0% found this document useful (0 votes)
25 views16 pages

FE CSI104 - ZXCVBNM

The document discusses the von Neumann model of computer architecture and its components including memory, ALU, control unit, and input/output. It also discusses data representation methods, number systems, logical and arithmetic operations, CPU and memory organization, and networking protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views16 pages

FE CSI104 - ZXCVBNM

The document discusses the von Neumann model of computer architecture and its components including memory, ALU, control unit, and input/output. It also discusses data representation methods, number systems, logical and arithmetic operations, CPU and memory organization, and networking protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

13:32 24/03/2024 FE CSI104 - zxcvbnm

1-1The von Neumann model is the basis for today's computers.


1-2 In a computer, the memory subsystem stores data and programs.
1-3 In a computer, the ALU subsystem performs calculations and logical operations.
1-4 In a computer, the input/output subsystem accepts data and programs and sends
processing results to output devices.
1-5 In a computer, the control unit subsystem serves as a manager of the other subsystems.
1-6 According to the von Neumann model, data and programs are stored in memory.
1-7 A step-by-step solution to a problem is called an algorithm
1-8 FORTRAN and COBOL are examples of computer languages .
1-9 A 17th-century computing machine that could perform addition and subtraction was the
Pascaline
1-10 A program is a set of instructions in a computer language that tells the computer what to
do with data.
1-11 Software engineering is the design and writing of a program in structured form.
1-12 The first electronic special-purpose computer was called ABC
1-13 One of the first computers based on the von Neumann model was called EDVAC
1-14 The first computing machine to use the idea of storage and programming was called
the Jacquard loom
1-15 High-level programming languages separated the programming task from computer
operation tasks.
2-1 The base of the decimal number system is 10
2-2 The base of the binary number system is 2
2-3 The base of the octal number system is 8
2-4 The base of the hexadecimal number system is 16
2-5 When converting a decimal integer to base b, we repeatedly divide by
2-6 When converting a decimal fraction to base b, we repeatedly multiply by
3-2 In a set of 64 symbols, each symbol requires a bit pattern length of 6 bits
3-3 How many symbols can be represented by a bit pattern with ten bits? 1024
3-4 If the ASCII code for E is 1000101, then the ASCII code for e is 1100101 . Answer the
question without consulting the ASCII table.
3-5 A 32-bit code called Unicode represents symbols in all languages.

about:blank 1/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

3-6 An image can be represented in a computer using the either bitmap or vector graphic
method.
3-7 In the bitmap graphic method of representing an image in a computer,
each pixel is assigned a bit patterns.
3-8 In the vector graphic method of representing an image in a computer,
the image is decomposed into a combination of geometrical figures.
3-9 In the bitmap graphic method of representing an image in a computer,
re-scaling of the image creates a ragged or grainy image.
3-10 When we want to store music in a computer, the audio signal must be
sampled, quantized, and coded
3-11 A floating-point value after normalization is (1.0101) ? 2?4. What is the
value of exponent section in the Excess-127 representation? 123
3-12 Assume a new Excess system uses 17 bits to represent the exponent
section. What is the bias value in this system? 65535
3-13 Which number representation method is often used to store the exponential value of a
fractional part? Excess
3-14 In an Excess conversion, we add the bias number to the number to be converted.
3-15 When a fractional part is normalized, the computer stores the the sign, exponent, and
mantissa
3-17 The combination of sign and mantissa of a real number in IEEE
standard floating point format is stored as an integer in the sign-and-magnitude
representation.
4-1 Subtraction is an arithmetic operation.
4-2 exclusive OR, unary NOT, or binary AND is a logical bit operator.
4-3 The two's complement method of integer representation is the most common method for
storing integers in computer memory.
4-4 In two's complement addition, if there is a final carry after the left most
column addition, discard it
4-5 For an 8-bit allocation, the smallest decimal number that can be
represented in two's complement form is -128
4-6 For an 8-bit allocation, the largest decimal number that can be
represented in two's complement form is 127

