
c. In only XOR
d. In AND, OR, or XOR
In AND, OR, or XOR
___ operator (s), if the input is two 1s, the output is 0.
a. In only AND
b. In only OR
c. In only XOR
d. In AND, OR, or XOR
In only XOR
For the binary AND operation, only an input of ___ gives an output of 1.
a. two 0s
b. two 1s
c. one 0 and one 1
d. two 2s
two 1s
For the binary OR operation, only an input of ___ gives an output of 0.
a. two 0s
b. two 1s
c. one 0 and one 1
d. two 2s
two 0s
We use a bit pattern called a ___ to modify another bit pattern.
a. mask
b. carry
c. float
d. byte
mask
To flip all the bits of a bit pattern, make a mask of all 1s and then ___ the bit pattern and the mask.
a. AND
b. OR
c. XOR
d. NOT
XOR
To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then ___ the bit pattern and the mask.
a. AND
b. OR
c. XOR
d. NOT
AND
To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then ___ the bit pattern and the mask.
a. AND
b. OR
c. XOR
d. NOT
OR
The ___ is a computer subsystem that performs operations on data.
a. CPU
b. memory
c. I/O hardware
d. bus subsystem
CPU
___ is a stand-alone storage location that holds data temporarily.
a. An ALU
b. A register
c. A control unit
d. A tape drive
A register
___ is a unit that can add two inputs.
a. An ALU
b. A register
c. A control unit
d. A tape drive
An ALU
A register in a CPU can hold ___.
a. only data
b. only instructions
c. only program counter values
d. data, instruction, or program counter values
data, instruction, or program counter values
A control unit with five wires can define up to ___ operations.
a. 5
b. 10
c. 16
d. 32
32
A word can be ___ bits.
a. only 8
b. only 16
c. only 32
d. 8, or 16, or 32
8, or 16, or 32
If the memory address space is 16 MB and the word size is 8 bits, then _______ bits are needed to access each word.
a. 8
b. 16
c. 24
d. 32
24
The data in ___ is erased if the computer is powered down.
a. RAM
b. ROM
c. a tape drive
d. a CD-ROM
RAM
___ is a memory type with capacitors that need to be refreshed periodically.
a. SRAM
b. DRAM
c. ROM
d. CROM
DRAM
___ is a memory type with traditional flip-flop gates to hold data.
a. SRAM
b. DRAM
c. ROM
d. CROM
SRAM
There are ___ bytes in 16 Terabytes.
a. 2^16
b. 2^40
c. 2^44
d. 2^56
2^44
___ can be programmed and erased using electronic impulses but can remain in a computer during erasure.
a. ROM
b. PROM
c. EPROM
d. EEPROM
EEPROM
___ is a type of memory in which the user, not the manufacturer, stores programs that cannot be overwritten.
a. ROM
b. PROM
c. EPROM
d. EEPROM
PROM
Main memory in a computer usually consists of large amounts of ___ speed memory.
a. high
b. medium
c. low
d. very high speed
low
A ___ is a storage device to which the user can write information only once.
a. CD-ROM
b. CD-R
c. CD-RW
d. CD-RR
CD-R
A ___ is a storage device that can undergo multiple writes and erasures.
a. CD-ROM
b. CD-R
c. CD-RW
d. CD-RR
CD-RW
The smallest storage area on a magnetic disk that can be accessed at one time is a ___.
a. track
b. sector
c. frame
d. head
sector
If the memory has 232 words, the address bus needs to have ___ wires.
a. 8
b. 16
c. 32
d. 64
32
A control bus with eight wires can define ___ operations.
a. 8
b. 16
c. 256
d. 512
256
A ___ controller is a high-speed serial interface that transfers data in packets.
a. SCSI
b. USBUSB and FireWire
c. FireWire
d. USB and FireWire
USB and FireWire
The three steps in the running of a program on a computer areperformed in the specific order ___.
a. fetch, execute, and decode
b. decode, execute, and fetch
c. fetch, decode, and execute
d. decode, fetch, and execute
fetch, decode, and execute
In the ___ method for synchronizing the operation of the CPU with an I/O device, the I/O device informs the CPU when it is ready for data transfer.
a. programmed I/O
b. interrupt-driven I/O
c. DMA
d. isolated I/O
programmed I/O
In the ___ method for synchronizing the operation of the CPU with an I/O device, the CPU is idle until the I/O operation is finished.
a. programmed I/O
b. interrupt-driven I/O
c. DMA
d. isolated I/O
programmed I/O
In the ___ method for synchronizing the operation of the CPU with an I/O device, a large block of data can be passed from an I/O device to memory directly.
a. programmed I/O
b. interrupt-driven I/O
c. DMA
d. isolated I/O
DMA
The TCP/IP model has ___ layers.
a. five
b. six
c. seven
d. eight
five
The ___ layer of the TCP/IP protocol suite provides services for end users.
a. data-link
b. transport
c. application
d. physical
application
The ___ layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.
a. physical
b. data-link
c. network
d. transport
physical
The ___ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.
a. transport
b. network
c. data-link
d. session
data-link
5. The ___ layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of the entire message.
a. transport
b. network
c. data-link
d. session
network
What is the domain name in the e mail address kayla@nasa.gov?
a. kayla
b. kayla@nasa.gov
c. nasa.gov
d. gov
nasa.gov
Which physical topology uses a hub or switch?
a. bus
b. ring
c. star
d. bus and ring
star
IP addresses are currently _______ bits in length.
a. 4
b. 8
c. 32
d. 40
32
____ protocol (s) is one of the protocols in the transport layer.
a. Only TCP
b. Only UDP
c. Only SCTP
d. TCP, UDP, and SCTP
TCP, UDP, and SCTP