0% found this document useful (0 votes)
29 views5 pages

June 2024 0795 Computer Science P1

This document outlines the instructions and guidelines for candidates taking the Advanced Level Computer Science examination in June 2024. It includes details on the examination process, rules regarding the use of materials, and how to answer multiple-choice questions. Additionally, it features sample questions related to computer science concepts and practices.

Uploaded by

ndzijioromeo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
29 views5 pages

June 2024 0795 Computer Science P1

This document outlines the instructions and guidelines for candidates taking the Advanced Level Computer Science examination in June 2024. It includes details on the examination process, rules regarding the use of materials, and how to answer multiple-choice questions. Additionally, it features sample questions related to computer science concepts and practices.

Uploaded by

ndzijioromeo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 5
0795 COMPUTER SCI ICE 1 ‘GENERAL\CERTIFICATE OF,EDUCATION:/BOARD General Certificate of Education Examination JUNE 2024 ‘ADVANCED: LEVEL ‘Centre Number Centre Name Candidate Number i Candidate Name Mobile phones:anidccalculators are NOT allowed in:the examination'room ‘MULTIPLE CHOICE Q’ESTION: PAPER One and a'Half Hours 'INSTRUCTIONS:TO CANDIDATES Reud the following instructions carefull before you start answering the questions in this paper.’Make sure you ‘have a soft HB pencil and an eraser for this examination, Us OFT HB PENCIL THROUGHOUT:THE EXAMINATION. 2. ‘DO NOT OPEN|THIS' BOOKLET UNTIL\YOU ‘ARE TOLD TO DO'SO, Before the examination begins: 3. Check that this question bodklet is heaided “Advanced Level — 0795 Computer Seience:1” 4. Fill in the information required in the spaces above. 5. Fill in the information required in the spaces provided on the answer sheet using your HB pencil: Candidate Name,'Exam‘Session, Subject Code and ‘Candidate Identification’ Number. ‘Take care that you do not ctease or fold the-answer sheet or make any marks on it other than those asked forin these instruction. How to answer the questions‘in this examination 6 *Answer‘ALL the'S0 questions in this Examination. All questions carry equal marks. 7. ‘Bach question has! FOUR suggested answers: ‘A, By(C and: D.‘ Decide, on: which answer'is.correct.iFind the ‘number of the question onthe ‘Answer Sheet and draw a’ horizontal’ line across the’ letter to.join the-square brackets for the answer.youhave chosen. For example, if C is your correct answer, mark C as shown below: ‘TAD 1B) 64:10] ! 8. Mark only one answer for each question. If you mark: more than one answer, you will:score a’zero for that question Ifyou change: your mind about an answer, eas the ist mark: eaeflly ten mark. your pew answer. ‘Duratiot 9, Avoid spending’ too'muéh’time on any one question. ‘If you find:a question difficillt, move onto the next question. You can come back to this question later. 10. _Doalll rough work in this booklet, using, where necessary, the blank spaces in the question booklet. 11. ‘At the end of the examination, the invigilator shall collect the answer sheet first and the question \booldet after: DO'NOT ATTEMPT.TO LEAVE THE-EXAMINATION:HALL WITH IT, sTurrt Over (0000707957 (C2004GCEB It uses the same instruction sequences to process in the same way large amounts of data streamed to it. At best it must be: A Multiple-instruction, muttiple-data, ion, single-daia, ultiple-data, Suh has data to process, at the same powerful machines in various parts of the world. Itis best he does this on a(n): A Online Computer. B Distributed Computer. C Mainframe Computer. D Parallel Computer. 6. Which of the following corresponds tothe truth table adjacent? . : jaja Ie A lr le ty B le lr oir c To |r D Toit ig 7, What guides a machine on how to execute any instruction given i ‘A The values to use in operations. B__ The machine addressing mode. The machine instruction set. D__ The instruction format. 3. ‘We seek it for long-term storage, temporary - 6 storage for executing instructions and data, and 8. Amachine’s CPU takes arguments for its binary for sheer bulk. It is a ‘operations from the accumulator. It surely isa: ‘A Main memory. ‘A. Three-address machine. B- Hard drive. B_ Two-address machine. C Cache memory, One-address machine. D__ USB drives. D_ Zero-address machine. 4, What is the result of the following in ones 9. In indexed mode addressing of machines: complement notat ‘A The operand of the instruction is not used +10 110 011 ~ 10 001 010 immediately. A 00101 001. B00 101 000. C 10101001. D 10011 000. ‘Which of the following circuits corresponds to a reexpression of the Boolean formula? (A+B)+ A+B? TS He> mp: =>, (ED. A Circuit A. B Circuit B. C Circuit C. D_ Circuit D. 0000/0795/1 Go on to the next page B_ The operand is an offset to the location where the sought value is found. The operand field holds an address for its immediate use. D_ The operand addres from the instruction. given as an offset 10. It is used for work, for teaching and learning, without preliminary training, for instant feedback and suitable displays. It must be a(n) A Video Conferencing System. B Email system, C Information retrieval system. D Office automation system. 11. Itis good at repetitive tasks, a good replacement for humans in hostile environments. It must be: ‘A Computer-aided Manufacturing. B An intelligent machine. C A Simulation Game. D_ Arobot. a Oe 12. Its good for incidents reporting, tracking evolution over time, across distances, and must ‘manage large amounts of data. ‘A * Database Management Systems. B_ Information & Communi Systems. C Geographic Information Systems. Management Information Systems. 13, Inhandling data, which of the following is NOT. a breach of privacy? A Let Zia verify data Joe must have input. B__ Nai forgot his medical records in a park. C Obey a court order on Fuh’s debts. D__ Idi makes public Pat's medical record. 