Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
國立彰化師範大學九十八學年度教師在職進修碩士學位班招生考試試題 班別:資訊科技應用教學碩士學位班【暑期班】 ★★請在答案紙上作答★★ 科目:計算機概論 共5頁 第1頁 一、 Multiple-choice questions(1% each) 100% 1. Which is more valuable today to an origination: a. hardware b. data c. system software d. application software 2. A programming language has ten different instructions. How many five-instruction programs can be written in this language? a. 100,000 b. 30240 c. 252 d. 10 3. The model is the basis for today’s computers. a. Leibnitz b. Pascal c. Charles Babbage d. von Neumann 4. Which of the following representation is erroneous. a. (10111)2 b. (349)8 c. (3AB)16 d. (256)10 5. What is the minimum number of required bits to store integers lass than 64. a. 6 b. 8 c. 7 d. 5 6. Convert the (ABC.D)16 hexadecimal number to octal. a. (5274.64)8 b. (5274.61)8 c. (5274.15)8 d. (5276.15)8 7. A 32-bit code called represents symbols in all language. a. ANSI b. EBCDIC c. Unicode d. Extended ASCII 8. In the graphic method of representing an image in a computer, rescaling of the image creates a ragged or grainy image. a. binary b. vector c. quantized d. bitmap 9. In which of the following situations does an overflow never occur? a. Adding two positive number b. Adding one positive integer to a negative integer c. Subtracting one positive integer from a negative integer d. Adding two negative number 10. The result of changing the decimal number -100 to 8-bit 2’s complement integer is equivalent to . a. 11100100 b. 10011011 c. 01100100 d. 10011100 11. The 8-bit allocation 1’s complement binary number 11111100 = ( )10 . a. -4 b. 4 c. -3 d. 3 12. A step-by-step solution to a problem is called . a. hardware b. an operating system c. a computer language d. an algorithm 13. separated the programming task from the computer operation tasks. a. Algorithms b. Data processors c. High-level programming language d. Operating systems 14. FORTRAN and COBOL are examples of . a. hardware b. operating systems c. computer language d. algorithms 15. is a set of instructions in a computer language that tells the computer what to do with data. a. An operating system b. An algorithm c. A data processor d. A program 16. In a set with 64 symbols, each symbol requires a bit pattern length of bits. a. 4 b. 5 c. 6 d. 7 17. In extended ASCII, each symbol is bits. a. 7 b. 8 c. 9 d. 10 18. When you want to download music to a computer, the audio signal must be . a. sample b. quantized c. coded d. all of the above 19. In the graphic method of representing an image in a computer, each pixel is assigned one or more bit patterns. a. bitmap b. vector c. quantized d. binary 5-1 國立彰化師範大學九十八學年度教師在職進修碩士學位班招生考試試題 班別:資訊科技應用教學碩士學位班【暑期班】 ★★請在答案紙上作答★★ 科目:計算機概論 共5頁 第2頁 20. How many hexadecimal digits are needed to convert a 21-bit pattern? a. 3 b. 4 c. 5 d. 6 21. If the ASCII code for Z is 1011010, then the ASCII code for z is . a. 1011011 b. 1011110 c. 1111010 d. 0011010 22. Which of the following can be classified as data? a. number b. video c. audio d. all of the above 23. A byte consists of bits. a. 2 b. 4 c. 6 d.8 24. The ASCII code for A is . a. 1000001 b. 1000010 c. 1000011 d. 1000100 25. In unsigned integers, a 4-bit allocation allows nonnegative numbers. a. 7 b. 8 c. 15 d. 16 26. In number representation, 1111 in memory represent -1. a. unsigned integer b. sign-and-magnitude c. one’s complement d. two’s complement 27. How is the mantissa stored in a computer? a. in one’ complement b. in two’s complement c. as an unsigned integer d. in sign-and-magnitude 28. The precision of the fractional number stored in a computer is defined by the a. sign b. exponent c. mantissa d. any of the above 29. When a fraction is normalized, there is a to the left of the decimal point. a. 0 bit b. 1 bit c. random bit sequence d. a or b 30. In number representation, there is one representation for 0. a. two’s complement b. sign-and-magnitude c. one’s complement d. all of the above 31. Which number representation method is most widely used for storing number in a computer? a. two’s complement b. sign-and-magnitude c. one’s complement d. unsigned integer 32. Which number representation method is often used to convert analog signal to digital signal? a. two’s complement b. sign-and-magnitude c. one’s complement d. unsigned integer 33. You use a bit pattern called a to modify another bit pattern. a. mask b. carry