文档库 最新最全的文档下载
当前位置:文档库 › 计算机科学引论课后题原文

计算机科学引论课后题原文

计算机科学引论课后题原文
计算机科学引论课后题原文

23页

1. A common term that describes the combination of traditional computer and communication

technologies is

a.management of information systems

b. information technology

c. information superhighway

d. computer competency

2. Procedures are typically documented in manuals written by

a. end users c. Microsoft

b. computer specialists d. service providers

3. Which of the following is an example of connectivity?

a. Internet

b. floppy disk

c. power cord

d. dala

4. Windows XP, Windows Vista, and Macintosh OS X are all examples of

a. application software

b. operating systems

c. browsers

d. shareware

5. because of their size and cost, these computers are relatively rare.

a. minicomputers

b. maintrame computers

c. microcomputers

d. supercomputers

6. The system component that controls and manipulates data in order to produce

Information is called the a. monitor

b. mouse

c. keyboard

d. microprocessor

7.A systrm component that translates data and programs that humans can understand

Into a form that the computer can process is called a(n)

a. input device

b. pointer

c. output device

d. display

8. A CD is an example of a(n)

a. output device

b. floppy disk

c. optical disc

d. hard disk

9.If you want to communicate a message or persuade other people, you would typically

a. worksheet

b. document

c. database

d. presentation

10. Many experts are predicting that this revolution iss expected to dramatically affect the

Way we communicate and use computer technology.

a. FTP

b. World Wide Web

c. Telnet

d. wireless

24页

a. microcomputers

b. optical discs

c. output device

d. primary storage

e. procedures

f. program

g. secondary, storage

h. supercomputers

i. system software

j. the Internet

1.Guidelines people follow when using software.__ I

2.Consists of the step-by-step instructions that tell the

computer how to do its work.

3. 3. Software that enables the application software to interact with the computer hardware.

4. The most powerful type of computer.

5. The least powerful and most widely used type of computer.

6. Translates data and programs that humans can understand into a form that the

computer can process.

7. Holds data and programs even after electrical power to the system has been turned off.

8. Uses laser technology. __

9. Holds data and program instructions for processing data

10. The largest network in the world.

55页

1.The Internet was launched m 1969 when the United States funded a project that developed national computer network called

R. AARPNET b. CERNET c. CERN d. ARPANET

2._____ is the most popular" lnternet activity.

a, communication b. shopping c. searching d. entertainment

3.A(n)____program provides access to Web resources.

a. Web

b. ISP c, browser d. URL

4. Rules for exchanging data between computers are called

a. programs

b. procedures

c. protocols

d. hyperlinks

5. The of the domain name following the dot (.) is the top domain,

a. level

b. link

c. locator

d. language

6. ____to add interest and activity to a Web site by presenting animation

Displaying graphics , providing interactive games, and more.

a. Applets

b. Bots

c. Plug-ins

d. Spiders

7. unwanted e-mails are called

a. spam

b. junk

c. flame

d. lurk

8.Programs that submit your search request to several search engines

a. metasearch engines

b. search engines

c. spiders

d. hits

9. ______ cash is the Internet's equivalent to traditional cash

a. Universal

b. Web

c. Premium

d. Digital

10. These programs allow parents as well as organizations to block OUl selected sites and

a. plug-ins

b. filters

c. FTP

d. WAIS

56页

a. carders b digital cash c. e-commerce d. header e. hits r. metasearch engine

g. plug-in h. reuniting i. URLs j. Web auction

1. Addresses of Web resources. _

2. Part of an e-mail message that includes the subject address, and attachments.

3. Program that starts and operates as part of a browser. __

4. The list of sites that contain the keyword search.

5. Program that automatically submits a search request to several search engines

simultaneously.

6. Buying and selling goods over the Internet.

7. Type of social networking site that reconnects people who have lost touch with one another.

8. Similar to a traditional auction, but buyers and sellers typically interact only on the Web.

9. Criminals that specialize in stealing, trading, and using stolen credit cards over the Internet.

10. Internet equivalent to traditional cash.

87页

1.This type of software works with end users, application software, and computer hardware to

handle the majority of technical details.

a. communication software

b. application software

c. Web software

d. system software

2. ____are narrowly focused on specific disciplines and occupations.

a. Basic applications

b. Utility programs

c. Specialized applications

d. Business suites

3. This primary purpose of this type of software is to create text-based documents.

a. Web development

b. word processing

c. spreadsheet

d. presentation

4. Organiztions create newsletters, manuals, and brochures with this type of software.

a. presentation b, graphics c. spreadsheet d. word processing

5.Letters, memos, term papers, reports, and contracts are all examples of

a.. menus

b. models

c. spreadsheets

d. documents

6. Numbers and formulas entered in a cell are called

a.. numeric entries

b. intersection

c. labels

d. text

7. The acronym DBMS stands for what?

a. document binder management system

b. database management system

c. double-blind management setup

d. dam binding and marketing structure

8. Database____ are primarily used to enter new records and to make changes to existing records.

a. table

b. forms

c. queries

d. reports

9.A file that includes predefined settings that can be used to create many common types of presentations is called a

a. pattern

b. model

c. template

d. blueprint

10. A(n)__is a single program that provides the functionality of a word processor,spreadsheet, database manager, and more.

a. software suite

b. integrated package

c. specialized application

d. basic application

88页

a. analytical

b. cell

c. integrated package

d. range

e. relational database

f. software suite

g. sort h. spelling checker i. what-if analysis j. window

1. Area that contains a document, program or message..

2. Type of graph or chart.

3. Includes the functionality of a word processor, spreadsheet, database manager, and more

4. Identifies incorrectly spelled words and suggests alternatives.

5. The intersection of a row and column in a spreadsheet

6. A collection of two or more cells in a spreadsheet

7. Spreadsheet feature in which changing one or more numbers results in the automatic recalculation related fields. ,,

8. Database structure that organizes data into related tables.

9. Arranging objects numerically or alphabetically

10. Individual applications that are sold as a group

115页

1.Graphic programs widely used in the graphic arts profession include

a. desktop publishing programs, image

b. artficial intelligence ,virtual reality, and illustration programs

c. megamedia programs, image editors, and desktop publishing programs

d. virtual reality, desktop publishing programs, and illustration programs

2. Image editors are used' for creating and editing

a. bitmap images

b. vector images

c. text

d. HTML codes

3. Protrams used to create or modify vector images are called

a. illustration programs

b. image editors

c. graphical modifiers

d. bit publishing packages

4.pages in a multimedia presentation typically provide ~ or connections to related

a. blogs

b. links

c. logs

d. maps

5. when determining the overall objective of a multimedia project, the resources required,and the people who will work on the project, you are in the __ step.

a. planning

b. designing

c. creating

d. supporting

6. Many individuals create their own personal sites called Web logs, or

a. flobs

b. blogs

c. buds

d. fellows

7. A special effect in which one image seems to melt into another is referred to as

a. drifting

b. flashing

c. morphing

d. polling

https://www.wendangku.net/doc/992216396.html,er can interact in a fully immersed 3-D environment using __

a. unstructured problems

b. virtual reality

c. VRML

d. robotics

9. Fuzzy logic is

a. use to respond to questions in a humanlike way

b. a new programming language used to program animation

c. the result of fuzzy thinking

d. a term that indicates logical values greater than one

10. Robots used in automobile plants would be classified as

a. perception system robots

b.industrial robots

c. mobile robots d, knowledge robots

116页

a. AI

b. bitmap

c. desktop publishing

d. fuzzy logic

e. graphical map

f. graphics suite

g. image editor h. morphing i. multimedia J. vector image

1. integrates all sorts of media into onepresentation .

