TEST BANK OF SYSTEMS ARCHITECTURE 7TH EDITION BY BURD
IF You Want To Purchase A+ Work Then Click The Link
Below , Instant Download
Chapter 03 Data
Representation
1. Computer input devices convert external data into an
internal representation that can be carried to and manipulated by processing
circuitry.
|
2. Automated data processing combines physics and
mathematics.
|
3. Decimal and binary notations are alternative forms of
Boolean logic.
|
4. In numbering systems other than the decimal numbering
system, the term radix point is used for the period or comma.
|
5. The number of digits needed to represent a value
decreases as the numbering system’s base decreases.
|
6. Generally, a byte is the largest unit of data that can
be read from or written to a storage device.
|
7. The representation format for each data type balances
compactness, range, accuracy, ease of manipulation, and standardization.
|
8. Twos complement notation is simple to understand for
most people.
|
9. With any fixed-width data storage format, it’s possible
that the result of a computation will be too large to fit in the format.
|
10. To avoid overflow and increase accuracy, some computers
and programming languages define additional numeric data types called
long-precision data formats.
|
11. Double-precision integers are sometimes called large
integers.
|
12. You can increase a fixed radix point format’s numeric
range by allocating more bits to the whole portion.
|
13. In the binary32 format, the leading sign bit applies to
the exponent, not the mantissa.
|
14. The number of bits in a floating-point string and the
formats of the mantissa and exponent impose limits on the range of values
that can be represented.
|
15. Monetary amounts should be stored and manipulated as
binary floating-point numbers.
|
16. Scientific and floating-point notation is far more
complex than integer data formats.
|
17. Computers are designed to process character data and
can therefore represent characters directly.
|
18. ASCII is a 7-bit format because most computers and
peripheral devices transmit data in bytes and because parity checking was
used widely in the 1960s to 1980s for detecting transmission errors.
|
19. In ASCII, NAK is sent to acknowledge correct receipt of
data, and ERR is sent to indicate that an error has been detected.
|
20. Unicode is widely supported in modern software,
including most OSs and word-processing applications.
|
21. Before Unicode, devices designed for character I/O used
ASCII by default and vendor-specific methods or older ISO standards to
process character sets other than Latin-1.
|
22. Intel microprocessors have been used in PCs since 1961.
|
23. The complexity of data structures is limited only by
the software.
|
24. Whether implemented in system or application software,
almost all data structures make extensive use of pointers and addresses.
|
25. Using contiguous storage locations, especially in
secondary storage devices, simplifies the allocation of storage locations.
|
26. More storage locations are required for a linked list
than for an array with equivalent content because both data and pointers must
be stored.
|
27. Linked lists are easier to expand or shrink than
arrays are.
|
28. Each element of a doubly linked list has two pointers:
one pointing to the next element in the list and one pointing to the top
element in the list.
|
29. In a sequential file, records are stored in contiguous
storage locations.
|
30. The advantage of using an index lies in the efficiency
of record insertion, deletion, and retrieval.
|
31. In a ____, each digit can have only one of two
possible values: 0 or 1.
|
32. Binary numbers are well suited to computer processing
because they correspond directly with values in ____ logic.
|
33. In the decimal or binary notations, the symbol used to
represent a digit and the digit’s position in a string determines its ____.
|
34. The multiplier that describes the difference between
one position and the next is the ____ of the numbering system.
|
35. In the decimal numbering system, the period or comma is
called a ____.
|
36. The leftmost digit in a bit string is called the ____.
|
37. The rightmost digit in a bit string is the ____.
|
38. Large numeric values expressed in octal notation are
one-third the length of corresponding ____ notation.
|
39. Hexadecimal numbering uses ____ as its base or radix.
|
40. The term “____” describes the number of bits used to
represent a numeric value.
|
41. The accuracy, or precision, of data format
representation increases with ____.
|
42. When discussing computer processing, ____ refers to
executing processor instructions, such as addition, subtraction, and equality
comparisons, and “ease” refers to machine efficiency.
|
43. A(n) ____ is a whole number—a value that doesn’t have a
fractional part.
|
44. Most CPUs provide a(n) ____ data type, which stores
positive integer values as ordinary binary numbers.
|
45. ____ notation always uses a fixed number of bits, with
the leftmost bit representing the sign.
|
46. In ____ notation, nonnegative integer values are
represented as ordinary binary values.
|
47. ____ occurs when the absolute value of a computational
result contains too many bits to fit into a fixed-width data format.
