作者s88239 (s88239)
看板NTU-Exam
标题[试题] 100上 陈彦仰 计算机概论 第一次期中考
时间Wed Nov 16 20:51:47 2011
课程名称︰计算机概论
课程性质︰选修
课程教师︰陈彦仰
开课学院:电机资讯学院
开课系所︰资讯工程学系
考试日期(年月日)︰2011.10.18
考试时限(分钟):120分钟
是否需发放奖励金:是
(如未明确表示,则不予发放)
试题 :
Part I: Multiple Choice Problems (20 points)
1. Which of the following is not a member of the Unix family?
a. BSD b. Ubuntu c. OS/2 d. Solaris
2. Which of the following is not an operating system commonly found in mobile
phones?
a. Windows 7 b. iOS c. Android d. Symbian
3. What's the name of the first large-scale electronic general-purpose digital
computer?
a. ABC b. Colossus c. ENIAC d. Z1
4. Who defined the computational model that laid the foundation of all modern
computers?
a.Alan Turing b.John von Neumann c.John William Mauchly d.J.Presper Echert
5. Which is a volatile storage?
a. Hard disk b. DRAM c. Floppy d. Flash memory
6. Which is not an optical drive?
a. ROM b. DVD-RAM c. DVD-R d. CD-ROM
7. The Windows' Task Manager/Mac OS' Activity Monitor/Unix's top are system
utilities for monitoring
a. processes b. memory c. network d. all of the above
8. To save a file and exit from Vim, use the command
a. :w b. :q c. :wq d. :q!
9. Which command can you use to compress a directory?
a. tar xvf b. tar cvf c. tar zcf d. tar zxf
10.Which command can you use to get help in Linux?
a. how b. sos c. help d. man
Part II: Alphabet Soup (15 points)
For each terminology, spell it out completely (in English), and explain (in
either Chinese or English) briefly.
1. SSH
2. BIOS
3. LRU
4. ROM
5. RAM
Part III: Short Answers (70 points)
Answer the following questions briefly but clearly.
1. What are the two key concepts defined by the von Neumann architecture?
(5 points)
2. Consider a simple 16-bit computer, what is the range of unsigned binary
number the can be represented using 16 bits? (5 points)
3. Is 10 bits long enough to represent -512 in the 2's complement notaion?
If yes, what is it? If not, please explain the reason. (5 points)
4. What is HDD? What is SSD? What is the difference between them? (5 points)
5. Please explain briefly the "许功盖" problem in Chines encoding and its
solution. (5 points)
6. Why should one use ssh instead of the basic telnet? (5 points)
7. Write the Linux commands for performing the following tasks. (25 points)
A. Define a short name for a long command.
B. Find out whar shell you're using.
C. List all files whose names start with NTU.
D. Print lines from all .txt files matching the pattern "hello".
E. Show the 6th to 10th line of a file.
8. What is the following command doing: tar cf txt.tar `find . -name "*.txt"`
(5 points)
9. Let any given positive number n (n>=3) be represented by a string of n "1"s.
Design a Turing Machine to do "subtracting 3 from the number" with the
smallest number of states. (The number of states must be less than 5)
(10 points)
--
Answers:
Part I:
1.c 2.a 3.c 4.a 5.b 6.a 7.d 8.c 9.c 10.d
Part II:
1. Secure Shell
SSH uses public-key cryptography to authenticate the remote computer and
connects computers via a secure channel.
2. Basic Input/Output System
BIOS software is stored in a non-volatile ROM and it is the first code run by
a PC when powered on.
3. Least Recently Used
LRU is a cache algorithm. It discards the least recently used item first.
4. Read Only Memory
5. Random Access Memory
RAM is a form of computer data storage. It’s often associated with volatile
types of memory.
Part III:
1. stored-program concept & separation of the processing from data
2. 0~65536
3. Yes, it’s 1000000000.
4. HDD (Hard Disc Drive) is a non-volatile, random access digital magnetic data
storage device.
SSD (Solid State Drive) is a data storage device that uses solid-state memory
(e.g. NAND-based flash memory) to store persistent data.
SSD is faster and more robust. It also takes less energy and has less noise.
However, SSD is more expensive and has less capacity.
5. The second bytes of one of “许功盖” in Big-5 is as same as the back slash
in ASCII. Because back slash is a lead character of control symbols in ASCII,
some systems will take these words as a part of some control symbols and won’
t show them correctly.
The solution is use UTF-8 instead of Big-5 when encoding traditional Chinese.
6. SSH is more secure by the public key cryptography.
7. A. (in bash) alias short_cmd=”long cmd”
B. echo $SHELL
C. ls NTU*
D. grep hello `find . –name “*.txt”`
E. head –n 10 [filename] | tail –n 5
8. Create a new archive contains all the .txt files in the current folder.
9. (1,_,→)(1,_,→)(1,_,→)
┌──┐┌──┐┌──┐
│ ↓│ ↓│ ↓
○ ○ ○ ○
│↑
└┘
(_,_,→)
--
※ 发信站: 批踢踢实业坊(ptt.cc)
◆ From: 140.112.242.63
1F:→ andy74139 :已收录至资讯系!! 11/16 23:42
※ 编辑: s88239 来自: 140.112.242.63 (11/20 15:35)