2. Graphics program for creating and editing bitmap images.

3. Programs used to create multimedia presentations

4. Diagram of a Web site's overall design

5. Program that allows you to mix text and graphics to create publications of professional quality.

6. Group of graphics programs offered at lower cost than if purchased separately.

7. Special effect in which one image seems to melt into another.

8. Graphics file made up of thousands of pixels

9. Graphics file made up of a collection of objects,such as rectangles, lines, and ovals

10.Attempts to develop computer systems that mimic or simulate human thought processes and actions

143页

1.Software that allows your computer to interact with the user, applications, and

hardware is called

a, application software c,, system software

b. word processor d. database software

2, In order for a computer to understand a program, it must be converted into machine

language by a(n) .

a. operating system c. device driver

b. utility d. language translator

3. ~GUI" stands for

a. gnutella universal interface c. graphical user interface

b. graphic uninstall/install d. genera] utility interface

4, To connect several computers together, one generally needs to be running a(n) operating system.

L network c. stand-alone

b. Internet d. embedded

$. __ is the most widely used operating system.

a. Windows c. UNIX

b. Mac OS d. Linux

6. This operating system is most popular with graphic designers and those who work

in multimedia.

a. Windows XP c. Mac OS

b~ Linux d. UNIX

7. This operating system was originally designed to run on minicomputers used in a

network environment.

a, Linux c. Windows

b. UNIX d. Mac OS

8, These programs guard your computer against malicious programs that may invade your computer system.

L file compression program c. backup program

b. antivirus program tL troubleshooting program

9. A concentric ring on a hard disk is referred to as a

a, track c. table

b. ,sector d. segment

10. Ever).' time the computer system is ,,tarred, the operating system loads these into

memory~

a. driver updates c. device drivers

b, device managers d. Windows updates

144页

a. desktop OS

b. embedded OS

c. file compression program

d. Leopard

e. Linux

f. multitasking

g. NOS

h. platform L system software j. track

1. Concentric ring on a disk.__

2. A version of Mac Os X.__

3. A computer's ability to run more than one application at a time.

4. Operating systems completely stored within ROM.

5. Operating system used to control and coordinate computers that are linked together

6. Another name for software environment.

7. An operating system located on a single stand-alone hard disk.

g. One popular, and free, version of the UNIX operating system.

9. Collection of programs that handle technical details.

10. Program that reduces the size of files for efficient storage.

174页

1' The container that houses most of the electronic components that make a computer ~ system is known as the

a. arithmetic-logic unit c. primary storage unit

b. central processing unit d. system unit

2. The smallest unit in a digital system is a

a. byte c. word

b. bit d. character

3. The communications medium for the entire computer system is the

a. arithmetic-logic unit c. motherboard

b. semiconductor d. coprocessor

4. These provide expansion capability for a computer system.

a. sockets c. ports

b. slots d. bays

5. The __ tells the rest of the computer how to carry out a program's instructions.

a. ALU c. system unit

b. control unit d. motherboard

6. A 32-bit word computer can access __ bytes at a time.

a. 4 e. 16

b. 8 d. 32

7. These chips are specifically designed to handle the processing requirements related to

displaying and manipulating 3-D images.

a. graphics coprocessors c. control unit processors

b. arithmetic-logic unit processors d. CISC chips

8. This type of memory improves processing by acting as a temporary high-speed holding

area between the memory and the CPU.

a. RAM c. cache memory

b. ROM d. flash memory

9. is a set of hardware and software standards.

a. CPU c. cache

b. Plug and Play d. ALU

10. ports connect special types of music instruments to sound cards.

a. BUS c. USB

b. CPU d. MIDI

a. bus widlh

b. cables

c. control unit

d. expansion card

e. PC card

f. port

g. RAM h. smart card i. system clock j. system unit

1. Houses most of the electronic components in a computer system --

2. The number of bils that can travel down a bus at the same time

3. Tells the computer system how to carry out a program's instructions,

4. A credit card-sized piece of plastic with an embedded chip.

5. Volatile storage that holds the program and data the CPU is currently processing.

6. Produces precisely timed electrical beats as a timing mechanism. __

7. Plugs into slots on the system board.

8. Credit card sized expansion boards used by portable computers. __

9. Connecting socket on the outside of the system unit. __

10. Connects input and output devices to the system unit via the ports. __

207页

1, Hardware used to translate words, sounds, images, and actions,that people understand into a form that the system unit can process is known as

a. input devices c. device reader'~

lb. output devices d. device drivers

2. This type of keyboard provides the greatest amount of flexibility and convenience by

eliminating cables connected to the system unit.

a. ergonomic keyboard c. traditional keyboard

b. wireless keyboard d. flexible keyboard

3. The mouse_ usually appears in the shape of an arrow.

a. pointer c. indicator

b. marker d. meter

4. This type of pointing device is located in the middle of the keyboard.

a. joystick c. wireless

b. pointing stick d. light pen

5. This type of pointing device has crisscrossed invisible beams of infrared light that are

protected with a clear plastic outer layer.

a. optical mouse c. pointing stick

b. light pen d. touch screen

6. A Universal Product Code is read by what type of scanner?

a. bar code c. OCR

b. flatbed d. MICR

7. ~ input devices convert sounds into a form that can be processed by the system unit

a. Electrolyzing c. WebCarn

b. Plotting d. Audio

8. The most important characteristic of a monitor is its

a. dot pitch c. clarity

b. resolution d. viewable size

9. Which of the following printer types requires special paper?

a. chain c. ink-jet

b. laser d. thermal

10. ____ is a specialized input and output device for receiving and sending voice

communication.

a. Fax machine c. Network terminal

b. Internet telephone d. PDA

207页

a. clarity

b. CRT

c. dpi

d. HDTV

e. joystick

f. stylus

h. thermal L toggle ]. UPC

1. These keys turn a feature on or off. __

2. A pointing device widely used for computer games. --

3. Penlike device commonly used with tablet PCs and PDAs. __

4. ~ of bar code used in supermarkets. --

5. Refers to quality and sharpness of displayed images.

6.Type of monitor similar to a traditional television set.

7. Monitors that have independently activated pixels. __

g. Delivers a much clearer wide-screen picture than regular television. --

9, Measurement used to determine a printer's resolution.

10. Printer that uses heat to produce images on heat sensitive paper __

235页

1. Primary storage is referred to as __ storage.

a. volatile c. direct

b. sequential d. nonvolatile

2. The amount of time required by a storage device to retrieve data and programs is its

a. access speed c. memory

b. capacity d. storage

3. How tightly the bits can be packed next to one another on a disk is referred to as

a. tracks c. density

b. sectors d. configuration

4. Thick, rigid metal platters that are capable of storing and retrieving information at a

high rate of speed are known as

a. hard disks c. cartridges

b. soft disks d. packs

5. The data on an optical disc is represented by flat areas called on the disc surface.

a. surfaces c. lands

b. flats d. pits

6. A CD-ROM disc

a. cannot be erased and rewritten c. holds less data than a floppy disk

b. has more storage capacity than a CD-R d. can be written to only once

7. DVD stands for

a. digital video data c. digital versatile disc

b. direct video disc d. direct versatile disc

8. This type of storage device has no moving parts.

a. hard disks c. optical discs

b. floppy disks d. solid state

9. Tape is described as using this type of access.

a. magneto-optical c. direct

b. DVD d. sequential

10. Specialized high-capacity secondary storage device designed to meet organizational

demands for data.

