计算机导论简答芯片,吉大计算机 - 计算机导论简答题 (2011级)
C1
2. Q: What model is the basis for today’s computers? A: Von Neumann Model.
5. Q: What are the subsystems of the Von Neumann computer model?
A: Memory, ALU, control unit, input/output.
C2
1. Q: Name five types of data that a computer can process. A: Text, numbers, image, audio, video.
4. Q: What is the difference between ASCII and extended ASCII? A: ASCII code uses 7 bits for each symbol, this means 128 (27) A: For each pair of input bits, the result is 0 if and only if both bits are equal; otherwise, it is 1. 17. Q: What binary operation can be used to set bits? What bit pattern should be mask have? A: OR; 11111111.
18. Q: What binary operation can be used to unset bits? What bit pattern should be mask have? A: AND, 00000000.
19. Q: What binary operation can be used to flip bits? What bit pattern should be mask have? A: XOR; 11111111.
C5
1. Q: What are the three subsystems that make up a computer? topology, and ring topology. Star topology.
9. Q: Name four types of connecting devices and their functions. A: Repeater, bridge, router, and gateway.
10. Q: What’s the difference between TCP and UDP?. A: The UDP is the simpler of the two. It is an end-to-end transport level protocol that
provides only the basic necessities for end-to-end delivery of a
transmission. The TCP is a reliable transport protocol. It divides a message into a sequence of segments that are numbered
sequentially. If one segment is lost, constructs used in structured
programming. A: Sequence: An algorithm, and eventually a program, is a sequence of instructions, which can be a simple instruction or
either of the other two constructs. Decision: Sometimes you need to test a condition. If the result of testing is true, you follow a sequence of instructions; if it is false, you follow a different sequence of instructions. This is called the decision (selection) construct. Repetition: In some problems, the same sequence of instructions must be repeated. You handle this with the repetition different symbols can be defined by this code. To make the size of each pattern 1 byte (8bits), the ASCII bit patterns are augmented with an extra 0 at the left. Now each pattern can easily fit into 1 byte of memory. In other words, in extended ASCII, the first pattern is 00000000and the last one is 01111111.
6. Q: How is bit pattern length related to the number of symbols the bit pattern can represent? A: Bit pattern length depends on the number of symbols, the relationship is logarithmic. The bit pattern length = log2 (number of symbols)
C3
5. Q: What are three methods to represent signed integers? A: Sigh-and-Magnitude
Format; One’s complement Format; Two’s complement Format.
13. Q: Compare and contrast the representation of 0 in
sign-and-magnitude, one’s complement, and two’s complement. A: There are two 0s in
sign-and-magnitude representation: positive and negative. In an 8-bit allocation: +0→00000000, -0→10000000. There are two 0s in one’s complement representation: positive and negative. In an 8-bit allocation: +0→00000000, -0→11111111. There is only one 0 in two’s complement: In an 8-bit allocation: 0→
00000000.00000000.
C4
14. Q: What is the inherent rule
of the AND operator? A: For each pair of input bits, the result is 1 if and only if both bits are 1; otherwise, it is 0.
15. Q: What is the inherent rule of the OR operator? A: For each pair of input bits, the result is 0 if and only if both bits are 0; otherwise, it is 1.
16. Q: What is the inherent rule of the XOR operator?
A: The CPU, main memory and input/output subsystems. 3. Q: What is the function of the ALU? A: It performs arithmetic and logical operations.
35. Q: Compare and contrast the two methods to handle the addressing of I/O devices. A: In the isolated I/O method, the instructions used to read/write memory are totally different from the instructions used to read/write input/output devices. In the
memory-mapped I/O method, the CPU treats each register in the input/output controller as a word in memory.
37. Q: Compare and contrast the three methods to handle the synchronization of the CPU with the I/O devices. A: In the programmed I/O method, synchronization is very primitive; the CPU waits for the I/O device. In the interrupt-driven I/O method, the CPU informs the I/O device that a transfer is going to happen, but it does not test the status of the I/O device
continuously. The I/O device
informs (interrupts) the CPU when it is ready. DMA method transfers a large block of data between a high-speed I/O device, such al a disk, and memory directly (without passing data through the CPU).
C6
2. Q: Name the layers of the OSI model. A: The physical layer, data-link layer, network layer, transport layer, session layer,
presentation layer and application layer.
3. Q: Name the layers of the TCP/IP protocol suite. A: The physical and data-link layers, the network layers, the transport layer and the application layer.
8. Q: What are the three common topologies? Which is most popular today? A: Bus topology, star
it is sent again. if a segment is received out of order, it is ordered with the help of the sequence numbering mechanism.
13. Q: What is the purpose of FTP? A: FTP (File Transfer Protocol) is a standard protocol on the
Internet for transferring a file from one machine to another. FTP establishes two connections between the communicating computers: one for data transfer and the other for control information (commands and
responses). The control connection is present during the entire FTP session; the data connection is present only when there are data to be transferred.
C7
4. Q: What are the components of an operating system? A: Memory manager, process manager, device manager and file manager.
11. Q: Where does a
program/job/process reside? A: A program is stored on disk (or tape). A job may be residing on disc waiting to be loaded to memory, or it may be residing in memory waiting for execution by the CPU. It may be residing on disk or in memory waiting for an input/output event, or it may be residing in memory while being executed by the CPU. A process is a job that is residing in memory.
13. Q: What kinks of states can a process be in? A: Really, waiting, running. 15. Q: If a process is in the running state, what states can it go to next? A: Ready and waiting.
C8
1. Q: What is the formal definition of an algorithm? A: An ordered set of
unambiguous steps that produces a result and terminates in a finite time.
2. Q: Define the three
construct.
10. Q: What are the three types of sorting algorithm? A: Selection sort, Bubble sort, and insertion sort.
13. Q: What are the two major types of searches? How are they different? A: Sequential search and binary search. Sequential search is used if the list being searched is not ordered. In a sequential search, you start searching for the target from the beginning of the list. You continue until you either find the target or you are sure that it is not in the list. If the list is sorted, you can use a more efficient algorithm called binary search. A binary search starts by testing the data in the element at the middle of the list. This determines if the target is in the first half or the second half of the list and eliminates the half the list from further consideration.
The definition of the OS:
An operating system is an interface between the hardware of a
computer and the users (programs or humans) that facilitates the execution of other programs and the access to hardware and software resources.
總結
以上是生活随笔為你收集整理的计算机导论简答芯片,吉大计算机 - 计算机导论简答题 (2011级)的全部內容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: 量子计算机真随机数,量子真随机数发生器研
- 下一篇: 婚礼在家里举办还是在酒店里举办?[已扎口