0% found this document useful (0 votes)
67 views

CSC Past Question

Computer science past questions

Uploaded by

kebokuemmanuel01
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
67 views

CSC Past Question

Computer science past questions

Uploaded by

kebokuemmanuel01
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
sc2UU examination 10. 1. 12. 13, 14. 15. 16. 17. 18. 19. 20. 21. 22. The following are level of abstraction in computing except (a) Computer Science (b) Information system (c) Information Manager (d) Computer Engineering The ___ generation of computers is associated with parallel processing and networking (a) 1° (b) 4" (c) Zero (d) 5 Numerical Information is associated with type of Information (a) Graphical (b]Quantitative (c) Qualitative (d) Figure The following are different Keyboard layout except (a) QWERTY (b) HCESAZ (c) DVORAK (d) AZERTY The following are type of Registers in Computer memory except (a) Memory Counting Register ( MCR) (b)Memory Address Register (MAR) (c| Memory Buffer Register (MBR) (d) Program Counter(PC) is a small set of data holding places that are part of the computer processor (a) RAM (b) Registers (c) ROM (d) Program holder Which of the following is not a type of Read Only Memory(ROM) (a)Programmable ROM (b) Erasable Programmable ROM (c) Electrical Erasable Programmable ROM (d)Electronic Electrical Erasable Programmable ROM The following are major components of the computer system except (a) Processor (b) Communication Devices (c) Input Devices (d) Main Memory Which of these Is an example of a system software (a) Spreadsheet Software (b)Word Processor Software (c) Utility Software (d) Graphical packages The following are the basic elements of a data communication system except (a) Sender (b)Media (c)Modem (d)Receiver The term associated with the propagation of signals across a communication medium is called (a)Transmission (b)Signals (c)Data Receiver (d) Signaling Which of the following transmission modes allow the communication channel to be used in both direction at the same time (a) Half Duplex (b)Simplex (c)Full Duplex (d) Double Duplex The following are attributes of information except (a) Accuracy (b) Cost effectiveness (c) Auditability (d) Portability The following are professions in Computing except (a) Information Management (b) Researchers (c) Teacher (d)Programmer Who invented the difference engine (a)Joseph Marie (b)Blaise Pascal (c) Abacus (d) Charles Babbage is a digital circuits used to perform arithmetic and logical operation in the central processing unit (a) Cache (b) Control Unit (¢) ALU (d)Adder is an example of output devices (a) Magnetic tape (b) Light Pen (c) Scanner (d)Projector Report Generator is a type of generations of programming languages (a)4" (b)2"(c) 1 (d) 5 ____ is not a criteria for classifying computers (a) Architecture (b) Cost (c) Amount of main memory (d) Software Type Which of the following is a type of access method in secondary memory (a) Information access (b) Direct Access (c) Data Access (d) Program access The following are components of an algorithm (a)lteration (b) Selection (c) Ambiguity (d)Sequence Which of the following is not an example of BASIC character set (a) Blank Character (b) Number (c) Alphabet (d) dash 23, 24, 25. 26. 27. 28, 29. 30. 31. 32, 33. 34, 35. 36. 37, 38. 39. 40. 41. 42. 43. 44, 45. 46. 47. 48. 49, The following are types of error ina computer program except (a) Syntax Error (b) Data Error (c)Run time error (d)Logical error The parallelogram symbol Is used for operation in flowchart (a) Input/Output (b) Decision (c) Start/Stop (d) Processing The following are keywords in BASIC programming except (a)CLS (b)FOR (c)LATE (d) DATA is the kind of value a particular variable can hold . (a) Data Type (b) Constants (c) Data Value (d) Constant Value _____ is aname given to program entities. (a) Variable (b) Fixed Values (c)Identifier (d) Records Which of these is not a type of flow chart (a) System Flowchart (b) Data Flowchart (c) Document flowchart (d) Program Flowchart ___ is a communication means between the user and the computer (a) Programmer Language (b) Programs Language (c)Program language (d) Programming language AND, OR and NOT are examples of _ operators in BASIC programming (a) Relational Operator (b)Logical Operator (c)Arithmetic Operator (d)Comparison Operator The following are the advantages of word processing over manual typewriter except (a)Saving (b)Editing (c)Typing (d) printing. __Isa single table that contains grid of vertical and horizontal lines (a) Workbook (b)Worksheet (c)Cell (d)Ribbon. The unauthorized duplication of copyrighted computer programs (a)Hardware piracy (b)System Piracy (c)Software piracy (4) Copyright infringement. ____ disguises itself as a legitimate program but damages or erases all data once in rogue program (a)Warm (b)Time Bomb (c)Trojan Horse (d) Data Virus. In other to draw pictures or select menu options you need (a)Scanner (b)Printer (c)Light Pen (d)Joystick. A certain type of memory that stores each bit of data in a separate capacitor within an integrated circuit which contains data only when electricity is available is called {a)DRAM(b)SRAM (c)EPROM (d) EEPROM, The following except one are parts of a main computer keyboard (a]Numerical Keys (b]Factorial Keys (c)Control Keys (d)Direction Keys. A particular type of system software is designed to assist users in maintenance and monitoring activities (a)Operating System (b)Utility Software (c)Device Drivers (d)Language Translator. In assembly language, Instructions are coded using (a)Symbols (b)Formulas (c)Mnemonics (d)Libraries. An assembler directives is also called (3)Opcodes Mnemonics (b)Data Definition (c)Pseudo Opcodes (d)Macros. One of the following is an object oriented programming language (a]Java(b)Pascal (c)ADA (d)COBOL. A computer application customized or developed to meet the specific requirements of an organization is called (a)Spreadsheet (b)General Packages (c)Customized Packages (d)Desktop Software. An error found in a program is called (a)Bug (b)Issues (c|Code (d)REM The violation of a rule for writing a program in a given programming language is called {a)Runtime (b)Logical Error (c)Syntax Error (d)Test Error Which of the following is a valid variable name in Basic (a)A102 (b)5234 (c)REM (d)Tina James those not require translator for a program written in it to be executed (a)Assembly Language (b)Machine Language (c)COBOL (d)High-Level Language. Agood algorithm must be (aJambiguous (b)Definite (c)Voluminous (d)Implement. The conversion of digital signal to analog is referred to (a]Demodulation (b)Modem (c)Modular (d)Modulation. transmits data character by character (a)Synchronous (b)Asynchronous (c)Duplex (d)Radio 50. 51. 52. 53. 84. 55. 56. 57. 58. 59. 62. 63. |. From Figure A, identify the error in line 20. And correct it (a) x (b] * (c) PIE (d) let 65. 66. 67. 68. 69. 70. fi 7. 73. 74, 2. 76. For communication of information and messages to take place, we use —- and ——— communication systems. (a) telephone, postal (b) nitel, nipost (c] Computer , handsets (d) All There are ------ basic elements of a communication system. (a) 2 (b)3 (c) 4 (d) 1 In Data communication, —— basic terms are frequently used. (a) 2 (b)3 (c) 4(d) 1 A collection of facts in raw form is —--- (a) Data (b) Information (c) signal (d) Signalling Electromagnetic encoding of data i (a) Data (b) Information (c} signal (d) Signalling The data transmission software perform the following — (a)Data routing (b)flow control (c) a, b (d) information routing The transmission mode used in transmit duplex (b)Full duplex (c) Simplex (4) All ig data from one point ta another is-—-- (a) Half —--- is a sequence of voltage represented in binary form. (a) Analog signal (b)Hybrid signal (c)Digital signal (d) All The device which converts digital signal into analog and the reverse is known as --— (a) MODEM (b} VisAfone (c} Globacom (d) Dial up The basic forms by which data can be converted into a form suitable for communication —~ (a)pulse of light (b) Electromagnetic waves (c) ALL (d) Electromagnetic