1993 Illinois JETS TEAMS Regional Computer Fundamentals Test. a. 3 b. 8 c. 12 d. 16 e. 20

Size: px
Start display at page:

Download "1993 Illinois JETS TEAMS Regional Computer Fundamentals Test. a. 3 b. 8 c. 12 d. 16 e. 20"

Transcription

1 1. Which answer below best describes the purpose of the following pseudocode? Assume that the code is using an array a with n elements. j = 0 m = j do i = 1 to n if a[i] = j then m = m + 1 end if end do t = j j = m m = t a. set the value of j equal to zero b. set the value of j equal to the number of zero values in the array c. set the value of m equal to the number of zero values in the array d. set the value of the elements of the array equal to zero e. none of these 2. The principle of information hiding is: a. it is hard to find specific detailed information in documentation that is separate from source code. b. lack of communication within a programming team can result in lost data. c. the user should not have to be concerned with where in memory information is stored. d. it is a problem if management keeps information regarding specification changes from a programming team. e. information within a module is inaccessible to other modules which have no need for such information. 3. The Yetun Uther computer can be purchased with or without a math coprocessor, with or without a builtin modem, and with either a monochrome, standard color or a high resolution color monitor. How many configurations are there? a. 3 b. 8 c. 12 d. 16 e A metric is something that can be quantified, and for which records can be kept for future reference. Software metrics include a. the time needed to develop half the software. b. how much better the software will be with enhancements. c. how much better the product would be in a structured language. d. the number of times the source code is compiled. e. none of the above - there are no metrics in software. 5. Lines of code (LOC) is a measure that a. is used only by small software companies. b. is clearly defined and universally used. c. varies from one language to another. d. is only used with higher level languages. e. is only used with software written by teams. 1

2 6. Subroutines a. are only used with structured languages b. are only needed in interactive programs c. only use global variables which are passed as parameters d. must be compiled separately e. may use both local and global variables 7. In a binary search, the elements of the array must be in order. To search for a specific element, look at the middle and see if you need to go forward or backward. Then go to the middle of the remaining half, and continue until the element is found. If an ordered array contains 500 elements, what is the maximum number of elements that must be examined? a. 1 b. 9 c. 25 d. 250 e. can't tell from the information given 8. Good computing practice requires systematic backup procedures a. to provide duplicate copies to use on other computers b. to prevent attacks by viruses c. to create duplicate copies in case of system failure d. to prevent unauthorized users from accessing files e. to make additional copies for system managers 9. A word processor can be used to change strings of text. If a word processor is used to change every occurrence of 'ec' to 'XX' in the following string, what will the result be? Eclectic collections of electronic technology a. XXlXXtic collxxtions of elxxtronxx txxhnology b. EclXXtic collxxtions of XXXXtronic txxhnology c. XXlXXtic collxxtions of elxxtronic txxhnology d. EclXXtic collxxxions of elxxxronic texxnology e. EclXXtic collxxtions of elxxtronic txxhnology 10. A monitor has a resolution of 180,000. Which of the following pixel configurations is possible? a x 600 b. 600 x 300 c. 300 x 900 d. 120 x 600 e. 120,000 x 60, Viruses are a serious problem with microcomputers If you have a commercial anti-viral program on computer your a. you only need to run it when you use floppy disks. b. it will prevent viruses from getting on your backup disks. c. when run, it will check for viruses it knows how to detect. d. if you use it every day you will be safe from all viruses. e. you only need to run it when you know you have a virus. 2

3 12. What is the output of the following pseudocode? do i := 1 to 4 by 1 do j := 1 to i+1 by 1 print ('*') end do do 6 downto i+2 by 1 print ('*') end do end do a. a string of 16 asterisks b. a string of 20 asterisks c. a string of 24 asterisks d. a string of 28 asterisks e. a string of 32 asterisks 13. If you want to protect your software by Trade Secret, it is important to keep it a secret. This means a. all copies of the source code must be kept under lock and key at all times. b. anyone who sees the software must sign a nondisclosure agreement. c. you market only the object code. d. all of these e. none of these 14. For a linear (or sequential) search, members of the array to be searched a. must be in nondescending sequence b. must be in nonascending sequence c. must be in either nondescending or nonascending sequence d. must not be in either nondescending or nonascending sequence e. may be in any sequence Use the pseudocode below for the questions The purpose of the code is to do a binary search on the first n members of the array a[1..n] to set the value indx to the index of an array member equal to the search value key. first := 1 last := n indx := 0 while first <= last do med := (first + last)/2 if a[med] = key then begin indx = med first = last + 1 end else if a[med] > key then last = med - 1 else first = med + 1 end if end if end while 15. For satisfactory performance of the code, members of the array a. must be in nondescending sequence b. must be in nonascending sequence c. must be in either nondescending or nonascending sequence d. may be in any sequence e. sequencing requirements cannot be determined 16. If the array to be searched does not include a value equal to the search value key a. indx will be set equal to zero b. key will be set equal to zero c. an error condition will be indicated and program execution will be terminated d. results cannot be predicted e. none of the above 3

