Download 壹 - 國立彰化師範大學進修學院

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Unix security wikipedia , lookup

Burroughs MCP wikipedia , lookup

Process management (computing) wikipedia , lookup

VS/9 wikipedia , lookup

CP/M wikipedia , lookup

Transcript
國立彰化師範大學九十八學年度教師在職進修碩士學位班招生考試試題
班別:資訊科技應用教學碩士學位班【暑期班】
★★請在答案紙上作答★★
科目:計算機概論
共5頁
第1頁
一、 Multiple-choice questions(1% each) 100%
1. Which is more valuable today to an origination:
a. hardware
b. data
c. system software d. application software
2. A programming language has ten different instructions. How many five-instruction programs can be
written in this language?
a. 100,000 b. 30240
c. 252 d. 10
3. The
model is the basis for today’s computers.
a. Leibnitz b. Pascal c. Charles Babbage d. von Neumann
4. Which of the following representation is erroneous.
a. (10111)2
b. (349)8
c. (3AB)16
d. (256)10
5. What is the minimum number of required bits to store integers lass than 64.
a. 6
b. 8
c. 7
d. 5
6. Convert the (ABC.D)16 hexadecimal number to octal.
a. (5274.64)8
b. (5274.61)8
c. (5274.15)8
d. (5276.15)8
7. A 32-bit code called
represents symbols in all language.
a. ANSI
b. EBCDIC
c. Unicode
d. Extended ASCII
8. In the
graphic method of representing an image in a computer, rescaling of the image creates
a ragged or grainy image.
a. binary
b. vector
c. quantized
d. bitmap
9. In which of the following situations does an overflow never occur?
a. Adding two positive number
b. Adding one positive integer to a negative integer
c. Subtracting one positive integer from a negative integer
d. Adding two negative number
10. The result of changing the decimal number -100 to 8-bit 2’s complement integer is equivalent to
.
a. 11100100
b. 10011011
c. 01100100
d. 10011100
11. The 8-bit allocation 1’s complement binary number 11111100 = (
)10 .
a. -4
b. 4
c. -3
d. 3
12. A step-by-step solution to a problem is called
.
a. hardware b. an operating system c. a computer language d. an algorithm
13.
separated the programming task from the computer operation tasks.
a. Algorithms b. Data processors
c. High-level programming language
d. Operating
systems
14. FORTRAN and COBOL are examples of
.
a. hardware b. operating systems
c. computer language
d. algorithms
15.
is a set of instructions in a computer language that tells the computer what to do with data.
a. An operating system b. An algorithm
c. A data processor d. A program
16. In a set with 64 symbols, each symbol requires a bit pattern length of
bits.
a. 4
b. 5
c. 6
d. 7
17. In extended ASCII, each symbol is
bits.
a. 7
b. 8
c. 9
d. 10
18. When you want to download music to a computer, the audio signal must be
.
a. sample b. quantized
c. coded
d. all of the above
19. In the
graphic method of representing an image in a computer, each pixel is assigned one or
more bit patterns.
a. bitmap
b. vector
c. quantized
d. binary
5-1
國立彰化師範大學九十八學年度教師在職進修碩士學位班招生考試試題
班別:資訊科技應用教學碩士學位班【暑期班】
★★請在答案紙上作答★★
科目:計算機概論
共5頁
第2頁
20. How many hexadecimal digits are needed to convert a 21-bit pattern?
a. 3
b. 4
c. 5
d. 6
21. If the ASCII code for Z is 1011010, then the ASCII code for z is
.
a. 1011011
b. 1011110
c. 1111010
d. 0011010
22. Which of the following can be classified as data?
a. number b. video
c. audio
d. all of the above
23. A byte consists of
bits.
a. 2
b. 4
c. 6
d.8
24. The ASCII code for A is
.
a. 1000001
b. 1000010
c. 1000011
d. 1000100
25. In unsigned integers, a 4-bit allocation allows
nonnegative numbers.
a. 7
b. 8
c. 15 d. 16
26. In
number representation, 1111 in memory represent -1.
a. unsigned integer b. sign-and-magnitude c. one’s complement
d. two’s complement
27. How is the mantissa stored in a computer?
a. in one’ complement b. in two’s complement c. as an unsigned integer d. in
sign-and-magnitude
28. The precision of the fractional number stored in a computer is defined by the
a. sign
b. exponent
c. mantissa
d. any of the above
29. When a fraction is normalized, there is a
to the left of the decimal point.
a. 0 bit b. 1 bit c. random bit sequence d. a or b
30. In
number representation, there is one representation for 0.
a. two’s complement
b. sign-and-magnitude c. one’s complement
d. all of the above
31. Which number representation method is most widely used for storing number in a computer?
a. two’s complement
b. sign-and-magnitude c. one’s complement
d. unsigned integer
32. Which number representation method is often used to convert analog signal to digital signal?
a. two’s complement
