Skip to main content
留学咨询

程序代写案例-MCD4700

By January 4, 2021No Comments

MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 1 Sample Paper MCD4700 Sample Exam Paper 1 Trimester 3, 2020 Monash College Note that this is a list of sample exam questions only. It is only made available for training purposes and does not contain questions from the actual exam. The goal is to self-test and get an idea of the character of questions that can be expected in the actual exam. In the actual exam it is not permitted to use any material, books, or calculators. The answer of this paper will be released, at the end of week 12. MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 2 Sample Paper Part A: Multiple Choice Questions (20 marks total) Instructions: Each question has only one correct answer. Select the single, best choice for each question. Please CIRCLE the answer for each of the following multiple-choice questions in the table below. Question Option Question Option 1 a b c d e 11 a b c d e 2 a b c d e 12 a b c d e 3 a b c d e 13 a b c d e 4 a b c d e 14 a b c d e 5 a b c d e 15 a b c d e 6 a b c d e 16 a b c d e 7 a b c d e 17 a b c d e 8 a b c d e 18 a b c d e 9 a b c d e 19 a b c d e 10 a b c d e 20 a b c d e MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 3 Sample Paper Question 1: Which base is usually used to display a binary file to a user? a) Base 2 b) Base 8 c) Base 10 d) Base 16 e) None of the above Question 2: Adding the two signed magnitude binary numbers 01000101 and 00011101 equals? a) 10001101 b) 11101010 c) 11010101 d) 01100010 e) None of the above Question 3: What are the decimal values for the two signed magnitude numbers 01001101 and 10011101? a) 77 and 28 b) 72 and -22 c) 77 and -29 d) -80 and -16 e) None of the above Question 4: Subtracting 01110011 from 00001011 using 2’s complement notation equals? a) 10011000 b) 11010101 c) 00101100 d) 11010100 e) None of the above Question 5: How many different numbers can be represented with n bits? a) n b) 2n c) log2(n) d) 16 e) 32 MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 4 Sample Paper Question 6: Which of the following basic circuits is used in an ALU? a) An S/R adder b) A multiplexer c) A D-Flipflop d) A 2’s complement e) A decoder Question 7: Assume a computer architecture where instructions are 64 bits long, which contain a 56 bit memory address, and enough bits to address 8 registers. How many different opcodes can this computer architecture support? a) 3 b) 7 c) 5 d) 16 e) 32 Question 8: Which sequence of instructions in MARIE assembly code results in the value stored at address 123 to be negated? a) Load 0, Subt 123, Store 123 b) Clear, SubtI 123, StoreI 123 c) Load 0, SubtI 123, Store 123 d) Clear, Subt 123, Store 123 e) Load 0, Subt 123, StoreI 123 Question 9: What is a context switch? a) The operating system switching from one process to another b) An I/O device that requests that the CPU deals with new input c) A signal raised by the currently running process that causes the operating system to perform I/O. d) A timer event that causes the operating system to perform process scheduling. e) All of the above Question 10: Which of the following is not a typical function of operating systems? a) Managing the CPU’s fetch-decode-execute cycle b) Handling hardware interrupts c) Managing virtual memory d) Providing a graphical user interface e) Providing access to I/O devices MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 5 Sample Paper Question 11: Which of the following is a difference between preemptive timesharing and cooperative timesharing? a) Preemptive t. is used in practice, cooperative t. is not. b) Preemptive t. can interrupt malicious or buggy processes, cooperative t. cannot. c) Preemptive t. does not require hardware support, cooperative t. does. d) Preemptive t. does not require cooperation from the user, cooperative t. does. e) Preemptive t. makes processes run more efficiently compared to cooperative t. Question 12: HTTPS means that a) A VPN is used for communication b) A communication between client and server is encrypted using ASE 128 c) It is hypertext transfer protocol via TLS. d) The authenticity of the server is always guaranteed. e) None of the above Question 13: Which of the following problems is addressed by the CA part of CSMA/CA? a) The “hidden node” problem in wireless LANs. b) The “spam” problem in email networks. c) The “Certification Authority” problem in public key cryptography. d) The “Collision Avoidance” problem in wired Ethernet. e) All of the above Question 14: How does TCP identify the application layer process that should handle a message? a) Using the IP address. b) Using the MAC address. c) Using the port number. d) Using the process ID. e) Using the application ID. Question 15: Which of the following is not part of the TCP protocol? a) The four-way handshake. b) The three-way handshake. c) Acknowledgement numbers. d) Sequence numbers. e) HTTP status codes. MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 6 Sample Paper Question 16: A “client-server” architecture approach a) places all or almost all of the application logic on the client b) places all or almost all of the application logic on the server c) places all or almost all of the data storage logic on the client d) places all or almost all of the presentation logic on the server e) places all or almost all of the network logic on the client Question 17: Which of the following parameters deteriorates with distance between sender and receiver? a) Bandwidth b) Burst rate c) Frame rate d) Committed Information Rate e) Latency Question 18: Which of the following is an independent malicious program that