Podcast
Questions and Answers
Which of the following is the correct decimal fraction equal to hexadecimal fraction 0.248?
Which of the following is the correct decimal fraction equal to hexadecimal fraction 0.248?
Which of the following is the correct value of the quadruple of hexadecimal fraction 0.FEDC?
Which of the following is the correct value of the quadruple of hexadecimal fraction 0.FEDC?
In a floating-point number format, which of the following is the correct operation for adjusting the radix point and the exponent so that the most significant digit of the mantissa can be a non-zero value? Here, an absolute value is used for the mantissa.
In a floating-point number format, which of the following is the correct operation for adjusting the radix point and the exponent so that the most significant digit of the mantissa can be a non-zero value? Here, an absolute value is used for the mantissa.
The decimal value “-72” is stored in an 8-bit register using 2's complement. If the data in the register is logically shifted two bits to the right, which of the following is the correct result that is represented in decimal?
The decimal value “-72” is stored in an 8-bit register using 2's complement. If the data in the register is logically shifted two bits to the right, which of the following is the correct result that is represented in decimal?
Signup and view all the answers
By definition of the IEEE754 standard, 32-bit floating point numbers are represented as follows: S (1 bit) E (8 bits) M (23 bits) S: Sign bit E: Exponent M: Mantissa Which of the following is the correct “mask bits” in hexadecimal to be used for extracting only the exponent part of the above format? Here, “mask bits” means a bit pattern which is logically ANDed with the 32-bit floating point value.
By definition of the IEEE754 standard, 32-bit floating point numbers are represented as follows: S (1 bit) E (8 bits) M (23 bits) S: Sign bit E: Exponent M: Mantissa Which of the following is the correct “mask bits” in hexadecimal to be used for extracting only the exponent part of the above format? Here, “mask bits” means a bit pattern which is logically ANDed with the 32-bit floating point value.
Signup and view all the answers
In the Venn Diagrams labeled 1 to 3, which of the following is the result of Boolean “OR” operations for all three to be combined? Here, “·” is used for “logical AND,” “+” for “logical OR,” and “ A” for the “logical NOT” of A. Each set corresponding to x, y, or z is depicted by a circle X y X y X y 1 Z 2 3 Z Z
In the Venn Diagrams labeled 1 to 3, which of the following is the result of Boolean “OR” operations for all three to be combined? Here, “·” is used for “logical AND,” “+” for “logical OR,” and “ A” for the “logical NOT” of A. Each set corresponding to x, y, or z is depicted by a circle X y X y X y 1 Z 2 3 Z Z
Signup and view all the answers
When you flip a coin four times, what is the probability that it will come up heads exactly twice?
When you flip a coin four times, what is the probability that it will come up heads exactly twice?
Signup and view all the answers
There are two important operations on a stack: PUSH and POP. PUSH adds the new data to the top of the stack leaving previous data below, and POP removes and returns the current top data of the stack. When the operations shown below are sequentially executed, which of the following is the correct combination of the values x and y? Here, the size of the stack is big enough to hold the entire data. “PUSH(a)” inserts the data a into the stack, and “POP(b)” removes the data b from the stack. [Operations] PUSH (5); PUSH (3); PUSH (6); PUSH (1); x = POP ( ); PUSH (7); y = POP ( );
There are two important operations on a stack: PUSH and POP. PUSH adds the new data to the top of the stack leaving previous data below, and POP removes and returns the current top data of the stack. When the operations shown below are sequentially executed, which of the following is the correct combination of the values x and y? Here, the size of the stack is big enough to hold the entire data. “PUSH(a)” inserts the data a into the stack, and “POP(b)” removes the data b from the stack. [Operations] PUSH (5); PUSH (3); PUSH (6); PUSH (1); x = POP ( ); PUSH (7); y = POP ( );
Signup and view all the answers
Reverse Polish Notation (RPN) is used to represent arithmetic expressions without using brackets to define priorities for evaluation of operators. For example, 3x(a+b) becomes 3ab+x in RPN. Which of the following is the best data structure that should be used for implementation of RPN in a computer?