a. Blue-Ray c. mass storage

b. hi def d. Zip disk

235页

a. access speed

b. file compression

c. flash memory card

d. hard-disk pack

e. hi def

f. Internet hard drive h. solid-state storage i. track j. Zip disk

1. A type of storage that is volatile. --

2. Time required to retrieve data and programs. --

3. A high-capacity floppy disk. __

4. Closed concentric ring on a disk on which data is recorded. __

S. Several platters aligned one above the other, allowing greater storage capacity. __

6. Increases storage capacity by reducing the amount of space required to store data and

programs

7. Stores data electronically and has no moving parts. __

8. Solid-state storage device used in portable computers. __

9. Free or low-cost storage available at special service Web sites. --

10. The next generation of optical discs. –

305页

1. The standards of moral conduct that control how computers are used are called

a. ethics c. security requirements

b. laws d. business demand~

2. The ethical issue that involves who is able to read and use data is

a. access c. accuracy

b. property d. privacy

3. Two types of cookies are __

a. advanced and remedial c. natural and ad network

b. traditional and natural d. ad network and traditional

4. People who gain unauthorized access to computers for the fun of it, but do not

intentionally do damage, are __

a. employees c. crackers

b. hackers d. members of organized crime

5. A program that migrates through networks and operating systems by attaching itself to

different programs and databases is a __

a. virus c. denial-of-service attack

b. worm d. Web bug

6. An attempt to slow down or stop a computer system or network by flooding the system

with requests for information is called a

a. virus c. denial-of-service attack

b. worm d. Trojan horse

7. Secret words or numbers used to gain access to a computer system are called

a. encryption c. crackers

b. codes d. passwords

8. One of the more common types of technological failures is when your computer

experiences too much electricity. This is known as __

a. a protector c. a voltage surge

b. a brownout d. energizing

9. __ is the study of human factors relating to things people use

a. EPA c. encryption

b. ergonomics d. privacy

10. The computer industry response to the Energy Star program is the

a. CFC Association e. Freedom of Information Act

b. EncryptionAct d. Green PC

305页

a. ad network cookies

b. computer crime

c. cracker

d. DoS

e. firewall

f. illusion of anonymity

g. property h, snoopware i virus checkers j. worm

I. Relates to who owns data and rights to software. __

2. Programs that record virtually every activity on a computer system. __

3. Belief that there is little threat to personal privacy via the Internet. __

4. Monitor Web activity and send repot ts to marketing groups. --

5. Illegal action involving special knowledge of compute technology. __

6. Gains unauthorized access to a system for malicious purposes. __

7. Fills a computer system with self-replicating information.

8. An attack that overwhelms Web sites with data, making them inaccessible. __

9. Programs that alert users when certain viruses enter a system. __

10. Security hardware and software that controls access to internal computer networks. –

331页

a. DSS

b. exception report

c. GDSS

d. general ledger

e. knowledge Workers

f. MIS

g. periodic report

h. supervisor

i. tactical models J. TPS

I. Manager responsible for administration and monitoring workers

2. System that records day-to-day transactions ~

3. Computer-based information system that produces standardized reports in summarized, structured form,

4. Activity that produces income statements and balance sheets based on all transactions of a company

5. Repot1 generated at regular intervals

6. Report that calls attention to unusual events ____

7. Flexible tool for analysis that helps manager make decisions about unstructured problems. --

8. System used to support the collective work of a team addressing large problems, --

9. Models that help middle managers control the work the organization. --

10. Individuals involved in the creation of information.

361页

a. data dictionary

b. DBMS engine

c. file

d. key field

e. logical

f. multidimensional

g. network database h. SOL i. real-time processing j. relational database

1. End users ~d most computer professional use this data view. __

2. A collection of records.

3. The common field by which tables m a database are related.

4. Processing that occurs where data is processed when the transaction occurs. __

5. Software required to create, modify', and gain access to a database.

6. Dictionary ~ith a description of the data structure in a database --

7. Most widely used query language.

8. Database with hierarchical arrangement of nodes in which each child node may have more than one parent node. __

9. Database structure in which data is organized into related tables. __

10. DBMS su'ucture that extends the two-dimensional relational data model. –

393页

1.In which phase of the systems life cycle are information needs identified?

a. preliminary investigation c. systems implementation

b, systems design d. systems maintenance

2, This phase of the systems life cycle is known as the "ongoing phase," where the system is periodically evaluated and updated as needed.

It. preliminary investigation c. systems implementation

b, systems design d. systems maintenance

3. Which of the following shows levels of management and formal lines of authority?

a, organization chart c. pyramid diagram

b. decision table d. grid chart

4, Which of the following is r~0t found on a data flow diagram?

a. entities c. locations

b. process d. file

5. Which of the following tasks is not part of the systems design phase?

a. designing alternative systems c. writing a systems design report

b. selecting the best system d. suggesting alternative solutions

6. Determining if employees, managers, and clients will resist a proposed new system is

part of this feasibility study.

a. technical feasibility c. organizational feasibility

b. economic feasibility d. operational feasibility

7. The __ approach conversion type simply involves abandoning the old system and

using the new

a. direct c. phased

b. pilot d. parallel

8, In the implementation approach, the new system is broken down into smaller parts that are implemented over time.

a. pilot c. parallel

b, direct d. phased

9. The ongoing testing and analysis of an existing system is called systems

a. maintenance c. design

b. implementation d, analysis

10. Which of the following is a disadvantage to prototyping?

L quick user feedback c. difficult to manage

b. lengthy development times d. lack of user feedback

393页

a. data flow diagram

b. economic feasibility e. grid chart d. organization chart

e. phased approach

f. preliminary investigation

g. systems anal)sis and design

h. systems analyst L systems design report j. systems development

1. Six-phase procedure for examining and improving information systems. __

2. Computer professional who studies an organization's systems.

3. The first phase of the systems life cycle. __

4. Chart showing management levels and format lines of authority. __

g. Shows the relationship between input and output documents.

6. Shows the data or information flow within an information system. --

7. Condition where cost of designing a system is justified by the benefits.

8. Report for higher management describing the alternative designs suggested in the design phase.

9, Phase consisting of developing software, acquiring hardware, and testing the new system. __ 10. Implementation gradually over a period of time. __

451页

1.Change in technology require people who

a. think every piece of equipment is so simple they can just turn it on and use it

b. know just the basics about the technology

c. think each new machine is a potential disaster

d. are not afraid to learn and manage new technology

2. One of the advantages of the changes in information technology

a, people are put out of work c. data can be lost and/or stolen

b. new businesses are created d. new skills are constantly m demand

3. The __ user believes that learning and using computers take time away from his or her real

job.

a. cynical c. frustrated

b. proactive d. naive

4. Generally, a proactive person

a. feels that the idea of using a c. hates to take time to learn about

microcomputer is overrated microcomputers

b. is unfamiliar with computers d. looks at technology in a positive, realistic way

5. To maintain your computer competence, you should try to stay ahead of technology by

a. learning a new trade c. reading books, journals, newspapers

b. reviewing the systems life cycle and magazines

d. quiting your current job and going back to school

6. Successful people make it a point to

a. develop nonspecific skills c. get their education and relax

b. avoid contact with others d. maintain contact with others in their filed

7. These individuals design, test, and research encryption procedures.

a. database administrator c. cryptographer

b. technical writer d. computer trainer

8. __ oversee the work of programmers, computer specialists, and other computer professionals.

a. Systems analysts c. Information systems managers

b. Database administrators d. Network managers

9. These individuals are responsible for creating, testing, and troubleshooting computer

programs.

a. systems analysts c. network managet~

b. database administrators d. programmers

10. ___develop and maintain Web sites and Web resources.

a. System analysts c. Network managers

b. Webmaster d. Programmers

451页

a.database administrator computer technician c. computer trainer d. cynic

e. software engineer

f. technical writer

g. network administrator h programmer

i systems analyst J. Webmaster

1. Computer user who feels the idea of using microcomputers overrated. __

2. A computer specialist employed to evaluate, create, and maintain Web sites. --

3. Computer professional who creates, tests, and troubleshoots computer programs. __

4. Computer specialist who uses datable management software to determine the most efficient ways to organize and access dam. __

5. Computer professional who an analyzes uses' needs and creates application software. __

6. Computer professional who plans and designs information systems.

7. Computer professional who plans and installs computer components and systems --

8. Computer professional who creates and maintains networks. __

9. Computer professional who instructs users on the latest software or hardware. __

10. Computer professional who prepares ins4rucfion manuals, technical reports, and other scientific or technical documents. --

计算方法引论课后答案.

