Podcast
Questions and Answers
Which of the following is the correct decimal fraction equal to hexadecimal fraction 0.248?
Which of the following is the correct decimal fraction equal to hexadecimal fraction 0.248?
- 31/32
- 31/512
- 31/125
- 73/512 (correct)
Which of the following is the correct value of the quadruple of hexadecimal fraction 0.FEDC?
Which of the following is the correct value of the quadruple of hexadecimal fraction 0.FEDC?
- 2.FB78
- 1.FDB8
- F.EDC0
- 3.FB70 (correct)
In a floating-point number format, which of the following is the correct operation for adjusting the radix point and the exponent so that the most significant digit of the mantissa can be a non-zero value? Here, an absolute value is used for the mantissa.
In a floating-point number format, which of the following is the correct operation for adjusting the radix point and the exponent so that the most significant digit of the mantissa can be a non-zero value? Here, an absolute value is used for the mantissa.
- Round up
- Normalize (correct)
- Carry
- Round down
The decimal value “-72” is stored in an 8-bit register using 2's complement. If the data in the register is logically shifted two bits to the right, which of the following is the correct result that is represented in decimal?
The decimal value “-72” is stored in an 8-bit register using 2's complement. If the data in the register is logically shifted two bits to the right, which of the following is the correct result that is represented in decimal?
By definition of the IEEE754 standard, 32-bit floating point numbers are represented as follows: S (1 bit) E (8 bits) M (23 bits) S: Sign bit E: Exponent M: Mantissa Which of the following is the correct “mask bits” in hexadecimal to be used for extracting only the exponent part of the above format? Here, “mask bits” means a bit pattern which is logically ANDed with the 32-bit floating point value.
By definition of the IEEE754 standard, 32-bit floating point numbers are represented as follows: S (1 bit) E (8 bits) M (23 bits) S: Sign bit E: Exponent M: Mantissa Which of the following is the correct “mask bits” in hexadecimal to be used for extracting only the exponent part of the above format? Here, “mask bits” means a bit pattern which is logically ANDed with the 32-bit floating point value.
In the Venn Diagrams labeled 1 to 3, which of the following is the result of Boolean “OR” operations for all three to be combined? Here, “·” is used for “logical AND,” “+” for “logical OR,” and “ A” for the “logical NOT” of A. Each set corresponding to x, y, or z is depicted by a circle X y X y X y 1 Z 2 3 Z Z
In the Venn Diagrams labeled 1 to 3, which of the following is the result of Boolean “OR” operations for all three to be combined? Here, “·” is used for “logical AND,” “+” for “logical OR,” and “ A” for the “logical NOT” of A. Each set corresponding to x, y, or z is depicted by a circle X y X y X y 1 Z 2 3 Z Z
When you flip a coin four times, what is the probability that it will come up heads exactly twice?
When you flip a coin four times, what is the probability that it will come up heads exactly twice?
There are two important operations on a stack: PUSH and POP. PUSH adds the new data to the top of the stack leaving previous data below, and POP removes and returns the current top data of the stack. When the operations shown below are sequentially executed, which of the following is the correct combination of the values x and y? Here, the size of the stack is big enough to hold the entire data. “PUSH(a)” inserts the data a into the stack, and “POP(b)” removes the data b from the stack. [Operations] PUSH (5); PUSH (3); PUSH (6); PUSH (1); x = POP ( ); PUSH (7); y = POP ( );
There are two important operations on a stack: PUSH and POP. PUSH adds the new data to the top of the stack leaving previous data below, and POP removes and returns the current top data of the stack. When the operations shown below are sequentially executed, which of the following is the correct combination of the values x and y? Here, the size of the stack is big enough to hold the entire data. “PUSH(a)” inserts the data a into the stack, and “POP(b)” removes the data b from the stack. [Operations] PUSH (5); PUSH (3); PUSH (6); PUSH (1); x = POP ( ); PUSH (7); y = POP ( );
Reverse Polish Notation (RPN) is used to represent arithmetic expressions without using brackets to define priorities for evaluation of operators. For example, 3x(a+b) becomes 3ab+x in RPN. Which of the following is the best data structure that should be used for implementation of RPN in a computer?