b. sign-and-magnitude c. one’s complement
d. unsigned integer
33. You use a bit pattern called a
to modify another bit pattern.
a. mask
b. carry
c. float
d. byte
34. If you are adding two numbers, one of which has an exponent value of 7 and the other an exponent
value of 9, you need to shift the decimal point of the smaller number
.
a. one place to the left b. one place to the right c. two place to the left
d. two place to the right
35. If the exponent in Excess_127 is binary 10000111, the exponent in decimal is
a. 10 b. 9
c. 8
d. 7
36. Which of the following operations creates overflow if the numbers and the result are represented in
8-bit two’s complement notation?
a. 11000010 + 0011111111
b. 00000010 + 00111111 c. 10000000 + 11111111
d. 00000010 + 11111111
37. For the binary
operator, if the input is two 1’s, the output is 0.
a. AND
b. OR
c. XOR
d. all of the above
38. To flip all the bits of a bit pattern, make a mask of all 1s and then
the bit pattern and the
mask.
a. AND
b. OR
c. XOR
d. NOT
39. In two’s complement representation with a 4-bit allocation, you get
when you add 1 to 7.
a. 8
b. 1
c. -7
d. -8
5-2
國立彰化師範大學九十八學年度教師在職進修碩士學位班招生考試試題
班別:資訊科技應用教學碩士學位班【暑期班】
★★請在答案紙上作答★★
科目:計算機概論
共5頁
第3頁
40. The three steps in the running of a program on a computer are performed
in this specific
order.
a. fetch, execute, and decode b. decode, execute, and fetch c. fetch, decode , and execute
d. decode, fetch, and execute
41. A
bus connects the CPU and memory.
a. data
b. address
c. control
d. all of the above
42. Which optical storage device has the highest capacity?
a. CD-ROM
b. CD-R
c. CD-RW
d. DVD
43. A register in a CPU can hold
.
a. data b. instructions c. program counter values d. all of the above
44.
is a memory type with traditional flip-flop gates to hold data.
a. SRAM b. DRAM c. ROM
d. all of the above
45. The
memory contains a copy of a portion of main memory.
a. CPU
b. cache
c. main
d. ROM
46. The smallest storage area on a magnetic disk that can be accessed at one time is a
.
a. track
b. sector
c. frame
d. head
47. The
layer of the TCP/IP protocol suite provides service for end user.
a. application b. data-link c. transport d. physical
48. What is the domain name in the email address [email protected] ?
a. ketty b. pit.arc.nasa.gov
c. [email protected] d. nasa.gov
49.
is a protocol for mail service.
a. FTP b. SMTP c. TELNET d. HTTP
50. A computer has 64MB(megabytes) of memory. Each word is 4 bytes. How many bits are needed to
address each single word in memory?
a. 22 b. 24 c. 26 d. 14
51. The job scheduler and the process scheduler are under the control of the
manager.
a. memory b. process c. device d. files
52. The
manager is responsible for archiving and backup.
a. memory b. process c. device d. files
53. To prevent
, an operating system can put resource restrictions on process.
a. starvation
b. synchronization
c. paging
d. deadlock
54.
is a program that facilitates the execution of other programs.
a. An operating system b. Hardware c. A queue
d. An application program
55. A process in the ready state goes to the running state when
.
a. it enters memory b. it request I/O c. it gets access to the CPU d. it finishes running
56. A system with more than one CPU requires a
operating system
a. bath b. time-sharing c. parallel d. distributed
57. There are
basic constructs in computer science.
a. one b. two c. three d. four
58.
is a pictorial representation of an algorithm.
a. A UML diagram b. A program c. Pseudocode d. An algorithm
59. A subalgorithm is also known as a
.
a. function b. subroutine c. module d. all of the above
60. In
sort, the smallest item moves to the beginning of the unsorted list. There is no
one-to-one swapping.
a. selection b. bubble c. insertion d. all of the above
61. Use a
search for an unordered list.
a. binary b. sequential c. insertion d. bubble
62.
is a process in which an algorithm calls itself.
5-3
國立彰化師範大學九十八學年度教師在職進修碩士學位班招生考試試題
班別:資訊科技應用教學碩士學位班【暑期班】
★★請在答案紙上作答★★
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
科目:計算機概論
共5頁
第4頁
a. Searching b. Sorting c. Recursion d. Iteration
The only language understood by computer hardware is a
language.
a. machine b. symbolic c. high-level d. natural
, the first high-level language, is still popular with the scientific and engineering
communication.
a. COBOL
b. FORTRAN
c. C++
d. JAVA
The UNIX operating system is written in a language called
.
a. C
b. FORTRAN
c. C++
d. JAVA
A
program can be either an application or an applet.
a. COBOL