4 17. For values of n = 12, key = 18, and array members as shown, what is the value stored for indx after execution of the code? a[1] = 40 a[4] = 32 a[7] = 22 a[10] = 18 a[2] = 38 a[5] = 25 a[8] = 20 a[11] = 18 a[3] = 38 a[6] = 323 a[9] = 18 a[12] = 10 a. 13 b. 11 c. 10 d. 9 e What does the following pseudocode do? integer i,j; integer a[1..10, 1..20]; do i = 1 to 10; do j = 1 to 20; a[i,j] := 0; end do; end do; a. set all the elements of the array to zero b. set the first 10 elements of the array to zero c. set the first 20 elements of the array to zero d. set the first 20 elements of the array to zero 10 times e. set the first 10 elements of the array to zero 20 times 19. Which of the following devices is used only for output? a. mouse b. printer c. floppy disk d. keyboard e. modem 20. The FasTest II Computer has a clock cycle time of 125 nsec. What is the clock speed in MHz? a. 8 b. 10 c. 16 d. 20 e What is the decimal value of the sum of the unsigned values: A9h + 6Bh? a. 114 b. 118 c. 128 d. 270 e What is the decimal value of the hexadecimal number F1.Ch? a b c d e binary = a. 116 octal b. 180 decimal c. 128 decimal d. 76 hexadecimal e. 67 hexadecimal 24. What is the decimal value with sign and magnitude of the 1 byte two's complement signed number ? a. 66 b. 67 c. 188 d. 189 e

5 25. Which of the following is equivalent to F = (A AND B) OR (NOT A)? a. F = A OR NOT B b. F = B OR NOT A c. F = A AND NOT B d. F = B AND NOT A e. F = A OR B For questions 26 and 27, assume that a floppy disk storage system is characterized by the following specifications: Sectors/track 10 Rotation speed 240 rpm Tracks/side 30 Track to track seek 8 ms Sides 2 Worst case head seek 180 ms Bytes/sector 512 Average head seek 94 ms Sectors/cluster 2 Directory is on Track If 5 sectors are allocated for the directory, and each directory entry requires 32 bytes of information, what is the maximum number of files the diskette can hold? (Assume subdirectories are not used.) a. 25 b. 50 c. 80 d. 512 e What is the time needed to read a 4 Kbyte file? Assume the transfer time begins when the read mechanism is positioned over the beginning of the file on the correct track. The file is contained within contiguous sectors but not all on the same track. a. 200 msec b. 208 msec c. 248 msec d. 32 msec e. 33 msec 5

6 28. The following operations may be used with a stack: PUSH X put the value of X on the top of the stack; do not change X POP X put the top value on the stack into X; remove the value from the stack After the following sequence of instructions, what are the values of a, b, c, and d? integer a, b, c, d; a:=1; b:=2; c:=3; push a push b push c push a pop b pop c pop d a. a=1, b=2, c=3, d=2 b. a=1, b=3, c=4, d=2 c. a=1, b=1, c=3, d=2 d. a=3, b=2, c=1, d=0 e. this is an illegal sequence because the stack is not empty Use the information below for questions 29 and 30. The Zarlak II computer has two storage registers, A and B. Below is a partial list of assembly language commands this machine uses. Operation Description LOAD Load register A with the contents of the specified address LOADM Load register A with the specified value STORE Store the contents of register A in the specified address Copy the contents of register B to register A (register B does not change) ADD Add the contents of the specified address to the contents of register A and put the result in register B SUB Subtract the contents of the specified address from the contents of register A and put the result in register B ADDM Add the specified value to the contents of register A and put the result in register B SUBM Subtract the specified value from the contents of register A and put the result in register B 6

7 29. What sequence of instructions will subtract the contents of address 5h from the contents of address 10h and store the result in address 125h? a. LOADM 10h SUBM 5h b. LOADM 5h SUBM 10h d. LOAD 10h SUB 5h e. LOAD 5h SUB 10h c. LOADM 10h SUBM 5h 30. What does the following sequence do? LOAD 8h ADD 12h STORE 10h a. Add 8h + 12h and store the result at address 10h b. Add 8h to the contents of address 12h and store the result at address 10h c. Add 8h + 12h and replace with 10h d. Add the contents of address 8h to the contents of address 12h, then store the result at address 10h e. Add the contents of address 8h to 12h and store the result at address 10h 7

8 Answer Key 1. b 2. e 3. c 4. d 5. c 6. e 7. b 8. c 9. e 10. b 11. c 12. c 13. d 14. e 15. a 16. a 17. e 18. a 19. b 20. a 21. e 22. a 23. d 24. a 25. b 26. c 27. b 28. c 29. d 30. d 8

1993 Illinois JETS TEAMS District Computer Fundamentals Test. 1. What is the decimal value of the sum of the two unsigned binary values: ?

1993 Illinois JETS TEAMS District Computer Fundamentals Test. 1. What is the decimal value of the sum of the two unsigned binary values: ? 1. What is the decimal value of the sum of the two unsigned binary values: 1101 + 1001? a. 6 b. 12 c. 22 d. 1024 e. 10,110 2. What is the decimal value of the binary number 1101.101b? a. 13.202 b. 13.250

More information

1992 Illinois JETS TEAMS Regional Computer Fundamentals Test

1992 Illinois JETS TEAMS Regional Computer Fundamentals Test 1. Subroutines a. are always compiled separately b. are never compiled separately c. may only use local variables which are passed as parameters d. may use both local and global variables e. always use

More information

1992 Illinois JETS TEAMS District Computer Fundamentals Test

1992 Illinois JETS TEAMS District Computer Fundamentals Test 1 1992 Illinois JETS TEAMS District Computer Fundamentals Test 1. The following pseudocode is an algorithm for finding the smallest of 3 numbers, x, y, and z. Where, if anywhere, is another "end if" needed?