about:blank 2/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

4-7 In two's complement representation with a 4-bit allocation, we get


-8 when we add 1 to 7.
4-8 In two's complement representation with a 4-bit allocation, we get
-6 when we add 5 to 5.
4-9 If the exponent in Excess_127 is binary 10000101, the exponent in
decimal is 6
4-10 If we are adding two numbers, one of which has an exponent value of 7
and the other an exponent value of 9, we need to shift the decimal point of the
smaller number two places to the left
4-11 AND, OR, or XOR operator (s) takes two inputs to produce one output
4-12 The unary NOT operator inverts its single input.
4-13 In AND, OR, or XOR operator (s), if the input is two 0s, the output is 0.
4-14 In only XOR operator (s), if the input is two 1s, the output is 0.
4-15 For the binary AND operation, only an input of two 1s gives an
output of 1.
4-16 For the binary OR operation, only an input of two 0s gives an output of 0.
4-17 We use a bit pattern called a mask to modify another bit pattern.
4-18 To flip all the bits of a bit pattern, make a mask of all 1s and then XOR the bit pattern
and the mask.
4-19 To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s
and then AND the bit pattern and the mask.
4-20 To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then OR the bit
pattern and the mask.
5-1 The CPU is a computer subsystem that performs operations on data.
5-2 A register is a stand-alone storage location that holds data temporarily.
5-3 An ALU is a unit that can add two inputs.
5-4 A register in a CPU can hold data, instruction, or program counter values
5-5 A control unit with five wires can define up to 32 operations.
5-6 A word can be 8 or 16 or 32 bits.
5-7 If the memory address space is 16 MB and the word size is 8 bits, then 24 bits are needed
to access each word.

about:blank 3/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

5-8 The data in RAM is erased if the computer is powered down.


5-9 DRAM is a memory type with capacitors that need to be refreshed periodically.
5-10 SRAM is a memory type with traditional flip-flop gates to hold data.
5-11 There are 2^16 bytes in 16 Terabytes.
5-12 EEPROM can be programmed and erased using electronic impulses but can remain in a
computer during erasure.
5-13 PROM is a type of memory in which the user, not the manufacturer, stores programs
that cannot be overwritten.
5-14 Main memory in a computer usually consists of large amounts of low speed memory.
5-15 A CD-R is a storage device to which the user can write information only once.
5-16 A CD-RW is a storage device that can undergo multiple writes and erasures.
5-17 The smallest storage area on a magnetic disk that can be accessed at one time is a sector
5-18 If the memory has 232 words, the address bus needs to have 32 wires.
5-19 A control bus with eight wires can define 256 operations.
5-20 A USB and FireWire controller is a high-speed serial interface that transfers data in
packets.
5-21 The three steps in the running of a program on a computer are performed in the specific
order fetch, decode, and execute
5-23 In the programmed I/O method for synchronizing the operation of the CPU with an I/O
device, the CPU is idle until the I/O operation is finished.
5-24 In the DMA method for synchronizing the operation of the CPU with an I/O device, a
large block of data can be passed from an I/O device to memory directly.
6-1 The TCP/IP model has five layers.
6-2 The application layer of the TCP/IP protocol suite provides services for end users.
6-3. The physical layer of the TCP/IP protocol suite transmits a bit stream over a physical
medium.
6-4 The data-link layer of the TCP/IP protocol suite is responsible for node-to-node delivery
of a frame between two adjacent nodes.
6-5 The network layer of the TCP/IP protocol suite is responsible for source-to-destination
delivery of the entire message.
6-6 What is the domain name in the email address kayla@nasa.gov? nasa.gov
6-7 Which physical topology uses a hub or switch? star
6-8 IP addresses are currently 32 bits in length.
6-9 TCP, UDP, and SCTP protocol (s) is one of the protocols in the transport layer.

about:blank 4/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

6-10 FTP is a protocol for file transfer.