enables the attacker to remotely control the computer? a) Virus b) Worm c) Trojan Horse d) Backdoor e) Botnet Question19: Digital signatures ensure that a message has not been a) intercepted b) delayed c) forwarded d) forged e) read Question 20: One main role of a packet-filter firewall is to drop packets that do not match the criteria defined in policy rules. What are typical parameters? a) Content on application layer b) MAC addresses c) source and destination IP addresses and ports d) route of the packet e) digital signatures MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 7 Sample Paper Part B: Short Answer Questions (81 marks total) Question 1 (3 Marks): Draw a sketch of the von Neumann Architecture and name the different components. Question 2 (3 Marks): a) How many bits are needed to express 1024 numbers? b) How many bits are in 32 Gib? (Give answer in power of 2) Question 3 (3 Marks): A 16-bit word in memory contains two 7-bit ASCII characters and one additional even parity bit for each character. The parity bit is the right-most bit. ASCII Hexadecimal ASCII Binary (7-bit) Character Value 030 0110000 0 031 0110001 1 032 0110010 2 033 0110011 3 034 0110100 4 035 0110101 5 036 0110110 6 037 0110111 7 038 0111000 8 MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 8 Sample Paper 039 0111001 9 041 1000001 A 042 1000010 B 043 1000011 C 044 1000100 D 045 1000101 E 046 1000110 F 047 1000111 G 048 1001000 H a) If you find 01101000 10001110. Would this be a valid representation of two characters? b) Which two characters are encoded in 10001101 01101010? Question 4 (3 Marks): Give one reason why signed integer arithmetic is not suitable for computation of 3D graphics. Question 5 (3 Marks): Convert the decimal integer -65 to an 8-bit binary representation in 2´s complement notation. Show all workings. MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 9 Sample Paper Question 6 (3 Marks): Using a truth table show that (̅ + ) = for all values of and Question 7 (3 Marks): Identify the function of the circuit below. Give an example of inputs A and B (by writing in
to the squares) and fill in all intermediate and final outputs (dotted squares and circles). Question 8 (3 Marks): Add two 3-bit binary numbers 101 and 100 using circuit below. Fill in input, intermediate and output bits in space provided. MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 10 Sample Paper Question 9 (3 Marks): Describe the difference between a direct jump and an indirect jump instruction, using the MARIE system as an example. Question 10 (3 Marks): Identify which MARIE instruction corresponds to the following RTL code: MAR  X MBR  PC M[MAR]  MBR MBR  X AC  1 AC  AC+MBR PC  AC Question 11 (3 Marks): Briefly explain the difference between sequential and combinational circuits. Question 12 (3 Marks): Assume a memory that can store 216 bytes. What are the lowest and highest addresses, and how many bits are needed to store those addresses, if the memory is 1. Byte addressable MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 11 Sample Paper 2. Word addressable with a word size of 16 bits Question 13 (3 Marks): Write a MARIE program which receives a series of positive numbers from the user and prints out the maximum and the minimum number in the list. You can assume that the last number will always be a 0. Question 14 (3 Marks): Given the following truth table a. Write the Boolean expression. x y z F(x,y,z) 0 0 0 1 0 0 1 1 0 1 0 0 0 1 1 0 1 0 0 0 1 0 1 1 1 1 0 1 1 1 1 1 MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 12 Sample Paper b. Draw the corresponding logic circuit. c. Simplify it using K-maps Question 15 (3 Marks): Briefly explain the concept of a process, including the states it can be in. Question 16 (3 Marks): Briefly explain how the hardware and operating system work together to control how programs access I/O devices. MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 13 Sample Paper Question 17 (3 Marks): Name the layers of the TCP/IP architecture (also called the Internet Model), and briefly explain the function of layer 2. Question 18 (3 Marks): Briefly explain how a switch works. Question 19 (3 Marks): a. Given a 64 bit (IEEE double-precision) binary floating-point number with 1 bit sign, 11 bit exponent and 52 bit fraction (mantissa/significand): represent this binary number (11111.0011)2 in these bits. b. Convert the following floating decimal numbers to 3-digit precision scientific decimal notation: • 339967.89 = • 0.0056457 = MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 14 Sample Paper Question 20 (3 Marks): Name two different methods for transmitting digital data through cables. Question 21 (3 Marks): Name the acronym of the application layer protocol used for accessing the World Wide Web. Question 22 (3 Marks): Are wireless LANs more or less secure than wired Ethernet? Explain your answer. Question 23 (3 Marks): What is the difference between interior and exterior routing protocols? MCD4700 Sample Paper MCD4700 Introduction to Computer Systems, Networks and Security 15 Sample Paper Question 24 (3 Marks): What are the end-points of the encrypted channel in a VPN connection? Explain why a VPN does not provide end-to-end security between a home-office PC and a PC in the enterprise network. Question 25 (3 Marks): Explain the term demilitarised zone and provide 2 examples of firewall placements for such a zone. Question 26 (3 Marks): Compare public Message Authentication Codes and Hash Functions showing one similarity and two differences. Question 27 (3 Marks): What is the difference between Two-tier mail and three-tier mail? 欢迎咨询51作业君

admin

Author admin

More posts by admin