Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Questions and answers, Computer Systems & Programming Fundamentals, Exercises of Introduction to Computers

This document offers a foundational overview of computer systems, encompassing hardware components, software concepts, and fundamental programming principles. it covers topics such as computer architecture, input/output devices, operating systems, memory organization (including binary and hexadecimal representation), and the importance of algorithms in problem-solving. The educational value lies in its clear explanation of core concepts, making it suitable for introductory computer science courses.

Typology: Exercises

2024/2025

Uploaded on 04/24/2025

abc-51w
abc-51w 🇨🇦

5 documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
24 Questions with answers on 01-overview-of-
computers-and-programming-1pdf
You'll find the list of questions at the end of the document
1. What are the main types of computer systems?
The main types of computer systems include mainframe computers, desktop
computers, laptop/notebook/netbook computers, tablets, and smartphones.
2. List at least five examples of input/output devices.
Examples of input/output devices include keyboards, mice, monitors,
printers, and speakers.
3. What is an operating system and what are its main functions?
An operating system (OS) is system software that manages computer
hardware and software resources. Its main functions include scheduling
tasks for optimal system use and managing memory allocation. Common
operating systems include Windows, MacOS, Linux, iOS, Android, and Unix.
4. Explain the difference between RAM and ROM.
RAM (Random-Access Memory) is the main memory used for storing data
and programs that the computer is actively using. It is volatile, meaning
data is lost when power is off. ROM (Read-Only Memory) is used for storing
software that is rarely changed, also known as firmware. It retains its data
even when power is off.
5. What is the relationship between bits, bytes, and words in
computer memory?
A bit is a binary digit (0 or 1). A byte is a group of 8 bits, often used to
represent a single character. A word is the width of a register, which
depends on the processor architecture (e.g., 32-bit or 64-bit).
6. Explain how negative integers are represented using two's
complement.
To represent a negative number using two's complement, you first
represent the positive number in binary. Then, you invert all the bits
(change 0s to 1s and 1s to 0s) and add 1 to the result. Alternatively, you can
start from the right, find the first 1, and invert all the bits to the left of that
one.
7. Convert the decimal number 10 to its binary equivalent.
The binary equivalent of the decimal number 10 is 1010.
pf3
pf4
pf5

Partial preview of the text

Download Questions and answers, Computer Systems & Programming Fundamentals and more Exercises Introduction to Computers in PDF only on Docsity!

24 Questions with answers on 01-overview-of-

computers-and-programming-1pdf

You'll find the list of questions at the end of the document

  1. What are the main types of computer systems?

The main types of computer systems include mainframe computers, desktop computers, laptop/notebook/netbook computers, tablets, and smartphones.

  1. List at least five examples of input/output devices.

Examples of input/output devices include keyboards, mice, monitors, printers, and speakers.

  1. What is an operating system and what are its main functions?

An operating system (OS) is system software that manages computer hardware and software resources. Its main functions include scheduling tasks for optimal system use and managing memory allocation. Common operating systems include Windows, MacOS, Linux, iOS, Android, and Unix.

  1. Explain the difference between RAM and ROM.

RAM (Random-Access Memory) is the main memory used for storing data and programs that the computer is actively using. It is volatile, meaning data is lost when power is off. ROM (Read-Only Memory) is used for storing software that is rarely changed, also known as firmware. It retains its data even when power is off.

  1. What is the relationship between bits, bytes, and words in computer memory?

A bit is a binary digit (0 or 1). A byte is a group of 8 bits, often used to represent a single character. A word is the width of a register, which depends on the processor architecture (e.g., 32-bit or 64-bit).

  1. Explain how negative integers are represented using two's complement.

To represent a negative number using two's complement, you first represent the positive number in binary. Then, you invert all the bits (change 0s to 1s and 1s to 0s) and add 1 to the result. Alternatively, you can start from the right, find the first 1, and invert all the bits to the left of that one.

  1. Convert the decimal number 10 to its binary equivalent.

The binary equivalent of the decimal number 10 is 1010.

  1. What is the purpose of an Integrated Development Environment (IDE)? Give an example.

An Integrated Development Environment (IDE) is an application software used for programming. It provides tools for writing, testing, and debugging code. An example of an IDE is Geany.