6-11 SMTP is a protocol for email services.
6-12 HTTP is a protocol for accessing and transferring documents on the WWW.
7-1 An operating system is a program that facilitates the execution of other programs.
7-2 An operating system supervises the activity of each component in a computer system.
7-3 Multi-programming requires a time-sharing operating-system.
7-4 Demand paging is multi-programming with swapping.
7-5 Partitioning is multi-programming without swapping. Partitioning
7-6 In mono-programming , only one program can reside in memory for execution.
7-7 Partitioning is a multi-programming method in which multiple programs are entirely in
memory with each program occupying a contiguous space.
7-8 In paging, a program is divided into equally sized sections called pages .
7-9 In demand segmentation , the program can be divided into differently sized sections.
7-10 In demand paging , the program can be divided into equally sized sections called pages,
but the pages need not be in memory at the same time for execution.
7-11 A process in the running state can go to either the ready, terminated,or waiting states.
7-12 A process in the ready state goes to the running state when it gets access to the CPU
7-13 A program becomes a job when it is selected by the operating system and brought to the
hold state.
7-14 Every process is a job and a program
7-15 The job scheduler creates a process from a job and changes a process back to a job.
7-16 The process scheduler moves a process from one process state to another.
7-17 To prevent deadlock , an operating system can put resource restrictions on processes.
7-18 Starvation can occur if a process has too many resource restrictions.
7-19 The file manager is responsible for archiving and backup.
7-20 The device manager is responsible for access to I/O devices.
8-1 An algorithm is a step-by-step method for solving a problem or doing a task.
8-2 There are three basic constructs in computer -science.
8-3 The decision construct tests a condition.
8-4 The sequence construct uses a set of actions one after another.
8-5 The repetition construct handles repeated actions.

about:blank 5/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

8-6 A UML diagram is a pictorial representation of an algorithm.


8-7 Pseudocode is an English-language-like representation of code.
8-8 Summation is a basic algorithm that adds a list of numbers.
8-9 Product is a basic algorithm that multiplies a list of numbers. Product
8-10 Sorting is a basic algorithm that arranges data according to its value.
8-11 The items are divided into two lists (sorted and unsorted) in selection, bubble, or
insertion sort.
8-12 In insertion sort, the item that goes into the sorted list is always the first item in the
unsorted list.
8-13 In selection sort, the smallest item from the unsorted list is swapped with the item at the
beginning of the unsorted list.
8-14 In bubble sort, the smallest item moves to the beginning of the
unsorted list. There is no one-to-one swapping.
8-15 Searching is a basic algorithm in which we want to find the location of a target in a list
of items.
8-16 We use a sequential search for an unordered list.
8-17 We use a binary search for an ordered list.
8-18 Recursion is a process in which an algorithm calls itself.
9-1 The only language understood by computer hardware is a machine language.
9-2 C, C++, and Java can be classified as high-level languages.
9-3 FORTRAN is a(n) procedural language. procedural
9-4 Pascal is a(n) procedural language.
9-5 Java is a(n) object-oriented language.
9-6 LISP is a(n) functional language. functional
9-7 COBOL is a common language in the business -environment.
9-8 Java is a popular object-oriented language.
9-9 A Java program can be either an application or an applet.
9-10 LISP and Scheme are both functional languages.
9-11 Prolog is an example of a(n) declarative language.
10-1 One phase in system development is analysis
10-2 Defining the users, requirements, and methods is part of the analysis phase.

about:blank 6/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

Document continues below

Discover more
from:
Computer
Science -…
CS 141
Trường Đại học FPT
924 documents

Go to course

CSI 104 test - CSI


98% (41)
43

Workshop 01 - Lecture
notes 1
3
94% (34)

