0% found this document useful (0 votes)
8 views7 pages

Computer System 2023

The document outlines the structure and content of the 2023 National Exam for the Higher National Diploma in Computer Science and Network in Cameroon. It includes general and specific instructions, sections for multiple-choice questions and detailed questions on topics such as assembly language programming, network security, artificial intelligence, human-computer interface, and computer graphics. The exam emphasizes the importance of clear presentation and logical reasoning in responses.

Uploaded by

njieemma42
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
8 views7 pages

Computer System 2023

The document outlines the structure and content of the 2023 National Exam for the Higher National Diploma in Computer Science and Network in Cameroon. It includes general and specific instructions, sections for multiple-choice questions and detailed questions on topics such as assembly language programming, network security, artificial intelligence, human-computer interface, and computer graphics. The exam emphasizes the importance of clear presentation and logical reasoning in responses.

Uploaded by

njieemma42
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 7
REPUBLIQUE DU CAMEROLS REPL BLIC OF CAMEROON Pai Travail Paire Pence Work-Fatherinnd MINISTERE DE L’ENSEIGNEMENT SUPERIEUR MINISTRY OF HIGHER EDUCATION COMMISSION NATIONALE D'ORGAAISATION DE L'EXAMEN NATIONAL COMMISSION FOR THE ORGANISATION OF HIGHER NATIONAL DIPLOMA EXAM (IND) HIGHER NATIONAL DIPLOMA EXAM (HIND) EXAM National Exam of Higher National Diploma 2023 Session Spécialty/option: Computer Science and Network Paper : Computer Systems Duration : 4 hours Credits 6 GENERAL INSTRUCTIONS. You are reminded of the necessity of good English and orderly presentation of your material. Where calculations are required, clearly show your working and be chronological in your answer SPECIFIC INSTRUCTIONS: This paper Is divided into two sections. The questions in all sections are compulsory. SECTION A: MCQs (40 marks) (Each question carries Imk) 1. Each personal computer has a that manages the computer’s arithmetical, logical and control activities. AS Microprocessor =7 /5 fx! gb) Assembler 19 QsSP~>\Ler MIcmng CO“ i fF nay ‘ > c) Microcontroller rod Ps, ) Interpreter’ > ck Purid po ane *2, An example of direct reference of specific location is Ved bea) Segment Address { & & fam cones i pt 1h ' Leord by AbsoluteAddress $2 2 a datvige UTAMbravou! MEME (peelior ct rlomipey Offset ® #2 Leplaramant Won a baie ashva oi o ce Cyeshi HPL lori in cans Mtl Soe fh Memory Ale pour no . as 3, Which is an example of a Borland Turbo Assembler. a) Nasm ag Tasm ¥ °f ©) Gas d) Asm ‘ Page Lof 9 4. The instructions that tell the assembler what to do. a) Executable instructions b) Pseudo-ops ¢) Logical instructions 4) Macros 5. The segment containing data values passed to functions and procedures within the program is . a) Code - b) Data 7 6) Stack d) System 6. To speed up the processor operations, the processor includes some internal memory storage locations, called _ . a) Drives b) Memory ©) Units 4) Registers 7. How many memory locations are required to store the instruction LXTH, 0800H in an 8085 assembly language program? a1 b) 2 93 44 8. The instruction DEC N inform the assembler to a) Decrement the content of N 'b) Decrement the data addressed by N ©) Convert signed decimal number to binary 4) None of the above 9. Select the most appropriate situation for that a blind search can be used. a) Real-life situation b) Small SearchSpace c) Complexgame d) Allof the above Page 2 of 9 35. Each pixel has___basic color components a) Two or three b) One or two ©) Three or four ) None of these 36. Several graphics image file formats that are used by most of graphics system are a) GIF b) JPEG ©) TIFF 4) Allofthese 37. Once a file is saved in JPEG format ,some data is lost a) Temporarily b) Permanently ©) Botha&b ) None 38. Color apparent in subtractive model are the result of a) Amount of Reflected light b) Transmission of light ©) Flow of light 4) None of these 39. The electron beam in a color picture tube is refreshed. video realistic a) 15 times b) 25 times ©) 35 times 4) 45 times 40. Interactive graphics is useful in a) Training pilots b) Computer aided design ¢) Process control d) Allof these times in a second to make’ Page 7 of 9 SECTION B: QUESTIONS-ANSWERS | (60marks) [Assembly Language Programming /I2Mks 1. Different Computer Architectures exist such as X86, MIPS, SPARC, PowerPC, ARM and RISC-V a) What is the full meaning of RISC? (mks) b)_ What is the difference between RISC and CISC? (mks) ©) What is the difference between x86 and MIPS Architecture? (2mks) 4) Why do Assembly language instructions execute faster than high level language instructions? (mk) 2. Explain the following concepts in relation to assembly language. Give an example in each case: a) Opcode b) Operand ©) Instruction 4) Mnemonic (4x0.5 =2mks) 3.