Reverse Polish Notation (RPN) is used to represent arithmetic expressions without using brackets to define priorities for evaluation of operators. For example, 3x(a+b) becomes 3ab+x in RPN. Which of the following is the best data structure that should be used for implementation of RPN in a computer?
Which of the following is an appropriate description concerning the list and/or array structures?
Which of the following is an appropriate description concerning the list and/or array structures?
The table below shows a state transition table that checks the input character string. This check starts from the initial state A, and it fails if the state changes to E during the input of the character string. Which of the character strings in the answer group fails this check? Here, the symbol A in the answer group represents a space. Input character Space Numeric Sign Radix point Other A A B C D E B A B E D E C E B E D E D A E E E E
The table below shows a state transition table that checks the input character string. This check starts from the initial state A, and it fails if the state changes to E during the input of the character string. Which of the character strings in the answer group fails this check? Here, the symbol A in the answer group represents a space. Input character Space Numeric Sign Radix point Other A A B C D E B A B E D E C E B E D E D A E E E E
There are two jugs; one is a 4-liter (4L) jug and the other is a 3-liter (3L) jug. Which of the following is the correct sequence to obtain exactly 2 liters of water in the 4L jug under the conditions shown below? Here, (x, y) indicates that the 4L jug contains x liters of water and the 3L jug has y liters of water. [Conditions] You can use only the 3L and 4L jugs. You are allowed to fill up or empty either jug. You are allowed to pour water from one jug to the other. The jugs have no scale marks. There is an ample supply of water.
There are two jugs; one is a 4-liter (4L) jug and the other is a 3-liter (3L) jug. Which of the following is the correct sequence to obtain exactly 2 liters of water in the 4L jug under the conditions shown below? Here, (x, y) indicates that the 4L jug contains x liters of water and the 3L jug has y liters of water. [Conditions] You can use only the 3L and 4L jugs. You are allowed to fill up or empty either jug. You are allowed to pour water from one jug to the other. The jugs have no scale marks. There is an ample supply of water.
Which of the following is the correct result produced by executing the program shown below? Here, the parameter “x” is called by value, and the parameter “y” is called by reference. Main Program Subprogram sub(x, y) a = 2; x = x + y; b = 3; y = x + y; sub(b, a); return;
Which of the following is the correct result produced by executing the program shown below? Here, the parameter “x” is called by value, and the parameter “y” is called by reference. Main Program Subprogram sub(x, y) a = 2; x = x + y; b = 3; y = x + y; sub(b, a); return;
The “prime number division remainder” method is a well-known hashing algorithm. In this method, a key value is divided by a number N, and the remainder which is also called a hash value is used directly as an index into the hash table. Nis the largest prime number less than or equal to the size of the available addressable spaces. When the 20 addressable spaces are available, which of the following is the correct hash value calculated from the key value 136? Here, a prime number is one that cannot be divided evenly by any other number except one (1). 2, 3, 5, 7, 11, and 13 are the first few prime numbers.
The “prime number division remainder” method is a well-known hashing algorithm. In this method, a key value is divided by a number N, and the remainder which is also called a hash value is used directly as an index into the hash table. Nis the largest prime number less than or equal to the size of the available addressable spaces. When the 20 addressable spaces are available, which of the following is the correct hash value calculated from the key value 136? Here, a prime number is one that cannot be divided evenly by any other number except one (1). 2, 3, 5, 7, 11, and 13 are the first few prime numbers.
In a certain computer, a bubble sort of an array of 200 data elements takes the same time as a quick sort of the array. In case of an array of 40,000 data elements, how many times faster is a quick sort than a bubble sort? Here, a bubble sort and a quick sort take time proportional to n² and n×log2n respectively, and “n” is the number of data elements.
In a certain computer, a bubble sort of an array of 200 data elements takes the same time as a quick sort of the array. In case of an array of 40,000 data elements, how many times faster is a quick sort than a bubble sort? Here, a bubble sort and a quick sort take time proportional to n² and n×log2n respectively, and “n” is the number of data elements.
