0% found this document useful (0 votes)
31 views5 pages

Computer SC Uppersixth

The document appears to be a test or exam covering various topics related to computer science. It contains 31 multiple choice questions testing knowledge of topics like computer hardware, operating systems, networking, databases, and software engineering.

Uploaded by

Maxim Tawoutia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views5 pages

Computer SC Uppersixth

The document appears to be a test or exam covering various topics related to computer science. It contains 31 multiple choice questions testing knowledge of topics like computer hardware, operating systems, networking, databases, and software engineering.

Uploaded by

Maxim Tawoutia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

NAME : GIC PROMEX-CAM Score : Teacher’s Remark

REPUBLIQUE
CLASS : DU CAMEROUNUpper sixth REPUBLIC OF CAMEROON
Paix - Travail - Patrie Peace - Work - Fatherland
SUBJECT
MINISTERE :
DES ENSEIGNEMENTS Computer science A/L
SECONDAIRES MINISTRY OF SECONDARY EDUCATION
DurationDE:L’EDUCATION DE2hrs
MINISTERE BASE MINISTRY OF BASIC EDUCATION

ANSWER ALL THE QUESTIONS Striving for Excellence


CAMEROON SCHOOL OF EXCELLENCE (C.S.E)
NKOLMESSENG, après le chef
B.P : 1660 Yaoundé Tel : 243 27 28 59 / 699 81 16 48 / 675 48 33 26

1. Which of the following is the fastest 6. Critical path of the PERT chart is:
memory medium in the computer? A. the shortest path to complete the
A. Hard disk project
B. ROM B. the average path to complete
C. SRAM the Project
D. DRAM C. the path which takes the longest time
to complete the project
2. Frequently used instructions by the CPU D. the path which takes the shortest time
are stored in the: to complete the project
A. Hard disk
B. ROM 7. The former way to close a project is to:
C. RAM A. Get the stakeholders to accept that the
D. Cache memory project is complete
B. The project manager and his workers
3. The suitable computer to execute many accepts that the project is complete
programs for hundreds of users at the C. Paying ail the workers and return ail
same time, performing relatively simple tools
operations and transactions is: D. Ensure that the tasks have been
A. Mainframe executed
B. Supercomputer
C. Personal computer 8. A laptop performance can be improved
D. Microcomputer by?
A. Increase the CPU speed
4. The maximum number of characters that B. Using utility software
can be represented by a computer that C. Increase the resolution power
operates a 4 bits System is: D. Increase the RAM size
A. 8
B. 16 9. An operation code with n bits will
C. 32 imply that there are______possible
D. 4 distinct operations.
A. 2n
5. ___ is a network device that B. 2n
combines multiple signals for C. n/2
transmission on a single channel. D. n2
A. Multiplexer 10. The main purpose of a digital
B. De multiplexer certificate is to:
C. Router A. Authenticate the source of a file
1.