More information

1996 ILLINOIS JETS TEAMS DISTRICT COMPUTER FUNDAMENTALS TEST. 1. A computer program is:

1996 ILLINOIS JETS TEAMS DISTRICT COMPUTER FUNDAMENTALS TEST. 1. A computer program is: 1996 ILLINOIS JETS TEAMS DISTRICT COMPUTER FUNDAMENTALS TEST 1. A computer program is: a. a sequence of binary machine instructions b. a sequence of operations to carry out a defined task c. a set of computer

More information

CS & IT Conversions. Magnitude 10,000 1,

CS & IT Conversions. Magnitude 10,000 1, CS & IT Conversions There are several number systems that you will use when working with computers. These include decimal, binary, octal, and hexadecimal. Knowing how to convert between these number systems

More information

User. Application program. Interfaces. Operating system. Hardware

User. Application program. Interfaces. Operating system. Hardware Operating Systems Introduction to Operating Systems and Computer Hardware Introduction and Overview The operating system is a set of system software routines that interface between an application program

More information

WYSE Academic Challenge Computer Fundamentals Test (State Finals)

WYSE Academic Challenge Computer Fundamentals Test (State Finals) WYSE Academic Challenge Computer Fundamentals Test (State Finals) - 1998 1. What is the decimal value for the result of the addition of the binary values: 1111 + 0101? (Assume a 4 bit, 2's complement representation.)

More information

5. The result of dividing the 8 bit value by the 8 bit value is:

5. The result of dividing the 8 bit value by the 8 bit value is: 1. The first generation of electronic computers in the 1950's used memory technology based on a. large scale integrated circuits b. medium scale integrated circuits c. transistors d. vacuum tubes e. toroidal

More information

CS401 - Computer Architecture and Assembly Language Programming Glossary By

CS401 - Computer Architecture and Assembly Language Programming Glossary By CS401 - Computer Architecture and Assembly Language Programming Glossary By absolute address : A virtual (not physical) address within the process address space that is computed as an absolute number.

More information

Midterm spring. CSC228H University of Toronto

Midterm spring. CSC228H University of Toronto Midterm 2002 - spring CSC228H University of Toronto Duration 50 minutes Aids Allowed: none. No calculators. Student Number: Last Name: First Name: Instructor: TA: Do not turn this page until you have received

More information

COMPUTER SCIENCE SECTION A

COMPUTER SCIENCE SECTION A Total No. of Printed Pages 16 X/13/CSc 0 1 3 COMPUTER SCIENCE ( CANDIDATES WITH PRACTICAL/INTERNAL ASSESSMENT ) Full Marks : 80 Pass Marks : 4 ( CANDIDATES WITHOUT PRACTICAL/INTERNAL ASSESSMENT ) Full

More information

Chapter 1 Microprocessor architecture ECE 3120 Dr. Mohamed Mahmoud http://iweb.tntech.edu/mmahmoud/ mmahmoud@tntech.edu Outline 1.1 Computer hardware organization 1.1.1 Number System 1.1.2 Computer hardware

More information

Groups of two-state devices are used to represent data in a computer. In general, we say the states are either: high/low, on/off, 1/0,...

Groups of two-state devices are used to represent data in a computer. In general, we say the states are either: high/low, on/off, 1/0,... Chapter 9 Computer Arithmetic Reading: Section 9.1 on pp. 290-296 Computer Representation of Data Groups of two-state devices are used to represent data in a computer. In general, we say the states are

More information

CHAPTER V NUMBER SYSTEMS AND ARITHMETIC

CHAPTER V NUMBER SYSTEMS AND ARITHMETIC CHAPTER V-1 CHAPTER V CHAPTER V NUMBER SYSTEMS AND ARITHMETIC CHAPTER V-2 NUMBER SYSTEMS RADIX-R REPRESENTATION Decimal number expansion 73625 10 = ( 7 10 4 ) + ( 3 10 3 ) + ( 6 10 2 ) + ( 2 10 1 ) +(

More information

ECE232: Hardware Organization and Design

ECE232: Hardware Organization and Design ECE232: Hardware Organization and Design Lecture 4: Logic Operations and Introduction to Conditionals Adapted from Computer Organization and Design, Patterson & Hennessy, UCB Overview Previously examined

More information

Computer Technology Flash Card 2

Computer Technology Flash Card 2 Computer Technology Flash Card 2 Mouse An input device that allows the user to manipulate objects on the screen by moving the mouse along the surface of a desk. Data Refers to the symbols that represent

More information

COMP375 Practice Final Exam

COMP375 Practice Final Exam You are allowed one and only one 8½ by 11 inch page of notes during this exam. You are not allowed to use more than 187 square inches of paper surface to hold your notes. Telephone calls and texting are

More information

CSC201, SECTION 002, Fall 2000: Homework Assignment #2

CSC201, SECTION 002, Fall 2000: Homework Assignment #2 1 of 7 11/8/2003 7:34 PM CSC201, SECTION 002, Fall 2000: Homework Assignment #2 DUE DATE Monday, October 2, at the start of class. INSTRUCTIONS FOR PREPARATION Neat, in order, answers easy to find. Staple

More information

Lecture 9. I/O Management and Disk Scheduling Algorithms

Lecture 9. I/O Management and Disk Scheduling Algorithms Lecture 9 I/O Management and Disk Scheduling Algorithms 1 Lecture Contents 1. I/O Devices 2. Operating System Design Issues 3. Disk Scheduling Algorithms 4. RAID (Redundant Array of Independent Disks)

More information

VARDHAMAN COLLEGE OF ENGINEERING (AUTONOMOUS) Shamshabad, Hyderabad

VARDHAMAN COLLEGE OF ENGINEERING (AUTONOMOUS) Shamshabad, Hyderabad Introduction to MS-DOS Debugger DEBUG In this laboratory, we will use DEBUG program and learn how to: 1. Examine and modify the contents of the 8086 s internal registers, and dedicated parts of the memory

More information

ECE 3055: Final Exam

ECE 3055: Final Exam ECE 3055: Final Exam Instructions: You have 2 hours and 50 minutes to complete this quiz. The quiz is closed book and closed notes, except for one 8.5 x 11 sheet. No calculators are allowed. Multiple Choice

More information

Multiple Choice Type Questions

Multiple Choice Type Questions Techno India Batanagar Computer Science and Engineering Model Questions Subject Name: Computer Architecture Subject Code: CS 403 Multiple Choice Type Questions 1. SIMD represents an organization that.