Integers are stored in the 1st to N-th elements of an array A (N>1). The flowchart below shows the process to check which element of the array contains the same value as X. Which of the following correctly describes the execution result of this process? Start 1->k >: k: N <= = X: A(k) ≠ k+1->k End
Integers are stored in the 1st to N-th elements of an array A (N>1). The flowchart below shows the process to check which element of the array contains the same value as X. Which of the following correctly describes the execution result of this process? Start 1->k >: k: N <= = X: A(k) ≠ k+1->k End
Which of the following is a re-writable, erasable memory, using electrical signals, which is widely used for various devices such as digital cameras and digital music players and can maintain the data even after the power is turned off?
Which of the following is a re-writable, erasable memory, using electrical signals, which is widely used for various devices such as digital cameras and digital music players and can maintain the data even after the power is turned off?
The figure shows an RS flip-flop using two NOR gates. Which of the following is the correct truth table for the flip-flop? Here, “unchanged” shown in the table means the outputs maintain a previous state, and “unstable” means the outputs are in an unstable state. R Ω S
The figure shows an RS flip-flop using two NOR gates. Which of the following is the correct truth table for the flip-flop? Here, “unchanged” shown in the table means the outputs maintain a previous state, and “unstable” means the outputs are in an unstable state. R Ω S
Which of the following is the correct combination of various addressing modes? Here, X1 is an address which is stored in a program counter. X2 is an address part of an instruction which is addressed by X1. X3 is an address in which an operand needed to execute an instruction is stored. X4 is a value in an index register. (X2) means the contents of location X2. Addressing mode PC (Program Counter)-relative Direct Indirect Indexed a) X3 = X2 X3 = X2+X4 X3 = (X2) X3 = X1+X2 b) X3 = X2 X3 = (X2) X3 = X1+X2 X3 = X2+X4 c) X3 = X2 X3 = (X2) X3 = X2+X4 X3 = X1+X2 d) X3 = (X2) X3 = X2 X3 = X1+X2 X3 = X2+X4
Which of the following is the correct combination of various addressing modes? Here, X1 is an address which is stored in a program counter. X2 is an address part of an instruction which is addressed by X1. X3 is an address in which an operand needed to execute an instruction is stored. X4 is a value in an index register. (X2) means the contents of location X2. Addressing mode PC (Program Counter)-relative Direct Indirect Indexed a) X3 = X2 X3 = X2+X4 X3 = (X2) X3 = X1+X2 b) X3 = X2 X3 = (X2) X3 = X1+X2 X3 = X2+X4 c) X3 = X2 X3 = (X2) X3 = X2+X4 X3 = X1+X2 d) X3 = (X2) X3 = X2 X3 = X1+X2 X3 = X2+X4
A computer is designed to enable pipeline control so that each instruction can be completed in five cycles. How many cycles are needed to execute 20 instructions? Here, all instructions can be executed without being stopped halfway.
A computer is designed to enable pipeline control so that each instruction can be completed in five cycles. How many cycles are needed to execute 20 instructions? Here, all instructions can be executed without being stopped halfway.
Which of the following is an appropriate statement in regard to interrupts?
Which of the following is an appropriate statement in regard to interrupts?
What range of decimal numbers can be represented with an 11-bit two's-complement number?
What range of decimal numbers can be represented with an 11-bit two's-complement number?
Which of the following decimal fractions becomes a finite fraction in an octal representation?
Which of the following decimal fractions becomes a finite fraction in an octal representation?
Flashcards
What is the decimal equivalent of hexadecimal fraction 0.248?
What is the decimal equivalent of hexadecimal fraction 0.248?
The hexadecimal fraction 0.248 is equivalent to the decimal fraction 31/512.
What is the quadruple of hexadecimal fraction 0.FEDC?
What is the quadruple of hexadecimal fraction 0.FEDC?
The quadruple of hexadecimal fraction 0.FEDC is 3.FB70.
What is the process of adjusting the radix point and exponent in a floating-point number?
What is the process of adjusting the radix point and exponent in a floating-point number?