11. The binary equivalent of the octal


number625 is: 17. The memory device that holds
A. 110010101 current date and time on your
B. 110011101 computer is called:
C. 110001101 A. DRAM
D. 110000101 B. Clock
C. ROM
12. An operation that is executed a D. CMOS
number of times at different places
in your algorithm can be extracted 18. Which of the following is a
out and made into: characteristic of broadband?
A. Function A. Completely safe from
B. Control structure intruders
C. Iteration B. It has a dial up connection
D. Module C. High speed
D. Cost varies from day to day
13. A variable type which can
conveniently store different 19. A real-time operating System
elements of the same type under a is used in:
single name is called: A. Controlling access to a network
A. A record printer
B. A queue B. Providing services to all users
C. An array of the network at the same time
D. A stack C. Managing the access to System
files in a computer
14. A software subject to copyright that D. Controlling the fuel injection
users can download from the System of an automobile
Internet and use for free is: engine
A. Open source
B. Freeware 20. An airline reservation System
C. Shareware is an example of:
D. Utility software A. Batch processing
B. Real time processing
15. The use of__makes it easier to C. On line processing
Organize files in a logical way. D. Time sharing processing
A. File extension
B. File name 21. Data redundancy is a database
C. Folder anomaly that:
D. File path A. Deletes data that has not been
used for long
16. A System that can predict weather B. Causes unnecessary
conditions is: duplication of data
A. Decision support System C. Forbids data of a particular
B. Expert System type
C. Transaction support System D. Selects data that occur too
D. Geographical Information System often
22. Why is it necessary for an
organization to adopt a good 28. Which of the following describes
password policy? Instant Messaging?
A. Easy sharing of files across the A. Sending messages through fax.
network. B. e-mail communication.
B. Easy connection of computer to a C. Making voice communication over
network. Internet.
C. To protect files against unauthorized D. Real-time text-based communication.
use. 29. Quality Developer is a company that
D. Easy access of files on a computer writes program to do specific jobs
23. Which one of the following monitors for other companies. These programs
incoming network traffic to prevent are called?
unauthorized attacks? A. Custom-purpose software
A. Data guard B. General-purpose software
B. Fireguard C. Off-the-shelf software
C. Data shield D. Special-purpose software
D. Firewall 30. One important role of interface in
24. A network topology whose design is:
Components are connected A. It presents menus to users
Physically to the cable trunk is: B. It teachers users how to operate the
A. Star topology machine.
B. Ring topology C. It makes decoding of information
C. Bus topology easier.
D. Mesh topology D. It hides the complexities of the
25. The logic gate with one input and one machine.
output is: 31. The stream of bits used to control the
A. NOT gate flow of data in asynchronous
B. AND gate communication is called:
C. XOR gate A. Error control bits
D. N AND gate B. Parity bits
C. Start-stop bits
26. Which of the following is NOT a D. Clock
feature of electronic commerce?
A. Goods can be advertised and prices 31.4ACi6 + 9BFi6 is equal to:
compared. A. E6B16
B. Transactions can be processed B. A7BF16
quickly. C. CFC16
C. Customers are identified before D. D6D16
buying.
D. Services are available 24 hours a day. 32. The quality of sound from a speaker is
best determined by:
27. Which of the following is NOT a A. Speakers
feature of electronic commerce? B. Sound card
E. Goods can be advertised and prices C. Media player
compared. D. Processor
F. Transactions can be processed
quickly.
G. Customers are identified before
buying.
H. Services are available 24 hours a day.
33. Which of the following about an end user 39. One function of an operating
license agreement is true? System is:
A. It gives full ownership of the software A. It retrieve information from a
to the user. database.
B. It gives the user the exclusive right to B. It Controls the allocation of
copy and sell the software to others. hardware.
C. It gives the user the right to modify the C. It is used for booting the
software. computer.
D. It gives the user the right to install and D. It processes data.
run the software on a specified number
of computers. 40. The 2’s complement of the binary
34. The rules governing the rights of data expression 1001 is:
subjects are called? A. 1001
A. Data Privacy Law B. OUI
B. Copyright law C. 0110
C. Data Protection legislation D. 0101
D. Data Publicity Law
35. A malicious attempt such as to make a 41. A format that best guarantees file
website unavailable to its intended users quality is:
can be termed? A. BMP
A. Hacking B. PNG
B. Spamming C. TIFF
C. Denial of service D. JPEG
D. Computer fraud
36. A tool in the Internet that assist users to 42. The recycler in the computer that
locate resources in the World Wide Web recovers deleted files is an example of:
is: A. Application software
A. Protocol B. General purpose software
B. E-mail C. Bespoke software
C. Web browser D. Utility software
D. Search engine
37. Which one of the following is a good 43. An abstract data structure that use
password policy for an organization? FIFO is:
A. Ail passwords are changed regularly A. List
B. Ail passwords are ne ver changed B. Queues
C. Ail passwords are made up of less than C. Stack
four characters. D. Arrays
D. Ail passwords are made up of less than 44. is a property of a
four numbers. Programming language:
38. Which of the following statements about A. Syntax
Internet connection services is true? B. Interface
A. Broadband connections are always-on C. Editor
while your computer is switched on. D. Comments
B. Dial-up connections are usually
faster than broadband 45. The appropriate action to take to
Connections. determine why a software is failing to
C. You cannot use your telephone line to give the required result is:
make calls while using a broadband A. Debugging
connection. B. Requirement analysis
D. Dial-up connections are always-on C. Compilation
while your computer is switched on. D. Feasibility study
46. A foreign key in a relation refers to
ANSWER ONLY ONE QUESTION
A. Primary key of another table.
QUESTION I :
B. Key that is imported from other
1. Explain any two benefits of
database.
Normalization.(2mks)
C. Key field that can replace the
2. When is a table in a database said to be
primary key.
in First Normal Form? (2mks)
D. Field with no relation with
3. Diferentiate between Flat file and
other keys.
DBMS (2mks)
47. Which of the following is the best
4. Explain the different database models
way to maintain a good posture (6mks)
when working with a computer? 5. What do you understamd by
A. Sit well a. An information system 1mk
B. Make sure your feet touch the b. State and explain any two forms of
floor. information system (4mks)
C. Take frequent breaks. c. Who is a system analyst and what is
D. Make sure that your computer, his function? (3mks)
desk and chair are positioned
correctly. QUESTION II :
48. Which of the following is 1 a. What is Computer Aided Design
descending order of data (CAD)? (1mk)
hierarchy: b. Name one professional who uses
A. database - record - file - field CAD and describe to what extent it is useful
- byte - bit to him.(1mk)
B. database - file - record - field 2 a. What is a robot ? (2mks)
- byte - bit
b. Give any two reasons why robots are
preferred for use over human beings.(2mks)
C. database - record - file - field
c. Give one disadvantage of a robot.
- byte - bit
(1mk)
D. database - file - record - byte
3 a. What do you understand by the term
- field - bit
“Computer ethics”? (2mks)
49. JavaScript can be embedded in an b. Differentiate between computer
HTML page between? ethics and netiquette.(2mks)
A. <Style> and </Style>. 4 a. What is computer ergonomics?
B. <html> and </html> (2mks)
C. <script> and </script> b. Give any four (04) ways in which
D. <body> and </body> your computer work environment can be
made ergonomically suitable.(2mks)
50. The technique preferred to transfer 5 a. Explain what you understand by:
large amount of data to and from a  Repetitive Strain Injury (RSI)
memory in a short time is:  Eye strain(2mks)
A. Programmed I/O
B. Interrupt driven I/O b. Explain two ways to prevent each of
C. Direct Memory Access the health problems above.(2mks)
D. Non maskable interrupt driven
I/O

You might also like