|
48. A ____ data format combines two adjacent fixed-length
data items to hold a single value.
|
49. A(n) ____ can contain both whole and fractional
components.
|
50. The fractional portion of a real number is represented
by digits to the right of the ____.
|
51. Real numbers are represented in computers by using
____.
|
52. ____ occurs when the absolute value of a negative
exponent is too large to fit in the bits allocated to store it.
|
53. Numbers such as 1/3 are stored in floating-point format
by ____.
|
54. In their written form, English and many other languages
use alphabetic letters, numerals, punctuation marks, and a variety of other
special-purpose symbols known as ____.
|
55. ____ is a character-coding method developed by IBM in
the 1960s and used in all IBM mainframes well into the 2000s.
|
56. The assignment of numeric codes to characters follows a
specific order called a(n) ____.
|
57. The upper 128 entries in Latin-1 are sometimes called
____.
|
58. The ____ data type has only two data values—true and
false.
|
59. The data types a CPU supports are sometimes called ____
data types.
|
60. A(n) ____ is a related group of primitive data elements
organized for some type of common processing and is defined and manipulated
in software.
|
61. A(n) ____ is a data element containing the address of
another data element.
|
62. A(n) ____ is a set of related data values.
|
63. A(n) ____ is an ordered list in which each element can
be referenced by an index to its position.
|
64. The address of an array element can be calculated with
the starting address of the array and the element’s ____.
|
65. A(n) ____ is a data structure that uses pointers so
that list elements can be scattered among nonsequential storage locations.
|
66. A sequence of records on secondary storage is called a
____.
|
67. A sequence of records stored in main memory is normally
called a ____.
|
68. A(n) ____ is a data structure containing both
traditional (static) data elements and programs that manipulate the data.
|
69. The programs in a class are called ____.
|
70. A(n) ____ is one instance, or variable, of a class.
|
71. Computer systems represent data electrically and
process it with ____________________
|
72. The physical laws of electricity, optics, and quantum
mechanics are described by ____________________.
|
73. In computer terminology, each digit of a binary number
is called a(n) ____________________.
|
74. A group of bits that describe a single data value is
called a(n) ____________________.
|
75. A string of eight bits is called a(n) ____________________.
|
76. Compilers and interpreters for high-level programming
languages, such as C and Java, convert decimal numbers into
____________________ numbers automatically when generating CPU instructions
and data values.
|
77. The primary advantage of hexadecimal notation, compared
with binary notation, is its ____________________.
|
78. ____________________ numbers often designate memory
addresses.
|
79. ____________________ notation uses the base-8 numbering
system and has a range of digits from 0 to 7.
|
80. A processor’s efficiency depends on its
____________________.
|
81. An unsigned integer’s value is always assumed to be
____________________.
|
82. A(n) ____________________ integer uses one bit to
represent whether the value is positive or negative.
|
83. With unsigned integers, the lowest value that can be
represented is always ____________________.
|
84. To represent a specific integer value in excess
notation, you must know how many ____________________ are to be used.
|
85. One way of dealing with the tradeoff between range and
precision is to abandon the concept of a fixed ____________________ point.
|
86. Recall that scientific notation, including
floating-point notation, trades numeric range for ____________________.
|
87. A sequence of characters that forms a meaningful word,
phrase, or other useful group is a(n) ____________________.
|
88. The standard ASCII version used for data transfer is
sometimes called ____________________.
|
89. Like ASCII, ____________________ is a coding table that
assigns nonnegative integers to represent printable characters.
|
90. In CPUs using a(n) ____________________ memory model,
using twos complement or unsigned binary as the coding format for memory
addresses is logical and typical.
|
91. A segmented memory model has primary storage is divided
into equal-sized (for example, 64 KB) segments called ____________________.
|
92. A(n) ____________________ is the location of a data
element in a storage device.
|
93. A(n) ____________________ is a data structure composed
of other data structures or primitive data elements.
|
94. A(n) ____________________ is an array of pointers to
records.
|
95. A(n) ____________________ combines related data items
in much the same way a record does, but it extends the record to include
methods for manipulating data items.
|
96. List the capabilities that any data and information
processor, whether organic, mechanical, electrical, or optical, must have.
|
97. Why do computers represent data with binary numbers?
|
98. Explain the procedure to convert a binary value to its
decimal equivalent.
|
99. Discuss the limitations of ASCII.
|
100. Explain the process of inserting an element in a list
stored in contiguous memory.
|
No comments:
Post a Comment