Normalizing a floating-point number involves adjusting the radix point and exponent so that the most significant digit of the mantissa is non-zero. This ensures a consistent representation, which is important for arithmetic operations.
What happens to a decimal value when logically shifted right twice in 2's complement?
What happens to a decimal value when logically shifted right twice in 2's complement?
Signup and view all the flashcards
What is the hexadecimal mask to extract only the exponent part of a 32-bit floating-point number?
What is the hexadecimal mask to extract only the exponent part of a 32-bit floating-point number?
Signup and view all the flashcards
What is the combined result of the Boolean OR operation on three Venn Diagrams?
What is the combined result of the Boolean OR operation on three Venn Diagrams?
Signup and view all the flashcards
What is the probability of getting exactly two heads in four coin flips?
What is the probability of getting exactly two heads in four coin flips?
Signup and view all the flashcards
What are the final values of x and y after a series of stack operations?
What are the final values of x and y after a series of stack operations?
Signup and view all the flashcards
Which data structure is best suited for implementing Reverse Polish Notation (RPN)?
Which data structure is best suited for implementing Reverse Polish Notation (RPN)?
Signup and view all the flashcards
What is the difference between a list and an array?
What is the difference between a list and an array?
Signup and view all the flashcards
What is the character string that fails the state transition table?
What is the character string that fails the state transition table?
Signup and view all the flashcards
What is the correct sequence of operations to obtain 2 liters of water in the 4-liter jug?
What is the correct sequence of operations to obtain 2 liters of water in the 4-liter jug?
Signup and view all the flashcards
What are the final values of a and b after calling the subprogram?
What are the final values of a and b after calling the subprogram?
Signup and view all the flashcards
What is the hash value for key value 136 in the prime number division remainder method?
What is the hash value for key value 136 in the prime number division remainder method?
Signup and view all the flashcards
How many times faster is quick sort than bubble sort for an array of 40,000 elements?
How many times faster is quick sort than bubble sort for an array of 40,000 elements?
Signup and view all the flashcards
What is the final value of index k after checking if a value exists in an array?
What is the final value of index k after checking if a value exists in an array?
Signup and view all the flashcards
What type of memory is re-writable, erasable, and used in digital cameras and music players?
What type of memory is re-writable, erasable, and used in digital cameras and music players?
Signup and view all the flashcards
What is the correct truth table for an RS flip-flop constructed from NOR gates?
What is the correct truth table for an RS flip-flop constructed from NOR gates?
Signup and view all the flashcards
What are the different addressing modes?
What are the different addressing modes?
Signup and view all the flashcards
How many cycles are needed to execute 20 instructions in a 5-cycle pipeline?
How many cycles are needed to execute 20 instructions in a 5-cycle pipeline?
Signup and view all the flashcards
What is the role of interrupts in a computer system?
What is the role of interrupts in a computer system?
Signup and view all the flashcards
What is the final state of the state machine after a sequence of JK inputs, starting from state C?
What is the final state of the state machine after a sequence of JK inputs, starting from state C?
Signup and view all the flashcards
What is the Boolean equation for output Z in the 4-to-2 encoder?
What is the Boolean equation for output Z in the 4-to-2 encoder?
Signup and view all the flashcards
What are the JK input sequences that produce the state transition CABDD, starting from state C?
What are the JK input sequences that produce the state transition CABDD, starting from state C?
Signup and view all the flashcards
What is the decimal range of an 11-bit two's complement number?
What is the decimal range of an 11-bit two's complement number?
Signup and view all the flashcards
Which decimal fraction becomes a finite octal fraction?
Which decimal fraction becomes a finite octal fraction?
Signup and view all the flashcards
What equation relates a binary number pattern to its decimal value?
What equation relates a binary number pattern to its decimal value?
Signup and view all the flashcards
How much larger is the result after left-shifting and adding a binary number?
How much larger is the result after left-shifting and adding a binary number?
Signup and view all the flashcards
What is the main reason for using complement representation in computers?
What is the main reason for using complement representation in computers?
