Exam 12: Theory of Computation
Exam 1: Data Storage31 Questions
Exam 2: Data Manipulation35 Questions
Exam 3: Operating Systems48 Questions
Exam 4: Networking and the Internet33 Questions
Exam 5: Algorithms46 Questions
Exam 6: Programming Languages42 Questions
Exam 7: Software Engineering34 Questions
Exam 8: Data Abstractions46 Questions
Exam 9: Database Systems41 Questions
Exam 10: Computer Graphics40 Questions
Exam 11: Artificial Intelligence39 Questions
Exam 12: Theory of Computation40 Questions
Select questions type
In a two's complement system, what value can be added to any other value without causing an overflow? How many values in the system have this property? Explain your answer.
(Essay)
4.8/5
(31)
Which of the following representations in two's complement notation represents the smallest value?
(Multiple Choice)
4.7/5
(34)
Which of the following bit patterns represents the value -5 in two's complement notation?
(Multiple Choice)
4.8/5
(33)
Which of the following bit patterns (represented in hexadecimal notation) represents a positive number in two's complement notation?
(Multiple Choice)
4.9/5
(31)
Which of the following bit patterns (represented in hexadecimal notation) represents a negative number in two's complement notation?
(Multiple Choice)
4.8/5
(34)
Which of the following bit patterns represents the value 5 in two's complement notation?
(Multiple Choice)
4.7/5
(38)
Describe how a computer can produce an incorrect answer when performing numerical computations even though it has not malfunctioned.
(Short Answer)
4.9/5
(27)
Which of the following Boolean operations produces the output 1 for the fewest number of input patterns?
(Multiple Choice)
4.9/5
(31)
Which of the following systems is least efficient when encoding numeric values?
(Multiple Choice)
4.9/5
(32)
Which of the following mass storage system does not require physical motion?
(Multiple Choice)
4.9/5
(32)
Which of the following is the binary representation of 4 5/8?
(Multiple Choice)
4.7/5
(30)
Data compression techniques apply various principles to reduce the size of data. One, called _______________________, avoids repeating long strings of the same data item. Another, called _______________________, encodes the difference between consecutive blocks of data rather than encoding each block in its entirety. Still another, called _________________________, uses short bit patterns to encode frequently occurring items and longer patterns to encode less frequent items.
(Short Answer)
4.9/5
(40)
Which of the following bit-patterns represents the smallest value using the floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa?
(Multiple Choice)
4.7/5
(37)
Which of the following values cannot be stored accurately using a floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa?
(Multiple Choice)
4.9/5
(32)
Why is the rightmost bit in a string of bits considered to be the least significant bit?
(Essay)
4.9/5
(35)
Explain why the final version of the dictionary need not be transmitted with a message encoded using LZW compression.
(Essay)
4.9/5
(41)
To what does the term "normalized form" refer in the context of floating-point notation?
(Essay)
4.8/5
(34)
Which of the following representations in two's complement notation represents the largest value?
(Multiple Choice)
4.8/5
(28)
Explain why such terms as kilo, mega, and giga have acquired double meanings.
(Essay)
4.8/5
(27)
Showing 21 - 40 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)