第一章 误差 1. 试举例,说明什么是模型误差,什么是方法误差. 解: 例如,把地球近似看为一个标准球体,利用公式2 4A r π=计算其表面积,这个近似看为球体的过程产生 的误差即为模型误差. 在计算过程中,要用到π,我们利用无穷乘积公式计算π的值: 12 222...q q π=? ?? 其中 11 2,3,... n q q n +?=?? ==?? 我们取前9项的乘积作为π的近似值,得 3.141587725...π≈ 这个去掉π的无穷乘积公式中第9项后的部分产生的误差就是方法误差,也成为截断误差. 2. 按照四舍五入的原则,将下列各数舍成五位有效数字: 816.956 7 6.000 015 17.322 50 1.235 651 93.182 13 0.015 236 23 解: 816.96 6.000 0 17.323 1.235 7 93.182 0.015 236 3. 下列各数是按照四舍五入原则得到的近似数,它们各有几位有效数字? 81.897 0.008 13 6.320 05 0.180 0 解: 五位 三位 六位 四位 4. 若1/4用0.25表示,问有多少位有效数字? 解: 两位 5. 若 1.1062,0.947a b ==,是经过舍入后得到的近似值,问:,a b a b +?各有几位有效数字? 解: 已知4311 d 10,d 1022 a b --

计算机科学导论课后练习

Chapter 1 练习 复习题 1.定义一个基于图灵模型的计算机。 答:Turing proposed that all kinds of computation could be performed by a special kind of a machine. He based the model on the actions that people perform when involved in computation. He abstracted these actions into a model for a computational machine that has really changed the world.图灵模型假设各种各样的运算都能够通过一种特殊的机器来完成,图灵机的模型是基于各种运算过程的。图灵模型把运算的过程从计算机器中分离开来,这确实改变了整个世界。 2.定义一个基于冯·诺伊曼模型的计算机。 答:The von Neumann Model defines the components of a computer, which are memory, the arithmetic logic unit (ALU), the control unit and the input/output subsystems. 冯·诺伊曼模型定义了计算机的组成,它包括存储器、算术逻辑单元、控制单元和输入/输出系统。 3.在基于图灵模型的计算机中,程序的作用是什么? 答:Based on the Turing model a program is a set of instruction that tells the computer what to do. 基于图灵模型的计算机中程序是一系列的指令,这些指令告诉计算机怎样进行运算。 4.在基于冯·诺伊曼模型的计算机中,程序的作用是什么? 答:The von Neumann model states that the program must be stored in the memory. The memory of modern computers hosts both programs and their corresponding data. 冯·诺伊曼模型的计算机中,程序必须被保存在存储器中,存储程序模型的计算机包括了程序以及程序处理的数据。 5.计算机中有哪些子系统? 答:The subsystems of the von Neumann model are memory, the arithmetic/logic unit (ALU), the control unit, and the input/output.冯·诺伊曼模型的计算机中子系统包括存储器、算术逻辑单元、控制单元和输入/输出单元。 6.计算机中存储器子系统的功能是什么? 答:Memory is the storage area used for programs and data. 存储器的功能是用来保存程序和数据的。 7.计算机中ALU子系统的功能是什么? 答:The arithmetic/logic unit (ALU) is where calculations and logical operations take place. 计算机中ALU子系统的功能是进行算术和逻辑运算的地方。 8.计算机中控制单元子系统的功能是什么? 答:The control unit controls the operations of the memory, ALU, and the input/output subsystem. 计算机中控制单元子系统的功能是控制存储器、算术逻辑单元和输入/输出的运行。

《抽象代数基础》习题解答

《抽象代数基础》习 题 答 解 于延栋编 盐城师范学院数学科学学院二零零九年五月

第一章 群 论 §1 代数运算 1.设},,,{c b a e A =,A 上的乘法”“?的乘法表如下: 证明: ”“?适合结合律. 证明 设z y x ,,为A 中任意三个元素.为了证明”“?适合结合律,只需证明 )()(z y x z y x ??=??. 下面分两种情形来阐明上式成立. I.z y x ,,中至少有一个等于e . 当e x =时,)()(z y x z y z y x ??=?=??; 当e y =时,)()(z y x z x z y x ??=?=??; 当e z =时,)()(z y x y x z y x ??=?=??. II .z y x ,,都不等于e . (I)z y x ==.这时,)()(z y x e x x z z e z y x ??=?===?=??. (II)z y x ,,两两不等.这时,)()(z y x x x e z z z y x ??=?==?=??. (III)z y x ,,中有且仅有两个相等. 当y x =时,x 和z 是},,{c b a 中的两个不同元素,令u 表示},,{c b a 中其余的那个元素.于是,z z e z y x =?=??)(,z u x z y x =?=??)(,从而,)()(z y x z y x ??=??.同理可知,当z y =或x z =时,都有)()(z y x z y x ??=??. 2.设”“?是集合A 上一个适合结合律的代数运算.对于A 中元素,归纳定义∏=n i i a 1为: 111a a i i =∏=,111 1+=+=????? ??=∏∏r r i i r i i a a a . 证明: ∏∏∏+==+==???? ??????? ??m n k k m j j n n i i a a a 1 11.

计算方法习题答案

计算方法第3版习题答案 习题1解答 1.1 解:直接根据定义得 *411()102x δ-≤?*411()102r x δ-≤?*3*12211 ()10,()1026 r x x δδ--≤?≤?*2*5331()10,()102r x x δδ--≤?≤ 1.2 解:取4位有效数字 1.3解:433 5124124124 ()()() 101010() 1.810257.563 r a a a a a a a a a δδδδ----++++++≤≤=?++? 123()r a a a δ≤ 123132231123 ()()() a a a a a a a a a a a a δδδ++0.016= 1.4 解:由于'1(),()n n f x x f x nx -==,故***1*(())()()()n n n f x x x n x x x δ-=-≈- 故** * ***(()) (())()0.02()r r n f x x x f x n n x n x x δδδ-= ≈== 1.5 解: 设长、宽和高分别为 ***50,20,10l l h h εεωωεεεε=±=±=±=±=±=± 2()l lh h ωωA =++,*************()2[()()()()()()]l l l h h l h h εδωωδδδωδδωA =+++++ ***4[]320l h εωε=++= 令3201ε<,解得0.0031ε≤, 1.6 解:设边长为x 时,其面积为S ,则有2()S f x x ==,故 '()()()2()S f x x x x δδδ≈= 现100,()1x S δ=≤,从而得() 1 ()0.00522100 S x x δδ≈ ≤ =? 1.7 解:因S ld =,故 S d l ?=?,S l d ?=?,*****()()()()()S S S l d l d δδδ??≈+?? * 2 ()(3.12 4.32)0.010.0744S m δ=+?=, *** ** * () () 0.0744 ()0.55%13.4784 r S S S l d S δδδ= = = ≈ 1.8 解:(1)4.472 (2)4.47 1.9 解:(1) (B )避免相近数相减 (2)(C )避免小除数和相近数相减 (3)(A )避免相近数相减 (3)(C )避免小除数和相近数相减,且节省对数运算 1.10 解 (1)357sin ...3!5!7!x x x x x =-+-+ 故有357 sin ..3!5!7! x x x x x -=-+-, (2) 1 (1)(1)1lnxdx ln ln ln N+N =N N +-N N +N +-? 1 (1)1ln ln N +=N +N +-N 1.11 解:0.00548。 1.12解:21 16 27 3102 ()()() -? 1.13解:0.000021

计算机科学导论复习整理

计算机科学导论复习整 理 文档编制序号:[KK8UY-LL9IO69-TTO6M3-MTOL89-FTT688]

《计算机科学导论》课程考试重点知识 考试说明:选择题(共10小题,每小题2分,共20分)、名词解释题(共5小题,每小题4分,共20分)、简答题(共5小题,每小题6分,共30分)、综合题(共5小题,选做3小题。其中强化班同学必作1、2、3小题,普通班同学任选3小题作答,每小题10分,共30分)。 一、考试范围:1~10、15章,每章都有一定量的题目。 二、课后习题中的选择题全部要求。 三、重点掌握的知识点: 1.计算机操作系统: 操作系统就是合理管理并控制计算机系统内软、硬件资源,并能够合理组织工作流程、方便用户使用的程序的集合。 通常我们将操作系统的功能概括为两大功能:扩展的虚拟机功能、资源管理功能。 其中,资源管理功能包括了处理机管理、内存管理、设备管理、文件管理四大功能。而扩展的虚拟机提供友好的人机交互以及程序级接口,使得计算机看上去像是功能扩展了的机器。 2.存储器: 存储器是计算机的记忆装置,用于存放原始数据、中间数据、最终结果和处理程序。为了对存储的信息进行管理,把存储器划分成存储单元,每个单元的编号称为该单元的地址。各种存储器基本上都是以1个字节作为一个存储单元。存储器内的信息是按地址存取的,如要访问存储器中的某个信息,就必须知道它的地址。向存储器里存入信息也称为“写入”,写入新的内容将覆盖原来的内容。从存储器里取出信息也称为“读出”,信息读出后并不破坏原来存储的内容,因此信息可以重复读出,多次利用。 通常把内存储器、运算器和控制器合称为计算机主机,也可以说主机是由CPU与内存储器组成的,而主机以外的装置称为外部设备,外部设备包括输入/输出设备、外存储器等。

