Papers Flashcards

(26 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Calculate the normalised binary floating-point representation of +201.125 in this system Show your working

A

Mantissa: 0110010010, Exponent: 001000. Also award working marks for converting to binary: 11001001.001; exponent shift: ×2⁸

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Calculate the denary value of the given normalised binary floating-point number Show your working Mantissa: 1010110011 Exponent: 000101

A

–20.8125

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identify four features of a RISC processor

A

Low number of instruction formats; Single-clock cycle instructions; Fixed-length instructions; Many general-purpose registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe circuit switching as a method of data transmission

A

A dedicated circuit is required; established before transmission begins; lasts for the whole transmission; data travels the same route continuously; usually bidirectional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State one benefit and one drawback of circuit switching

A

Benefit: No need to reassemble data; arrives in order. Drawback: No other transmission can use the circuit when it’s in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe how the layers of the TCP/IP protocol stack interact with each other

A

Each layer accepts input from the layer above or below; interfaces between layers only interact directly; headers are added as packets move down the layers; operations handled by software; user interacts at the application layer; hardware at the link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain what is meant by a hashing algorithm in the context of file access

A

A mathematical formula used to calculate an address from a key field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Outline two methods of overcoming hash collisions

A
  1. Store record in next free memory space (linear progression); 2. Use an overflow area
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the user-defined data type set

A

A composite data type of unordered elements of the same data type; supports set operations like union and intersection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Write pseudocode statements to declare the set data type SymbolSet to hold the following set of mathematical operators using the variable Operators

A

TYPE SymbolSet = SET OF CHAR; DEFINE Operators (‘+’, ‘-‘, ‘*’, ‘/’, ‘^’) : SymbolSet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Write the Boolean logic expression that corresponds to the given truth table as the sum-of-products

A

T = A.B.C.D + A.B.C.D + A.B.C.D + A.B.C.D + A.B.C.D + A.B.C.D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Complete the Karnaugh map for the given truth table

A

See grid in mark scheme – filled correctly with 1s and 0s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Draw loop(s) around appropriate group(s) in the K-map to produce an optimal sum-of-products

A

Correct groups drawn around adjacent 1s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Write the Boolean logic expression from your answer to part (c) as the simplified sum-of-products

A

T = A.D + B.D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Use Boolean algebra to write your answer to part (d)(i) in its simplest form

A

T = D.(A + B)

17
Q

Describe the process of segmentation for memory management

A

Logical address space divided into segments; each has a name and size; during execution segments are mapped to physical memory using a segment map table; segments are indexed with offsets

18
Q

Explain what is meant by disk thrashing

A

Occurs when excessive paging happens in virtual memory; high disk access rates; more time spent swapping pages than processing

19
Q

State one reason why the attributes would be declared as PRIVATE

A

To ensure that the attributes are only accessible using the class’s own methods/within the class

20
Q

Complete the class diagram for Pet to include additional attributes and methods

A

Attributes: PetName : STRING, OwnerName : STRING; Constructor(); SetPetID(APetID : STRING); SetDateRegistered(RegDate : DATE); GetPetName(); GetOwnerTelephone()

21
Q

Complete the BNF for the given syntax diagrams

A

<operator> ::= + | – | * | /; <label> ::= <letter><digit> | <letter><digit><digit>; <equation> ::= <label> = <label><operator><label>
</label></operator></label></label></equation></digit></digit></letter></digit></letter></label></operator>

22
Q

Draw a syntax diagram for password

A

Starts with letter or symbol, then digit, then one or two symbols – see diagram

23
Q

Write the BNF for password

A

<password> ::= <letter><digit><symbol> | <letter><digit><symbol><symbol> | <symbol><digit><symbol> | <symbol><digit><symbol><symbol>
</symbol></symbol></digit></symbol></symbol></digit></symbol></symbol></symbol></digit></letter></symbol></digit></letter></password>

24
Q

Complete the linked list to represent the given binary tree

A

Add 4 more nodes with correct data and pointers for Orange, Yellow, Indigo, Violet; use -1 for null pointers

25
Complete the diagram to store binary tree in an array of records
Rows with correct pointers: Red(0,1,2), Green(1,3,4), Yellow(2,6,-1), Blue(3,-1,-1), Orange(4,5,-1), Indigo(5,-1,-1), Violet(6,-1,-1)
26
Complete the pseudocode for binary search in a linked list
IF BinTree[NowPtr].Data > Item THEN NowPtr ← BinTree[NowPtr].LeftPtr \n ELSE IF BinTree[NowPtr].Data < Item THEN NowPtr ← BinTree[NowPtr].RightPtr /n ELSE RETURN NowPtr