1997 fall.doc

15 Pages
75 Views
Unlock Document

Department
Electrical Engineering and Computer Science
Course
EECS 1520
Professor
John Hofbauer
Semester
Fall

Description
CS1520 Final Examination -- Fall 97 Name: . Part A [10] Answer each of the following questions by circling true or false: 1. The mechanical computing machines conceived by Charles Babbage could not follow algorithms. true false 2. In an abacus the algorithm is represented by the positions of the beads. true false 3. The invention of the integrated circuit meant that problems for which an algorithm was not previously known could now be solved. true false 4. The addition algorithm is represented by circuitry in the CPU. true false 5. A computer system might operate faster if the hard disk were changed to one with faster access time and transfer rate. true false 6. Multi-tasking operating systems are only used in a multi-user environment. true false 7. Random access to files stored on disk is impossible because they are sequential files. true false 8. A neural network learns by adjusting the input weights of individual neurons. true false 9. Although "image analysis" is a hard problem, it has largely been solved. true false 10. An "expert system" is constructed by beginning with knowledge obtained from interviewing a human expert. true false Part B [10] Answer each of the following questions by circling the most appropriate choice: 1. If the 8 bit binary code 10011101 is to be interpreted as a binary fraction with the "point" placed between the 4th and 5th bits (i.e. 1001.1101) then the 7th bit from the left has the place value 1 -3 1 -1 1 0 a. 0 b. 2 c. 2 or / 8 d. 2 or / 2 e. 2 or 1 page 1 of 15 CS1520 Final Examination -- Fall 97 Name: . 2. The concept of abstraction is best defined as: a. understanding the details of every process b. focussing on the external properties of a process rather than its internal details c. finding a simpler algorithm to replace a complex one. d. visualising a system as composed of components whose internal details are ignored e. b and d 3. A flip-flop circuit is used to a. add two bits b. change a 0 bit to a 1 bit c. store a given bit d. multiply two bits e. change a 1 bit to a 0 bit 4. The protocol underlying most machine to machine communications on the Internet is a. ftp b. WWW c. TCP/IP d. telnet e. nntp 5. The transport layer of the Internet software layers a. communicates with the application the user is currently executing such as an e-mail program or a WWW browser. b. breaks up the data to be transmitted into suitably sized segments, each containing the destination address. c. appends intermediate addressing information to each packet, such as the address of a router machine that will forward the packet. d. deals with the local network protocol as determined by its hardware and topology, such as token ring or bus, for example. e. interprets the URL specification such as http://www.yorku.ca 6. The link layer of the Internet software layers a. communicates with the application the user is currently executing such as an e-mail program or a WWW browser. b. breaks up the data to be transmitted into suitably sized segments, each containing the destination address. c. appends intermediate addressing information to each packet, such as the address of a router machine that will forward the packet d. deals with the local network protocol as determined by its hardware and topology, such as token ring or bus, for example. e. interprets the URL specification such as http://www.yorku.ca 7. A sequential file is one that a. is stored in one continuous block on disk, one record after the other b. is always sorted c. can only be updated by a transaction file d. is ordered from beginning to end e. can only be used in batch processing page 2 of 15 CS1520 Final Examination -- Fall 97 Name: . 8. A hashing algorithm a. splits up a file into pieces in order to store it in fragments on a disk b. computes the location of a record from its key field value c. creates an index from the key field values in a file d. sorts a file according to the key field e. relates a partial index to the key field values 9. The data access restrictions imposed by subschemas are enforced by which layer of the database system a. the applications software b. the database model c. the database management system software d. the end user interface e. the host language 10. Redundancy or repetition of data in a relation or table of a relational database may be fixed by: a. deleting the data b. joining the relation with another c. a nonloss decomposition of the relation d. projecting out the repeated data e. recoding the data values Part C [5] Answer each of the following questions by filling-in the most appropriate word(s) to complete the sentence. 1. The ___________ is the smallest unit of storage that can have an address in a computer. 2. If the ASCII code for the letter A is 1000001, then the ASCII code for the letter E is . 3. The part of the CPU which holds the address of the next instruction to be executed is called the . 4. In Artificial Intelligence, an algorithm which is based on general guidelines rather than rigorous analysis of the problem is called a . 5. In Microsoft Access, the built-in function that lets you extract the first so-many characters page 3 of 15 CS1520 Final Examination -- Fall 97 Name: . of a string of text is called . [10] 6. Matching: Fill in the blank on the left with a number that best describes the term. ___ Access time 1. a short segment of time during which the CPU is executing one of several processes ___ Bootstrap 2. the ability to change the organization of the database without changing the application software ___ Bus 3. a situation that can arise during resource allocation 4. the method most modern shells of operating ___ CPU systems use to communicate with the user 5. allowing a dialogue to be carried on with ___ Data Independence the user as programs are executing 6. activities taking place in a machine must be ___ Deadlock coordinated with the activities in the machine's environment ___ Interactive processing 7. the program that is executed automatically when the machine is turned on ___ Parallel processing 8. the time required to move the read/write heads to the desired track ___ Protocols 9. the time required to move the read/write heads to the desired track plus the time for the disk to rotate to the desired sectors ___ Quantum (time slice) 10. the ability to import data into Microsoft Access from Microsoft Excel without changing the fields 11. collection of wires that connect a CPU with Main Memory 12. a method of increasing throughput that involves using more than one processing unit for a task 13. the rules that govern the communication between components in a computer network 14. contains an arithmetic/logic unit and a control unit 15. contains the main memory of a computer system page 4 of 15 CS1520 Final Examination -- Fall 97 Name: . Part D [2] 1. Write the name of the gate (i.e. AND, OR, XOR, NOT) under to the symbol that represents it. _ _ _ _ [2] 2. Convert
More Less

Related notes for EECS 1520

Log In


OR

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit