Key FE Flashcards
The ________ model is the basis for today’s computers.
von Neumann
In a computer, the ________ subsystem stores data and programs.
memory
In a computer, the ________ subsystem performs calculations and
logical operations.
ALU
In a computer, the ________ subsystem accepts data and programs and
sends processing results to output devices.
input/output
In a computer, the ________ subsystem serves as a manager of the
other subsystems.
control unit
According to the von Neumann model, ________ are stored in memory.
data and programs
A step-by-step solution to a problem is called ________
an algorithm
FORTRAN and COBOL are examples of ________ .
computer languages
A 17th-century computing machine that could perform addition and
subtraction was the ________
Pascaline
________ is a set of instructions in a computer language that tells the
computer what to do with data.
A program
________ is the design and writing of a program in structured form.
Software engineering
The first electronic special-purpose computer was called ________
ABC
One of the first computers based on the von Neumann model was called ________ .
EDVAC
The first computing machine to use the idea of storage and
programming was called ________ .
the Jacquard loom
________ separated the programming task from computer operation tasks.
High-level programming languages
The base of the decimal number system is ________
10
The base of the binary number system is ________ .
2
The base of the octal number system is ________ .
8
The base of the hexadecimal number system is ________ .
16
When converting a decimal integer to base b, we repeatedly _______
. divide by
When converting a decimal fraction to base b, we repeatedly ________
multiply by
In a set of 64 symbols, each symbol requires a bit pattern length of
________ bits.
6
How many symbols can be represented by a bit pattern with ten bits?
1024
f the ASCII code for E is 1000101, then the ASCII code for e is
________ . Answer the question without consulting the ASCII table.
1100101
A 32-bit code called ________ represents symbols in all languages.
Unicode
An image can be represented in a computer using the ________ method.
either bitmap or vector graphic
In the ________ graphic method of representing an image in a computer,
each pixel is assigned a bit patterns.
bitmap
In the ________ graphic method of representing an image in a computer,
the image is decomposed into a combination of geometrical figures.
vector
In the ________ graphic method of representing an image in a computer,
re-scaling of the image creates a ragged or grainy image.
bitmap
When we want to store music in a computer, the audio signal must be ________ .
sampled, quantized, and coded
A floating-point value after normalization is (1.0101) ? 2?4. What is the value of exponent section in the Excess-127 representation?
123
Assume a new Excess system uses 17 bits to represent the exponent
section. What is the bias value in this system?
65535
Which number representation method is often used to store the
exponential value of a fractional part?
Excess
In an Excess conversion, we ________ the number to be converted.
add the bias number to
When a fractional part is normalized, the computer stores the ________
the sign, exponent, and mantissa
The combination of sign and mantissa of a real number in IEEE
standard floating point format is stored as an integer in the ________
representation.
sign-and-magnitude
________ is an arithmetic operation.
Subtraction
________ is a logical bit operator.
exclusive OR, unary NOT, or binary AND
The ________ method of integer representation is the most common
method for storing integers in computer memory.
two’s complement
In two’s complement addition, if there is a final carry after the left most
column addition, ________ .
discard it
For an 8-bit allocation, the smallest decimal number that can be
represented in two’s complement form is ________
-128
For an 8-bit allocation, the largest decimal number that can be
represented in two’s complement form is ________
127
In two’s complement representation with a 4-bit allocation, we get
________ when we add 1 to 7.
-8
In two’s complement representation with a 4-bit allocation, we get
________ when we add 5 to 5.
-6
If the exponent in Excess_127 is binary 10000101, the exponent in
decimal is ________ .
6
If we are adding two numbers, one of which has an exponent value of 7
and the other an exponent value of 9, we need to shift the decimal point of the
smaller number ________ .
two places to the left
________ operator (s) takes two inputs to produce one output.
AND, OR, or XOR
The unary ________ operator inverts its single input.
NOT
________ operator (s), if the input is two 0s, the output is 0.
In AND, OR, or XOR
________ operator (s), if the input is two 1s, the output is 0.
In only XOR
For the binary AND operation, only an input of ________ gives an
output of 1.
two 1s
For the binary OR operation, only an input of ________ gives an output of 0.
two 0s
We use a bit pattern called a ________ to modify another bit pattern.
mask
To flip all the bits of a bit pattern, make a mask of all 1s and then
________ the bit pattern and the mask.
XOR
To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s
and then ________ the bit pattern and the mask.