+ What will be the values of the registers: eax, ebx, ecx, edx, esp, ebp after the execution of the code fragments below? (mks) SECTION data 1 st SECTION text SECTION text SECTION text LR 4 mov eax. 10 mov ebx. 4 and ebl, eal emp eax. 5 emp ebx, 5 Shl ebl. 1 jnz L1 Ne L3 Mul3 ‘move eal. 1 mov ebl. 0 Mov edx. ebt jmp L2 jmp 14 Mov ecx, 5 u LB ‘mov eal. 0 mov ebl. 1 I. Network Security /A2Mks 1. With the help of examples, give two (3) differences between Passive Attacks and Active attacks. (6mks) 2, What is cryptography? (Qmks) 3. Differentiate between classical and modern eryptography. (4mks) IIL. Artificial Intelligence and Expert Systems /12m| 1. With the aid of real world examples, explain the following concepts a) Artificial Intelligence b) Machine Learning ©) Data Science x1 =3mks) Page B of 9 jons, then the robot is 10. If a robot is able to change its own trajectory as per the external cond. considered as the _ a) Mobile b) Non-Servo c) Open Loop d) Intelligent 11. Among the given options, which is not the required property of Knowledge representation? a) InferentialEfficiency b) Inferential Adequacy ©) Representational Verification d) RepresentationalAdequacy 12. Among the given options, which search algorithm requires less memory? a) Optimal Search b) Depth First Search ©) Breadth-First Search 4) LinearSearch 13. Which rule is applied for the Simple reflex agent? a) Simple &Condition-action rule b) None of the above ©) Condition-action rule 4) Simple-action rule 14, Rational agent always does the right things. a) True b) False 15, Which term describes the common-sense of the judgmental part of problem-solving? a) Values-based b) Critical ©) Analytical 4) Heuristic 16. Which AI technique enables the computers to understand the associations and relationships between objects and events? a) HeuristicProcessing b) Cognitive Science ©) Relative Symbolism 4) Pattern Matching Page 3 of 9 17. hides the true network addresses and is used to intercept all messages entering ap d leaving the network. a) Logic bomb b) Firewall ©) Patches ) Proxy server 18. Which of the following is true about Phishing? a) It is a type of cybersecurity attack that attempts to obtain data that are sensitive like Usernames, Passwords, and more. b) Iti typically carried out by email spoofing, instant messaging, and text messaging. c) a)and b) d) Neither a) nor b) 19. A is a small program embedded inside of a GIF image. a) Web bug b) Cookie ©) Spyware application 4) Spam 20. Which virus spreads in application software? a) Macro virus b) Boot virus ©) File virus 4) Antivirus 21. Cracked Softwares are another source of a) E-mail attack b) Virus attack ©) Trojan Horse 4) Allof these 22. In computing, is a network security system that monitors and control and outgoing network traffic based on predetermined security rules. a) Spyware b) Cookie ©) Spam 4) Firewall Is incoming Page 4of 9 rk a = w Serr Pr Nes ie a of real world examples, logically explain how Artificial Intelligence has portant in the following areas: a) Health sector b) Education ©) Business (3x2=6mks) A Stack and Queue are used in search algorithms in Artificial Intelligence: a) Whatis the difference between a stack and a queue b) List 2 stack operations and 2 queue operations ©) Give 2 real world examples of a stack and 2 real world examples of a queue. (3x2=6mks) Human Computer Interface (HCI) /12Mks Define the term Human Computer Interface (HCI). (imk) With the help of examples, explain three (3) types of HCI (6mks) In HCI, what is loop of interaction? (mk) How is Human Computer Interface (HCI) usefal in speech recognition? (4mks) Computer Graphics and Animation _/JZ2Mks Explain the concept of computer graphics and its importance to modem day society. (4mks) Explain the concept of color theory and its importance to a graphics designer. (4mks) Explain color harmonization and how it is useful in computer graphics. (4mks)

You might also like