Progress-Test-3-for-
SE1502 -Attempt
10
Mathematics
100% (5)
Engineering

Practice Final Exam 1


Mathematics
18 100% (4)
Engineering

Final test MAE101 Fall


2019
17
Mathematics
100% (3)
Engineering

about:blank 7/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
Exercise MAE 101
Chapter 1 LA
3
Mathematics
100% (2)
Engineering
10-3 In the system development process, writing the program is part of the implementation
phase.
10-4 In the system development process, structure charts are tools used in the design phase.
10-5 Testing a software system can involve both black-box and glass-boxtesting.
10-6 Modularization is the breaking up of a large project into smaller parts.
10-7 Coupling is a measure of how tightly two modules are bound to each other.
10-8 Coupling between modules in a software system must be minimized.
10-9 Cohesion between modules in a software system must be maximized.
11-1 A data structure can be an array, a record, or a linked list
11-2 An array that consists of just rows and columns is a one-dimensional array.
11-3 Each element in a record is called a field
11-4 All the members of a record must be related types
11-5 A linked list is an ordered collection of data in which each element contains the location
of the next element.
11-6 In a linked list, each element contains data and a link
11-7 The link is a pointer that identifies the next element in the linked list.
11-8 Given a linked list called children, the pointer variable children identifies the first
element of the linked list.
11-9 An empty linked list consists of a null head pointer
11-10 To traverse a list, you need a walking pointer.
12-1 In an abstract data type, the ADT implementation is hidden
12-2 A stack is a LIFO structure.
12-3 A (n) FIFO list is also known as a queue.
12-4 If A is the first data element input into a stack, followed by B, C, and D,
then D is the first element to be removed.
12-5 If A is the first data element input into a queue, followed by B, C, and
D, then A is the first element to be removed.
12-6 The pop operation deletes an item from the top of the stack.
12-7 The push operation inserts an item at the top of the stack.
12-8 In a binary tree, each node has at most two subtrees.
12-9 In preorder traversal of a binary tree, the root is processed first

about:blank 8/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

12-10 In inorder traversal of a binary tree, the right subtree is processed


12-11 In postorder traversal of a binary tree, the root is processed last
12-12 In postorder traversal of a binary tree, the left subtree is processed first
12-13 In preorder traversal of a binary tree, the left subtree is processed
last.
12-14 In an inorder traversal of a binary tree, the root is processed second
13-1 Any file can be accessed randomly.
13-2 A sequential file can be accessed sequentially.
13-3 When a sequential file is updated, the new master file gets the actual update.
13-4 When a sequential file is updated, the error report file contains a list of all errors
occurring during the update process.
13-5 When a sequential file is updated, the transaction file contains the changes to be applied.
13-6 After a sequential file is updated, the new master file contains the most current data.
13-7 If the transaction file key is 20 and the first master file key is 25, then we add the new
record to the new master file
13-8 If the transaction file key is 20 with a delete code and the master file key is 20, then we
delete the data
13-9 An indexed file consists of an index and random data file
13-10 The index of an indexed file has two fields.
13-11 In the digit extraction hashing method, selected digits are extracted from the key and
used as the address.
13-12 In the modulo division hashing method, the key is divided by the file size, and the
address is the remainder plus 1.
13-13 In the direct hashing method, there are no synonyms or collisions.
13-14 Synonyms are keys that hash to the same location in the data file.
13-15 When a hashing algorithm produces an address for an insertion key and that address is
already occupied, it is called a collision
13-16 The address produced by a hashing algorithm is the home address.
13-17 The prime area is the file area that contains all the home addresses.
13-18 In the open addressing collision resolution method, we try to put data that cannot be
placed in location 123 into location 124.
14-1 In a three-level DBMS architecture, the layer that interacts directly with the hardware is
the internal level.