c. float d. byte 34. If you are adding two numbers, one of which has an exponent value of 7 and the other an exponent value of 9, you need to shift the decimal point of the smaller number . a. one place to the left b. one place to the right c. two place to the left d. two place to the right 35. If the exponent in Excess_127 is binary 10000111, the exponent in decimal is a. 10 b. 9 c. 8 d. 7 36. Which of the following operations creates overflow if the numbers and the result are represented in 8-bit two’s complement notation? a. 11000010 + 0011111111 b. 00000010 + 00111111 c. 10000000 + 11111111 d. 00000010 + 11111111 37. For the binary operator, if the input is two 1’s, the output is 0. a. AND b. OR c. XOR d. all of the above 38. To flip all the bits of a bit pattern, make a mask of all 1s and then the bit pattern and the mask. a. AND b. OR c. XOR d. NOT 39. In two’s complement representation with a 4-bit allocation, you get when you add 1 to 7. a. 8 b. 1 c. -7 d. -8 5-2 國立彰化師範大學九十八學年度教師在職進修碩士學位班招生考試試題 班別:資訊科技應用教學碩士學位班【暑期班】 ★★請在答案紙上作答★★ 科目:計算機概論 共5頁 第3頁 40. The three steps in the running of a program on a computer are performed in this specific order. a. fetch, execute, and decode b. decode, execute, and fetch c. fetch, decode , and execute d. decode, fetch, and execute 41. A bus connects the CPU and memory. a. data b. address c. control d. all of the above 42. Which optical storage device has the highest capacity? a. CD-ROM b. CD-R c. CD-RW d. DVD 43. A register in a CPU can hold . a. data b. instructions c. program counter values d. all of the above 44. is a memory type with traditional flip-flop gates to hold data. a. SRAM b. DRAM c. ROM d. all of the above 45. The memory contains a copy of a portion of main memory. a. CPU b. cache c. main d. ROM 46. The smallest storage area on a magnetic disk that can be accessed at one time is a . a. track b. sector c. frame d. head 47. The layer of the TCP/IP protocol suite provides service for end user. a. application b. data-link c. transport d. physical 48. What is the domain name in the email address [email protected] ? a. ketty b. pit.arc.nasa.gov c. [email protected] d. nasa.gov 49. is a protocol for mail service. a. FTP b. SMTP c. TELNET d. HTTP 50. A computer has 64MB(megabytes) of memory. Each word is 4 bytes. How many bits are needed to address each single word in memory? a. 22 b. 24 c. 26 d. 14 51. The job scheduler and the process scheduler are under the control of the manager. a. memory b. process c. device d. files 52. The manager is responsible for archiving and backup. a. memory b. process c. device d. files 53. To prevent , an operating system can put resource restrictions on process. a. starvation b. synchronization c. paging d. deadlock 54. is a program that facilitates the execution of other programs. a. An operating system b. Hardware c. A queue d. An application program 55. A process in the ready state goes to the running state when . a. it enters memory b. it request I/O c. it gets access to the CPU d. it finishes running 56. A system with more than one CPU requires a operating system a. bath b. time-sharing c. parallel d. distributed 57. There are basic constructs in computer science. a. one b. two c. three d. four 58. is a pictorial representation of an algorithm. a. A UML diagram b. A program c. Pseudocode d. An algorithm 59. A subalgorithm is also known as a . a. function b. subroutine c. module d. all of the above 60. In sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-one swapping. a. selection b. bubble c. insertion d. all of the above 61. Use a search for an unordered list. a. binary b. sequential c. insertion d. bubble 62. is a process in which an algorithm calls itself. 5-3 國立彰化師範大學九十八學年度教師在職進修碩士學位班招生考試試題 班別:資訊科技應用教學碩士學位班【暑期班】 ★★請在答案紙上作答★★ 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. 83. 84. 