Computer Science Tutorial Sheet 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

THE COPPERBELT UNIVERSITY

SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY


=====================================================================

2020/2021 SESSIONAL EXAMINATIONS

CS 120: INTRODUCTION TO COMPUTER SYSTEMS

INSTRUCTIONS

1. Time allowed is three (3) hours


2. There are six (6) questions in this paper. ANSWER ANY FIVE (5) QUESTIONS.
3. DO NOT use acronyms or abbreviations in answering questions, unless you have been asked
to do so in the question.
4. All questions carry equal marks. Each Question is 20 Marks for a total of 100 Marks.

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO


===================================================================
QUESTION ONE
a) Differentiate Product standards and Process standards and give an example of each. (4 marks)

b) List any two (2) sources of standards. (2 marks)

c) Standards are important for a number of reasons, describe any two (2). (4 marks)

d) There are at least five (5) documents which are an essential part of user documentation. Name
any three (3) and describe what they contain. (6 marks)

e) List any two (2) commonly used system documentation (2 marks)


(i) ______________________________________________
(ii) ______________________________________________

f) Documentation of a software project is organized into several categories. List any two (2).
(2 marks)

QUESTION TWO

a) Output can be in two forms, what are these? (1 mark)

(i) ________________________________________
(ii) ________________________________________

b) Give 2 examples of devices that are used to produce each type of output. (2 marks)
Type 1:
(i) _____________________________________
(ii) _____________________________________

Type 2:
(iii) _____________________________________
(iv) _____________________________________

c) Different kinds of printers are available for different applications. Printers are classified into
two categories- impact and non-impact printers. Give two examples of each. (2 marks)

Impact Printers Non-Impact Printers

d) An image on the monitor is created by configuration of dots, also known as __________. The
clarity of the image on the computer screen depends on three factors. These are
_______________________________________, ____________________________ and
__________________________________. (2 marks)

2
e) Name two applications where plotters are commonly used. (1 mark)
(iii) ______________________________________________
(iv) ______________________________________________

f) What do the following acronyms stand for: (2 marks)


(i) LCD: __________________________________
(ii) USB: __________________________________
(iii) COM: _________________________________
(iv) VDT: __________________________________
g) State three (3) input devices and two (2) output devices that blind people can use when
interacting with a computer-based information system. (5 marks)

h) The Central Processing Unit sends data, instructions and information to the components inside
the computer as well as to the peripherals and devices attached to it. For this purpose, buses
are used. Name the three (3) buses that make up the system bus. (3 marks)

i) The primary responsibility of a computer processor is to execute a sequential set of instructions


that constitute a program. CPU executes each instruction in a series of steps, called instruction
cycle. List the steps that make up the instruction cycle. (2 marks)

3
QUESTION THREE

a) In addition to the categorization of programming languages into machine language,


assembly language, and high-level language, programming languages are also classified in
terms of generations in which they have evolved. Indicate these generations from the
following: (5 marks)

i. .NET (VB.NET. C# etc):

ii. LISP, Prolog:

iii. Cobol:

iv. Machine language:

v. Assembly language:

b) List two (2) examples of application software under below: (6 marks)

i. Word Processing Software:


ii. Image Processing Software:
iii. Web Browser Software:

c) System utility software is required for the maintenance of a computer. List any three (3)
system utilities. (3 marks)

d) Discuss any three (3) hazards to computer operator health and efficiency. (6 marks)

4
QUESTION FOUR

a) Explain the difference between transcription and transposition errors. (4 marks)

b) A method devised to help detect transcription and transposition errors is called the Check
digit method. Use the Modulus 11 check digit method to compute a check digit that would
be added to a five-digit personal identification number (PIN), 32416, to validate it.
(5 marks)

c) What is the purpose of the following tests: (4 marks)


i. Sequence test
ii. Existence test
iii. Combination test
iv. Duplicate processing

d) Viruses harm the computer in many ways, list any four: (2 marks)

e) What do the following acronyms stand for? (2 marks)


i. CD-RW: ____________________________________
ii. CD-R: ______________________________________

f) An online system can offer three (3) major functions, what are these? (3 marks)

QUESTION FIVE

a) Define the following terms: (10 marks)


i. Transaction Validation
ii. Audit Trail
iii. Encryption
iv. Computer Worm
v. Trojan horse

b) Give four (4) characteristics of real-time systems. (4 marks)


c) Give three (3) advantages of distributed processing. (3 marks)
d) Give 3 examples of interactive processing. (3 marks)

5
QUESTION SIX

a) Computer security focuses on three (3) aspects. These aspects are attacks, services and
mechanisms. For each of the following, state the aspect of computer security under which
it falls. (5 marks)
i. Martha listens in on Mary and Adam’s conversation.
ii. Agnes is assured that only Lisa will receive the message she sent.
iii. The company formulates a security policy.
iv. Stella is denied access to Steve’s facebook account.
v. An intrusion detection system is installed to detect intruders.

b) Provide one word to complete each of the following sentences. (4 marks)


i. To protect an organisation from an external hacker, every packet of data sent
between the organisation ‘s intranet and the Internet should pass through a
____________.
ii. _____________ is a weakness of the system that is left unprotected.
iii. __________ is the software that is intentionally included into a system with the
intention to harm the system.
iv. The process of converting a message into meaningless text for security is called
____________.
c) Classify each of the following as a violation of confidentiality, of integrity, of availability,
or of some combination thereof. (4 marks)
i. John copies Mary’s homework
ii. Caroline changes the amount of Angelo’s cheque from $100 to $1000.
iii. Jonah obtains Peter’s credit card number and has the credit card company cancel
the card and replace it with another card bearing a different account number.
iv. Henry spoofs Julie’s IP address to gain access to her computer.
d) What is Non-Repudiation? (2 marks)
e) The two types of security attacks are passive attacks and active attacks. State the category
in which each of these attacks fall. (3 marks)
i. Bank A spies on their competitor’s corporate data.
ii. Trudy uses Bob’s identity to post horrible messages on facebook.
iii. Eve launches a denial of service attack on Alice’s servers.
f) There are various methods used to get the username and password of the system to gain
unauthorized access to the system. List/mention any two (2) of these methods. (2 marks)

You might also like