0% found this document useful (0 votes)
67 views4 pages

CSC P1 2ND

This document discusses various concepts related to computer science including: 1. It discusses different types of instruction cycles including the machine instruction cycle. 2. It mentions different types of computer memory including ROM which is used for long-term storage but also as overflow area for executing programs. 3. It discusses the concept of indirect operand addressing mode in computer instructions. This provides a high-level overview of some key topics and concepts covered in the document in 3 sentences.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views4 pages

CSC P1 2ND

This document discusses various concepts related to computer science including: 1. It discusses different types of instruction cycles including the machine instruction cycle. 2. It mentions different types of computer memory including ROM which is used for long-term storage but also as overflow area for executing programs. 3. It discusses the concept of indirect operand addressing mode in computer instructions. This provides a high-level overview of some key topics and concepts covered in the document in 3 sentences.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

GBHS BALENG D. A . B+ Á´ + Á .


CLASSS USS 6. It looks for an instruction, uses circuits to
SUBJECT : COMPUTER SCIENCE PAPER N° 1
interpret it, and then carries out the instruction in
SECOND EVALUATION
a process known as the:
A. Program Instruction Cycle
1. Computer organization is how:
B. Machine Instruction Cycle
A. The computer hardware logic is Organised to carry
C. Machine execution cycle
out its operations
D. Program Execution Cycle
B. Computer hardware is organised into functional
7. When the processor receives a signal, it stops
units and subsystems
what it is doing in order to attend to the request.
C. The computer is set up so as to carry out tasks
The mechanism exploited here is:
people want done
A. Interrupt signal
D. To provide services and facilities for use.
B. Spooling
2. In the classification, each instruction is executed
C. Interrupt handling
using its own input data, independently of how
D. Polling
other instructions get their data. We are using
8. The following is true of indirect operand
a(n)
addressing mode
A. Multiple Instruction Multiple Data
A. The data occupies the address just after the
B. Multiple instruction Multiple Data
instruction
C. Single instruction single data
B. The data occupies two memory cells of the
D. Single instruction Multiple Data
instruction
3. It is used for long-term storage of information,
C. One needs to read two more memory cells to
but also as an overflow area for executing
get the data
program:
D. One needs to index memory cells to get the
A. Hard disk
data…
B. CD ROM
9. Which of the following is NOT true of machine
C. CMOS
instruction code?
D. ROM
A. It has an instruction format
4. What is the result of the following in sign
B. Its bit pattern is for specific machines
absolute notation? 01110100-01001100
C. It has clear addressing formats
A. 00101000
D. All machines have same instructions format
B. 10101000
10. Its software directly controls the hardware
C. 00010100
components in order to carry out tasks they are
D. 10011000
designed for but, essentially, it acts as a computer
5. What is R in the following circuit diagram
and seen as such. It is:
A A. A monitoring system
B. An embedded system
B C. An automated system
R D. A control system
11. We use them to manipulate and disseminate
information among individuals and organisations;
possibly over long distances.
A. MIS
B. Information & communication system
A. A.B+ A+ ´B C. GIS
B. A´. B . A + B D. Data communication system
C. Á + B́+ Á . B
1
12. Joe hacked into Dan’s online bank account and D. Allows them to be used more efficiently than
withdrew and returned money Dan stole from on stand-alone devices
Jane. Joe accessed the account by supplying the 17. Certain programs facilitate the construction of
information Dan normally gives. Joe commit a other programs, and can be used over and over
computer crime. again rather than constructed. They are:
A. Joe illegally accessed an account, wheter or A. Application programs
not he used computers B. System programs
B. No. Joe simply helped Jane to get what was C. Library programs
rightfully hers. D. Utility programs
C. Joe used computing skills to access an account 18. A ______is used such that correct programs in a
he shouldn’t source programming language are possibly made
D. No. Joe supplied all the information to legally more efficient while they are made ready for
access the account machine execution
13. Which of the following controls the aspect the A. An assembler
public can see or inquire about you, if stored in a B. An optimiser
computer system, but allows you to verify or C. A translator
correct the information so stored? D. A compiler
A. Computer security 19. Bisi’s computer help Desk uses may software
B. Computer privacy platforms. She has to quickly respond to
C. computer correctness frequently asked questions from her client, so she
D. Computer ethics most probably uses:
14. Given today’s technology and his immediate A. A Graphical User Interface (GUI).
access to resources all over the world, NGene says B. A Command Line Interface (CLI).
he is a citizen of the world, not just a C. A Linux Interface.
Cameroonian. We agree with him because: D. An MS Windows Interface.
A. His computing skills are useful all over the 20. Jobs P1, P2, and P3 need 6, 4, and 2 units of execution time
world respectively. They arrive at times 1, 4 , and 6 as shown belo
Which job is completed last if a shortest job first schedulin
B. He accesses facilities all over the world, as
policy is used?
would one living in those countries
C. His computing skills gives him the same rights
as citizens in other countries
D. His computing skills gives him extra advantages
over ordinary citizens of the world
15. Mojoko submitted many programs and their data
at a computing centre, to later get her results
online. Processing her work must have required.
A. P1.
A. An online processing system
B. P2.
B. A real time processing system C. P3.
C. A transaction processing system D. P4
D. A batch processing system 21. Which of the following is false for segment paged
16. Cloud computing handles resources, data and memory allocation
information in certain ways: A. page of the program can be in any order in
A. It provides them as services over the Internet memory.
B. It allows them to be transmitted to assorted B. Segments are overlaid onto the physical
machines across the Internet address space.
C. It allows them to be used to assorted machines C. A page need not occupy a whole segment
over the Internet where they are found of memory.