pulse Types of network ---~ (a) LAN (b) MAN (c) All (d) WAN is interconnection of various computer system located at different places. (a) Network (b}Computer Network (c) Internet (d) network topology The network topology examples (a) Star (b] Ring (c) Bus (d) All Figure A: 5 REM Basic program to compute area of a circle 10 let pie=3.142 15 INPUT R 20 LET Area=pie"R/2 25 print “Area of a circle=' ; Area 30 END From Figure A, identify the error in line 10. [a) pie (bylet (c)” (d) All From Figure A, identify the error in line 25. (a) print (b)* (c)” (d) aand b There are --- categories of Programming languages. (a) 2 (b)3 (c] 4 (d) 1 There are --- types of bugs/errors found in program. (a) 2 (b)3 (c) 4 (d) 1. Machine and Assembly language are examples of ---- language. (a) low level (b)High Level (c) middle level (d) a, b ‘There are ---- types of program flowcharts. [a) 2 (b)3 (c} 4 (d) 1 ‘symbol is used to indicate the point at which selection are made. (a) Processing (b)Decision (cJinput/output (d)arrow symbol is used to denote the execution of an operation or event. (a) Processing (b)Decision (c) input/output (4) arrow ‘There are --- components of algorithm. (a) 3 (b) 2 (c) 4 (d) 1 ‘There are —--- ways of designing algorithm. (a) 1 (b)3 (c) 4(d) 2 Pseudocode and flowchart are ways of designing ~---- (a) selection (b)program (c] b, d (djAlgorithm Problem solving steps entails (i) analyse problem (iidefine problem (iiiJgenerate solution (iv)Analyse solution (v) evaluate solution. (a) iiiii,iv,v (b)iiiiii,v,v (C) i, iiLiv,v (d) Wi iiiy,iv ——-is the process by which unfamiliar situation is resolved (a) algorithm (b)solution (c)Programming (d)problem solving (d)copyright 78. The association of computing machinery code ask members to abide by the following except {a)honesty (b) tolerant (c}eondone copyright (d)maintain privacy 79. --- is the unauthorised duplication of copyrighted computer program . (a)software piracy (b)copyright piracy (c}computer fraud (d)unethical &0. --—- occurs when the appropriate royalty payment is not made for use of the protected work (a)software piracy (b)copyright infringement (c)computer privacy (d)infringement was invented that allowed people and products to quickly move across wide area {a)computer (b)Airplane (c)radio & Television (d)car -- was invented that made the world smaller. (a]computer (bjAirplane (c}radio & Television (a)ear 83, ---is the invention that transformed business world to the internet. (a)computer (b)Airolane (cJradio & Television (d)car 84, The following comprises the components of the ribbon on MS office environment except —- (a)insert (b]view (c)page layout (d) Copy 85. Which of the following levels of abstraction is NOT common to information system and computer engineering? a. Business & users b. Software design c. Software use d. Hardware use 86. Which of the following area in computer science describes programming of computers to mimic human brain? a. Computer graphics b. Human computer interaction c. Antificial intelligence d. Software engineering 87. In 1642, a French scientist invented ....... which represents the position of digit with help of gears 82. init Pascal's calculator The abacus Leibnitz's calculator Difference engine 88. ....... technology is often regarded as the improved technology from the transistors a. Very Large Scale Integration b. Vacuum tube ©. Mechanical devices d. Integrated circuits 89. In computer science, information sources can either be from a. Internal or External b. High or low ©. Individual or organization d. Human and computer keyboard layout is widely used in central Europe a. QWERTY b. AZERTY c. QWERTZU a b, c. 0, 90. 91... 92. 