  1. Explain the concept of memory addresses and their significance.

Each memory cell in RAM has a unique address, which is its relative position in the computer's main memory. These addresses allow the CPU to directly access specific locations in memory to read or write data. The size of the address (number of bits) determines the maximum amount of memory the system can address.

  1. Given the 8-bit binary number 11110000, what is its decimal equivalent if interpreted as a two's complement signed integer?

Since the leftmost bit is 1, it's a negative number. To find its magnitude, we take the two's complement: invert the bits (00001111) and add 1 (00010000). This is 16 in decimal. Therefore, the original number represents -16.

  1. What are the three main components used to represent a floating-point number in the IEEE-754 standard?

The three main components are the sign bit, the exponent, and the mantissa (also known as the significand). The sign bit indicates the sign of the number, the exponent represents the magnitude, and the mantissa represents the precision.

  1. Explain the purpose of biasing the exponent in floating-point representation. What is the bias value for single-precision floating- point numbers?

Biasing the exponent allows us to represent both positive and negative exponents without needing a separate sign bit for the exponent. This simplifies comparisons. For single-precision floating-point numbers, the bias value is 127.

  1. Convert the decimal number 2.0 into its single-precision IEEE-754 floating-point representation.

The single-precision IEEE-754 representation of 2.0 is 0100 0000 0000 0000 0000 0000 0000 0000. The sign bit is 0 (positive), the exponent is 128 (1 + 127), which is 10000000 in binary, and the mantissa is 0 (since 2.0 / 2^1 = 1.0, and we assume the leading 1).

  1. What is the ASCII code and what is it used for?

ASCII (American Standard Code for Information Interchange) is a character encoding standard for electronic communication. ASCII codes represent

  1. Describe what is involved in the 'Implementation' step of the software development process, including at least three sub-steps.

The 'Implementation' step is the actual programming step. It involves: 1. Writing the program source code. 2. Compiling the source code and checking for errors. 3. Building the program by linking it to necessary libraries to create an executable file. 4. Running the program.

  1. Explain why accessing sensitive health or financial information without authorization is considered a serious offense for computer programmers and software engineers. What are the potential consequences?

Accessing sensitive health or financial information without authorization is a breach of professional ethics and considered a serious offense because it violates the privacy and confidentiality of individuals. Programmers and software engineers have a responsibility to protect the data they have access to. Breaches of confidence are felonies that can lead to fines or imprisonment.

  1. Differentiate between plagiarism and piracy in the context of software development and explain why they are considered misconduct.

Plagiarism in software development refers to using someone else's program or code without permission and claiming it as your own work. Piracy involves using or distributing unauthorized copies of software or copyrighted material. Both are considered misconduct because they violate intellectual property rights, undermine the original creator's work, and are illegal. Plagiarism is a form of academic dishonesty and professional misconduct, while piracy is a copyright infringement.

24 Questions on 01-overview-of-computers-

and-programming-1pdf

What are the main types of computer systems?

List at least five examples of input/output devices.

What is an operating system and what are its main functions?

Explain the difference between RAM and ROM.

What is the relationship between bits, bytes, and words in computer memory?

Explain how negative integers are represented using two's complement.

Convert the decimal number 10 to its binary equivalent.

What is the purpose of an Integrated Development Environment (IDE)? Give an example.

Explain the concept of memory addresses and their significance.

Given the 8-bit binary number 11110000, what is its decimal equivalent if interpreted as a two's complement signed integer?

What are the three main components used to represent a floating-point number in the IEEE-754 standard?

Explain the purpose of biasing the exponent in floating-point representation. What is the bias value for single-precision floating- point numbers?

Convert the decimal number 2.0 into its single-precision IEEE- floating-point representation.

What is the ASCII code and what is it used for?

Explain why hexadecimal numbers are used in computer science.

Convert the decimal number -9.0 into its hexadecimal representation, assuming it's a single-precision floating-point number.

What are the key characteristics of an algorithm?

Describe the difference between a sequence, repetition, and selection algorithm, providing a real-world example for each.

Explain the difference between 3GL, 4GL, and 5GL programming languages, providing an example of each.