More information

iup-200aliup-201a UNIVERSAL PROM PROGRAMMERS

iup-200aliup-201a UNIVERSAL PROM PROGRAMMERS iup-200aliup-201a UNIVERSAL PROM PROGRAMMERS MAJOR iup-200aliup-201a FEATURES: Personality Module Plug-Ins Provide Industry First Support for Intel and Intel Compatible EPROMs, EEPROMs, KEPROM, Microcontrollers,

More information

Model Answer paper Guru Ghasidas Vishwavidyalaya (Bilaspur ) B.COM(Third Semester) Examination, 2014 Fundamentals of Computers Paper Code: BC-307

Model Answer paper Guru Ghasidas Vishwavidyalaya (Bilaspur ) B.COM(Third Semester) Examination, 2014 Fundamentals of Computers Paper Code: BC-307 Model Answer paper Guru Ghasidas Vishwavidyalaya (Bilaspur ) B.COM(Third Semester) Examination, 2014 Fundamentals of Computers Paper Code: BC-307 Section- A What are the basic 3 part of the computer? Ans:

More information

COLLEGEDUNIA MCA. 3. What would be displayed, if the following program is compiled and run?

COLLEGEDUNIA MCA. 3. What would be displayed, if the following program is compiled and run? MCA 1. If a 1Gb file is to be transmitted over a 10Mbps link, how much time would it take to complete the transmission? A) 10 seconds B) 100 seconds C) 1000 seconds D) 1024 seconds 2. Which one of the

More information

231 Spring Final Exam Name:

231 Spring Final Exam Name: 231 Spring 2010 -- Final Exam Name: No calculators. Matching. Indicate the letter of the best description. (1 pt. each) 1. address 2. object code 3. condition code 4. byte 5. ASCII 6. local variable 7..global

More information

WYSE Academic Challenge 2002 Computer Science Test (Sectional) SOLUTION

WYSE Academic Challenge 2002 Computer Science Test (Sectional) SOLUTION Computer Science - 1 WYSE Academic Challenge 2002 Computer Science Test (Sectional) SOLUTION 1. Access to moving head disks requires three periods of delay before information is brought into memory. The

More information

Computer Architecture (part 2)

Computer Architecture (part 2) Computer Architecture (part 2) Topics: Machine Organization Machine Cycle Program Execution Machine Language Types of Memory & Access 2 Chapter 5 The Von Neumann Architecture 1 Arithmetic Logic Unit (ALU)

More information

231 Spring Final Exam Name:

231 Spring Final Exam Name: 231 Spring 2010 -- Final Exam Name: No calculators. Matching. Indicate the letter of the best description. (1 pt. each) 1. b address 2. d object code 3. g condition code 4. i byte 5. k ASCII 6. m local

More information

BSNL TTA Question Paper-Computers Specialization 2007

BSNL TTA Question Paper-Computers Specialization 2007 BSNL TTA Question Paper-Computers Specialization 2007 1. What is the name of the software that allows us to browse through web pages? (a) Browser (b) Mail Client (c) FTP Client (d) Messenger 2. What is

More information

UNIT 7A Data Representation: Numbers and Text. Digital Data

UNIT 7A Data Representation: Numbers and Text. Digital Data UNIT 7A Data Representation: Numbers and Text 1 Digital Data 10010101011110101010110101001110 What does this binary sequence represent? It could be: an integer a floating point number text encoded with

More information

SIO-DLL. Serial I/O DLL. User Manual

SIO-DLL. Serial I/O DLL. User Manual SIO-DLL Serial I/O DLL User Manual SIO-DLL User Manual Document Part N 0127-0178 Document Reference SIO-DLL\..\0127-0178.Doc Document Issue Level 1.3 Manual covers software version 1 All rights reserved.

More information

Tutorial 1 Microcomputer Fundamentals

Tutorial 1 Microcomputer Fundamentals Tutorial 1 Microcomputer Fundamentals Question 1 What do these acronyms mean? (a) CPU? (b) ROM? (c) EPROM? (d) RWM? (e) RAM? (f) I/O? What role does the CPU play in a computer system? Why is ROM an essential

More information

Team 1. Common Questions to all Teams. Team 2. Team 3. CO200-Computer Organization and Architecture - Assignment One

Team 1. Common Questions to all Teams. Team 2. Team 3. CO200-Computer Organization and Architecture - Assignment One CO200-Computer Organization and Architecture - Assignment One Note: A team may contain not more than 2 members. Format the assignment solutions in a L A TEX document. E-mail the assignment solutions PDF

More information

Chapter 1. Microprocessor architecture ECE Dr. Mohamed Mahmoud.