AND
To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then ________ the bit pattern and the mask.
OR
The ________ is a computer subsystem that performs operations on
data.
CPU
________ is a stand-alone storage location that holds data temporarily.
A register
________ is a unit that can add two inputs.
An ALU
A register in a CPU can hold ________ .
data, instruction, or program counter values
A control unit with five wires can define up to ________ operations.
32
A word can be ________ bits.
8, or 16, or 32
If the memory address space is 16 MB and the word size is 8 bits, then________ bits are needed to access each word.
24
The data in ________ is erased if the computer is powered down.
RAM
________ is a memory type with capacitors that need to be refreshed periodically.
DRAM
________ is a memory type with traditional flip-flop gates to hold data.
SRAM
There are ________ bytes in 16 Terabytes.
2^16
________ can be programmed and erased using electronic impulses but can remain in a computer during erasure.
EEPROM
________ is a type of memory in which the user, not the manufacturer,
stores programs that cannot be overwritten.
PROM
Main memory in a computer usually consists of large amounts of________ speed memory.
low
A ________ is a storage device to which the user can write information only once.
CD-R
A ________ is a storage device that can undergo multiple writes and erasures.
CD-RW
The smallest storage area on a magnetic disk that can be accessed at one time is a ________ .
sector
If the memory has 232 words, the address bus needs to have ________ wires.
32
A control bus with eight wires can define ________ operations.
256
A ________ controller is a high-speed serial interface that transfers data in packets.
USB and FireWire
The three steps in the running of a program on a computer are
performed in the specific order ________ .
fetch, decode, and execute
In the ________ method for synchronizing the operation of the CPU with an I/O device, the CPU is idle until the I/O operation is finished.
programmed I/O
In the ________ method for synchronizing the operation of the CPU with an I/O device, a large block of data can be passed from an I/O device to memory directly.
DMA
The TCP/IP model has ________ layers.
5
The ________ layer of the TCP/IP protocol suite provides services for end users.
application
The ________ layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.
physical
The ________ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.
data-link
The ________ layer of the TCP/IP protocol suite is responsible for
source-to-destination delivery of the entire message.
network
What is the domain name in the email address kayla@nasa.gov?
nasa.gov
Which physical topology uses a hub or switch?
star
IP addresses are currently ________ bits in length.
32
________ protocol (s) is one of the protocols in the transport layer.
TCP, UDP, and SCTP
________ is a protocol for email services.
SMTP
________ is a protocol for file transfer.
FTP
________ is a protocol for accessing and transferring documents on the WWW.
HTTP
________ is a program that facilitates the execution of other programs.
An operating system
________ supervises the activity of each component in a computer
system.
An operating system
________ is multi-programming with swapping.
Demand paging
________ is multi-programming without swapping.
Partitioning
In ________ , only one program can reside in memory for execution.
mono-programming
________ is a multi-programming method in which multiple programs are entirely in memory with each program occupying a contiguous space.
Partitioning
In paging, a program is divided into equally sized sections called________ .
pages
In ________ , the program can be divided into differently sized sections.
demand segmentation
In ________ , the program can be divided into equally sized sections called pages, but the pages need not be in memory at the same time for execution.
demand paging
A process in the ________ state can go to either the ready, terminated, or waiting states.
running
A process in the ready state goes to the running state when ________ .
it gets access to the CPU
A program becomes a ________ when it is selected by the operating system and brought to the hold state.
job
Every process is ________ .
a job and a program
The ________ scheduler creates a process from a job and changes a process back to a job.
job
The ________ scheduler moves a process from one process state to another.
process
To prevent ________ , an operating system can put resource
restrictions on processes.
deadlock
________ can occur if a process has too many resource restrictions.
Starvation
The ________ manager is responsible for archiving and backup.
file
The ________ manager is responsible for access to I/O devices.
device
________ is a step-by-step method for solving a problem or doing a task.
An algorithm
There are ________ basic constructs in computer -science.
three
The ________ construct tests a condition.
decision
The ________ construct uses a set of actions one after another.
sequence
The ________ construct handles repeated actions.
repetition
________ is a pictorial representation of an algorithm.
A UML diagram
________ is an English-language-like representation of code.
Pseudocode
________ is a basic algorithm that adds a list of numbers.
Summation
________ is a basic algorithm that multiplies a list of numbers.
Product
________ is a basic algorithm that arranges data according to its value.
Sorting