93, 2, 95, 96, 97, 98, 99, d. DVORAK is known as the primary memory except a. Cache memory b. Dynamic Random Access Memory (DRAM) Magnetic tape d. Programmable Read Only Memory (PROM) Computers can be classified under the following except a. Size b. Cost Architecture d. Colour isa program routine that links peripheral device to an operating system of a computer, a. Device drivers b. Language translators © Utility system d. Assembler »- is also known as third generation language a. Low level language b. Medium level language © High level language d. Machine language What is the main function or action of the “Alt+F4” keys a. Close window b, Shutdown Switch between windows d. Close active window Each box within an Excel worksheet/window is known as a. Column cell b. Cell © Tab d._ Name box isa program that can get into a computer to destroy data and spread itself to other computers a Crime b. Worms © Trojan horse d. Virus A program that occupies computer memory and spreads quickly ike a virus is called a. Trojan horse b. Worm Bomb d. Fire e The third step to problem solving is a. Analyse the problem b. Analyse the solution ©. Define the problem d._ Select best solution 100. 101, 102, 103, 104, 105, 106, 107, Which of the following is not an attribute of good pragramming a. Reliability b. Friendliness Algorithm d. Portability Which of the steps below is not a step of debugging? a. Supply the antivirus b. Recognise that a bug exists Apply the fix and test it d. Determine a fix for the bug is a name given to data-items with static values a. Constant b. Identifier c. Rules d. Variables Which of the following basic expression is wrong a. HAZY b. 4X¥/27-5*/X c AtY/2-C%X d. S"U*t-1/2tartne In the basic sample codes below, identify the wrong line of codes i. REM program ii, LET PIE” 3.142 iii, INPUT “obtain value for r:";r iv. LET Area” tita/360*PIE*r2 Vv. PRINT area of sector” ; Area vi. END ev Which of the following is a vector variable that holds a set of variables at a time a. DIM statement b. Basicinteraction statement Array d. Visual Basic. NET is a data transmission mode a. Simplet b. Half-duplex ‘ 4 simples Full-duplex Which of the following network topologies is used frequently to connect one or more small computers or peripheral devices to 2 large host computer or CPU a. Ring network b. Bus network ©. Star network 4. Protocol network 108, IF 1110110, + T, "100110011, Find T (a) 10111011 (b}1011011 (c) 110110 (d) 100101 335 7 272332334 109. Find the decimal equivalent of 100001.101,(a)~"# 8 (b) 8 (c)33.25 (a) 32, 625 5 u , 272 272 4 SA 110. 1011110.10110, is equivalent to X,.. Find X. (a) “’4 “73 16 (by 16 (c) oS gg h 16 (dg) 16 111. _ Find the Product of DC,,,.and BC, in hexadecimal (a)A013(b)A018(c)D017(d)A1'0 112. In hexadecimal, the next 4 numbers After 2FACE Is (a) 2BABA (b) 2FAD3 (c) 2FADZ (d)FACE2 113. if M,, +473, + 101111,” 111111, Find M (a)11074’'(b) 110744 (c) 11749(d) 111749 114. If 177,,, 1s added to certain number in hexadecimal and the result yield 2028,... What is the value of the number? (a) 1682 (b)2E81(c)1EA0(d)1EA1 115. Find the decimal equivalent of ABC,.., (a) 274 (b)2749 (c)2739 (4) 2738 116. Convert EFCC,.. to binary (a) 1010101110101 (b) 1110111111001100 {c)111010111010(4)11010111012 117. IFY,,." 2FACE,_-EFCC,., Find Y (a}20B02 (b) EBA (c)DODO (d)BABA 118. Find the two's complement of 1011011100 is (2} 110100100 (b} 101100100 (c) 100100100, (4) 1001000110 119. Evaluate 362,., x 715,,, (a)331712,,, (b)258830 . (c)264712,., (d) 358830, 120. Convert 47227,,, to binary (a) 111110111100 (b)110111101100 (c)100111010010111 (d) 101101111101 121. Which of the following statements is v GB” 1024 KB (d) 2 KB = 204’ bytes 122. How many byte(s) are there in the following statement “WELCOME TO DELTA STATE UNIVERSITY” (a}34 (b)264 (¢)35 (d)280 123. In base 8, the next number after 20777, in (a) 21000 (b) 2100 (c) 21100 (d) 17000 124. Convert ADA,,,to Decimal (a) 2779... (b) 227774. (€)277' (4) 2788... 125. Find the One’s Compliment of 0000000 (a) 1111111 (b)111111 (c)1101121 (4)1111110 126. Convert 111110111100, to hexadecimal (a) FBC,..(b)EFE,..(c)DFE,. (4) FDE, 127. Convert DADA,,, to Decimal (a) 27379,.,, (b) 22787,,, (c)56026,,,(d) 2788, 128. Given that Z,,"C629,, + 9A52,,.. Find Z,, (a) 16067B,, (b)16066B,, (c) 4 (d) 2 129, Find the two's compliments of 0.01011. (a) 1.10100 (b)1.10101 (c) 0.10100 (¢) 0.10101 130. _ Find the two's compliments of 1010.0011. (a) 101.1100 (b) 101.1100 (c)1011.1101 (d) 101.1101 131, Add 1101 to 111 (a) 10100, (b) 10100, (c) 4 (d) 1 132, Convert 762, to base,, (aJO5C (b}1F3 (c)1F2 (a)31F 133. 