《徐翠微计算方法引论》

第二章 插值法 知识点:拉格朗日插值法,牛顿插值法,余项,分段插值。 实际问题中,时常不能给出f (x )的解析表达式或f (x )解析表达式过于复杂而难于计算,能采集的只是一些f (x )的离散点值{xi,f(xi)}(i=0,1,2,…n )。因之,考虑近似方法成为自然之选。 定义:设f (x )为定义在区间[a ,b]上的函数,x0,x1,…,xn 为[a ,b]上的互异点,yi=f (xi )。若存在一个简单函数?(x ),满足 (插值条件)?(xi )=f (xi ),i=0,1,…,n 。 则称 ?(x )为f (x )插值函数,f (x )为被插函数,点x0,x1,…,xn 为插值节点,点{xi,f(xi)},i=0,1,2,…n 为插值点。 于是计算f (x )的问题就转换为计算 ?(x )。 构造插值函数需要解决:插值函数是否存在唯一;插值函数如何构造(L 插值);插值函数与被插函数的误差估计和收敛性。 对插值函数 ?(x )类型有多种不同的选择,代数多项式常被选作插值函数。 P23(2.18)和(2.19)指出,存在唯一的满足插值条件的n 次插值多项式p n (x )。但是需要计算范德蒙行列式,构造插值多项式工作量过大,简单表达式不易得到,实际中不采用这类方法。 插值法是一种古老的数学方法,拉格朗日(Lagrange )、牛顿(Newton )等分别给出了不同的解决方法。 拉格朗日插值 拉格朗日(Lagrange )插值的基本思想:把插值多项式p n (x )的构造问题转化为n+1个插值基函数l i (x)(i=0,1,…,n)的构造。 (1)线性插值 ①构造插值函数 已知函数y =f (x )的两个插值点(x 0,y 0),(x 1,y 1),构造多项式y =p 1(x ),使p 1(x 0)=y 0,p 1(x 1)=y 1。 p n (x )≈f (x )

计算机科学导论答案

2011年计算机导论修订第二版课后练习答案 第一章一、简答题 1、什么是计算机? 计算机系统是一种能够按照事先存储的程序,自动、高速的对数据进行输入、处理、输出和存储的系统。一个计算机系统包括硬件和软件两大部分。 2、解释冯·诺依曼所提出的“存储程序”概念。 把程序和数据都以二进制的形式同意存放在存储器中,由机器自动执行。不同的程序解决不同的问题,实现了计算机通用计算的功能, 3、计算机有哪些主要的特点? 运算速度快`精度高 计算机的字长越长,其精度越高,现在世界上最快的计算机每秒可以运算几十万次以上。一般计算机可以有市纪委甚至几十位(二进制)有效数字,计算精度可由千分之几到百万分之几,是任何计算工具所望尘莫及的。具有逻辑判断和记忆能力 计算机有准确的逻辑判断能力和高超的记忆能力。能够进行各种逻辑判断,并根据判断的结果自动决定下一步应该执行的指令。高度的自动化和灵活性 计算机采取存储程序方式工作,即把编号的程序输入计算机,机器便可依次逐条执行,这就使计算机实现了高度的自动化和灵活性。 4、计算机有哪些主要的用途? (1)科学计算(2)数据处理 (3) 实时控制(4)人工智能 (5)计算机辅助工程和辅助教育(6)娱乐和游戏 5、计算机发展中各个阶段的主要特点是什么?第一代计算机特征是采用电子管作为主要元器件第二代计算机特征是采用晶体管作为主要器件 第三代计算机特征是半导体中小规模集成电路第四代计算机特征是大规模和超大规模集成电路 6信息化社会的主要特点是什么? 1·建立完善的信息基础设施 2·采用先进的信息技术 3·建立广泛的信息产业 4·拥有高素质的信息人才 5·构建良好的信息环境 7、信息化社会对计算机人才的素质和知识结构有哪些要求? 在信息化社会中所需要的计算机人才是多方位的,不仅需要研究型、设计型的人才,而且需要应用型的人才;不仅需要开发型人才而且需要维护型、服务型、操作型的人才。要求计算机人才具有较高的综合素质和创新能力,并对于新技术的发展具有良好的适应性。 8、说明计算机科学与技术学科的知识体系及知识领域、知识单元和知识点的含义。 9计算机科学的研究范畴主要包括哪些? 计算机科学技术的研究范畴主要包括计算机理论、硬件、软件、网络及其应用等。二、选择题 1 计算机是接受命令,处理输入以及产生【数据】的系统 2 冯·诺依曼的主要贡献是【提出了存储程序概念】 3 共科学研究,军事和大型组织用的高速,大容量计算机是【巨型计算机】 4 计算机硬件由5个基本部分组成,下面【总线】不属于这5个基本组成部分 5 其内容在电源断掉以后就消失又被暂时存储器的条件是【内存储器】 6 拥有高度结构化和组织化的数据文件被称为【数据库】 7 计算机系统必须具备的两部分是【硬件和软件】 8 计算机处理的5个要素是【输入,输出,处理,打印和存储】

密码学引论第三版答案【复杂性与密码学引论】

John TalbotDominicWelshComplexity and CryptographyAn Introduction2006,292pp.Paperback USD 50.00ISBN 0-521-61771-5CAMBRIDGEUNIVERSITY PRESS 自古以来,密码加密与分析一直就是军事、外交领域不可少的工具。它在很大程度上是门艺术。1948年到1949年,Shannon建立了信息论基础,同时开创了编码理论和密码学。前者解决信息传输的效率和不失真问题,后者解决信息的保密和安全问题。1976年,公开密钥体制出现是密码学第二次革命。在此之前,密码学称为古典密码学,它与复杂性理论基本上没什么关系。其后的密码学是建立在复杂性理论的基础上,也就是从算法复杂性的观点来研究密码的安全性,称为现代密码学。 本书是现代密码学的一本入门书。 本书共分11章。前4章涉及计算理论的初步.后7章主要讨论密码学。1 密码学基础关键的概念是密码系统,包括五个组系明文、密钥、密文、密钥、明文。前一个密钥用来加密。特别强调经典密码学和现代密码学的不同,也就是后者同复杂性理论的关连;2 复杂性理论。这章是入门的介绍;3 非决定论的计算;4 概率的计算;5 对称加密系统,这些是经典密码学范围;6 单路函数; 7 公共密钥密码学;8 数字签名;9 密钥建制协议1O 安全加密;11 鉴定格式。每章后有练习问题和注记。全书有六个附录1 基本数学背景;2 图论定义;3 代数和数论;4 概率论,介绍书中所需的基本数学内容;5、6两个

附录则对练习及问题做出提示及答案。 密码学是当前一大热门领域,国内外出版了不少这一主题的图书。本书特点严密且通俗简明,它可以做为本科及研究生教材,也适合有一定基础的读者自学和参考。 胡作玄,研究员 (中国科学院系统科学研究所) Hu Zuoxuan,Professor (Institute of Systems Science, the Chinese Academy of Sciences)