14, Which of the following is a computer threat that affects content owned by another? A Flood a website with service requests. B Illegal change to someone’s password. C Spoofing where data is sent in a hetwork. D__ Corruption of a file system in a network 15. Which of these terms from the early days of operating systems is most correctly defined: ‘A. Batch systems grouped tasks and executed them by a single user. B_ Multi-tasking systems carry out multiple tasks. Multi-user systems shared machine resources among users at the same time D__ Real-time systems were interactive in real, world-clock time. 16, Temporal databases record: A Objects and their relationships as they evolve over time B__ Objects and their relationships at fixed points in time. C Record changing values and relationships at fixed positions in time. D__ Record the values of objects as their relationships change in time. 17. Itenables the independent reuse of program- level functionalities in other programs as they are readied for execution, They are: ‘A Utility programs. B Library programs. C Application programs. D__ Systems programs 18. Which of the following compiler phases best work together so that strings of symbols are given the meaning expected of the program when executed. ‘A Lexical analysis and syntax analysis. B Syntax analysis and code generatior C Code generation and code optimisation. D__ Code optimisation and code execution, 0000/0795/1 19. Mbu, a systems administrator just wants to navigate Google earth to locate some information for friends. On the other hand, Nawe is new to systems administration and wants to learn. It is best for Mbu and Ngwe to respectively use: ‘A MS Windows GUI; MS Windows GUL B_ MS Windows GUI; Linux CLI. C Linux CLI; Linux CLI. D__ Linux CLI; MS Windows GUL 20. Which of the following makes it easiest to swap locally executing code into memory? ‘A Variable memory partitioning, B_ Paged memory allocation. C Segmented memory allocation, D__ Segmented demand-paged allocation. 21, In what circumstance(s) would it be best to use a Shortest Job First policy? ‘A Inorder to avoid CPU preemption. B__Inorder to reduce CPU waiting time. C When there are many short jobs and it is D not clear which ones to consider first. When it is important to improve on the overall turnaround time of processes. 22. In which of the following scenari normalisation NOT be of help? A. Record Che’s library registration without him having to borrow at least one book. s would B__ Remove Njoh as a library user, without deleting his library usage history. C Awaiting Pat to update her CV since she became Chief librari D__ Update the same details of Egbe found in many activities in her university. 23. Inrelational databases which of the following is, true? A. Candidate keys can be used as primary keys. B_ Akey cannot include all attributes. Foreign keys cannot be candidate keys. D_ Candidate keys of a relation can be null, 24, Itallows one to access, update and otherwise ‘manipulate the data found ina DBMS: tion Language (DDL). B Data Manipulation Language (DML). C Structured Query Language (SQL). D_ Fourth Generation Language (4GL). Turn over 5. Which of the following. is mesticonveniently used to specify,the requirements of a program to develop? A\. Dataflowsdiagrams. By E-Rdiagrams. ©. UMUcharts D) Flowcharts. Itisused to make stire that management and others have needed data in tailored and well- presented forms, All in the organisation‘can acquire its skills, ‘A\ Document preparation: B» Laptop computing. C Jobretraining. D__ Office automation. It lets data from channels go over long 32. Assuming identifier names are of obvious meanings, the SQL query: SELECT author FROM booklist WHERE published >= 5 AND. livesin = *Kom’. “4 ‘A List authors in Kom who published 5 or more books. B_ Selects from the filé ‘author’ all entries having “Kom and at least 5 published C List book authors of at least 5 books that live in Kom. D Identify authors that have at least 5 books published or live in Kom. 33. Which of these statements is false? relation is in second normal form (2NF) if: ‘A. Noattribute ean depend on non-key attributes. distances, before possibly being resent to other B butes are filly dependent on the devices: primary key. Ay Multiplexer: . C | Candidate key attributes can transitively B- Repeater, depend on the primary key, Modem. D_ A primary key attribute may fully depend “D. Codec. on the primary key. 8. It lets one forward data to other networks in an 34, Computing arithmetic expressions (from left to internet, no. matter how distant they, are: tight) has to check operator precedence such as A. Router. BEDMAS. To avoid this and execute them in Be Gateway. the correct precedence order requires C. Bridge. transforming the expressions using: D__ Repeater. ‘A. Pre order traversal ‘9... Bisuh receives data from various parts of the world, in varying quantities and rates and, most critically: only when she is ready to handle the data, Data transmission must be: A’ signalled B> buffered. C synchronised. D__ coordinated. 30: Inrelation to database security, which of the following does NOT detect or prevent threats? ‘A Data encryption. B_ Data backup. © Integrity constraints. D_ Standards enforcement. 31. She physically realises the design, implementation, security,and controls of the database system as well as the maintenance and performance of the operational system, She is, certainly a: ‘A. Application Developer. B_ Database Designer. C Database Administrator, D__ Data Administrator. 0000/0795/1 Go on to the next page B__ Post order traversal C Inorder traversal. D> Mixed order traversal. : 35. Which of these data types is least suited 10 repeatedly process data in the same way? A File. B List. C Array. D String. 36. Ina'small restaurant service, current clients, the day's menu and drinks options are each given @ 4-bit code. If half the-clieit ID's, menu and drinks options are currently available, how’ niany client-food-drink triples can still be encoded? A512. B 256, C64 D128. 37. A sofiware application provides resources identified to mostly self-contained subtasks. with explicit interfacing for use of, services and resources. The best desi to use is: A Services design, B_ Modular design, C Top-down design. D Bottom-up design, vices and, strategy 38. Analgorithm initially sets variables rand) 10 and 0. 1f 22 itthen subtracts 3 from rand adds 210 s, and repeatedly does so until r White box testing. C Integration testing. D Acceptance testing. STOP GO BACK AND CHECK YOUR WORK

You might also like