Reverse Polish Notation (RPN) is used to represent arithmetic expressions without using brackets to define priorities for evaluation of operators. For example, 3x(a+b) becomes 3ab+x in RPN. Which of the following is the best data structure that should be used for implementation of RPN in a computer?
Signup and view all the answers
Which of the following is an appropriate description concerning the list and/or array structures?
Which of the following is an appropriate description concerning the list and/or array structures?
Signup and view all the answers
The table below shows a state transition table that checks the input character string. This check starts from the initial state A, and it fails if the state changes to E during the input of the character string. Which of the character strings in the answer group fails this check? Here, the symbol A in the answer group represents a space. Input character Space Numeric Sign Radix point Other A A B C D E B A B E D E C E B E D E D A E E E E
The table below shows a state transition table that checks the input character string. This check starts from the initial state A, and it fails if the state changes to E during the input of the character string. Which of the character strings in the answer group fails this check? Here, the symbol A in the answer group represents a space. Input character Space Numeric Sign Radix point Other A A B C D E B A B E D E C E B E D E D A E E E E
Signup and view all the answers
There are two jugs; one is a 4-liter (4L) jug and the other is a 3-liter (3L) jug. Which of the following is the correct sequence to obtain exactly 2 liters of water in the 4L jug under the conditions shown below? Here, (x, y) indicates that the 4L jug contains x liters of water and the 3L jug has y liters of water. [Conditions] You can use only the 3L and 4L jugs. You are allowed to fill up or empty either jug. You are allowed to pour water from one jug to the other. The jugs have no scale marks. There is an ample supply of water.
There are two jugs; one is a 4-liter (4L) jug and the other is a 3-liter (3L) jug. Which of the following is the correct sequence to obtain exactly 2 liters of water in the 4L jug under the conditions shown below? Here, (x, y) indicates that the 4L jug contains x liters of water and the 3L jug has y liters of water. [Conditions] You can use only the 3L and 4L jugs. You are allowed to fill up or empty either jug. You are allowed to pour water from one jug to the other. The jugs have no scale marks. There is an ample supply of water.
Signup and view all the answers
Which of the following is the correct result produced by executing the program shown below? Here, the parameter “x” is called by value, and the parameter “y” is called by reference. Main Program Subprogram sub(x, y) a = 2; x = x + y; b = 3; y = x + y; sub(b, a); return;
Which of the following is the correct result produced by executing the program shown below? Here, the parameter “x” is called by value, and the parameter “y” is called by reference. Main Program Subprogram sub(x, y) a = 2; x = x + y; b = 3; y = x + y; sub(b, a); return;
Signup and view all the answers
The “prime number division remainder” method is a well-known hashing algorithm. In this method, a key value is divided by a number N, and the remainder which is also called a hash value is used directly as an index into the hash table. Nis the largest prime number less than or equal to the size of the available addressable spaces. When the 20 addressable spaces are available, which of the following is the correct hash value calculated from the key value 136? Here, a prime number is one that cannot be divided evenly by any other number except one (1). 2, 3, 5, 7, 11, and 13 are the first few prime numbers.
The “prime number division remainder” method is a well-known hashing algorithm. In this method, a key value is divided by a number N, and the remainder which is also called a hash value is used directly as an index into the hash table. Nis the largest prime number less than or equal to the size of the available addressable spaces. When the 20 addressable spaces are available, which of the following is the correct hash value calculated from the key value 136? Here, a prime number is one that cannot be divided evenly by any other number except one (1). 2, 3, 5, 7, 11, and 13 are the first few prime numbers.
Signup and view all the answers
In a certain computer, a bubble sort of an array of 200 data elements takes the same time as a quick sort of the array. In case of an array of 40,000 data elements, how many times faster is a quick sort than a bubble sort? Here, a bubble sort and a quick sort take time proportional to n² and n×log2n respectively, and “n” is the number of data elements.
In a certain computer, a bubble sort of an array of 200 data elements takes the same time as a quick sort of the array. In case of an array of 40,000 data elements, how many times faster is a quick sort than a bubble sort? Here, a bubble sort and a quick sort take time proportional to n² and n×log2n respectively, and “n” is the number of data elements.