about:blank 9/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

14-2 In a three-level DBMS architecture, the internal level determines where data is actually
stored on the storage devices.
14-3 The conceptual level of a three-level DBMS architecture defines the logical view of the
data.
14-4 The data model and the schema of a DBMS are often defined at the conceptual level.
14-5 In a three-level DBMS architecture, the external level interacts directly with the users.
14-6 Of the various database models, the relational model is the most prevalent today.
14-7 Each column in a relation is called an attribute
14-8 Each row in a relation is called a tuple
14-9 A unary operator is applied to one relation(s) and creates an output of two relation(s).
14-10 A binary operator is applied to two relation(s) and creates an output of one relation(s).
14-11 The unary insert operation always results in a relation that has exactly one more row
than the original relation.
14-12 If you want to change the value of an attribute of a tuple, you use the update operation.
14-13 The operation that takes two relations and combines them based on common attributes
is the join operation.
14-14 If you need to delete an attribute in a relation, you can use the project operation.
14-15 You want to create a relation called New that contains tuples that belong to both
relation A and relation B. For this, you can use the intersection operation.
14-16 Which of the following is a unary operator? project
14-17 Which of the following is a binary operator? difference
14-18 SQL is a declarative language used on relational databases.
15-1 Data is compressed using a dictionary with indexes to strings. This is Lempel Ziv
encoding
15-2 A string of one hundred 0s is replaced by two markers, a 0, and the number 100. This is
run-length encoding
15-4 In a lossless data compression method, the received data is an exact copy of the original
message.
15-5 In MP3, JPEG, or MPEG data compression method, the received data need not be an
exact copy of the original message.
15-3 JPEG is an example of lossy compression.
15-6 Huffman, run-length, or LZ encoding is a lossless data compression method.
15-7 In Huffman encoding, the more frequently occurring characters have shorter codes than
the less frequently occurring characters.

about:blank 10/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

15-8 In run-length encoding, PPPPPPPPPPPPPPP can be replaced by P15.


15-9 LZ encoding requires a dictionary, a buffer, and an algorithm
15-10 JPEG encoding involves the discrete cosine transform, a process that reveals the
redundancies in a block.
15-11 In JPEG encoding, the blocking process breaks the original picture into smaller blocks
and assigns a value to each pixel in a block.
15-12 The last step in JPEG, compression , removes redundancies.
15-13 JPEG is a lossy compression method for pictures and graphics, whereas MPEG is a
lossy compression method for video.
Physical Which of the following is OSI layer of repeater?
Time slicing An OS method of allowing multiple processes to share the CPU is: *
Partitioned and formatted Before a disk can be used, it must be: *
Data Link Which of the OSI layers is responsible for guaranteed delivery of data? *
Transfer Web pages The purpose of HTTP is to *
Ctrl+Alt +Del key In Windows , you can see the Task manager by using which of the
following? *
Fiber-optic cable Which type of guided medium is the least susceptible to attenuation
and inductance? *
64 What is the positional value of the 7 in the base 8 number 2715? *
XOR Which of the following is not one of the basic Boolean operators? *
Network Which of the following is OSI layer of Router *
Disk Operating System DOS stands for: *
DOS Which of the following is not a multitasking OS? *
Formatting The process of arranges the disk's surface into addressable areas and sets up
the disk's basic directory tree structure *
1100010000111010 What binary value is equivalent to the hex number C43A? *
ALU Which part of the CPU is responsible for mathematical operations? *
They were cheaper, smaller, and cooler than tubes and lasted longer. What features of
transistors made them superior for computers, compared with vacuum tubes? *
Linux operating system Today, Microsoft considers its major competition in operating
systems to be what system? *
High-speed Cache memory is used to speed processing in a computer system *
Flip-flop Which of the following circuit types is used to create SRAM? *