Signup and view all the flashcards
What is the key feature of Newton's method for finding function roots?
What is the key feature of Newton's method for finding function roots?
Signup and view all the flashcards
What is a valid Customer Account Number (CAN)?
What is a valid Customer Account Number (CAN)?
Signup and view all the flashcards
What is the probability of Player Y winning in a dice game?
What is the probability of Player Y winning in a dice game?
Signup and view all the flashcards
How many students are not taking computer science or math?
How many students are not taking computer science or math?
Signup and view all the flashcards
What is the simplified form of the given logical expression?
What is the simplified form of the given logical expression?
Signup and view all the flashcards
What are the character codes with even parity added?
What are the character codes with even parity added?
Signup and view all the flashcards
What data structure uses a LIFO method?
What data structure uses a LIFO method?
Signup and view all the flashcards
What is the decimal equivalent of hexadecimal fraction 2A.4C?
What is the decimal equivalent of hexadecimal fraction 2A.4C?
Signup and view all the flashcards
In what radix does the equation 131 - 45 = 53 hold?
In what radix does the equation 131 - 45 = 53 hold?
Signup and view all the flashcards
What is the range of integers expressible in n-bit two's complement?
What is the range of integers expressible in n-bit two's complement?
Signup and view all the flashcards
What range of values keeps a loop running?
What range of values keeps a loop running?
Signup and view all the flashcards
What is the equivalent expression for the given logical operation?
What is the equivalent expression for the given logical operation?
Signup and view all the flashcards
What is the check digit calculation for Customer Account Numbers?
What is the check digit calculation for Customer Account Numbers?
Signup and view all the flashcards
What is the probability of a coin landing on heads exactly once in three tosses?
What is the probability of a coin landing on heads exactly once in three tosses?
Signup and view all the flashcards
How is the hash function used for page-based address translation?
How is the hash function used for page-based address translation?
Signup and view all the flashcards
What is the result of converting a binary tree into a max heap?
What is the result of converting a binary tree into a max heap?
Signup and view all the flashcards
How does the program fragment manage a linked list?
How does the program fragment manage a linked list?
Signup and view all the flashcards
What Mealy machine transition is NOT possible?
What Mealy machine transition is NOT possible?
Signup and view all the flashcards
What is the value of the postfix formula 5 1 – 3 * 3 1 – 2 / *?
What is the value of the postfix formula 5 1 – 3 * 3 1 – 2 / *?
Signup and view all the flashcards
How many arrangements can be made with 5 white and 5 green balls?
How many arrangements can be made with 5 white and 5 green balls?
Signup and view all the flashcards
Which of the following is the correct decimal fraction equal to hexadecimal fraction 0.248?
Which of the following is the correct decimal fraction equal to hexadecimal fraction 0.248?
Signup and view all the flashcards
Which of the following is the correct value of the quadruple of hexadecimal fraction 0.FEDC?
Which of the following is the correct value of the quadruple of hexadecimal fraction 0.FEDC?
Signup and view all the flashcards
In a floating-point number format, which of the following is the correct operation for adjusting the radix point and the exponent so that the most significant digit of the mantissa can be a non-zero value?
In a floating-point number format, which of the following is the correct operation for adjusting the radix point and the exponent so that the most significant digit of the mantissa can be a non-zero value?
Signup and view all the flashcards
The decimal value “-72” is stored in an 8-bit register using 2’s complement. If the data in the register is logically shifted two bits to the right, which of the following is the correct result that is represented in decimal?
The decimal value “-72” is stored in an 8-bit register using 2’s complement. If the data in the register is logically shifted two bits to the right, which of the following is the correct result that is represented in decimal?
Signup and view all the flashcards
By definition of the IEEE754 standard, 32-bit floating point numbers are represented as follows:S (1 bit) E (8 bits) M (23 bits)S: Sign bitE: ExponentM: MantissaWhich of the following is the correct “mask bits” in hexadecimal to be used for extracting only the exponent part of the above format? Here, “mask bits” means a bit pattern which is logically ANDed with the 32-bit floating point value.
