Review CSI

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

High leve programming languages separated the programming task from computer operation tasks

… loom smt about first storage information

ABC first electronic …

Pascaline first computing machine in 17th century

The base of hexadecimal is 16

When converting a decimal integer to base b, we repeatedly divide b

When converting a decimal fraction to base b, we repeatedly multiply b

Which of the following representations is erroneous (349)8, (10211)2

Which of the following is equivalent to 12 in decimal? (c)16

Which of the following is equivalent to 24 in decimal? (11000)2

If the ASCII code for E is 1000101, then the ASCII code for e is ___. Answer the question without
consulting the ASCII table.

Chữ thường = chữ hoa + 32

ASCII: 7 bit

32 = 01000 00

E = 10001 01

->e =11001 01

A 32-bit code called Unicode represents symbols in all languages.

Unicode = 32 bit

ASCII = 7 BIT

Extended ASCII = 8 BIT

In the bitmap graphic method of representing an image in a computer, each pixel is assigned a bit
pattern.

Subtraction Is an arithmetic operation

OR, AND, XOR, NOT is a logical bit operator.

The 2-compliment method of integer representation is the most common method for storing integers in
computer memory.

We use a bit pattern called a mask to modify another bit pattern

1001+ 0111 shift left 2

To flip all the bits of a bit pattern, make a mask of all 1s and then XOR the bit pattern and the mask.
A word can be 8, 16, or 32 bits

If a memory address space is 16 MB and the word size is 8 bits, then __24__ bits are needed to access
each word

Memory: 16mb = 2^4.2^20 = 2^24 byte

1w = 8bits = 1byte

Bit = log2(2^24) = 24

The data in RAM is erased if the computer is powered down.

DRAM is a memory type with capacitors that need to be refreshed periodically.

DRAM: capacitors

SRAM: flip-flop

A CD-R is a storage device to which the user can write information only once.

CD-ROM: CD read only

CD-R: CD - write only one time

CD-RW: CD-rewrite, can write many time.

CD-RR: same with CD-R but the storage double, don’t learn this type

A CD-RW is a storage can rewrite many time

EEPROM can be programmed and erased using electronic impulses but can remain in a computer during
erasure.

EPROM can be programmed can erased using UV light but can remain in a computer during erasured.

PROM-programmable rom is a type of memory in which the user, not the manufacturer, stores
programs that cannot be overwritten.

Main memory in a computer usually consists of large amounts of low-speed memory.

Cache in a computer usually consists of large amounts of medium-speed memory.

Register in a computer usually consists of large amounts of high-speed memory.

The smallest storage area on a magnetic disk that can be accessed at one time is a sector.

In the interrupt-driven I/O method for synchronizing the operation of the CPU with an I/O device, the
I/O device informs the CPU when it is ready for data transfer.

The TCP/IP model has five layers.

The application layer of the TCP/IP protocol suite provides services for end users

The physical layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.
The layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two
adjacent nodes.

Physical layer: define the physical protocol for data to transfer. Transfer data using bit

Datalink layer: define the data transfer method. Transfer data using frames

Network layer: define where data go to. Transfer data using packets

Transport: define how data got transfered. Transfer Data using segments

Appication layer: Transfer Data

What is the domain name in the e mail address kayla@nasa.gov

Nasa.gov

TCP, UDP, SCTP Protocol(s) Is one of the protocols in the transport layer.

TCP: secure transport protocol

UDP: fast protocol

SMTP is a protocol for e mail service

SMTP : mail transfer protocol

FTP: file transfer protocol

TELNET: telephone

HTTP: hyper text

is a multi-programming method in which multiple programs are entirely in memory with each program
occupying a contiguous space.

The process scheduler moves a process from one …

Starvation can occur if a process has too many resource restrictions

The device manager is responsible for accessing I/O devices

The items are divided into two lists (sorted and unsorted) in selection, bubble, insertion sort

We use a binary search for an ordered list.

Recursion is a process in which an algorithm calls itself.


We use a sequential search for an unordered list.

C, C++, and Java can be classified as high-level languages.

COBOL is a common language in the business–environment.

COBOL: common business-oriented language

LISP and Scheme are both functional languages.

Prolog. Are declarative languages.

A Java program can be either an application or an applet.

Defining the users, requirements, and methods is part of the analysis phase.

Testing a software system can involve both black-box and glass-box testing.

Black-box testing = functional testing

Modularization is the breaking up of a large project into smaller parts.

Coupling between modules in a software system must be minimized.

Cohesion = mối quan hệ -> max

Coupling = sự phụ thuộc/ ràng buộc/ khớp nối. -> min

An array that consists of just column and row is 2-dimensional array

The link is a pointer that identifies

An empty linked list consists of a null head pointer

Given a linked list called children, the pointer variable children identify the first element of the linked
list.

Each element in a record is called a field.

Index là của array. Node là của linked list.

In an abstract data type, the ADT implementation is hidden.

If A is the first data element input into a stack, followed by B, C, D then D is the first element to be
removed.

In in order traversal of a binary tree, the right subtree is processed last.

PRE: ROOT -> LEFT -> RIGHT

IN: left -> root -> right

Post: left -> right -> root.

In out of order traversal binary tree, left subtree is process last.


In a binary tree, each node has at most two subtrees.

READ ALL HIGHLIGHTED LINES.

You might also like