2009级吉林大学计算机学院-计算机导论试题B卷
09年计算机专业试卷-专业课B及答案

河南省2009年普通高等学校对口招收中等职业学校毕业生考试计算机类专业课试题卷一、选择题(数据库应用基础-Visual Foxpro6.0 1-10;计算机网络基础11-23)1.用二维表格来表示数据集合以及它们之间联系的数据模型是A.层次模型B.关系模型C.网状模型D.面向对象模型2.在Visual Foxpro 6.0主界面中,显示已隐藏的命令窗口,应使用的组合键是A.ALT+Q B.CTRL+Q C.CTRL+F2D.CTRL+F43.Visual Foxpro 6.0的PACK命令用来清除当前数据表文件的A.全部记录B.有删除标记的记录C.满足条件的字段D.满足条件的记录4.要修改当前数据表文件的“姓名”字段,应使用的命令是A.MODIFY COMMAND B.MODIFY QUERYC.MODIFY STRUCTURE D.MODIFY FORM5.非空数据表文件及其索引文件都已经打开,确保记录指针定位在记录号为1的记录,应使用的命令是A.GOTO TOP B.GOTO BOF C.SKIP 1 D.GOTO 16.下列命令中,只能关闭当前数据库的是A.CLOSE ALL B.USE C.CLOSE D.CLOSE DA TABASE 7.使用报表向导创建报表的过程中,进行到“定义报表布局”步骤时的选项有A.列数、方向、字段布局B.列数、行数、字段布局C.行数、方向、字段布局D.列数、行数、方向8.Visual Foxpro 6.0中,视图不能单独存在,它依赖于A.表B.数据库C.查询D.表单9.表达式V AL(SUBSTR("5.12汶川大地震",1,4))的运算结果是A.5.12B."5.12" C..T. D.出错10.以下有关索引的说法中正确的是A.建立主索引的主关键字值不能为空,但可以有重复数值B.主索引既可在自由表中创建,也可以在数据库表中创建C.侯选索引既可在自由表中创建,也可以在数据库表中创建D.建立唯一索引的索引关键字值不能有重复值11.建立计算机网络的目的是实现计算机资源共享。
计算机导论试题及答案(总)

计算机导论》试卷1注意事项:1)本试卷适用于计算机相关专业本科学生使用。
2)本试卷共7页,满分100分。
考试时间120分钟。
一)单项选择题(1分×70=70分)1C234B)RAM是一种半导体存储器C)RAM中的信息不能长期保存D)RAM用来存放计算机本身的监控程序5、ASCII码值由小到大的一般顺序是。
A)特殊符号、控制符、数字、大写字母、小写字母B)控制符、特殊符号、数字、大写字母、小写字母C)大写字母、小写字母、数字、特殊符号、控制符D)数字、特殊符号、控制符、小写字母、大写字母6、扩展名为COM类文件为。
A)命令解释文件B)C语言源程序文件7891011、批处理操作系统是一个操作系统。
A)交互式B)分时C)非交互式D)网络式12、把高级语言的源程序变为目标程序要经过。
A)汇编B)编译C)编辑D)解释13、微机的性能指标中的内部存储器的容量是指。
A)RAM的容量B)ROM的容量C)硬盘的容量D)RAM和ROM的容量14、现代计算机之所以能自动连续进行数据处理,主要因为。
15、16171819、计算机一旦断电后中的信息会丢失。
A)硬盘B)软盘C)RAM D)ROM20、系统软件中最重要的是A)操作系统B)语言处理程序C)工具软件D)数据库管理系统21、总线是连接计算机各部分的一镞公共信号线,它是计算机中传送信息的公共通道,总线是由地址总线)数据总线和控制总线组成,其中地址总线是_在微机各部分之间传送的线路。
A)数据信号B)控制信号22AC23AC24AC2526、TCP/IP协议的含义是。
A)局域网传输协议B)拨号入网传输协议C)传输控制协议和网际协议D)OSI协议集27、Internet的域名结构中,顶级域名为Edu的代表。
A)商业机构B)政府部门C)教育机构D)军事部门28、电子邮件是A)网络信息检索服务。
B)通过Web网页发布的公告信息C)通过网络实时交互的信息传递方式29A)C)3031、A)C)32A)C)BitsPerSecondD)BillionPerSecond33、在因特网(Internet)中,电子公告板的缩写是。
计算机导论11~12第一学期(B 卷)

新乡学院2011 ―2012学年度第一学期《计算机导论》期末试卷B卷课程归属部门:计算机与信息工程学院试卷适用范围:11级计应本科& 数学系本科选择题答案填写栏:二、名词解释(10分,每小题5分)1.网络协议2.HTML三、问答题(10分)1.什么是操作系统?操作系统具有哪些基本功能?一、选择题每题2分共80分)院系:________班级:__________姓名:______________学号:_____________…….……………………….密…………………封…………………线…………………………新乡学院2011 ―2012学年度第一学期《计算机导论》期末试卷B卷课程归属部门:计算机与信息工程学院试卷适用范围:11级计应本科& 数学系本科一、选择题每题2分共80分)1.商业企业进销存管理系统属于。
A.科学计算方面的计算机应用B.数据处理方面的计算机应用C.过程控制方面的计算机应用D.人工智能方面的计算机应用2.下列数中最大的数是。
A.(1000101)2B.(107)8C.(73)10D.(4B)163.假设某计算机的字长为8位,则十进制数(+67)10的反码表示为。
A.01000011B.00111100C.00111101D.101111004.已知:“B”的ASCII码值是66,则码值为1000100的字符为。
A.“C”B.“D”C.“E”D.“F”5.下面的输入设备中,不属于定点输入设备?A. 鼠标B. 触摸屏C. 光笔D. 键盘6..在逻辑运算中有Y=A+B,则表示逻辑变量A和B进行。
A.与运算B.或运算C.非运算D.与非运算7.计算机的内存储器比外存储器。
A.更便宜B.存储速度快C.存储容量大D.虽贵但能存储更多信息8.计算机工作时,内存储器用来存储。
A.程序和指令B.程序与数据C.数据和信号D.ASCII码和汉字编码9.CPU中临时存放数据的部件是。
A.算术逻辑单元B.存储器C.寄存器D.控制器10.为了解决CPU与主存的速度匹配问题,可采用。
《计算机导论》2015B卷

一、选择题(每小题 2分,共50分)1、现在的计算机是基于()模型。
A. 莱布尼茨B. 冯.洛伊曼C. 帕斯卡D. 查尔斯.巴比奇2、目前人们常说“IT人才”,其中IT是指()。
A. 交互技术B. 信息技术C. 制造技术D. 控制技术3、下列不同数制的数值中,最大的一个是()。
A.(1001)2 B.(70)8 C.(70)10 D.(70)164、目前硬盘与内存相比,具有()的特点。
A. 存储容量小,工作速度快B. 存储容量大,工作速度快C. 存储容量小,工作速度慢D. 存储容量大,工作速度慢5、为了提高计算机中CPU的性能,可以采用多种措施,但以下措施中()是基本无效的。
A. 使用多个算术逻辑部件B. 提高中央处理器的主频C. 增加中央处理器的字长D. 增大辅助存储器的容量6、存储器容量是1KB,实际包含()字节。
A. 1000B. 1024C. 1024GD. 1000M7、()是可以存放临时数据的独立存储单元。
A.ALUB. 寄存器C. 控制单元D. 磁带驱动器8、在“资源管理器”中进行文件操作时,为了选择多个不连续的文件,必须首先按住()健。
A. AltB. ShiftC. INSD. Ctrl9、( ) 键是大写字母锁定键,主要用于连续输入若干大写字母。
A. Shift B. Alt C. Ctrl D. CapsLock10、启动Windows后,出现在屏幕的整个区域称为( )。
A.工作区域 B.桌面 C.文件管理器 D.程序管理器11、在Windows中移动窗口时,鼠标光标要停留在()处拖拽。
A. 菜单栏B. 状态栏C. 标题栏D. 工具栏12、在使用Word文本编辑软件时,插入点位置是很重要的,因为文字的增删都将在此处进行,现在要删除一个字,当插入点在该字的前面时,应该按()键。
A. 退格键B. 删除键C. 空格键D. 回车键13、在Word文档中插入图形的第1步操作是()。
A. 执行“插入”菜单中的“图片”命令B.将插入点置于图形预期出现的位置C.在图片对话框中选择要输入的图片文件名D.单击“确定”按钮,插入图片14、某Excel工作表的单元格区域A2:C4输入数值均为10,若在C1单元格内输入公式“=Sum(A2:C4)”,则C1单元格的显示结果是()。
计算机导论习题(解答)

计算机导论习题(答案)一、单项选择题1. 问题逐步解决的方案被称为 D 。
A. 硬件B. 操作系统C. 计算机语言D. 算法2、十进制整数A要转换为二进制数据,需要用的方法是 A 。
A.反复“以2除A并取其商的余数”B.反复“以10除A并取其商的余数”C.反复“以2乘A并取其积的整数”D.反复“以10乘A并取其积的整数”3. 把十进制数转换成8进制,需要不断用 C 来除这个数。
A. 2B. 4C. 8D. 104、6位无符号二进制整数所能表示的最大十进制整数是 B 。
A.64 B.63C.62 D.615.如果计算机断电,那么下列 A 中的数据将被擦除。
A. RAMB. ROMC. 磁带驱动器D. CD-ROM6、依据冯·诺依曼模型, C 将被存储在存储器之中。
A.仅有数据B.仅有程序C.程序及其所处理的数据D.以上都不是7. 16千兆的字节是 C 字节。
A. 2^16B. 2^40C. 2^34D. 2^568、冯·诺依曼模型中的控制单元用于对 D 子系统的操作进行控制。
A.算数逻辑单元B.存储器C.输入输出D.以上都是9. 子算法又称为 C 。
A. 函数B. 子例程C. 模块D. 过程10、十六进制数CE2所对应的位模式是 D 。
A.001100011101 B.101100011101C.010********* D.11001110001011. C、C++可归类于 C 语言:A.机器; B.符号;C.高级; D.自然。
12. 包括行和列的数组可能是 B 数组:A.一维; B.二维;C.三维; D.多维。
13、十进制数 -124表示在计算机内的8位二进制补码形式是 D 。
A.01111100 B.10000011C.01111011 D.1000010014. C 是有交换功能的多道程序技术A.分区调度;B.分页调度;C.请求分页调度;D.队列。
15、下列各项中 C 的程序是属于操作系统进程管理概念中的进程。
计算机导论考试题库大全(K12教育文档)

计算机导论考试题库大全(word版可编辑修改)编辑整理:尊敬的读者朋友们:这里是精品文档编辑中心,本文档内容是由我和我的同事精心编辑整理后发布的,发布之前我们对文中内容进行仔细校对,但是难免会有疏漏的地方,但是任然希望(计算机导论考试题库大全(word 版可编辑修改))的内容能够给您的工作和学习带来便利。
同时也真诚的希望收到您的建议和反馈,这将是我们进步的源泉,前进的动力。
本文可编辑可修改,如果觉得对您有帮助请收藏以便随时查阅,最后祝您生活愉快业绩进步,以下为计算机导论考试题库大全(word版可编辑修改)的全部内容。
《计算机导论》模拟试题一一、单选题(每小题1分,共80分)1.客机、火车订票系统属于。
A.科学计算方面的计算机应用B.数据处理方面的计算机应用C.过程控制方面的计算机应用 D。
人工智能方面的计算机应用2。
按照计算机用途分类,可将计算机分为。
A。
通用计算机、个人计算机 B.数字计算机、模拟计算机C.数字计算机、混合计算机 D。
通用计算机、专用计算机3.下列数中最大的数是。
A.(1000101)2B.(107)8 C。
(73)10 D。
(4B)164。
已知:3×4=10,则5×6= .A.24 B。
26 C.30 D.365。
假设某计算机的字长为8位,则十进制数(+67)10的反码表示为。
A。
01000011 B。
00111100 C.00111101 D。
101111006.假设某计算机的字长为8位,则十进制数(—75)10的补码表示为。
A.01001011B.11001011C.10110100 D。
101101017。
已知:“B”的ASCII码值是66,则码值为1000100的字符为。
A。
“C” B。
“D” C.“E" D。
“F”8.在计算机系统内部,汉字的表示方法是采用。
A.ASCII码B.机内码C.国标码D.区位码9。
汉字“办”的区位码是1676,其国标码是。
吉林大学软件学院《数据库原理》期末试题B卷(答案)

吉林大学软件学院《数据库原理》期末试题B卷(答案)2009-2010学年第2学期2007级《数据库系统》考试题(B)考试时间:2010年6月班级:学号:姓名:请将答案写在答题纸上,写明题号,不必抄题,字迹工整、清晰;请在答题纸和试题纸上都写上你的班级,学号和姓名,交卷时请将试题纸、答题纸和草纸一并交上来。
