Welcome to your COMPUTER SCIENCE PAPER - 2023
1. What is the equivalent in hexadecimal representation of the decimal number 973?
2. Machines A and B execute independently. However, B sometimes asks A to stop and attend to certain concerns once it reaches a convenient execution point. What is the best option for machine B to use on A?
3. What are the total addressable lines for a 2M by 16 memory?
4. The logic gate that obtains a similar operation as the sum in the half adder is?
5. It is an advantage of using two’s complement
6. A computer’s type, processor and operating system define its
7. Which of the following corresponds to the truth table below?
A | B | R |
F | F | T |
F | T | F |
T | F | F |
T | T | F |
8. Which of the following best describes machines that must wait for all their data before their instructions could be executed
9. It is not a computer threat linked to loss of security
10. What is the result of the following one’s complement binary arithmetic? 011 111 101 + 110 110 111
11. Processes that are in main memory and are ready and waiting to execute are kept on a list called a(n)
12. Which of the following is/are true of parallel and distributed computing?
13. In the priority scheduling algorithm:
14. Before proceeding with its execution, each process must acquire all the resources it needs. This is described as
15. A technique of temporarily removing in-active programs from the memory of a computer systems is:
16. A problem encountered in multitasking when the process is perpetually denied necessary resources is:
17. One of the following is not a memory performance parameter.
18. Computer systems are comprised of____________
19. Which of the following layers has main functions as data formats, data encryption/ decryption, data compression/ decomposition?
20. Which of the following are media uses in data communication networks?
21. _________ is a technique that is used to unveil more than one call from a single line
22. When a bank offers web self-services to its customers in order to answer their questions, the primary outcome expected is to
23. A trial version of a program is firs implemented, and the version then modified into the desired target program. This approach to program development is best called
24. How many 128 x 8 ram chips are needs to provide a memory capacity of 2048 bytes?
25. A systems administrator ensures that:
26. The attribute, name, could be structured as an attribute consisting of first name, middle initial and last name. this type of attribute is called a
27. It describes instructions to build a database, instructions to manipulate data in a database, and rules and guidelines that ensure that the data used is a accurate and correctly reflects the organization, it must be
28. Ndive Mbua has to recommended a fourth-generation language or software tool to Ngwa Neba who needs to present very detailed company accounting reports to his boss. What should Ndive Mbua suggest?
29. The attribute AGE is calculated from DATE_OF_BIRTH. The attribute AGE is
30. Relations student (ID, Name, subject code, mark) and subject (subject code, subject name, syllabus) hold details of students and subjects, which attribute could serve as both a primary key and a foreign key?
31. A driver can drive three types of vehicles and a vehicle can be driven by any qualified driver. The driver-vehicle type relationship is?
32. Given that the processor is executing a main program that calls a subroutine, after executing the main program up to the CALL instruction, the control will be transferred to the
33. Using a debugger in order to examine a specific instruction that my program might execute, it is best that I use a
34. Bessem misunderstood the notion of computational complexity as;
35. In a programming project, Ngwe designed components called widgets that investigated components called wadgets and drew conclusions about their properties. Which programming language best matches the programming paradigm Ngwe should use?
36. A mathematical model with a collective of operations defined over its values is called
37. Which of the following represents the results of a first pass during bubble sort? Assume passes are from left to right, sorting is in ascending order and the initial data to sort is 25, 10, 30, 35, 25, 20
38. Given a sort which searches through a list to exchange the first element with why elements less than it and when repeats with a new first elements at subsequent position is called:
39. One of the following is NOT true about high level languages
40. What is the value of x at the end of the alogrithm pseudocode?
41. A computer word that has 16 hexadecimal digits of data. How many distinct memory addresses can its processor access?
42. Structured charts are a product of
43. In parallel algorithm design, when two or more processes have sufficient resources to execute but cannot do so because they are waiting for each other tp proceed, the situation is known as a:
44. Software deteriorates rather than wears out because:
45. In software development, writing information into a program code intended for humans to better understand how a program works, how it may be used or why it works is known as:
46. Which of these object-oriented programming features least supports software reuse?
47. A change over method in which the new system is put in place incrementally is called:
48. Parameters x and y of procedure h below are respectively passed by reference and by value, after all the call h(a,b) what values do variables a and b hold?
49. A main technique to make a software package portable is to
50. How many 128 x 8 RAM chips are needed to provide a memory capacity of 1020 bytes?