计算机科学导论复习资料整理

《计算机科学导论》课程考试重点知识 考试说明:选择题(共10小题,每小题2分,共20分)、名词解释题(共5小题,每小题4分,共20分)、简答题(共5小题,每小题6分,共30分)、综合题(共5小题,选做3小题。其中强化班同学必作1、2、3小题,普通班同学任选3小题作答,每小题10分,共30分)。 一、考试范围:1~10、15章,每章都有一定量的题目。 二、课后习题中的选择题全部要求。 三、重点掌握的知识点: 1.计算机操作系统: 操作系统就是合理管理并控制计算机系统内软、硬件资源,并能够合理组织工作流程、方便用户使用的程序的集合。 通常我们将操作系统的功能概括为两大功能:扩展的虚拟机功能、资源管理功能。 其中,资源管理功能包括了处理机管理、内存管理、设备管理、文件管理四大功能。而扩展的虚拟机提供友好的人机交互以及程序级接口,使得计算机看上去像是功能扩展了的机器。 2.存储器: 存储器是计算机的记忆装置,用于存放原始数据、中间数据、最终结果和处理程序。为了对存储的信息进行管理,把存储器划分成存储单元,每个单元的编号称为该单元的地址。各种存储器基本上都是以1个字节作为一个存储单元。存储器内的信息是按地址存取的,如要访问存储器中的某个信息,就必须知道它的地址。向存储器里存入信息也称为“写入”,写入新的内容将覆盖原来的内容。从存储器里取出信息也称为“读出”,信息读出后并不破坏原来存储的内容,因此信息可以重复读出,多次利用。 通常把内存储器、运算器和控制器合称为计算机主机,也可以说主机是由CPU与内存储器组成的,而主机以外的装置称为外部设备,外部设备包括输入/输出设备、外存储器等。 3.运算速度:计算机的运算速度是衡量计算机水平的一项主要指标,它取决于指令执行时间。运算速度的计算方法多种多样,目前常用单位时间内执行多少条指令来表示,而计算机执行各种指令所需时间不同。因此,常根据在一些典型题目计算中,各种指令执行的频度以及每种指令的执行时间来折算出计算机的等效速度。 4.计算机系统: 计算机系统是一种能够按照事先存储的程序,自动、高速地对数据进行输入、处理、输出和存储的系统,由计算机硬件系统和计算机软件系统两大部分组成。 5.CPU和主机的概念: 通常把运算器、控制器做在一个大规模集成电路块上称为中央处理器,又称CPU(Central Processing Unit)。 通常把内存储器、运算器和控制器合称为计算机主机,也可以说主机是由CPU与内存储器组成的,而主机以外的装置称为外部设备,外部设备包括输入/输出设备,外存储器等。 6.软件生存周期:软件生存周期是指一个软件从提出开发要求开始直到该软件报废为止的整个时期。通常,软件生存周期包括可行性分析和项目开发计划、需求分析、概要设计、详细设计、编码、测试、维护等活动,可以将这些活动以适当方式分配到不同阶段去完成。 7.软件危机:随着计算机应用的普及和深化,计算机软件的数量、规模、复杂程度和开发所需的人力、物力等都在急剧增加,计算机发展初期个人编写小程序的传统方法,已不再适合现代大型软件的开发,用传统方法开发出来的许多大型软件甚至无法投入运行。同时,由于计算机应用领域和硬件技术得到丁飞速发展,软件的生产速度、质量和规模远远适应不了对软件的需求,造成大量人力、物力、财力的浪费,在软件开发和维护过程中出现了巨大

南开大学《计算机科学导论》在线作业和答案

17秋学期(1709)《计算机科学导论》在线作业和答案一、多选题(共 5 道试题,共 10 分。) V 1. ROM的主要类型包括ABC A. ROM B. PROM C. EPROM D. CDROM 满分:2 分 2. 布尔函数最小化的作用有ABCD A. 降低成本 B. 提高电路可靠性 C. 在一块芯片上设计更合适的电路 D. 减少电路计算时间 满分:2 分 3. 计算机网络的拓扑结构包括ABCD A. 星型拓扑 B. 网状拓扑 C. 树状拓扑 D. 环状拓扑 满分:2 分 4. 鼠标的主要部件有ABC A. 位置采样机构

B. 传感器 C. 专用处理芯片 D. 电荷耦合器件 满分:2 分 5. Internet的主要应用有ABCD A. 电子邮件 B. 文件传输 C. 远程登录 D. 万维网 满分:2 分 二、判断题(共 15 道试题,共 30 分。) V 1. 硬件是计算机系统中有形的装置和设备的总称B A. 错误 B. 正确 满分:2 分 2. 实体是指某种抽象事物的集合A A. 错误 B. 正确 满分:2 分 3. 编译器是把用高级语言编写的程序翻译成机器码的程序B A. 错误 B. 正确 满分:2 分

4. 关系是元组的集合而不是元组的列表因此元组的出现顺序无关紧要B A. 错误 B. 正确 满分:2 分 5. 软件仅指与计算机有关的程序A A. 错误 B. 正确 满分:2 分 6. 网络协议就是为网络数据交换而制定的规则B A. 错误 B. 正确 满分:2 分 7. 门是对电信号执行基础运算的设备,用于接受一个输入信号,生成一个输出信号A A. 错误 B. 正确 满分:2 分 8. 软件危机完全是由软件自身的特点决定的A A. 错误 B. 正确 满分:2 分 9. 视频中的一幅图像叫做一帧B A. 错误 B. 正确 满分:2 分

应用密码学习题答案

《应用密码学》习题和思考题答案 第4章 密码学数学引论 4-1 编写一个程序找出100~200间的素数。 略 4-2 计算下列数值:7503mod81、(-7503)mod81、81mod7503、(-81)mod7503。 解:7503mod81=51 (-7503)mod81=30 81mod7503=81 (-81)mod7503=7422 4-3 证明:(1)[]))(m od (m od )(m od )(m od m b a m m b m a ?=? (2)[][])(m od ))(m od ())(m od (m od )(m m c a m b a m c b a ?+?=+? 证明: (1)设(mod )a a m r =,(mod )b b m r =,则a a r jm =+(j 为某一整数),b b r km =+(k 为某一整数)。于是有: [](mod )(mod )mod ()(mod )a b a m b m m r r m ?= ()()() ()() ()() 2()(mod )mod mod mod a b a b a b a b a b m r jm r km m r r r km r jm kjm m r r m ?=++=+++= 于是有:[]))(m od (m od )(m od )(m od m b a m m b m a ?=? (2)设(mod )a a m r =,(mod )b b m r =,(mod )c c m r =,则a a r jm =+(j 为某一整数),b b r km =+(k 为某一整数),c c r im =+(i 为某一整数)。于是有: []()()()()[]()()22()mod (mod ) (mod ) mod mod a b c a b c a b a a a c b c a b a c a b c m r jm r km r im m r jm r km r im m r r r im r km r r r jm kjm r jm ijm m r r r r m ???+=++++????????=++++??=+++++++=+ []()()()()()[]()(mod )()(mod )(mod ) mod mod mod mod a b a c a b a c a b m a c m m r jm r km m r jm r im m m r r r r m ?+?=+++++????=+ 于是有:[][])(m od ))(m od ())(m od (m od )(m m c a m b a m c b a ?+?=+?

