FE Csi
FE Csi
One of the first computers based on the von Neumann model was called ___ .EDVAC
store music in a computer_ audio signal must be__ sampled, quantized, and coded
Assume a new Excess system uses DMA bits to represent the exponent
section. What is the bias value in this system?
65535
fractional part is normalized, the computer stores the__ the sign, exponent, and mantissa
combination of sign and mantissa of a real number_in IEEE standard_store as an integer__ sign-and-
magnitude representation.
two's complement__ most common method for storing integers in computer memory.
two's complement addition___ if there is a final carry( lần thực hiện cuối cùng) after the left most
column addition, discard it
smallest decimal number that can be represented in two's complement with n bit allocation: -2^(n-1)
8 bit: -2^(8-1)= -128
largest decimal number that can be represented in two's complement with n bit allocation: (2^(n-1))-1
8 bit: 2^7 -1=128-1=127
To flip all the bits of a bit pattern, make a mask of all 1s and then
________ the bit pattern and the mask. XOR
The smallest storage area on a magnetic disk that can be accessed at one time is a _____sector
A control unit with five wires can define up to ________ operations_operation of n wires= 2^n
32
If the memory has 232 words, the address bus needs to have ________wires.
32
USB and FireWire controller__high-speed serial interface(giao diện tiếp nối tốc độ cao)___transfers
data in packets.
THE OS
An operating system
__program that facilitates the execution of other programs.
___supervises the activity of each component in a computer
system.
Multi-programming__require__time-sharing OS
Multi-programming__with swapping__demand paging
Multi-programming___without swapping__partitioning
only one program can reside in memory for execution.___mono-programming
partitioning__pp lập trình_multiple programs are entirely in memory with each program occupying a
contiguous space.
phân vùng__nhiều chương trình hoàn toàn nằm trong bộ nhớ với mỗi chương trình chiếm một không
gian liền kề.
job__program selected by the operating system and brought to the hold state.
a process__a job+a program
Data is compressed using a dictionary with indexes to strings. This is _______
Lempel Ziv encoding___lossless
A string of one hundred 0s is replaced by two markers, a 0, and the number 100. This is ________ .
run-length encoding___lossless
In a ________ data compression method, the received data is an exact copy of the original message.
lossless____(ex: Huffman, run-length, or LZ)
________ data compression method, the received data need not be an exact copy of the original
message.(lossy)
In MP3, JPEG, or MPEG
In JPEG encoding, the ________ process breaks the original picture into smaller blocks and assigns a
value to each pixel in a block.(gán giá trị cho mỗi pixel trong mỗi khối)
blocking
______ is a lossy compression method for pictures and graphics, whereas ________ is a lossy
compression method for video.
JPEG, MPEG
JPEG_picture & graphic
MPEG_video
Which type of guided medium is the least susceptible to attenuation and inductance? *
Loại phương tiện được hướng dẫn nào ít bị suy giảm và tự cảm nhất? *
Coaxial cable
Copper wire
Fiber-optic cable(cáp quang)
Golden wire
In Windows , you can see the Task manager by using which of the following? *
1/1
Tab +Alt +Del key
Shift +Alt +Del key
Ctrl+Alt +Del key
Fn +Alt +Del key
The process of arranges the disk's surface into addressable areas and sets up the disk's basic directory
tree structure *
Quá trình sắp xếp bề mặt của đĩa thành các khu vực có thể địa chỉ và thiết lập cấu trúc cây thư mục cơ bản của đĩa *
Partitioning
Set up
Booting
Formatting
What features of transistors made them superior for computers, compared with vacuum tubes? *
1/1
They were more expensive than tubes but lasted longer and were cooler in temperature.
They didn't last as long as tubes but were less expensive.
They were cheaper and smaller than tubes.
They were cheaper, smaller, and cooler than tubes and lasted longer.
Today, Microsoft considers its major competition in operating systems to be what system? *
Control Data Corporation OS
Sega Games operating system
Linux operating system
Mac OS X
A _______________ in computer terminology is a set of wires and protocols designed to facilitate data
transfer *
Gate
Bus
Boolean circuit
CPU
What is the positional value(giá trị vị trí, ví dụ như A nằm ở vị trí 8^1 thì giá trị vị trí là 8^1) of the A
in the hexadecimal number C4A6? *
16
Which topology has become more popular with the advent of the Internet and home networking? *
Star
The _______________ contains instructions and data that provide the startup program for a computer.
*BIOS
A ... is a standard or typical example of how something might work, but without all the built-in
functionality. *(giống khai báo nguyên mẫu)
prototype
Which portion of the TCP/IP protocol suite provides error detection and correction *
TCP
.............. are uninvited guest programs on your computer with the potential to damage files and the
operating system *
Virus
How many IP addresses are presented to the Internet when NAT is used? *
1
__________ means that the data must arrive at the receiver exactly as they were sent. *
a. Nonrepudiation
b. Message integrity
c. Authentication
d. Secrecy
______________ can provide authentication, integrity, and nonrepudiation for a message. *
a. Encryption/decryption
b. Digital signature
c. Compression
d. Key-exchange
In ___________, the identity of a party is verified once for the entire duration of system access. *
a. entity authentication
In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly known? *
b. decryption key only
In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the
public key of _______. *
b. user B
------CHAP 12---------------------------------------------------------
____ determines whether the project is worth doing, and specifying the advantages and
disadvantages of this application.
d. Project feasibility
Testing software to ensure that it meets the software specifications is called ____.
b. software validation
Modifying or changing the software to meet changing customer needs is called ____.
a. software evolution
A(n) ____ is a standard or typical example that gives the end user a good idea of what they will see
when their application is completed.
b. prototype
In the ____ model of software development, the developer writes a program and continues to
modify it until the system is functional.
d. build and fix
With ____ tools are available that allow end users to work with prototypes of the screens and other
interfaces.
b. rapid prototyping
------CHAP 17---------
A _______ is a pictorial representation of the states and their relationships to each other.
a. transition diagram
A _______ shows, among other things, the movement of the read/write head, the character read, and
the character written.
c. transition table
We use _______ to denote a program's complexity.
b. big-O notation
The complexity of a problem is O (log10 n) and the computer executes 1 million instructions per
second. How long does it take to run the program if the number of operations is 10,000?
d. 4 microseconds