By definition of the IEEE754 standard, 32-bit floating point numbers are represented as follows:S (1 bit) E (8 bits) M (23 bits)S: Sign bitE: ExponentM: MantissaWhich of the following is the correct “mask bits” in hexadecimal to be used for extracting only the exponent part of the above format? Here, “mask bits” means a bit pattern which is logically ANDed with the 32-bit floating point value.
Signup and view all the flashcards
In the Venn Diagrams labeled 1 to 3, which of the following is the result of Boolean “OR” operations for all three to be combined? Here, “ ” is used for “logical AND,” “+” for “logical OR,” and “ A ” for the “logical NOT” of A. Each set corresponding to x, y, or z is depicted by a circle
In the Venn Diagrams labeled 1 to 3, which of the following is the result of Boolean “OR” operations for all three to be combined? Here, “ ” is used for “logical AND,” “+” for “logical OR,” and “ A ” for the “logical NOT” of A. Each set corresponding to x, y, or z is depicted by a circle
Signup and view all the flashcards
When you flip a coin four times, what is the probability that it will come up heads exactly twice?
When you flip a coin four times, what is the probability that it will come up heads exactly twice?
Signup and view all the flashcards
There are two important operations on a stack: PUSH and POP. PUSH adds the new data to the top of the stack leaving previous data below, and POP removes and returns the current top data of the stack. When the operations shown below are sequentially executed, which of the following is the correct combination of the values x and y?Here, the size of the stack is big enough to hold the entire data. “PUSH(a)” inserts the data a into the stack, and “POP(b)” removes the data b from the stack.
There are two important operations on a stack: PUSH and POP. PUSH adds the new data to the top of the stack leaving previous data below, and POP removes and returns the current top data of the stack. When the operations shown below are sequentially executed, which of the following is the correct combination of the values x and y?Here, the size of the stack is big enough to hold the entire data. “PUSH(a)” inserts the data a into the stack, and “POP(b)” removes the data b from the stack.
Signup and view all the flashcards
Reverse Polish Notation (RPN) is used to represent arithmetic expressions without using brackets to define priorities for evaluation of operators. For example, 3(a+b) becomes 3ab+ in RPN. Which of the following is the best data structure that should be used for implementation of RPN in a computer?
Reverse Polish Notation (RPN) is used to represent arithmetic expressions without using brackets to define priorities for evaluation of operators. For example, 3(a+b) becomes 3ab+ in RPN. Which of the following is the best data structure that should be used for implementation of RPN in a computer?
Signup and view all the flashcards
Which of the following is an appropriate description concerning the list and/or array structures?
Which of the following is an appropriate description concerning the list and/or array structures?
Signup and view all the flashcards
The table below shows a state transition table that checks the input character string. This check starts from the initial state A, and it fails if the state changes to E during the input of the character string. Which of the character strings in the answer group fails this check?Here, the symbol in the answer group represents a space.
The table below shows a state transition table that checks the input character string. This check starts from the initial state A, and it fails if the state changes to E during the input of the character string. Which of the character strings in the answer group fails this check?Here, the symbol in the answer group represents a space.
Signup and view all the flashcards
There are two jugs; one is a 4-liter (4L) jug and the other is a 3-liter (3L) jug. Which of the following is the correct sequence to obtain exactly 2 liters of water in the 4L jug under the conditions shown below?Here, (x, y) indicates that the 4L jug contains x liters of water and the 3L jug has y liters of water.
There are two jugs; one is a 4-liter (4L) jug and the other is a 3-liter (3L) jug. Which of the following is the correct sequence to obtain exactly 2 liters of water in the 4L jug under the conditions shown below?Here, (x, y) indicates that the 4L jug contains x liters of water and the 3L jug has y liters of water.
Signup and view all the flashcards
Which of the following is the correct result produced by executing the program shown below? Here, the parameter “x” is called by value, and the parameter “y” is called by reference.
Which of the following is the correct result produced by executing the program shown below? Here, the parameter “x” is called by value, and the parameter “y” is called by reference.