b. FORTRAN c. C++
d. JAVA
The standard data type
describes a number with a fractional part.
a. int b. char c. float d. struct
Software engineering principle were first established
years ago.
a. 10 b. 30 c. 60 d. 120
In the system development process, writing the code is part of the
phase.
a. analysis b. design c. implementation d. testing
Testing a software package can involve
testing.
a. black box
b. white box
c. breadbox
d. a and b
In the
model, an entire phase of the project is completed before the next phase starts.
a. waterfall
b. incremental
c. instrumental
d. black box
is the breaking up of a large program into small parts.
a. Coupling
b. Incrementing
c. Obsolescence
d. Modularity
Defining the user, requirements, and methods is part of the
phase.
a. analysis b. design c. implementation d. testing
Accuracy, efficiency, reliability, security, timeliness, and usability are factors important to the
of software.
a. operability
b. maintainability
c. transferability
d. longevity
Which is not the measure of transferability?
a. Reusability
b. correctability
c. interoperability d. portability
If a process is in the running state, what states can it never go to next?
a. Hold
b. Terminated
c. Ready
d. Waiting
In
, only one program can reside in memory for execution.
a. monoprogramming
b. multiprogramming
c. partitioning d. paging
A list contains 63 sorted distinct elements. If the binary search is used, what is the minimum times of
comparison if the target value is in the list.
a. 1
b. 3
c. 6
d. 7
A list contains 63 sorted distinct elements. If the binary search is used, what is the maximum times
of comparison if the target value is not in the list.
a. 1
b. 3
c. 6
d. 7
What is not the three concepts intrinsic to programs in C++?
a. Encapsulation
b. cohesion c. inheritance d. polymorphism
Which is not the assignment statement of language C?
a. ==
b. +=
c. *=
d. /=
What is the status of a process if the process has finished printing and needs the attention of the CPU
again?
a. running
b. ready
c. waiting
d. terminated
In a two-dimensional array with four rows, the row with the highest address in memory is the
row.
a. first
b. second
c. third
d. fourth
A queue is a linear list in which data can only be inserted at one end, called the
, and
delete from the other end, called the
.
5-4
國立彰化師範大學九十八學年度教師在職進修碩士學位班招生考試試題
班別:資訊科技應用教學碩士學位班【暑期班】
科目:計算機概論
★★請在答案紙上作答★★
a. front; rear
b. top; bottom
共5頁
c. rear; front
第5頁
d. bottom; top
85. Each element in a record is called
.
a. a variable
b. an index
c. a field
d. a node
86. The
directory is the directory we are “in” at any point in a user section.
a. root
b. home
c. working
d. parent
87. The RSA algorithm is the basis of a
encryption method.
a. public key
b. secret key
c. private key
d. all of the above
88. Which of the following applications is not a category of stack application?
a. reversing data b. parsing data c. backtracking steps d. print spools
89.
is a lossy compression method for pictures and graphics; whereas
is a lossy
compression for video.
a. DCT;MPEG
b. MPEG;JPEG
c. JPEG;MPEG
d. JPEG;DCT
90. The DBMS code that allows the user to access, maintain, and update data is the
.
a. hardware
b. data
c. software
d. user
91. Both human and
can be considered user of a database.
a. data
b. software
c. application programs
d. hardware
92. The data model and the schema of a DBMS are often defined in the
level.
a. external
b. conceptual
c. internal
d. physical
93. Of the various database models, the
model is the most prevalent today.
a. hierarchical b. network
c. relational
d. linked list
94. When a sequential file is updated, the
file contains the change to be applied.
a. new master b. old master
c. transaction
d. error report
95. Which of the following hashing methods will not produce collision?
a. modulo division hashing
b. bucket hashing c. direct hashing d. digit extraction hashing
96. A
file is a file of characters.
a. text b. binary c. character d. hash
97. In a linked list, each element contains
.
a. data b. a link c. a record d. a and b
98. Given a linked list called children, the pointer variable children identifies
element of the
linked list.
a. the first
b. the second
c. the last
d. any
99.
is a suitable structure if a large number of insertions and deletions are needed.
a. An array
b. A linked list
c. A graph
d. all of the above
100. We use
to denote a program’s complexity.
a. the turing
b. the simple language
c. big-O notation
d. factorials
5-5