科目:計算機概論 共5頁 第4頁 a. Searching b. Sorting c. Recursion d. Iteration The only language understood by computer hardware is a language. a. machine b. symbolic c. high-level d. natural , the first high-level language, is still popular with the scientific and engineering communication. a. COBOL b. FORTRAN c. C++ d. JAVA The UNIX operating system is written in a language called . a. C b. FORTRAN c. C++ d. JAVA A program can be either an application or an applet. a. COBOL b. FORTRAN c. C++ d. JAVA The standard data type describes a number with a fractional part. a. int b. char c. float d. struct Software engineering principle were first established years ago. a. 10 b. 30 c. 60 d. 120 In the system development process, writing the code is part of the phase. a. analysis b. design c. implementation d. testing Testing a software package can involve testing. a. black box b. white box c. breadbox d. a and b In the model, an entire phase of the project is completed before the next phase starts. a. waterfall b. incremental c. instrumental d. black box is the breaking up of a large program into small parts. a. Coupling b. Incrementing c. Obsolescence d. Modularity Defining the user, requirements, and methods is part of the phase. a. analysis b. design c. implementation d. testing Accuracy, efficiency, reliability, security, timeliness, and usability are factors important to the of software. a. operability b. maintainability c. transferability d. longevity Which is not the measure of transferability? a. Reusability b. correctability c. interoperability d. portability If a process is in the running state, what states can it never go to next? a. Hold b. Terminated c. Ready d. Waiting In , only one program can reside in memory for execution. a. monoprogramming b. multiprogramming c. partitioning d. paging A list contains 63 sorted distinct elements. If the binary search is used, what is the minimum times of comparison if the target value is in the list. a. 1 b. 3 c. 6 d. 7 A list contains 63 sorted distinct elements. If the binary search is used, what is the maximum times of comparison if the target value is not in the list. a. 1 b. 3 c. 6 d. 7 What is not the three concepts intrinsic to programs in C++? a. Encapsulation b. cohesion c. inheritance d. polymorphism Which is not the assignment statement of language C? a. == b. += c. *= d. /= What is the status of a process if the process has finished printing and needs the attention of the CPU again? a. running b. ready c. waiting d. terminated In a two-dimensional array with four rows, the row with the highest address in memory is the row. a. first b. second c. third d. fourth A queue is a linear list in which data can only be inserted at one end, called the , and delete from the other end, called the . 5-4 國立彰化師範大學九十八學年度教師在職進修碩士學位班招生考試試題 班別:資訊科技應用教學碩士學位班【暑期班】 科目:計算機概論 ★★請在答案紙上作答★★ a. front; rear b. top; bottom 共5頁 c. rear; front 第5頁 d. bottom; top 85. Each element in a record is called . a. a variable b. an index c. a field d. a node 86. The directory is the directory we are “in” at any point in a user section. a. root b. home c. working d. parent 87. The RSA algorithm is the basis of a encryption method. a. public key b. secret key c. private key d. all of the above 88. Which of the following applications is not a category of stack application? a. reversing data b. parsing data c. backtracking steps d. print spools 89. is a lossy compression method for pictures and graphics; whereas is a lossy compression for video. a. DCT;MPEG b. MPEG;JPEG c. JPEG;MPEG d. JPEG;DCT 90. The DBMS code that allows the user to access, maintain, and update data is the . a. hardware b. data c. software d. user 91. Both human and can be considered user of a database. a. data b. software c. application programs d. hardware 92. The data model and the schema of a DBMS are often defined in the level. a. external b. conceptual c. internal d. physical 93. Of the various database models, the model is the most prevalent today. a. hierarchical b. network c. relational d. linked list 94. When a sequential file is updated, the file contains the change to be applied. a. new master b. old master c. transaction d. error report 95. Which of the following hashing methods will not produce collision? a. modulo division hashing b. bucket hashing c. direct hashing d. digit extraction hashing 96. A file is a file of characters. a. text b. binary c. character d. hash 97. In a linked list, each element contains . a. data b. a link c. a record d. a and b 98. Given a linked list called children, the pointer variable children identifies element of the linked list. a. the first b. the second c. the last d. any 99. is a suitable structure if a large number of insertions and deletions are needed. a. An array b. A linked list c. A graph d. all of the above 100. We use to denote a program’s complexity. a. the turing b. the simple language c. big-O notation d. factorials 5-5