2
D. The address in a program requires an A. Number of users connected
offset from its page address only. B. Hardware and software
22. What input might a multi-choice questionnaire C. The transmission
writer use to input completed forms into a D. All of the above
computer. 30. Which OSI layer has routers?
A Magnetic Ink Character Recognition (MICR) A. Network layer
B Optical Mark Recognition B. Transport layer
C Optical character Recognition C. Session layer
D Hand held Computer D. Presentation layer
31. When an entity has the primary key of another
.
entity as an attribute, this creates:
23. The number -17 translated into 8 bits two’s
A. Parent – child relationship between the
complement binary integer is:
tables that connect them
A. 11101111
B. Many too many relationships between the
B. 11101101
tables that connect them.
C. 10010011
C. Network model between the tables that
D. 11101100
connect them.
24. The positive binary number 10101111 translated
D. A one to many relationships between the
into hexadecimal is :
tables that connect them
A. AE
32. Which of the following is not the required
B. AF
condition for binary search algorithm?
C. EF
A. The list must be stored.
D. FA
B. There should be the direct access to the
25. Two component of the von Neumann
middle element in any sub list.
Architecture are :
C. There must be mechanism to delete
A. Memory and processor.
and/or insert element in list.
B. Hard disk and RAM.
D. Direct access to the middle element in any
C. Processor and CPU.
sub list .
D. ALU and Processor.
33. In the database relation R (a, b, d, e, f) attribute b
26. Location 600 contains 601, 601 contains 607 and
and d are dependent only on a; e only d; and f
607 contains 613. What are the content of
only on d which of these set relation is equivalent
register R after the following instruction? (The
to R in third normal form (3NF) if key attribute are
parentheses indicate indirect addressing)
underlined?
LOAD R, (600)
A. R1 (a, b) R2 (d, e, f) R3 (a, d)
A. 600
B. R1 (a, b, d) R2 (d, e) R3 (e, f)
B. 607
C. R1 (a, b, d) R2 (d, e) R3 (e, f)
C. 601
D. R1 (a, b, d) R2 (d, e, f)
D. 613
34. When data goes through a network, data privacy
27. A table in third normal form is one which:
is available when:
A. Has only one primary key
A. Only authorized people can control what
B. Is linked to another table by means of
information can be gathered or disclosed.
foreign keys
B. Individuals control what information can
C. Have no repeating field
be collected or disclosed about them.
D. contain no non key dependencies
C. A system is always available to perform it
28. In mesh topology, relationship between one
intended functions on data.
device and another is :
D. Only authorized people can access and
A. Server to peer
modify information through a network.
B. peer to server
35. Which data type best holds for processing in the
C. client – server same fashion, the names of a number of plants?
D. peer to peer A. Record
29. The performance of data communication B. Array
network depends on :
3
C. Strings A. Uncomputable.
D. Characters. B. Partially computable.
36. How many distinct addresses can a processor C. Undecidable.
access if its machine word has 8 bytes? D. Semi-decidable.
A. 64 44. Algorithms or problems they solve are
B. 216 sometimes described as hard or intractable. This
C. 88 is often a measure of:
D. 264 A. How much time a human needs to produce a
37. The design strategy that identifies subtasks program.
based on the operations carried out in them to B. How much time a computer needs to execute
provide a service of feature is known as: the program.
A. Modular design. C. How complex a program can be to a
B. Functional design programmer.
C. Bottom-up design D. How complex a program can be to a computer.
D. Top-down design 45. Prototyping is a technique that:
38. A binary tree whose every node has either zero A. Permits one to design software quickly.
or two children is called: B. Allows the software to be quickly adapted to a
A. Complete binary tree. user’s needs.
B. Binary search tree. C. Allows the developers to better understand a
C. Extended binary tree. user’s needs.
D. Binary tree. D. Allows people to start using software before
39. The post order traversal of a binary tree is their complete implementation.
DEBFCA. Find the preorder traversal. 46. The space factor when determining the
A. ACBEDF efficiency of algorithm is measured by counting
B. ACBDEE the
C. ACBDEF A. Maximum memory needed by the algorithm.
D. ACBFDG B. Minimum memory needed by the algorithm.
40. Which of the following sorting algorithms is of C. Average memory needed by the algorithm.
divide-and-conquer type? D. Maximum disk space needed by the algorithm.
A. Bubble sort 47. To solve a certain problem, some of its
B. Insertion sort. procedures are executed on distinct machines,
C. Quick sort possibly across the world. We designed a (an):
D. Algorithm A. Parallel algorithm.
41. Program Readability is typically understood to B. Distributed algorithm.
be: C. Internet algorithm.
A. The comments and program instructions in a D. Serial algorithm.
source code. 48. The following are in distinct classes of
B. The manual that show people how to run the declarative languages:
program. A. Logic and functional programs.
C. The book that explains to users the program’s B. Applicative and functional programs.
features and how they work. C. Applicative and object-oriented programs.
D. The document that describes how the program D. Object-oriented and logic programs.
was constructed. 49. Programming language (PL) functions are
42. It is used to observe how the values change in designed to return a value; the values returned
memory locations, without altering program by PL functions are often passed in other
instructions, or altering memory locations; functions or procedures:
during debugging A. As output.
A. Break point. B. As parameter.
B. Watch point. C. By value.
C. Trace point. D. By reference.
D. Print statement. We examine a program, executing and checking its
43. Some programs will always guarantee an answer instructions, so as to
if there is one, but may run forever if there is
none. Such problems are:

You might also like