一、[20分]用英文解释下列名词:1.Schema:the logical structure of the database2.Instance:the actual content of the database at a particular point in time3.Entity:a “thing” or “object” in the enterprise that is distinguishable from otherobjects4.1NF:A relational schema R is in 1NF if the domains of all attributes of R areatomic5.Super Key:A super key of an entity set is a set of one or more attributes whosevalues uniquely determine each entity.6.RAID:Redundant Arrays of Independent Disks,disk organization techniquesthat manage a large numbers of disks, providing a view of a single disk7.Clustering index:in a sequentially ordered file, the index whose search keyspecifies the sequential order of the file8.Query Optimization:Amongst all equivalent evaluationplans choose the onewith lowest cost.9.Specialization:T op-down design process; we designate subgroupings within anentity set that are distinctive from other entities in the set10.Conflict serializable:We say that a schedule S is conflict serializable if it isconflict equivalent to a serial schedule二、[15分]以下是某健身俱乐部的会员管理数据库,其保存的信息有:·置业顾问(adviser)的编号Ano,姓名Aname,性别Asex,电话Atel;·客户(customer)的身份证号码Cid,姓名Cname,年龄Cage,联系电话Ctel ;·每个客户有且仅有一个置业顾问,一个置业顾问可以为多个客户提供咨询服务;·每个客户可以进行多次卖房或买房业务,在一次交易过程中,买方与卖方是一一对应的;·试画出E-R图,并将其转换为符合3NF规范的关系模型1.画出上述关系的E-R模型[10分]2.将E-R模型转换为符合3NF规范的关系模型[5分]Members = (cid, cname, cage, csex, phone, cdate, type, discount)Adviser = (ano, aname, asex, atel, level)Alevel = (Level, salary, awards)MA = (Cid, Ano, MAtime)三、[15分] 设有关系数据库e ( e#, en, ea, ex, d# ) p ( p#, pn, pt, pb )ep ( e#, p#, b ) d ( d#, dn, dl )其中,e#, en, ea, ex依次分别表示工程师编号、姓名、年龄、性别;p#, pn, pt, pb依次分别表示工程项目编号、名称、类别、预算;ep示工程师参加工程项目,b 表示奖金;d#, dn, dl依次分别表示部门编号、部门名称、部门地址;试用关系代数表达:1. 查询年龄大于40的工程师的编号和姓名∏e#,en (σea > 40(e))2. 查询所有参加了A项目,但没有参加B项目的工程师编号∏e#(σp# = 'A'(e ∞ ep))- ∏e#(σp# = 'B'(e ∞ ep))3. 查询参加所有pb大于100000的工程项目的工程师的编号和姓名∏e#,en (σpb > 100000(e ∞ ep ∞ p))4. 查询pb最大的工程项目的编号和工程名称∏p#,pn (p#gmax(pb)(p))5. 假设有一部分工程师没有参与任何项目,查询该单位所有的工程师的名字以及其所参与的项目编号∏e#,p#(e =∞ p)四、[20分] 题设与第三题相同。
2008级吉林大学软件学院-计算机导论试题A卷

2008级吉林大学软件学院-计算机导论试题A卷2007-2008学年第1学期2008级《计算机导论》考试试题A卷考试时间:2008年12月28班级学号姓名请将答案写在答题纸上,写明题号,不必抄题,字迹工整、清晰;请在答题纸和试题纸上都写上你的班级,学号和姓名,交卷时请将试题纸、答题纸和草纸一并交上来。
Ⅰ.Choice Questions(30 questions, 1 score for each question)1. The step by step solution that expresses the logical solution to a particular problem of interest is called a(n) ________.A. programB. answerC. algorithmD. process2. The ASCII character set includes ________ characters.A. 4,294967296B. 256C. 65536D. 1273. The most common way to represent signed integers today is ________.A. two’s complementB. one’s complementC. sign-and magnitudeD. unsigned integers4.What is -31 in Excess_127 notation? ________A. 01100001B. 01100000C. 10011111D. 111000015.To subtract two binary numbers, take the ________ of the second number, and then add.A. inverseB. one's complementC. two's complementD. square root6. Every computer today is based on the ________ model..A. IntelB. MicrosoftC. von NeumannD. input/output7. The place where programs and data are stored during processing is ________..A. displayB. hard diskC. floppy diskD. memory8. A computer stores data as a ________ pattern.A. binaryB. hexadecimalC. unaryD. numeric9. An 8-bit pattern can represent up to ________ symbols.A. 128B. 256C. 16D. 810. A byte consists of ______ bits.A. 2B. 4C. 8D. 111. If the memory address space is 32MB and the word size is 8 bits, then ______bits are needed to access each word.A.25B. 16C. 8D. 3212. The three steps in the running of a program on a computer are performed ______in this specific order.a. fetch, execute, and decodeb. fetch, decode, and executec. decode, fetch, and executed. decode, execute, and fetch13.A ______is a device that can route a packet based on its network layer address.A. bridgeB. repeaterC. routerD. all of the above14.In the ______method to synchronize the operation of the CPU with the I/O device, the I/O device informs the CPU when it is ready for data transfer.A. programmed I/OB. DMAC. isolated I/OD. interrupt-driven I/O15. A(n) ________ search is used if the list being searched is not ordered.A. heapB. binaryC. 8. selectionD. sequential16. Using the XOR (exclusive OR) operator, if more than one input is 1, the output is ________.A. 0B. 1C. indeterminateD. equal to the number of inputs that are 117.If you make a mask of all 0s and then AND the bit pattern and the mask, you will _______.A. set all the bits of the patternB. unset all the bits of the patternC. randomize the bits of the patternD. complement the bits of the pattern18. The ______ is a computer subsystem that performs operations on data.A. memoryB. I/O hardwareC. CPUD. RAM19.Memory addresses are defined using ________.A. signed binary integersB. two's complement representationC. floating point numbersD. unsigned binary integers20. The ________ moves a process from one state to another.A. control unitB. job schedulerC. system administratorD. process scheduler21.The idea of a sorting algorithm is to ________.A. determine if a particular item is present or notB. arrange data according to their valueC. compute the sum of all the items in an arrayD. output the items in an array22. A binary search starts the process ________ of a list.A. at the beginningB. at a random locationC. in the middleD. at the end23. What needs to be added to the simple black box model of a data processing device to make it more applicable to a computer?A. BIOSB. Power supplyC. Operating systemD. Program24. A program is comprised of a finite number of ________.A. instructionsB. memory cellsC. i/o devicesD. hard drives25.A(n) ________ operates ate the first three layers of the OSI model.A. hubB. repeaterC. routerD. bridge26. Machine language is ________.A. written in LinuxB. the only language understood by a computerC. the same as assembly languageD. variant of BASIC27.Recursion is a process by which an algorithm calls ________.A. a sorting algorithmB. a search