Chapter 1. Microprocessor architecture ECE Dr. Mohamed Mahmoud. Chapter 1 Microprocessor architecture ECE 3130 Dr. Mohamed Mahmoud The slides are copyright protected. It is not permissible to use them without a permission from Dr Mahmoud http://www.cae.tntech.edu/~mmahmoud/

More information

8086 Interrupts and Interrupt Responses:

8086 Interrupts and Interrupt Responses: UNIT-III PART -A INTERRUPTS AND PROGRAMMABLE INTERRUPT CONTROLLERS Contents at a glance: 8086 Interrupts and Interrupt Responses Introduction to DOS and BIOS interrupts 8259A Priority Interrupt Controller

More information

Hong Kong Polytechnic University Department of Electronic and Information Engineering. Experiment On DOS File system

Hong Kong Polytechnic University Department of Electronic and Information Engineering. Experiment On DOS File system DOSFS/CC/v1 Hong Kong Polytechnic University Department of Electronic and Information Engineering Experiment On DOS File system Objectives : To study how an OS manages its file system in a floppy disk.

More information

CS433 Homework 6. Problem 1 [15 points] Assigned on 11/28/2017 Due in class on 12/12/2017

CS433 Homework 6. Problem 1 [15 points] Assigned on 11/28/2017 Due in class on 12/12/2017 CS433 Homework 6 Assigned on 11/28/2017 Due in class on 12/12/2017 Instructions: 1. Please write your name and NetID clearly on the first page. 2. Refer to the course fact sheet for policies on collaboration.

More information

EC2304-MICROPROCESSOR AND MICROCONROLLERS 2 marks questions and answers UNIT-I

EC2304-MICROPROCESSOR AND MICROCONROLLERS 2 marks questions and answers UNIT-I EC2304-MICROPROCESSOR AND MICROCONROLLERS 2 marks questions and answers 1. Define microprocessors? UNIT-I A semiconductor device(integrated circuit) manufactured by using the LSI technique. It includes

More information

CSE 351 Midterm - Winter 2015 Solutions

CSE 351 Midterm - Winter 2015 Solutions CSE 351 Midterm - Winter 2015 Solutions February 09, 2015 Please read through the entire examination first! We designed this exam so that it can be completed in 50 minutes and, hopefully, this estimate

More information

We can study computer architectures by starting with the basic building blocks. Adders, decoders, multiplexors, flip-flops, registers,...

We can study computer architectures by starting with the basic building blocks. Adders, decoders, multiplexors, flip-flops, registers,... COMPUTER ARCHITECTURE II: MICROPROCESSOR PROGRAMMING We can study computer architectures by starting with the basic building blocks Transistors and logic gates To build more complex circuits Adders, decoders,

More information

Topics. Structured Computer Organization. Assembly language. IJVM instruction set. Mic-1 simulator programming

Topics. Structured Computer Organization. Assembly language. IJVM instruction set. Mic-1 simulator programming Topics Assembly language IJVM instruction set Mic-1 simulator programming http://www.ontko.com/mic1/ Available in 2 nd floor PC lab S/W found in directory C:\mic1 1 Structured Computer Organization 2 Block

More information

Number System. Introduction. Decimal Numbers

Number System. Introduction. Decimal Numbers Number System Introduction Number systems provide the basis for all operations in information processing systems. In a number system the information is divided into a group of symbols; for example, 26

More information

SOME ASSEMBLY REQUIRED

SOME ASSEMBLY REQUIRED SOME ASSEMBLY REQUIRED Assembly Language Programming with the AVR Microcontroller TIMOTHY S. MARGUSH CRC Press Taylor & Francis Group CRC Press is an imprint of the Taylor & Francis Croup an Informa business

More information

Contents 8051 Instruction Set BY D. BALAKRISHNA, Research Assistant, IIIT-H Chapter I : Control Transfer Instructions Lesson (a): Loop Lesson (b): Jump (i) Conditional Lesson (c): Lesson (d): Lesson (e):

More information

UC Santa Barbara. Operating Systems. Christopher Kruegel Department of Computer Science UC Santa Barbara

UC Santa Barbara. Operating Systems. Christopher Kruegel Department of Computer Science UC Santa Barbara Operating Systems Christopher Kruegel Department of Computer Science http://www.cs.ucsb.edu/~chris/ Input and Output Input/Output Devices The OS is responsible for managing I/O devices Issue requests Manage

More information

Number representations

Number representations Number representations Number bases Three number bases are of interest: Binary, Octal and Hexadecimal. We look briefly at conversions among them and between each of them and decimal. Binary Base-two, or

More information

The x86 Microprocessors. Introduction. The 80x86 Microprocessors. 1.1 Assembly Language

The x86 Microprocessors. Introduction. The 80x86 Microprocessors. 1.1 Assembly Language The x86 Microprocessors Introduction 1.1 Assembly Language Numbering and Coding Systems Human beings use the decimal system (base 10) Decimal digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Computer systems use the

More information

Chapter 3: Operating-System Structures

Chapter 3: Operating-System Structures Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1

More information

Advanced Diploma in Computer Science (907) Computer Systems Architecture

Advanced Diploma in Computer Science (907) Computer Systems Architecture Advanced Diploma in Computer Science (907) Computer Systems Architecture Prerequisites: Good computing knowledge Corequisites: A pass or better in Diploma in System Analysis & Design or equivalence. Aim:

More information

CHAPTER 5 VARIABLES AND OTHER BASIC ELEMENTS IN JAVA PROGRAMS

CHAPTER 5 VARIABLES AND OTHER BASIC ELEMENTS IN JAVA PROGRAMS These are sample pages from Kari Laitinen s book "A Natural Introduction to Computer Programming with Java". For more information, please visit http://www.naturalprogramming.com/javabook.html CHAPTER 5

