作者s88239 (s88239)
看板NTU-Exam
標題[試題] 100上 陳彥仰 計算機概論 第一次期中考
時間Wed Nov 16 20:51:47 2011
課程名稱︰計算機概論
課程性質︰選修
課程教師︰陳彥仰
開課學院:電機資訊學院
開課系所︰資訊工程學系
考試日期(年月日)︰2011.10.18
考試時限(分鐘):120分鐘
是否需發放獎勵金:是
(如未明確表示,則不予發放)
試題 :
Part I: Multiple Choice Problems (20 points)
1. Which of the following is not a member of the Unix family?
a. BSD b. Ubuntu c. OS/2 d. Solaris
2. Which of the following is not an operating system commonly found in mobile
phones?
a. Windows 7 b. iOS c. Android d. Symbian
3. What's the name of the first large-scale electronic general-purpose digital
computer?
a. ABC b. Colossus c. ENIAC d. Z1
4. Who defined the computational model that laid the foundation of all modern
computers?
a.Alan Turing b.John von Neumann c.John William Mauchly d.J.Presper Echert
5. Which is a volatile storage?
a. Hard disk b. DRAM c. Floppy d. Flash memory
6. Which is not an optical drive?
a. ROM b. DVD-RAM c. DVD-R d. CD-ROM
7. The Windows' Task Manager/Mac OS' Activity Monitor/Unix's top are system
utilities for monitoring
a. processes b. memory c. network d. all of the above
8. To save a file and exit from Vim, use the command
a. :w b. :q c. :wq d. :q!
9. Which command can you use to compress a directory?
a. tar xvf b. tar cvf c. tar zcf d. tar zxf
10.Which command can you use to get help in Linux?
a. how b. sos c. help d. man
Part II: Alphabet Soup (15 points)
For each terminology, spell it out completely (in English), and explain (in
either Chinese or English) briefly.
1. SSH
2. BIOS
3. LRU
4. ROM
5. RAM
Part III: Short Answers (70 points)
Answer the following questions briefly but clearly.
1. What are the two key concepts defined by the von Neumann architecture?
(5 points)
2. Consider a simple 16-bit computer, what is the range of unsigned binary
number the can be represented using 16 bits? (5 points)
3. Is 10 bits long enough to represent -512 in the 2's complement notaion?
If yes, what is it? If not, please explain the reason. (5 points)
4. What is HDD? What is SSD? What is the difference between them? (5 points)
5. Please explain briefly the "許功蓋" problem in Chines encoding and its
solution. (5 points)
6. Why should one use ssh instead of the basic telnet? (5 points)
7. Write the Linux commands for performing the following tasks. (25 points)
A. Define a short name for a long command.
B. Find out whar shell you're using.
C. List all files whose names start with NTU.
D. Print lines from all .txt files matching the pattern "hello".
E. Show the 6th to 10th line of a file.
8. What is the following command doing: tar cf txt.tar `find . -name "*.txt"`
(5 points)
9. Let any given positive number n (n>=3) be represented by a string of n "1"s.
Design a Turing Machine to do "subtracting 3 from the number" with the
smallest number of states. (The number of states must be less than 5)
(10 points)
--
Answers:
Part I:
1.c 2.a 3.c 4.a 5.b 6.a 7.d 8.c 9.c 10.d
Part II:
1. Secure Shell
SSH uses public-key cryptography to authenticate the remote computer and
connects computers via a secure channel.
2. Basic Input/Output System
BIOS software is stored in a non-volatile ROM and it is the first code run by
a PC when powered on.
3. Least Recently Used
LRU is a cache algorithm. It discards the least recently used item first.
4. Read Only Memory
5. Random Access Memory
RAM is a form of computer data storage. It’s often associated with volatile
types of memory.
Part III:
1. stored-program concept & separation of the processing from data
2. 0~65536
3. Yes, it’s 1000000000.
4. HDD (Hard Disc Drive) is a non-volatile, random access digital magnetic data
storage device.
SSD (Solid State Drive) is a data storage device that uses solid-state memory
(e.g. NAND-based flash memory) to store persistent data.
SSD is faster and more robust. It also takes less energy and has less noise.
However, SSD is more expensive and has less capacity.
5. The second bytes of one of “許功蓋” in Big-5 is as same as the back slash
in ASCII. Because back slash is a lead character of control symbols in ASCII,
some systems will take these words as a part of some control symbols and won’
t show them correctly.
The solution is use UTF-8 instead of Big-5 when encoding traditional Chinese.
6. SSH is more secure by the public key cryptography.
7. A. (in bash) alias short_cmd=”long cmd”
B. echo $SHELL
C. ls NTU*
D. grep hello `find . –name “*.txt”`
E. head –n 10 [filename] | tail –n 5
8. Create a new archive contains all the .txt files in the current folder.
9. (1,_,→)(1,_,→)(1,_,→)
┌──┐┌──┐┌──┐
│ ↓│ ↓│ ↓
○ ○ ○ ○
│↑
└┘
(_,_,→)
--
※ 發信站: 批踢踢實業坊(ptt.cc)
◆ From: 140.112.242.63
1F:→ andy74139 :已收錄至資訊系!! 11/16 23:42
※ 編輯: s88239 來自: 140.112.242.63 (11/20 15:35)