计算机科学导论第三版答案

第1章概述 习题(答案) 一?选择题 1. D 2. B 3. CD 4. C 5.A 6. ABC 7. A 8. C 9.B10. B 11. C12. A13. ABC14.B15. ABCD 16.C17.ABCDE 二?简答题 1简述计算机的发展阶段 计算机的出现是20世纪最辉煌的成就之一,按照采用的电子器件划分,计算机大致经历了四个阶段。 1. 第一代计算机(1946 —1957) 其主要特征是逻辑器件使用了电子管,用穿孔卡片机作为数据和指令的输入设备,用磁鼓 或磁带作为外存储器,使用机器语言编程。第一台计算机需要工作在有空调的房间里,如果希

望它处理什么事情,需要把线路重新连接接,把成千上万的线重新焊接。 1949年发明了可以存储程序的计算机,这些计算机使用机器语言编程,可存储信息和自动处理信息,存储和处理信息的方法开始发生革命性的变化。 第一代计算机体积大、运算速度低、存储容量小、可靠性低。几乎没有什么软件配置,主要用于科学计算。尽管如此,第一代计算机却奠定了计算机的技术基础,如二进制、自动计算及程序设计等,对以后计算机的发展产生了深远的影响。其代表机型有:ENIAC、IBM650(小 型机卜IBM709(大型机)等。 2. 第二代计算机(1958 —1964) 其主要特征是使用晶体管代替了电子管,内存储器采用了磁芯体,引入了变址寄存器和浮 点运算部件,利用I/O处理机提高了输入输出能力。这不仅使得计算机的体积缩小了很多,同时增加了机器的稳定性并提高了运算速度,而且计算机的功耗减小,价格降低。在软件方面配 置了子程序库和批处理管理程序,并且推出了Fortran、COBOL、ALGOL等高级程序设计语言及相应的编译程序,降低了程序设计的复杂性。除应用于科学计算外,它还开始应用在数据处理和工业控制等方面。其代表机型有IBM7090、IBM7094、CDC7600等。 3. 第三代计算机(1965 —1972) 其主要特征是用半导体中、小规模集成电路(Integrated Circuit,IC)作为元器件代替晶体管等分立元件,用半导体存储器代替磁芯存储器,使用微程序设计技术简化处理机的结构,这使 得计算机的体积和耗电量显著减小,而计算速度和存储容量却有较大提高,可靠性也大大加强。在软件方面则广泛地引入多道程序、并行处理、虚拟存储系统和功能完备的操作系统,同时还提供了大量的面向用户的应用程序。计算机开始定向标准化、模块化、系列化,此外,计算机的应用进入到许多科学技术领域。代表机器有IBM 360系列、富士通F230系列等。 4. 第四代计算机(1972年至今) 其主要特征是使用了大规模和超大规模集成电路,使计算机沿着两个方向飞速向前发展。 一方面,利用大规模集成电路制造多种逻辑芯片,组装出大型、巨型计算机,使运算速度向每秒十万亿次、百万亿次及更高速度发展,存储容量向百兆、千兆字节发展,巨型机的出现,推动了许多新兴学科的发展。另一方面,利用大规模集成电路技术,将运算器、控制器等部件集成在一个很小的集成电路芯片上,从而出现了微处理器。微型计算机、笔记本型和掌上型等超微型计算机的诞生是超大规模集成电路应用的直接结果,并使计算机很快进入到寻常百姓家。完善的系统软件、丰富的系统开发工具和商品化的应用程序的大量涌现,以及通信技术和计算 机网络的飞速发展,使得计算机进入了一个快速发展的阶段。 现在很多国家正在研制新一代的计算机,新一代计算机将是微电子技术、光学技术、超导 技术、电子仿生技术等多学科相结合的产物。它能进行知识处理、自动编程、测试和排错,以及用自然语言、图形、声音和各种文字进行输入和输出。新一代计算机的研究目标是打破计算机现有的体系结构,使得计算机能够具有像人那样的思维、推理和判断能力。已经实现的非传统计算技术有超导计算、量子计算、生物计算、光计算等。未来的计算机可能是超导计算机、量子计算机、生物计算机、光计算机、纳米计算机或DNA计算机等。

计算机操作系统(第四版)课后习题答案第五章

第五章 7.试比较缺页中断机构与一般的中断,他们之间有何明显的区别? 答:缺页中断作为中断,同样需要经历保护CPU现场、分析中断原因、转缺页中断处理程序进行处理、恢复CPU现场等步骤。但缺页中断又是一种特殊的中断,它与一般中断的主要区别是: ( 1)在指令执行期间产生和处理中断信号。通常,CPU都是在一条指令执行完后去检查是否有中断请求到达。若有便去响应中断;否则继续执行下一条指令。而缺页中断是在指令执行期间,发现所要访问的指令或数据不在内存时产生和处理的。 (2)一条指令在执行期间可能产生多次缺页中断。例如,对于一条读取数据的多字节指令,指令本身跨越两个页面,假定指令后一部分所在页面和数据所在页面均不在内存,则该指令的执行至少产生两次缺页中断。 8.试说明请求分页系统中的页面调入过程。 答:请求分页系统中的缺页从何处调入内存分三种情况: (1)系统拥有足够对换区空间时,可以全部从对换区调入所需页面,提高调页速度。在进程运行前将与该进程有关的文件从文件区拷贝到对换区。 (2)系统缺少足够对换区空间时,不被修改的文件直接从文件区调入;当换出这些页面时,未被修改的不必换出,再调入时,仍从文件区直接调入。对于可能修改的,在换出时便调到对换区,以后需要时再从对换区调入。 (3)UNIX 方式。未运行页面从文件区调入。曾经运行过但被换出页面,下次从对换区调入。UNIX 系统允许页面共享,某进程请求的页面有可能已调入内存,直接使用不再调入。 19.何谓工作集?它是基于什么原理确定的? 答:工作集:在某段时间间隔里,进程实际所要访问页面的集合。 原理:用程序的过去某段时间内的行为作为程序在将来某段时间内行为的近似。 24.说明请求分段式系统中的缺页中断处理过程。 答:在请求分段系统中,每当发现运行进程所要访问的段尚未调入内存时,便由缺段中断机构产生一缺段中断信号,进入操作系统后由缺段中断处理程序将所需的段调入内存。缺段中断机构与缺页中断机构类似,它同样需要在一条指令的执行期间,产生和处理中断,以及在一条指令执行期间,可能产生多次缺段中断。

计算机科学导论整理

计算机科学导论整理 第一章: 1.二进制转换:1. 十进制整数转换为二进制整数 十进制整数转换为二进制整数采用"除2取余,逆序排列"法。具体做法是:用2去除十进制整数,可以得到一个商和余数;再用2去除商,又会得到一个商和余数,如此进行,直到商为零时为止,然后把先得到的余数作为二进制数的低位有效位,后得到的余数作为二进制数的高位有效位,依次排列起来。 2.十进制小数转换为二进制小数 要点:乘二取整,正序排列 解释:对被转换的小数乘以2,取其整数部分(0或1)作为二进制小数部分,取其小数部分,再乘以2,又取其整数部分作为二进制小数部分,然后取小数部分,再乘以2,直到小数部分为0或者已经去到了足够位数。每次取的整数部分,按先后次序排列,就构成了二进制小数的序列。 0.2乘以2,取整后小数部分再乘以2,运算4次后得到的整数部分依次为0、0、 1、1,结果又变成了0.2, 若果0.2再乘以2后会循环刚开始的4次运算,所以0.2转换二进制后将是0011的循环,即: (0.2)10=(0.0011 0011 0011 .....)2 循环的书写方法为在循环序列的第一位和最后一位分别加一个点标注。 2.八进制:二进制转换为八进制 方法:取三合一法,即从二进制的小数点为分界点,向左(向右)每三位取成一

位,接着将这三位二进制按权相加,得到的数就是一位八位二进制数,然后,按顺序进行排列,小数点的位置不变,得到的数字就是我们所求的八进制数。如果向左(向右)取三位后,取到最高(最低)位时候,如果无法凑足三位,可以在小数点最左边(最右边),即整数的最高位(最低位)添0,凑足三位。例 ①将二进制数101110.101转换为八进制 得到结果:将101110.101转换为八进制为56.5 3.十六进制:二进制转换为十六进制 方法:取四合一法,即从二进制的小数点为分界点,向左(向右)每四位取成一位,接着将这四位二进制按权相加,得到的数就是一位十六位二进制数,然后,按顺序进行排列,小数点的位置不变,得到的数字就是我们所求的十六进制数。如果向左(向右)取四位后,取到最高(最低)位时候,如果无法凑足四位,可以在小数点最左边(最右边),即整数的最高位(最低位)添0,凑足四位。 ①例:将二进制11101001.1011转换为十六进制 得到结果:将二进制11101001.1011转换为十六进制为E9.B 数值的原码表示是指,将最高位用作符号位(0表示正数,1表示负数),其余各位代表数值本身的绝对值(以二进制形式表示)的表示形式。 例如,+9的原码是00001001 └→符号位上的0表示正数-9的原码是10001001。 └→符号位上的1表示负数 所谓原码就是前面所介绍的二进制定点表示法,即最高位为符号位,“0”表示