about:blank 11/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

256 Kbps to 1.5 MbpsDSL speeds range from: *


FDM and TDM DSL is a combination of what two types of multiplexing? *
1000011111 What is the binary equivalent of the decimal number 543? *
A Bus in computer terminology is a set of wires and protocols designed to facilitate data
transfer *
Wireless Which of the following is not one of the OSI model layers? *
Root The main level of a disk is called the: *
Point of Presence Internet Providers maintain a Switching center called a: *
16 What is the positional value of the A in the hexadecimal number C4A6? *
15,373 What base 10 value is equivalent to 3C0D of base 16? *
Star Which topology has become more popular with the advent of the Internet and home
networking? *
ROM Which type of memory can't be written to easily? *
Interrupt Which type of I/O processing is most efficient? *
129 What numeric value in base 10 does the binary number 10000001 represent? *
Data Link Which of the following is OSI layer of Switch? *
DEAD What numeric value in hexadecimal is equivalent to the binary number
1101111010101101 *
802.11 Which of the following standards is used in wireless networking? *
SRAM Which of the following memory types is the fastest? *
16 What is the minimum number of bits required to represent 256 colors? *
Algebraic expressions Boolean expressions are simplified through the use of: *
BIOS The _______________ contains instructions and data that provide the startup program
for a computer. *
False In Windows, the MD command must be used to create a folder *
Interpreter Which of the following translates a program's statements, one by one, into a
language the computer can understand? *
Router Which Internet component is responsible for decrementing the TTL field? *
<A> Which HTML tag is used to provide links to other pages? *
Compiler Which of the following converts source code into a computer language and
results in an executable file *
None of the above Which of the following is not a responsibility of the file system? *

about:blank 12/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

Prototype A ... is a standard or typical example of how something might work, but
without all the built-in functionality. *
HTTP Which of the following protocols makes the Web possible? *
TCP Which portion of the TCP/IP protocol suite provides error detection and correction *
None of the above Which is not included as a task of software engineering? *
Algorithm Which is not a type of control structure? *
Thousands How many DNS servers does the Internet have? *
Domain What is the set of possible values for a column? *
Eliminate repeated fields First normal DB form say *
C++ Which of the following is not a valid DBMS? *
Degradation Which is not a valid software development model? *
Worm A....... is a bot that actively reproduces itself across a network *
passwords Use ...................................to protect everything Startup, e-mail, router, phone,
PDA, screen saver *
HTML Which of the following is not an Internet-related protocol? *
Virus .............. are uninvited guest programs on your computer with the potential to damage
files and the operating system *
Efficient disk use on small volumes Which is not an advantage of using NTFS? *
Primary key What uniquely identifies a row in a table? *
1 How many IP addresses are presented to the Internet when NAT is used? *
65,536 5. How many possible ports are allowed in TCP? *
80 What is the standard port number for HTTP? *
Array A(n) __________ is a data structure consisting of contiguous memory locations *
Flowchart A ... is used as a visual model for describing a program's logical steps *
DHCP Which Internet protocol is used to assign IP addresses dynamically? *
ORDER BY Which of the following SQL SELECT options is used to organize the data
being returned? *
Flash With _________ the microchip is organized so that a section of memory cells are
erased in a single action. *
None of the above Which should not be included in the design document? *
Assembly Which is not an example of a high-level programming language? *
A blueprint that shows an application's functionality A design document is used as: *

about:blank 13/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

Compiler Which of the following converts source code into a computer language and
results in an executable file? *
Add the data Which is not a step of the database design process? *
minimize drive head movement? Disk Defragmenter utility is used to *
Variable What is a name used to identify a specific location and value in memory? *
Data dictionary The document responsible for describing the type of data stored in the
database is called the *
Troyjan is a program that poses as an innocent program *
SMTP Which of the following is an example of a high-level protocol? *
None of the above Which is not a type of programming language? *

about:blank 14/16
13:32 24/03/2024 FE CSI104 - zxcvbnm

More from:
Computer
Science -…
CS 141
Trường Đại học FPT
924 documents

Go to course

CSI 104 test - CSI


Computer
43 98% (41)
Science -…

Workshop 01 - Lecture
notes 1
3
Computer
94% (34)
Science -…

Nguyen Duy Tien Lab1


- This is my work
5
Computer
100% (10)
Science -…

Bài Lab 01 môn CSI104


Computer
3 100% (8)
Science -…

Recommended for you

Workshop 01 - Lecture
notes 1
3

about:blank 15/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
Computer 94% (34)
Science -…

Progress-Test-3-for-
SE1502 -Attempt
10
Mathematics
100% (5)
Engineering

Practice Final Exam 1


Mathematics
18 100% (4)
Engineering

Final test MAE101 Fall


2019
17
Mathematics
100% (3)
Engineering

about:blank 16/16

You might also like