algorithmC. itselfD. a subalgorithm28. The transport layer protocol of TCP/IP is called _______.A. TCPB. UDPC. IPD. a and b29. ______ is a program that facilitates the execution of other programs.A. An operating systemB. A queueC. An application programD. Hardware30. A process in the ready state goes to the running state when _________.A. it finishes runningB. it enters memoryC. it gets access to the CPUD. it requests I/OⅡ.Questions( 5 questions,4 scores for each question)1. What‘s the function of the ALU?/doc/6f3549947.html, the layers of the OSI model..3. What is the formal definition of an algorithm?4. What are the components of an operating system?5. What are the subsystems of the von Neumann computer model?Ⅲ.Calculation( 5 subjects, 6 scores for each subject)1. Change the following 8-bit two’s complement numbers to decimal.(1). 11111111 (2). 01100011 (3). 10000000 (4). 11001110 (5).11010000 (6)000100112.Change the following decimal numbers to 8-bit two’s complement integers.(1). 142 (2). -13 (3). -128 (4). 100 (5). -56 (6) -13. Using an 8-bit allocation, first convert each of the following numbers to two’s complement, do the operation, and then convert the result to decimal.(1) 18+22 (2) 18-22 (3) -18 +22 (4) -18-22 (5) 22-1 (6)-128-14. Show the result of the following operations in hexadecimal format.(1) NOT x55 (2) x AA AND x55 (3) x99 OR x66 (4) 100 AND 255(5) xFF XOR x33 (6) x40 OR (x8F AND xF7)5.Change the -7.125 decimal numbers to binary numbers, and show in 32-bit IEEE format, then changed to hexadecimal.Ⅳ. Analyzing and Design (4 subjects, 5 scores for each subject)1. An imaginary computer has eight data registers Rx(R0 toR7), 16M words in memory, the address can address words in the 16M words memory, and have 32 different instructions (ADD, SUB, etc.). A typical instruction of the computer uses the following format: SUB address, Rx(1) What is the minimum size of an instruction in bits?(2) If the instruction is in the minimum size and the computer uses the same size of word for data and instructions, what is the size of the data bus?(3) What is the size of the program counter?(4) What is the size of the address bus?(5) What is the minimum size of the control bus?2. Imaging a power plant that pumps water to a city using eight pumps. The states of the pumps (on oroff) can be represented by 8-bit pattern. For example, the pattern 10001111 shows that pumps 1 to 4(from right), and 8 are on(running) while pumps 5, 6, and 7 are off(shut down). How can you shut down all pumps, after a while, and then let the pump 5 ,7 running?3. Using the Insertion sort algorithm, manually sort the following list and show your work in each pass:12, 5, 23, 31, 40, 56, 78, 9, 2, 11, 984. A list contains the following elements. Using the binary search algorithm, trace the steps followed to find 58. At each step, show the values of first, last, and mid.5,12, 16, 26, 33, 51, 58, 80。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
