Sie sind auf Seite 1von 4

EX 1.

1
Processor: 2.5 GHz dual-core, Intel Core i5
Memory: 4 GB of 1600MHz DDR3 Memory
Hard Drive: 500GB
I/O Devices: -720p FaceTime Camera
-Keyboard / Trackpad
-Microphone
-Speakers
Operating System: OS X El Captain
Wireless: Wi-Fi and Bluetooth
Graphics: Intel HD Graphics 4000
Display: 13 LED
These hardware specifications can be found in APPLE MENUE About this
Mac ,
And are also available through the Apple archive forms.
EX 1.2
Binary is used because the devices (computers) that store and manipulate
binary data are inexpensive and reliable.
EX 1.3
How many unique items can be represented with each of the following?
a. 1 bit = 2
b. 3 bits = 8
c. 6 bits = 64
d. 8 bits = 256
e. 10 bits = 1,024
f. 16 bits = 65,536
EX 1.4
If a picture is made up of 128 possible colors, how many bits would be
needed to store each pixel of the picture? 7 bits would be needed. This is
because seven bits represent the 128 possible colors (unique events). 2^N
= 128
EX 1.5
If a language uses 240 unique letters and symbols, how many bits would be
needed to store each character of a document?
Why?
8 bits would be needed. This is because N=7.9069 (2^N=240)
EX 1.6
How many bits are there in each of the following?

How many bytes are there in each?


a. 12 KB Bits = 96000 Bytes = 12000
b. 5 MB Bits = 5e+6 Bytes = 625000
c. 3 GB Bits = 2.4e+10 Bites = 3e+9
d. 2 TB Bits = 1.6e+13 Bites = 2e+12
EX 1.7
Explain the difference between random access memory (RAM) and read-only
memory (ROM).
RAM is the memory where active programs and date are stored. ROM
typically store software that provide the preliminary instruction needed when
the computer is first turned on. Once information is stored on ROM, it is not
altered.
EX 1.8
A disk is a random access device but it is not RAM (random access memory).
Explain.
When information is put onto a disk is being stored as ROM and not RAM
because the information can no longer be altered (READ ONLY MEMORY).
EX 1.9
Determine how your computer, or a computer in a lab to which you have
access, is connected to others across a network. Is it linked to the Internet?
Draw a diagram to show the basic connections in your environment.
Wireless
Internet

Phone Line

Modem

Router
Personal Computer

EX 1.10
Explain the differences between a local area network (LAN) and a wide area
network (WAN).
LAN shares information on a small scale ( i.e.within a building), and WAN is
used to connect multiple LANs, often across large distances.
What is the relationship between them?
LAN and WAN are similar in that they are both used to allow different
computers to share information.
EX 1.11
What is the total number of communication lines needed for a fully
connected point-to-point network of eight computers? 8 computers * 7 Lines
= 56/2 ports = 28 communication lines
Nine computers? 36 Lines
Ten computers? 45 Lines
What is a general formula for determining this result?
(# of computers * (1-number of computers) )/ # of connection ports

EX 1.12
Explain the difference between the Internet and the World Wide
Web.
The internet is a WAN that connects computers via a IP address, The World
Wide Web is a software that makes sharing information across the
internet easy.
EX 1.13
List and explain the parts of the URLs for:
a. your school http://www.umt.edu/
b. the Computer Science department of your school
http://cs.umt.edu/
c. your instructors Web page
https://moodle.umt.edu/course/view.php?id=11879
Protocol = Blue, Machine Domain = Green, File = Yellow
[identify: protocol, machine, domain, and file]
EX 1.14
Give examples of the two types of Java comments and explain
the differences between them.
The // comment type of comment can only span one line.
The
/*
comment
*/
can span multiple lines.
EX 1.15
Which of the following are not valid Java identifiers?
Why?
a. Factorial Valid
b. anExtremelyLongIdentifierIfYouAskMe Valid
c. 2ndLevel Not, begins with a digit
d. level2 Valid
e. MAX_SIZE Valid
f. highest$ Valid
g. hook&ladder Not, ampersand
EX 1.16
Why are the following valid Java identifiers not considered good
identifiers?
a. q
Not enough meaning

b. totVal
Not a consistent use of upper case.
c. theNextValueInTheList
Unnecessarily long
EX 1.17
Java is case sensitive. What does that mean?
The upper and lower case versions of a letter are distinct
EX 1.18
What is a Java Virtual Machine? Explain its role.
A Java Virtual Machine makes it possible to build programs that can be run on
any platform because it is aware of the specific instruction lengths and other
particularities of the platform. A Java virtual machine interprets complied
Java binary code for a computers processor so that it can perform a Java
programs instructions.
EX 1.19
What do we mean when we say that the English language is ambiguous?
Give two examples of English ambiguity (other than the example used in this
chapter) and explain the ambiguity.
Ambiguity is the presence of two or mare possible meanings.
1) Run good looks run in my family. Lets go for a run! The first
sentence describes the genetics of a family, the second use of run
describes a physical activity.
2) Cooked That was a great meal. Ive never seen steak cooked like
that before. Jim cooked the steak. First use refers to the manner in
which the food was cooked. The second use refers to the action of
cooking.
Why is ambiguity a problem for programming languages?
Computers cannot recognize the differences in ambiguity so they may not do
what you had intended the program to do.
EX 1.20
Categorize each of the following situations as a compile-time error,
run-time error, or logical error.
a. multiplying two numbers when you meant to add them Logical Error
b. dividing by zero Run-time Error
c. forgetting a semicolon at the end of a programming statement Compiletime Error
d. spelling a word incorrectly in the output Logical Error
e. producing inaccurate results Logical Error
f. typing a { when you should have typed a ( Compile-time Error

Das könnte Ihnen auch gefallen