More information

Review question: Protection and Security *

Review question: Protection and Security * OpenStax-CNX module: m28010 1 Review question: Protection and Security * Duong Anh Duc This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 3.0 Review question

More information

CONCEPTS OF MANAGEMENT COMPUTING

CONCEPTS OF MANAGEMENT COMPUTING CONBUS1 JUNE 2012 EXAMINATION DATE: 11 JUNE 2012 TIME: 14H00 17H00 TOTAL: 100 MARKS DURATION: 3 HOURS PASS MARK: 40% (BUS-EDP) CONCEPTS OF MANAGEMENT COMPUTING THIS EXAMINATION PAPER CONSISTS OF 4 SECTIONS:

More information

CS4411 Intro. to Operating Systems Final Fall points 10 pages

CS4411 Intro. to Operating Systems Final Fall points 10 pages CS44 Intro. to Operating Systems Final Exam Fall 9 CS44 Intro. to Operating Systems Final Fall 9 points pages Name: Most of the following questions only require very short answers. Usually a few sentences

More information

ST. MARY S COLLEGE FORM 4

ST. MARY S COLLEGE FORM 4 Term 1 Week 1 Week 2 FUNDAMENTALS OF HARDWARE AND SOFTWARE 1. The generalpurpose computer system 2. Functions of the major hardware components of a computer system 3. Functions and uses of primary storage

More information

Input/Output. Today. Next. Principles of I/O hardware & software I/O software layers Disks. Protection & Security

Input/Output. Today. Next. Principles of I/O hardware & software I/O software layers Disks. Protection & Security Input/Output Today Principles of I/O hardware & software I/O software layers Disks Next Protection & Security Operating Systems and I/O Two key operating system goals Control I/O devices Provide a simple,

More information

Summer 2003 Lecture 26 07/24/03

Summer 2003 Lecture 26 07/24/03 Summer 2003 Lecture 26 07/24/03 Organization of Data on the Disk The logical organization of the FAT file system on a disk is made up of the following elements. BOOT Sector Root Directory Structure File

More information

c. Compiler d. Program 9. To maximize a window means a. Fill it to capacity b. Expand it to fit the desktop c. Put only like files inside d.

c. Compiler d. Program 9. To maximize a window means a. Fill it to capacity b. Expand it to fit the desktop c. Put only like files inside d. SET 14 1. In Excel --- contains one or more worksheets a. Template b. Workbook c. Active cell d. Label 2. Which of the following is a popular programming language for developing multimedia web pages, websites

More information

Memory Addressing, Binary, and Hexadecimal Review

Memory Addressing, Binary, and Hexadecimal Review C++ By A EXAMPLE Memory Addressing, Binary, and Hexadecimal Review You do not have to understand the concepts in this appendix to become well-versed in C++. You can master C++, however, only if you spend

More information

Chapter 3 Machine Instructions & Programs. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan

Chapter 3 Machine Instructions & Programs. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan Chapter 3 Machine Instructions & Programs Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan Outline Numbers, Arithmetic Operations, and Characters Memory Locations

More information

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd.

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd. Parity Even parity: Odd parity: Add a bit to make the number of ones (1s) transmitted even. Add a bit to make the number of ones (1s) transmitted odd. Example and ASCII A is coded 100 0001 Parity ASCII

More information

Show how to connect three Full Adders to implement a 3-bit ripple-carry adder

Show how to connect three Full Adders to implement a 3-bit ripple-carry adder Show how to connect three Full Adders to implement a 3-bit ripple-carry adder 1 Reg. A Reg. B Reg. Sum 2 Chapter 5 Computing Components Yet another layer of abstraction! Components Circuits Gates Transistors

More information

Number Systems. Binary Numbers. Appendix. Decimal notation represents numbers as powers of 10, for example

Number Systems. Binary Numbers. Appendix. Decimal notation represents numbers as powers of 10, for example Appendix F Number Systems Binary Numbers Decimal notation represents numbers as powers of 10, for example 1729 1 103 7 102 2 101 9 100 decimal = + + + There is no particular reason for the choice of 10,

More information

PESIT Bangalore South Campus

PESIT Bangalore South Campus INTERNAL ASSESSMENT TEST I Date: 30/08/2017 Max Marks: 40 Subject & Code: Computer Organization 15CS34 Semester: III (A & B) Name of the faculty: Mrs.Sharmila Banu.A Time: 8.30 am 10.00 am Answer any FIVE

More information

COURSE OUTLINE & WEEK WISE BREAKAGE

COURSE OUTLINE & WEEK WISE BREAKAGE COURSE OUTLINE & WEEK WISE BREAKAGE Week wise Course outline of Computer Fundamentals & Programming (CE-100) 3+1 (Batch 2018-Electronic Engineering) Dated: 13-12-2017 Course Coordinator: Saeed Azhar WEEK

More information

The MARIE Architecture

The MARIE Architecture The MARIE Machine Architecture that is Really Intuitive and Easy. We now define the ISA (Instruction Set Architecture) of the MARIE. This forms the functional specifications for the CPU. Basic specifications

More information

Number Systems. Readings: , Problem: Implement simple pocket calculator Need: Display, adders & subtractors, inputs

Number Systems. Readings: , Problem: Implement simple pocket calculator Need: Display, adders & subtractors, inputs Number Systems Readings: 3-3.3.3, 3.3.5 Problem: Implement simple pocket calculator Need: Display, adders & subtractors, inputs Display: Seven segment displays Inputs: Switches Missing: Way to implement