Signup and view all the answers
Integers are stored in the 1st to N-th elements of an array A (N>1). The flowchart below shows the process to check which element of the array contains the same value as X. Which of the following correctly describes the execution result of this process? Start 1->k >: k: N <= = X: A(k) ≠ k+1->k End
Integers are stored in the 1st to N-th elements of an array A (N>1). The flowchart below shows the process to check which element of the array contains the same value as X. Which of the following correctly describes the execution result of this process? Start 1->k >: k: N <= = X: A(k) ≠ k+1->k End
Signup and view all the answers
Which of the following is a re-writable, erasable memory, using electrical signals, which is widely used for various devices such as digital cameras and digital music players and can maintain the data even after the power is turned off?
Which of the following is a re-writable, erasable memory, using electrical signals, which is widely used for various devices such as digital cameras and digital music players and can maintain the data even after the power is turned off?
Signup and view all the answers
The figure shows an RS flip-flop using two NOR gates. Which of the following is the correct truth table for the flip-flop? Here, “unchanged” shown in the table means the outputs maintain a previous state, and “unstable” means the outputs are in an unstable state. R Ω S
The figure shows an RS flip-flop using two NOR gates. Which of the following is the correct truth table for the flip-flop? Here, “unchanged” shown in the table means the outputs maintain a previous state, and “unstable” means the outputs are in an unstable state. R Ω S
Signup and view all the answers
Which of the following is the correct combination of various addressing modes? Here, X1 is an address which is stored in a program counter. X2 is an address part of an instruction which is addressed by X1. X3 is an address in which an operand needed to execute an instruction is stored. X4 is a value in an index register. (X2) means the contents of location X2. Addressing mode PC (Program Counter)-relative Direct Indirect Indexed a) X3 = X2 X3 = X2+X4 X3 = (X2) X3 = X1+X2 b) X3 = X2 X3 = (X2) X3 = X1+X2 X3 = X2+X4 c) X3 = X2 X3 = (X2) X3 = X2+X4 X3 = X1+X2 d) X3 = (X2) X3 = X2 X3 = X1+X2 X3 = X2+X4
Which of the following is the correct combination of various addressing modes? Here, X1 is an address which is stored in a program counter. X2 is an address part of an instruction which is addressed by X1. X3 is an address in which an operand needed to execute an instruction is stored. X4 is a value in an index register. (X2) means the contents of location X2. Addressing mode PC (Program Counter)-relative Direct Indirect Indexed a) X3 = X2 X3 = X2+X4 X3 = (X2) X3 = X1+X2 b) X3 = X2 X3 = (X2) X3 = X1+X2 X3 = X2+X4 c) X3 = X2 X3 = (X2) X3 = X2+X4 X3 = X1+X2 d) X3 = (X2) X3 = X2 X3 = X1+X2 X3 = X2+X4
Signup and view all the answers
A computer is designed to enable pipeline control so that each instruction can be completed in five cycles. How many cycles are needed to execute 20 instructions? Here, all instructions can be executed without being stopped halfway.
A computer is designed to enable pipeline control so that each instruction can be completed in five cycles. How many cycles are needed to execute 20 instructions? Here, all instructions can be executed without being stopped halfway.
Signup and view all the answers
Which of the following is an appropriate statement in regard to interrupts?
Which of the following is an appropriate statement in regard to interrupts?
Signup and view all the answers
What range of decimal numbers can be represented with an 11-bit two's-complement number?
What range of decimal numbers can be represented with an 11-bit two's-complement number?
Signup and view all the answers
Which of the following decimal fractions becomes a finite fraction in an octal representation?
Which of the following decimal fractions becomes a finite fraction in an octal representation?
Signup and view all the answers
Study Notes
No specific topic provided. Please provide the text or questions for which you would like study notes.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge and understanding with this general study notes quiz. Suitable for students looking to reinforce their learning across various subjects, the quiz covers a range of topics to challenge your memory and comprehension skills.