2FACE added to BAFF is (a) 049C (b) 3BSCD(c}CBSDC (d)3ASCD 134, 523,+11011, ,+7A8,,(2)100100110101(b) 100101110101 (¢)100100010010(4)011010101010 135, Convert 1011.011, to base,, (a}49.30 (b)5.75(c)14.375(d)39.11 136. Convert 250.11,, to base2 (a)11111010.110 (b)01111101.110 (c)11111010.0001 (d)01011111.1000 137. Whats the 2's compliment of 110111011101 (a)001000100010 (b)0010010001 (cJ001001100010 (4)001000100011 138. ETAC,,~ 8B6F,,(3)5S3D (b)17348 (c}7318 (d)1631B 139, Subtract BABA from BEEF (a)BSC1 (b)D143 (c)-LBCD (d)0435, (a) 1 KB” 1048 bytes (b) 1 KB” 1000 bytes (c) 1 140. Find the 1's compliment of 001110011 (a)110001110 (b)110001101 (c}00110011 (d)110001100 141, Add 6123, to 2422, (a)4569 (b)8555 (c)10555 (d)1854 142. Subtract 10.1001, from 101.0110, a. 101.1101 b. 010.1101, «. 101.1101, d. 10.1011 143, Find the 1’s complement of the 010.1101, a. 10.0011, b. 11.0100, «. 101.0010, d. 101.0110, 194, Convert BCD,, to a binary number a. 110111001101, b. 110111001011, «. 110011011011, d. 101111001101, 145. How many bytes are there in Imb a. 102457 b. 104'575 ©. 1024 d. 1045875 146. Convert 42AD,, to decimal a. 17069,, b. 1706',, ©. 71069,, d. 71089,, 147. Convert 11001110, to hexadecimal a. 1198,, b. 196 c. 186 dE, 148. Four basic terms are frequently used in data communication except - Receiver (b) Data (c) Signals (d)Transmission 149. There are basic requirements for working of a communication system except --- (a)Sender (b) Receiver (c) Medium (d) information 150. 1. Identify the following variables as acceptable or unacceptable, giving your reason(s) if unacceptable in BASIC. i. ADA ii. $a ili, REVENUE iv. 9SMALL v.24 (a) 151. State four (4) types of variables including the two types commonly associated with BASIC programming. 152. Using the appropriate symbols, write the following expressions in BASIC code: (a) 4ac + Gb? feb? (b) ax? + bx +c b? 2 b? -dac 153. State three reserved words in BASIC that can be used under more than one programming task. 154. Identify the types of the "expression" in the examples of the above assignment statements. 155. When is GOTO statement needed in BASIC programming,? 156. What other expression can you use in place of the SQR function? 157. What are the two basic steps taken by the computer when it encounters a FOR statement? 158. What is the flowchart symbol appropriate for the DIM statement? 159. State the various types of BASIC statements you can use to enter data into your program 160. State an important rule to be followed when using nested loops in BASIC. Identify the error(s) in the following program: 10 PRINT 20 FOR =| TO 4 STEP -2 30 PRINT 2*1 40 FOR J=1TO5 50 PRINT J 60 NEXT | 70 NEXT J 161. The data transmission protocols perform the following functions for the efficient and error free transmission of data except --— (a)flow control (b) Error control (c}data routing (d) data bridging, 162. There are three modes for transmitting data except---— (a) half duplex (b)full duplex (c) Simplex (d) half Simplex 163. The following are transmission media used to support data transmission except (a) telephone lines (b) coaxial cables (c) microwaves systems (d) Flow systems 164. The type of hardware used in data communication is -—-- (aJModems (b) controllers (c)multiplexers (d) concentrators 165. The following are types of multiplexing used to optimize the use of communication lines, except —- (a)flow control (b) controllers (c)multiplexers (d) concentrators 166, ~~ is the formal act of rules for communicating as well as rules for timing of message exchanges (a) protocol (b)Notation (c) HTML (a) LAN 167. There are basic types of Networks except ——- (a) LAN (b) MAN (c) WAN (a) PCN 168. The following are popular protocols used in data communication, except ---—- (aJHTTP (b)ETP (c)EDVAP (d) POP 169. Data type in BASIC can be classified into types. Except —- (a)Numerical (b)Constant (c) Character (d) Variable 170. --—- isa finite set of well-defined step-by-step methods, procedures or rules for solving any given problem (a)Algol (b)Algorithm (c) Java (d) BASIC 171, —— is a computer-understandable language developed mai operation of the underlying hardware of a computer system. (a) Machi (d) 172. -—~ is error due to semantic rule of a language (a)Logical error (b)Run time error (c)Syntax error (d)compile time 173. The following is not a high level language --—- (a)BASIC (b)PYTHON (c)C++ (d)Assembly 174. What tool is not used in the development of an algorithm (b)pscudo code (c) data flow diagram (d)coding 175. Abacus is known to be the first calculating device used to be performed addition and subtraction easily and speedily 176. Abacus is divided into two parts called SHeaven9 and 8Earth9. 177. The lattice method is an alternative to long multiplication for numbers 178. The first mechanical calculator (Pascaline) based on gears was designed to performed addition and subtraction 179. Hollerith developed an electromechanical punched-card tabulator to tabulate the data for 1890 U.S. census. 180. John Napier9s of Scotland invented a calculating device, in the year 1617 called the Napier Bones 181. Gottfried Leibniz modified the Pascal calculator and he developed a machine which could perform various calculation based on multiplication and division 182. Difference Engine was used to solve polynomial equations. {a)flowcharts 5 183. The number 4 in diagram A is known as 184. The number 2 in diagram A is known as 185. The number 1 in diagram A is known as 186, ‘The number 5 in diagram A is known as 187. The function of the battery in the system unit is ~ 188. The disk drive controller card does the work of ~ 189. The diagram B isa screen shot for (a) Ms word (b) Ms Excel (c) Ms PowerPoint (d) Ms Access 190. The diagram C isa screen shot for -—~ (a) Ms word (b) Ms Excel (c) Ms PowerPoint (4) Ms Access lick to ad title exo as sate 191. The diagram D is a screen sl (a) Ms word (b) Ms Excel (¢) Ms PowerPoint (d) Ms Access (a) Ms word (b) Ms Excel (¢) Ms PowerPoint (d) Ms Access 192. Convert 2910 to binary a. Loll02 b 111012 110112, 101012 193. Convert 438 to base 10 3510 358 408 4010 194. Convert 11102 to decimal 2410 a110 2310 1410 195, Convert 24016 to decimal 48710 62210 57610 47610 196, Convert 4248 to binary 1001100102 1000101002 1000001102 10000101012 197, Convert 101.1012 to base 16 5A16 5B16 A516 BS516 198. Convert A.816 to binary 1011.01112 100.1102 1010.10002 101.0012 199. Convert D7.C4416 to octal 27210448, 327.61048, 32716048, 410.62738 200. Convert FD3216 to base 2 10101000011001012 11190011110100112 11110011110101112 11110011110100112 201. Solve 635B16 X A16 3915816 3715616 3953816 3761316 202. Solve BEEF-BABA16 42416 43716 43516 ao oe FP Boge Boeke Bore ao se ao oe 42716 203. Solve 7B5416 + BDCI6 373016 873216 873016 573016 204. Convert 6210 to hexadecimal E316 sD16 3E16 D316 205. Find the 19s compliment of 111000102 oor 1012 101000112 00111112 00101012 206. Find the 29s compliment of 111000102 111000112 io100112 orto00102 11000112 207. Convert 24010 to binary to1111012 111100002 0111102 q1i11012 208. Convert 100101 from binary to deci 3210 3810 3410 s710 209. There are two kinds of drive bays known as Internal and external Small and big Input and output Inside and outside 210. The harddrive in a computer is used as ..... storage device Volatile Non-volatile Volatile and non-volatile Allof the above 211. What technology was defined in Generation 0? Parallel processing and networking Vacuum tubes Mechanical devices ‘Transistors 212. What technology was defined in Generation 5: Transistors Mechanical devices Parallel processing and networking Integrated circuits Ao oe ange 213. What technology was defined in Generation 3? Parallel processing and networking Vacuum tubes Mechanical devices Integrated circuits 214. What technology was defined in Generation 1? Parallel processing and networking ‘Vacuum tubes Mechanical devices ‘Transistors

You might also like