More information

First of all, it is a variable, just like other variables you studied

First of all, it is a variable, just like other variables you studied Pointers: Basics What is a pointer? First of all, it is a variable, just like other variables you studied So it has type, storage etc. Difference: it can only store the address (rather than the value)

More information

Error Code. GO Software Pty Limited Map: 27 Tacoma Blvd, Pasadena SA 5042 ABN: ACN:

Error Code. GO Software Pty Limited Map: 27 Tacoma Blvd, Pasadena SA 5042 ABN: ACN: GO Software Pty Limited Map: 27 Tacoma Blvd, Pasadena SA 5042 Phn: 0403-063-991 Fax: none ABN: 54-008-044-906 ACN: 008-044-906 Eml: support@gosoftware.com.au Web: www.gosoftware.com.au Error Code GW-Basic

More information

Searching Algorithms/Time Analysis

Searching Algorithms/Time Analysis Searching Algorithms/Time Analysis CSE21 Fall 2017, Day 8 Oct 16, 2017 https://sites.google.com/a/eng.ucsd.edu/cse21-fall-2017-miles-jones/ (MinSort) loop invariant induction Loop invariant: After the

More information

Microprocessors I MICROCOMPUTERS AND MICROPROCESSORS

Microprocessors I MICROCOMPUTERS AND MICROPROCESSORS Microprocessors I Outline of the Lecture Microcomputers and Microprocessors Evolution of Intel 80x86 Family Microprocessors Binary and Hexadecimal Number Systems MICROCOMPUTERS AND MICROPROCESSORS There

More information

Module 3: Operating-System Structures

Module 3: Operating-System Structures Module 3: Operating-System Structures System Components Operating-System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation Operating

More information

A Review of Chapter 5 and. CSc 2010 Spring 2012 Instructor: Qian Hu

A Review of Chapter 5 and. CSc 2010 Spring 2012 Instructor: Qian Hu A Review of Chapter 5 and Chapter 6 Chapter 5 Computer Systems Organization Von Neumann Architecture 4 Components Memory Input/output ALU Control Unit Two major features Stored program concept Sequential

More information

elc International School

elc International School Subject: COMPUTER SCIENCE (0478) Syllabus 2016 Topics to be covered Section 1: Theory of Computer Science Theory: At the end of the section candidates should be able to Practical: At the end of the section

More information

Topics. Hardware and Software. Introduction. Main Memory. The CPU 9/21/2014. Introduction to Computers and Programming

Topics. Hardware and Software. Introduction. Main Memory. The CPU 9/21/2014. Introduction to Computers and Programming Topics C H A P T E R 1 Introduction to Computers and Programming Introduction Hardware and Software How Computers Store Data Using Python Introduction Computers can be programmed Designed to do any job

More information

Run time environment of a MIPS program

Run time environment of a MIPS program Run time environment of a MIPS program Stack pointer Frame pointer Temporary local variables Return address Saved argument registers beyond a0-a3 Low address Growth of stack High address A translation

More information

CS 201 The Memory Hierarchy. Gerson Robboy Portland State University

CS 201 The Memory Hierarchy. Gerson Robboy Portland State University CS 201 The Memory Hierarchy Gerson Robboy Portland State University memory hierarchy overview (traditional) CPU registers main memory (RAM) secondary memory (DISK) why? what is different between these

More information

Designing Computers. The Von Neumann Architecture. The Von Neumann Architecture. The Von Neumann Architecture

Designing Computers. The Von Neumann Architecture. The Von Neumann Architecture. The Von Neumann Architecture Chapter 5.1-5.2 Designing Computers All computers more or less based on the same basic design, the Von Neumann Architecture! Von Neumann Architecture CMPUT101 Introduction to Computing (c) Yngvi Bjornsson

More information

The Von Neumann Architecture. Designing Computers. The Von Neumann Architecture. CMPUT101 Introduction to Computing - Spring 2001

The Von Neumann Architecture. Designing Computers. The Von Neumann Architecture. CMPUT101 Introduction to Computing - Spring 2001 The Von Neumann Architecture Chapter 5.1-5.2 Von Neumann Architecture Designing Computers All computers more or less based on the same basic design, the Von Neumann Architecture! CMPUT101 Introduction

More information

CMPUT101 Introduction to Computing - Summer 2002

CMPUT101 Introduction to Computing - Summer 2002 7KH9RQ1HXPDQQ$UFKLWHFWXUH Chapter 5.1-5.2 Von Neumann Architecture 'HVLJQLQJ&RPSXWHUV All computers more or less based on the same basic design, the Von Neumann Architecture! CMPUT101 Introduction to Computing

More information

Part 2,Number Systems Questions

Part 2,Number Systems Questions Part 2,Number Systems Questions This study guide is provided as an aid in helping you to study for the ECE Department s 18-240, Fundamentals of Computer Engineering. The guide is a collection of previous

More information

Name: CMSC 313 Fall 2001 Computer Organization & Assembly Language Programming Exam 1. Question Points I. /34 II. /30 III.

