日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 人文社科 > 生活经验 >内容正文

生活经验

计算机导论简答芯片,吉大计算机 - 计算机导论简答题 (2011级)

發布時間:2023/11/27 生活经验 43 豆豆
生活随笔 收集整理的這篇文章主要介紹了 计算机导论简答芯片,吉大计算机 - 计算机导论简答题 (2011级) 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

C1

2. Q: What model is the basis for today’s computers? A: Von Neumann Model.

5. Q: What are the subsystems of the Von Neumann computer model?

A: Memory, ALU, control unit, input/output.

C2

1. Q: Name five types of data that a computer can process. A: Text, numbers, image, audio, video.

4. Q: What is the difference between ASCII and extended ASCII? A: ASCII code uses 7 bits for each symbol, this means 128 (27) A: For each pair of input bits, the result is 0 if and only if both bits are equal; otherwise, it is 1. 17. Q: What binary operation can be used to set bits? What bit pattern should be mask have? A: OR; 11111111.

18. Q: What binary operation can be used to unset bits? What bit pattern should be mask have? A: AND, 00000000.

19. Q: What binary operation can be used to flip bits? What bit pattern should be mask have? A: XOR; 11111111.

C5

1. Q: What are the three subsystems that make up a computer? topology, and ring topology. Star topology.

9. Q: Name four types of connecting devices and their functions. A: Repeater, bridge, router, and gateway.

10. Q: What’s the difference between TCP and UDP?. A: The UDP is the simpler of the two. It is an end-to-end transport level protocol that

provides only the basic necessities for end-to-end delivery of a

transmission. The TCP is a reliable transport protocol. It divides a message into a sequence of segments that are numbered

sequentially. If one segment is lost, constructs used in structured

programming. A: Sequence: An algorithm, and eventually a program, is a sequence of instructions, which can be a simple instruction or

either of the other two constructs. Decision: Sometimes you need to test a condition. If the result of testing is true, you follow a sequence of instructions; if it is false, you follow a different sequence of instructions. This is called the decision (selection) construct. Repetition: In some problems, the same sequence of instructions must be repeated. You handle this with the repetition different symbols can be defined by this code. To make the size of each pattern 1 byte (8bits), the ASCII bit patterns are augmented with an extra 0 at the left. Now each pattern can easily fit into 1 byte of memory. In other words, in extended ASCII, the first pattern is 00000000and the last one is 01111111.

6. Q: How is bit pattern length related to the number of symbols the bit pattern can represent? A: Bit pattern length depends on the number of symbols, the relationship is logarithmic. The bit pattern length = log2 (number of symbols)

C3

5. Q: What are three methods to represent signed integers? A: Sigh-and-Magnitude

Format; One’s complement Format; Two’s complement Format.

13. Q: Compare and contrast the representation of 0 in

sign-and-magnitude, one’s complement, and two’s complement. A: There are two 0s in

sign-and-magnitude representation: positive and negative. In an 8-bit allocation: +0→00000000, -0→10000000. There are two 0s in one’s complement representation: positive and negative. In an 8-bit allocation: +0→00000000, -0→11111111. There is only one 0 in two’s complement: In an 8-bit allocation: 0→

00000000.00000000.

C4

14. Q: What is the inherent rule

of the AND operator? A: For each pair of input bits, the result is 1 if and only if both bits are 1; otherwise, it is 0.

15. Q: What is the inherent rule of the OR operator? A: For each pair of input bits, the result is 0 if and only if both bits are 0; otherwise, it is 1.

16. Q: What is the inherent rule of the XOR operator?

A: The CPU, main memory and input/output subsystems. 3. Q: What is the function of the ALU? A: It performs arithmetic and logical operations.

35. Q: Compare and contrast the two methods to handle the addressing of I/O devices. A: In the isolated I/O method, the instructions used to read/write memory are totally different from the instructions used to read/write input/output devices. In the

memory-mapped I/O method, the CPU treats each register in the input/output controller as a word in memory.

37. Q: Compare and contrast the three methods to handle the synchronization of the CPU with the I/O devices. A: In the programmed I/O method, synchronization is very primitive; the CPU waits for the I/O device. In the interrupt-driven I/O method, the CPU informs the I/O device that a transfer is going to happen, but it does not test the status of the I/O device

continuously. The I/O device

informs (interrupts) the CPU when it is ready. DMA method transfers a large block of data between a high-speed I/O device, such al a disk, and memory directly (without passing data through the CPU).

C6

2. Q: Name the layers of the OSI model. A: The physical layer, data-link layer, network layer, transport layer, session layer,

presentation layer and application layer.

3. Q: Name the layers of the TCP/IP protocol suite. A: The physical and data-link layers, the network layers, the transport layer and the application layer.

8. Q: What are the three common topologies? Which is most popular today? A: Bus topology, star

it is sent again. if a segment is received out of order, it is ordered with the help of the sequence numbering mechanism.

13. Q: What is the purpose of FTP? A: FTP (File Transfer Protocol) is a standard protocol on the

Internet for transferring a file from one machine to another. FTP establishes two connections between the communicating computers: one for data transfer and the other for control information (commands and

responses). The control connection is present during the entire FTP session; the data connection is present only when there are data to be transferred.

C7

4. Q: What are the components of an operating system? A: Memory manager, process manager, device manager and file manager.

11. Q: Where does a

program/job/process reside? A: A program is stored on disk (or tape). A job may be residing on disc waiting to be loaded to memory, or it may be residing in memory waiting for execution by the CPU. It may be residing on disk or in memory waiting for an input/output event, or it may be residing in memory while being executed by the CPU. A process is a job that is residing in memory.

13. Q: What kinks of states can a process be in? A: Really, waiting, running. 15. Q: If a process is in the running state, what states can it go to next? A: Ready and waiting.

C8

1. Q: What is the formal definition of an algorithm? A: An ordered set of

unambiguous steps that produces a result and terminates in a finite time.

2. Q: Define the three

construct.

10. Q: What are the three types of sorting algorithm? A: Selection sort, Bubble sort, and insertion sort.

13. Q: What are the two major types of searches? How are they different? A: Sequential search and binary search. Sequential search is used if the list being searched is not ordered. In a sequential search, you start searching for the target from the beginning of the list. You continue until you either find the target or you are sure that it is not in the list. If the list is sorted, you can use a more efficient algorithm called binary search. A binary search starts by testing the data in the element at the middle of the list. This determines if the target is in the first half or the second half of the list and eliminates the half the list from further consideration.

The definition of the OS:

An operating system is an interface between the hardware of a

computer and the users (programs or humans) that facilitates the execution of other programs and the access to hardware and software resources.

總結

以上是生活随笔為你收集整理的计算机导论简答芯片,吉大计算机 - 计算机导论简答题 (2011级)的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。