View Kamer

COMPUTER SCIENCE PAPER 1 A/L – 2024

Welcome to your COMPUTER SCIENCE PAPER 1 2024

1. It uses the same instruction sequences o process in the same way large amounts of data streamed to it. At best it must be

2. Suh has data to process, at the same time, on powerful machines in various parts of the world. It is best he does this on a(n):

3. We seek it for long-term storage, temporary storage for executing instructions and data, and for sheer bulk. It is a:

4. What is the result of the following in ones complement notation? +10 110 001 – 10 001 010

5. Which of the following circuits corresponds to a reexpression of the Boolem formula?¯("(A .B )+A .B ?" )

6. Which of the following corresponds to the truth table adjacent?

7. What guides the machine on how to execute any instructions given it?

8. A machine CPU takes arguments for its binary operations from the accumulator. It surely is a:

9. In indexed mode addressing of machines:

10. It is used for work, for teaching and learning, without preliminary training, for instant feedback and suitable displays. it must be a(n)

11. It is good at repetitive tasks, a good replacement for humans in hostile environments. It must be

12. It is good for incidents reporting, tracking evolution over time, across distances, and must manage large amount of data

13. In handling data, which of the following is NOT a breach of privacy?

14. Which of the following is a computer threat that affects content owned by another?

15. Which of these terms from the early days of operating systems is most correctly defined?

16. Temporal databases record

17. It enables the independent reuse of program-level functionalities in other programs as they are readied for execution. They are

18. Which of the following compiler phases best work together so that strings of symbols are given the meaning expected of the program when executed

19. Mbu, a system administrator just want to navigate Google earth to locate some information for friends. On the other hand, Ngwe is new to systems administration and wants to learn. It is best for Mbu and Ngwe to respectively use

20. Which of the following makes it easier to swap locally executing code into memory?

21. In what circumstance(s) would it be best to use a shortest job first policy?

22. In which of the following scenarios would normalization NOT be of Help?

23. In relational databases which of the following is true?

24. It allows one to access, update and otherwise manipulate the data found in z DBMS

25. Which of the following is mostly conveniently used to specify the requirements of a program to develop?

26. It is used to make sure that management and others have needed data in tailored and well-presented forms. All in the organization can acquire is skills

27. It lets data from channels go over long distances, before possibly being resent to other devices

28. It lets one forward data to other networks in an internet, no matter how distant they are

29. Bisuh receives data from various parts of the world, in varying quantities and rates and, most critically, only when she is ready to handle the dat. Data transmission must be

30. In relation to database security, which of the following does Not detect or prevent threats

31. She physically realizes the design implementation, security and controls of the database system as well as the maintenance and performance of the operational system. She is certainly a

32. Assuming identifier names are of obvious meanings. The SQL query: SELECT author FROM booklist WHERE published >=5 livesln = ‘kom’

33. Which of the following statements is false? A relation is second normal form (2Nf) if:

34. Computing arithmetic expressions (from left to right) has to check operator precedence such as BEDMAS. To avoid this and execute them in transforming the expression using

35. Which of these data types is least suited to repeatedly process data in the same way?

36. In a small restaurant service, current clients, the day’s menu and drinks options are each given a 4-bit code. If half the client ID’s menu and drinks options are currently available, how many client food drinks triples can still be encodes?

37. A software application provides services and resources identified to mostly self-contained subtasks, with explicit interfacing for use of services and resources. The best design strategy to use is

38. An algorithm initially sets variables r and s 10 and 0. If r≥ it then subtracts 3 from r and adds 2 to s and repeatedly does so until r

39. What are the values of x and y just after h is last called, if its first call is h(10.17)?

40. Two variables in a code fragment can have the same name and be used without confusion because they have different

41. Sina wants to make sure a system software component he updated does not impede the functioning of other existing applications. It is best sina consult the system’s

42. We examine executed code to establish its execution patterns in order to make suitable corrections

43. In complexity theory, a hard problem is/has

44. In computability, the term semi-decidable means that in general at problem

45. It emphasizes the production of a working system that achieves the goals of the software

46. A high-level feature most convenient to use if a value is occasionally changed in implementations of a program is

47. Different components of a task could be executed independently at the same time, though one much fewer processors. For this, we designed a(n)

48. It has entities that interact via clear rules to communicate with each other, and to apply their influences on each other. The best programming language paradigm to use is

49. In programs, it holds values we access and is called by different names. But when we used it to communicate between self contained program units, we must call it

50. We examine software to make sure it conforms to the customer’s specified requirements. It must be