Name: CMSC 313 Fall 2001 Computer Organization & Assembly Language Programming Exam 1. Question Points I. /34 II. /30 III. CMSC 313 Fall 2001 Computer Organization & Assembly Language Programming Exam 1 Name: Question Points I. /34 II. /30 III. /36 TOTAL: /100 Instructions: 1. This is a closed-book, closed-notes exam. 2. You

More information

Project 3: RPN Calculator

Project 3: RPN Calculator ECE267 @ UIC, Spring 2012, Wenjing Rao Project 3: RPN Calculator What to do: Ask the user to input a string of expression in RPN form (+ - * / ), use a stack to evaluate the result and display the result

More information

ACADEMIC YEAR PLANNING - F.Y.J.C. ( ) F.Y.J.C. COMPUTER SCIENCE (Theory)

ACADEMIC YEAR PLANNING - F.Y.J.C. ( ) F.Y.J.C. COMPUTER SCIENCE (Theory) ACADEMIC YEAR PLANNING - F.Y.J.C. (2015-16) F.Y.J.C. COMPUTER SCIENCE (Theory) JULY Number Systems & Binary Arithmetic : Binary number, decimal, octal, hexadecimal numbers, BCD,conversion from one number

More information

Two hours. No special instructions. UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date. Time

Two hours. No special instructions. UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date. Time Two hours No special instructions. UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE System Architecture Date Time Please answer any THREE Questions from the FOUR questions provided Use a SEPARATE answerbook

More information

2. Define Instruction Set Architecture. What are its two main characteristics? Be precise!

2. Define Instruction Set Architecture. What are its two main characteristics? Be precise! Chapter 1: Computer Abstractions and Technology 1. Assume two processors, a CISC processor and a RISC processor. In order to run a particular program, the CISC processor must execute 10 million instructions

More information

C02: Interrupts and I/O

C02: Interrupts and I/O CISC 7310X C02: Interrupts and I/O Hui Chen Department of Computer & Information Science CUNY Brooklyn College 2/8/2018 CUNY Brooklyn College 1 Von Neumann Computers Process and memory connected by a bus

More information

Ethical Hacking. Assembly Language Tutorial

Ethical Hacking. Assembly Language Tutorial Ethical Hacking Assembly Language Tutorial Number Systems Memory in a computer consists of numbers Computer memory does not store these numbers in decimal (base 10) Because it greatly simplifies the hardware,

More information

OS and Computer Architecture. Chapter 3: Operating-System Structures. Common System Components. Process Management

OS and Computer Architecture. Chapter 3: Operating-System Structures. Common System Components. Process Management Last class: OS and Architecture OS and Computer Architecture OS Service Protection Interrupts System Calls IO Scheduling Synchronization Virtual Memory Hardware Support Kernel/User Mode Protected Instructions

More information

Fundamentals of Programming Session 2

Fundamentals of Programming Session 2 Fundamentals of Programming Session 2 Instructor: Reza Entezari-Maleki Email: entezari@ce.sharif.edu 1 Fall 2013 Sharif University of Technology Outlines Programming Language Binary numbers Addition Subtraction

More information

Operating-System Structures

Operating-System Structures Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1 Sana a University,

More information

INFORMATION TECHNOLOGY PRINCIPLES

INFORMATION TECHNOLOGY PRINCIPLES INTBUS9 NOVEMBER 2013 EXAMINATION DATE: 6 NOVEMBER 2013 TIME: 14H00 16H00 TOTAL: 100 MARKS DURATION: 2 HOURS PASS MARK: 40% (DBM-07) INFORMATION TECHNOLOGY PRINCIPLES THIS EXAMINATION PAPER CONSISTS OF

More information

CSC 553 Operating Systems

CSC 553 Operating Systems CSC 553 Operating Systems Lecture 12 - File Management Files Data collections created by users The File System is one of the most important parts of the OS to a user Desirable properties of files: Long-term

More information

MIPS Assembly Programming

MIPS Assembly Programming COMP 212 Computer Organization & Architecture COMP 212 Fall 2008 Lecture 8 Cache & Disk System Review MIPS Assembly Programming Comp 212 Computer Org & Arch 1 Z. Li, 2008 Comp 212 Computer Org & Arch 2

More information

File system internals Tanenbaum, Chapter 4. COMP3231 Operating Systems

File system internals Tanenbaum, Chapter 4. COMP3231 Operating Systems File system internals Tanenbaum, Chapter 4 COMP3231 Operating Systems Architecture of the OS storage stack Application File system: Hides physical location of data on the disk Exposes: directory hierarchy,

More information

Review Questions on Computer Basics

Review Questions on Computer Basics Review Questions on Computer Basics 1. Distinguish between and define (see glossary in Maxfield and Brown s Bebop Bytes Back for the definition of terms not found in Andrews A Guide to Managing and Maintaining

More information

Octal and Hexadecimal Integers

Octal and Hexadecimal Integers Octal and Hexadecimal Integers CS 350: Computer Organization & Assembler Language Programming A. Why? Octal and hexadecimal numbers are useful for abbreviating long bitstrings. Some operations on octal

More information

ECE 2030B 1:00pm Computer Engineering Spring problems, 5 pages Exam Two 10 March 2010

ECE 2030B 1:00pm Computer Engineering Spring problems, 5 pages Exam Two 10 March 2010 Instructions: This is a closed book, closed note exam. Calculators are not permitted. If you have a question, raise your hand and I will come to you. Please work the exam in pencil and do not separate

More information

Main Points of the Computer Organization and System Software Module

Main Points of the Computer Organization and System Software Module Main Points of the Computer Organization and System Software Module You can find below the topics we have covered during the COSS module. Reading the relevant parts of the textbooks is essential for a

More information

CS609 Final Term Solved MCQs with References Without Repetitions 14/02/2013

CS609 Final Term Solved MCQs with References Without Repetitions 14/02/2013 1 CS609 Final Term Solved MCQs with References Without Repetitions 14/02/2013 In BPB, root directory is saved in. (BIOS parameter block) Cluster#0 Cluster#1 (Ref) Cluster#2 Cluster#3 In NTFS, total sizes

More information