2009-2010学年第1学期2009 级《计算机导论》考试试题A卷考试时间:2009年12月日班级学号姓名✧请将答案写在答题纸上,写明题号,不必抄题,字迹工整、清晰;✧请在答题纸和试题纸上都写上你的班级,学号和姓名,交卷时请将试题纸、答题纸和草纸一并交上来。
一、Choice Questions(20 questions, 1 score for each question)1. In the von Neumann model, the _______subsystem accepts data and programs and sends processing results to output devices.a. ALUb. Input/outputc. memoryd. control unit2. FORTRAN and COBOL are examples of ________.a. hardwareb. an operating systemsc. computer languagesd. algorithms3. The first computing machine to use the idea of storage and programming was called_______.a. the Madelineb. EDV ACc. the Babbage machined. the Jacquard loom4. A 32-bit code was developed by ______ to represent symbols in all languages.a. ANSIb. ISOc. EBCDICd. Hamming5. The bitmap graphic method and the vector graphic method are used to represent ______in a computer.a. audiob. videoc. imagesd. numbers6. When converting a decimal number to binary, you repeatedly divide by _______.a. 2b. 8c. 10d. 167. In ______ number representation, 1111 in memory represents –0.a. unsigned integersb. sign-and-magnitudec. one’s complementd. two’s complement8. Which number representation method is often used to convert analog signals to digital signals?a. unsigned integersb. sign-and magnitudec. one’s complementd. two’s complement9. For an 8-bit allocation, the smallest decimal number that can be represented in two’s complement form is _____.a. -8b. -127c. -128d. -25610. You use a bit pattern called a ________ to modify another bit pattern.a. maskb. carryc. floatd. byte11. ______ is a memory type with capacitors that need to be refreshed periodically.a. SRAMb. DRAMc. ROMd. a tape drive12. The _____ memory contains a copy of a portion of main memory.a. CPUb. cachec. maind. ROM13. The _____ controller is a high-speed serial interface that transfers data in packets.a. SCSIb. FireWirec. USBd. IDE14. The ______ layer of the OSI model is responsible for source-to-destination delivery of the entire message.a. transportb. networkc. data-linkd. session15. A ______ is a connecting device that only regenerates the signal.a. repeaterb. bridgec. routerd. gateway16. ______ is a protocol for mail services.a. FTPb. SMTPc. TELNETd. HTTP17. In paging, memory is divided into equally sized sections called _______.a. pagesb. framesc. segmentsd. partitions18. To prevent ______, an operating system can put resource restrictions on processes.a. starvationb. synchronizationc. pagingd. deadlock19. _______ is english like representation of the code.a. A flowchartb. A structure chartc. Pseudocoded. an algorithm20. A process in the ready state goes to the running state when _________.a. it enters memoryb. it gets access to the CPUc. it requests I/Od. it finishes running二、Questions(6 questions, 5 scores for each question)1. What is the formal definition of an algorithm?2. What kinds of states can a process be in?3. What are the three common topologies in LANs? Which is the most popular today?4. What is a bit pattern?5. What are the two major types of searches?6. Name the layers of the TCP/IP protocol suite.