Sie sind auf Seite 1von 2

Assiut University - Preparatory Year Students

Faculty of Engineering Computers and Programming


Electrical Engineering Dept 2012/12/3 2012/11/29 Fall 2014

1. Write true or correct, the underlined text if it is not correct, in each of the following
sentences
a. An 8-bit binary number, in 2s Complement form, would be evaluated using the following
polynomial expansion: N = - (b7 * 27 + b6 * 26 + b5 * 25 + ....+ b1 * 21 + b0)

b. The decimal number 3x25 is equivalent to the hexadecimal number 0x60.

c. Peripheral devices is a software added to a computer to expand its functionality

d. USB flash drive is a volatile storage device.

e. 0xEF786AC is an odd number

f. Browser is a tool designed to search for information on the World Wide Web

g. Data is transferred between the processor and the RAM through ports.

h. SMTP is the protocol that defines the rules for handling the outgoing mails.

2. Underline the best answer to complete each of the following sentences


Notes: NONE: means all the choices are incorrect, ALL: means all the choices are correct,

unknown: means the answer cannot be provided from the given information

a. The largest integer number that can be stored in 8-bit twos complement is (128,1127,64,NONE)

b. Cell phones contain (general, special, unknown) purpose computers.

c. (Host, Server, ISP, ALL) is a computer that receives requests from client PCs and processes

them.

d. Decimal digits can be represented in binary using at least (4, 6, 8, unknown) bit.

e. DOS, UNIX, and Windows are (Text Editors, Operating systems, Web browsers, Compilers).

f. To address a memory of 128M bytes, we need an address of (28, 16, 27, unknown) bits.

g. The part of the computer that temporary stores programs and data to be processed is (CPU,

ROM, RAM, ALU).

3. Complete each of the following sentences, using only one or two words at most

a. ______ is a list of instructions that enables a computer to process data in order to perform a

specific task.

b. If (1?2)3 = (1011)2. The missing digit is_________.

1/2
Computer and Programming -
c. ________ is the operation of translating a high-level language program into a machine language.

d. (FFFF)16 = (FFFE)16 + ( _______________ )16

e. Any website can be accessed by entering its ________________ address.

f. Netscape and Internet Explorers are examples of __________________.

g. The computer with both analog and digital features is called _______________.

h. The programming language used to build websites is called __________________.

i. The processor of a general purpose computer consists of ______________ and _____________.

4. Answer the following questions on the right column:


a. The specifications of a memory module are 256Mx4 with access time 2 nSec. How long does it
take to consecutively read 128Mbytes of that module?

b. A processor speed is 2 GHz. A program composed of 100 high level statements is executed on
this processor. Calculate the time required to run this program, assuming that each high level
statement takes 20 primitive operations of that processor.

c. Write 5 methods by which people can connect to the world of internet

5. For the given flowchart, complete the following statements:

a. the program output is ____________ START

b. At the end of the flowchart, the value of X


K=1
will be ____________ X=2
Y=0
c. To make the program print 2 at the end of the

flowchart, the condition K>4 should be Y=X+Y


X=2*X
changed to ___________ K=K+1

Yes K>4
?
Print Y No

END

2/2

Das könnte Ihnen auch gefallen