Signup and view all the flashcards
The “prime number division remainder” method is a well-known hashing algorithm. In this method, a key value is divided by a number N, and the remainder which is also called a hash value is used directly as an index into the hash table. N is the largest prime number less than or equal to the size of the available addressable spaces. When the 20 addressable spaces are available, which of the following is the correct hash value calculated from the key value 136? Here, a prime number is one that cannot be divided evenly by any other number except one (1). 2, 3, 5, 7, 11, and 13 are the first few prime numbers.
The “prime number division remainder” method is a well-known hashing algorithm. In this method, a key value is divided by a number N, and the remainder which is also called a hash value is used directly as an index into the hash table. N is the largest prime number less than or equal to the size of the available addressable spaces. When the 20 addressable spaces are available, which of the following is the correct hash value calculated from the key value 136? Here, a prime number is one that cannot be divided evenly by any other number except one (1). 2, 3, 5, 7, 11, and 13 are the first few prime numbers.
Signup and view all the flashcards
In a certain computer, a bubble sort of an array of 200 data elements takes the same time as a quick sort of the array. In case of an array of 40,000 data elements, how many times faster is a quick sort than a bubble sort? Here, a bubble sort and a quick sort take time proportional to n2 and nlog2n respectively, and “n” is the number of data elements.
In a certain computer, a bubble sort of an array of 200 data elements takes the same time as a quick sort of the array. In case of an array of 40,000 data elements, how many times faster is a quick sort than a bubble sort? Here, a bubble sort and a quick sort take time proportional to n2 and nlog2n respectively, and “n” is the number of data elements.
Signup and view all the flashcards
Integers are stored in the 1st to N-th elements of an array A (N >1). The flowchart below shows the process to check which element of the array contains the same value as X. Which of the following correctly describes the execution result of this process?
Integers are stored in the 1st to N-th elements of an array A (N >1). The flowchart below shows the process to check which element of the array contains the same value as X. Which of the following correctly describes the execution result of this process?
Signup and view all the flashcards
Which of the following is a re-writable, erasable memory, using electrical signals, which is widely used for various devices such as digital cameras and digital music players and can maintain the data even after the power is turned off?
Which of the following is a re-writable, erasable memory, using electrical signals, which is widely used for various devices such as digital cameras and digital music players and can maintain the data even after the power is turned off?
Signup and view all the flashcards
The figure shows an RS flip-flop using two NOR gates. Which of the following is the correct truth table for the flip-flop? Here, “unchanged” shown in the table means the outputs maintain a previous state, and “unstable” means the outputs are in an unstable state.
The figure shows an RS flip-flop using two NOR gates. Which of the following is the correct truth table for the flip-flop? Here, “unchanged” shown in the table means the outputs maintain a previous state, and “unstable” means the outputs are in an unstable state.
Signup and view all the flashcards
Which of the following is the correct combination of various addressing modes? Here, X1 is an address which is stored in a program counter. X2 is an address part of an instruction which is addressed by X1. X3 is an address in which an operand needed to execute an instruction is stored. X4 is a value in an index register. (X2) means the contents of location X2.
Which of the following is the correct combination of various addressing modes? Here, X1 is an address which is stored in a program counter. X2 is an address part of an instruction which is addressed by X1. X3 is an address in which an operand needed to execute an instruction is stored. X4 is a value in an index register. (X2) means the contents of location X2.
Signup and view all the flashcards
A computer is designed to enable pipeline control so that each instruction can be completed in five cycles. How many cycles are needed to execute 20 instructions? Here, all instructions can be executed without being stopped halfway.
A computer is designed to enable pipeline control so that each instruction can be completed in five cycles. How many cycles are needed to execute 20 instructions? Here, all instructions can be executed without being stopped halfway.
Signup and view all the flashcards
Which of the following is an appropriate statement in regard to interrupts?
Which of the following is an appropriate statement in regard to interrupts?
Signup and view all the flashcards
Study Notes
No specific topic provided. Please provide the text or questions for which you would like study notes.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge and understanding with this general study notes quiz. Suitable for students looking to reinforce their learning across various subjects, the quiz covers a range of topics to challenge your memory and comprehension skills.