三、Calculation(5 subjects, 4 scores for each subject)1. Change the following 8-bit two’s complement numbers to decimal.(1). 10000000 (2). 01100100 (3). 11001000 (4). 11000011 (5).110101012. Change the following decimal numbers to 8-bit two’s complement integers, and then convert the result to hexadecimal.(1). -48 (2). 25 (3). -127 (4). 98 (5). -553. Using an 8-bit allocation, first convert each of the following numbers to two’s complement, do the operation, and then convert the result to hexadecimal.(1) 35+63 (2) 35-63 (3) -35 +63 (4) -35-63 (5) 63-14. Show the result of the following operations, and then convert the result to hexadecimal.(1) NOT 129 (2) 15 AND 10 (3) x55 OR xAA (4) 100 AND 255(5) (xFF XOR xBB) AND (xFF OR xBB)5. A computer has 64MB (megabytes) of memory. Each word is 4 bytes. How many bits are needed to address each single word in memory?四. Analyzing and Design (2 subjects, 10 scores for each subject)1. Using the selection sort algorithm, manually sort the following list and show your work in each pass:12, 6, 78, 31, 50, 46, 99, 2, 20, 442. A list contains the following elements. Using the binary search algorithm, trace the steps followed to find 18. At each step, show the values of first,last and mid.2, 5, 18, 28, 30, 40, 66, 1003. Write a recursive algorithm to find the greatest common divisor(gcd) of two integers using following definition.gcd(x, y)= gcd(y, x) , if x<ygcd(x, y)= x , if y=0gcd(x, y)= gcd(y, x mod y) , otherwise4. Imaging a power plant that pumps water to a city using eight pumps(P8, P7, P6, P5, P4, P3, P2, and P1). The states of the pumps (on or off) can be represented by 8-bit pattern. For example, the pattern 10001111 shows that pumps 1 to 4(from right), and 8 are on (running) while pumps 5, 6, and 7 are off (shut down). How can you shut down all pumps, after two minutes, let the pump P2 and P5 running, and after one hour, shut down the P2 pump and turn on the P6 pump simultaneously, and remain the P5 running too?5. An imaginary computer has sixteen data registers Rx(R0 to R15), 512M words in memory, the address can address words in the 64M words memory, and have 128 different instructions (ADD, SUB, etc.). A typical instruction of the computer uses the following format: ADD address, Rx(1) What is the minimum size of an instruction in bits?(2) If the instruction is in the minimum size and the computer uses the same size of word for data and instructions, what is the size of the data bus?(3) What is the size of the program counter?(4) What is the size of the address bus?(5) What is the minimum size of the control bus?。