计算方法引论课后答案

第一章 误差 1. 试举例,说明什么是模型误差,什么是方法误差. 解: 例如,把地球近似看为一个标准球体,利用公式2 4A r π=计算其表面积,这个近似看为球体的过程产生的误差即为模型误差. 在计算过程中,要用到π,我们利用无穷乘积公式计算π的值: 其中 我们取前9项的乘积作为π的近似值,得 这个去掉π的无穷乘积公式中第9项后的部分产生的误差就是方法误差,也成为截断误差. 2. 按照四舍五入的原则,将下列各数舍成五位有效数字: 816.956 7 6.000 015 17.322 50 1.235 651 93.182 13 0.015 236 23 解: 816.96 6.000 0 17.323 1.235 7 93.182 0.015 236 3. 下列各数是按照四舍五入原则得到的近似数,它们各有几位有效数字? 81.897 0.008 13 6.320 05 0.180 0 解: 五位 三位 六位 四位 4. 若1/4用0.25表示,问有多少位有效数字? 解: 两位 5. 若 1.1062,0.947a b ==,是经过舍入后得到的近似值,问:,a b a b +?各有几位有效数字? 解: 已知4311 d 10,d 1022 a b --< ?

计算机科学导论习题答案

以下答案为班团委查阅多方资料做的,仅供参考。 09通软班团委 第一章绪论 1. 和计算机相关的问题. 2. 冯.诺依曼模型. 3. 第一点:尽管这个模型能够体现现代计算机的功能,但是它的定义太广泛. 第二点:而且,并没有清楚地说明基于这个模型的机器能够完成的操作类型和数量. 4. 输入数据和程序. 5. 存储器,算术逻辑单元,控制单元和输入/输出单元. 6. 存储器是用来存储的区域,在计算机处理过程中用来存储数据和程序. 7. 算术逻辑单元是进行计算和逻辑判断的地方. 8. 控制单元是用来对存储器,算术逻辑单元,输入/输出单元等子系统的操作进行控制的单元. 9. 输入子系统负责从计算机外部接受输入数据和程序;输出子系统负责将计算机的处理结果输出到计算机外部. 10. 早期的计算机的存储器存储数据.而完成某一任务的程序是通过操作一系列的开关或改变配线系统来实现的. 而基于冯.诺依曼模型的计算机的存储器主要用来存储程序及其相应的数据. 11.编程在早期的计算机中体现为对系列开关的开闭和配线系统的改变. 而冯.诺依曼模型通过详细的第一计算机可以使用的不同指令集,从而使编程变得相对简单.程序员通过组合这些不同的指令来创建任意数量的程序. 从而改变了编程的概念. 12. B 13. C 14. A 15. B 16. D

17. C 18. D 19. C 20. A 21. D 22. A 23. C 24. D 25. D 26. D 第二章 略 第三章数的表示 1. 将十进制转换成二进制,则反复采用底数除法.将要转换的数反复除2,所得余数做为从右往左的数.直到除数为1,作为最左端的数. 2. 将所给的二进制的数每个二进制数字分别乘以它的权值,最后将每个二进制位乘以权值后的结果相加即得到相应的十进制数. 3. 第N位是2的N-1次幂. 4. 第N位是10的N-1次幂. 5. 符号加绝对值格式,二进制反码格式和二进制补码格式. 6. 计算机定义一个最大的无符号整数的常量,这样,计算机所能存储的无符号整数就介于0到该常量之间.也就定义了一个存值范围. 7. 位数分配是指用以表示整数的二进制位数. 8. 因为8位的存储单元中,范围最大的无符号整数类型的范围是0~255,256超出其存储范围,在计算机中不能存储. 9. 计数和寻址.

计算机科学导论第二版答案.doc

计算机科学导论第二版答案 【篇一:计算机科学导论习题答案】 题(答案) 一.选择题 1. d 2. b 3. cd 4. c 5. abc 6. a 7. b 8. b 9. abcd 10. abcde 二.简答题 1.什么是计算机系统? 计算机系统是一种能够按照事先存储的程序,自动、高速地对数据进行输入、处理、输出和存储的系统,由计算机硬件系统和计算机软件系统两大部分组成。 2.请解释冯?诺依曼所提出的“存储程序”概念。 把程序和数据都以二进制的形式统一存放在存储器中,由机器自动执行。不同的程序解决不同的问题,实现了计算机通用计算的功能。3.控制器的主要功能是什么? 控制器基本功能就是从内存中取出指令和执行指令,即控制器按程序计数器指出的指令地址从内存中取出该指令进行译码,然后根据该指令功能向有关部件发出控制命令,执行该指令。另外,控制器在工作过程中,还要接受各部件反馈回来的信息。 4.简述cpu 和主机的概念。 通常把运算器、控制器做在一个大规模集成电路块上称为中央处理器,又称cpu(central processing unit) 。 通常把内存储器、运算器和控制器合称为计算机主机,也可以说主机是由cpu 与内存储器组成的,而主机以外的装置称为外部设备,外部设备包括输入/输出设备,外存储器等。 5.什么是计算机软件?计算机软件的分类有哪些? 软件是指用来指挥计算机运行的各种程序的总和以及开发、使用和维护这些程序所需的技术文档。 计算机软件系统分为系统软件和应用软件。计算机系统软件由操作系统、语言处理系统、以及各种软件工具等组成,指挥、控制计算机硬件系统按照预定的程序运行、工作,从而达到预定的目标。应用软件是用户利用计算机软、硬件资源为解决各类应用问题而编写的软件,包括用户程序及其说明性文件资料。 6.计算机有哪些主要的特点?

大学计算机基础课课本计算机科学导论课后答案

以下答案多方资料做的,仅供参考。 第一章绪论 1. 和计算机相关的问题. 2. 冯.诺依曼模型. 3. 第一点:尽管这个模型能够体现现代计算机的功能,但是它的定义太广泛. 第二点:而且,并没有清楚地说明基于这个模型的机器能够完成的操作类型和数量. 4. 输入数据和程序. 5. 存储器,算术逻辑单元,控制单元和输入/输出单元. 6. 存储器是用来存储的区域,在计算机处理过程中用来存储数据和程序. 7. 算术逻辑单元是进行计算和逻辑判断的地方. 8. 控制单元是用来对存储器,算术逻辑单元,输入/输出单元等子系统的操作进行控制的单元. 9. 输入子系统负责从计算机外部接受输入数据和程序;输出子系统负责将计算机的处理结果输出到计算机外部. 10. 早期的计算机的存储器存储数据.而完成某一任务的程序是通过操作一系列的开关或改变配线系统来实现的. 而基于冯.诺依曼模型的计算机的存储器主要用来存储程序及其相应的数据. 11.编程在早期的计算机中体现为对系列开关的开闭和配线系统的改变. 而冯.诺依曼模型通过详细的第一计算机可以使用的不同指令集,从而使编程变得相对简单.程序员通过组合这些不同的指令来创建任意数量的程序. 从而改变了编程的概念. 12. B 13. C 14. A 15. B 16. D

17. C 18. D 19. C 20. A 21. D 22. A 23. C 24. D 25. D 26. D 第二章 略 第三章数的表示 1. 将十进制转换成二进制,则反复采用底数除法.将要转换的数反复除2,所得余数做为从右往左的数.直到除数为1,作为最左端的数. 2. 将所给的二进制的数每个二进制数字分别乘以它的权值,最后将每个二进制位乘以权值后的结果相加即得到相应的十进制数. 3. 第N位是2的N-1次幂. 4. 第N位是10的N-1次幂. 5. 符号加绝对值格式,二进制反码格式和二进制补码格式. 6. 计算机定义一个最大的无符号整数的常量,这样,计算机所能存储的无符号整数就介于0到该常量之间.也就定义了一个存值范围. 7. 位数分配是指用以表示整数的二进制位数. 8. 因为8位的存储单元中,范围最大的无符号整数类型的范围是0~255,256超出其存储范围,在计算机中不能存储. 9. 计数和寻址.

相关文档