View Kamer

COMPUTER SCIENCE PAPER 1 A/L- 2020

Welcome to your COMPUTER SCIENCE PAPER 1 - 2020

1. Computer organization is how

2. In this classification, each instruction is executed using its own input data, independently of how other instructions get their data. We are using a(n)

3. It is used for long-term storage of information but also as an overflow area for executing programs

4. What is the result of the following in sign absolute notation? 01 110 100 – 01 001 100

5. What is R in the following circuit diagram?

6. It looks for an instruction, uses circuits to interpret it, and then carries out the instruction in a process known as the

7. When the processor receives a signal, it stops what it is doing in order to attend to the request. The mechanism exploited here is

8. The following is true of indirect operand addressing mode

9. Which of the following is NOT true of machine instruction code?

10. Its software directly controls the hardware components in order to carry out tasks they are designed for but, essentially, it acts as a com and is seen as such. It is:

11. We use them to manipulate and disseminate information among individuals and organizations possible over long distances

12. Joe hacked into Dan’s online bank account and withdrew and returned money Dan stole from Jane. Joe accused the account by supplying the information Dan normally gives. Joe commit a computer crime

13. Which of the following controls the aspect the public can see or inquire about you, if stored in a computer system, but allows you to verify or correct the information so stored?

14. Given todays technology and his immediate access to resources all over the world, Ngene says he is a citizen of the world, not just a Cameroonian. We agree with him because

15. Mojoko submitted many programs and their data at a computing centre, to later get her results online. Processing her work mist have required

16. Cloud computing handles resources, data and information in certain ways

17. Certain programs facilitate the construction of other programs, and can be used over again rather than constructed. They are

18. A __________ is used such that correct programs in a source programming language are possibly made more efficient while they are made ready for machine execution

19. Bisi’s computer help desk uses many software platforms. She has to quickly respond to frequently asked question from her clients, so she most probably uses

20. Jobs P1, P2 and P3 need 6, 4 and 2 units of execution time respectively. They arrive at times 1, 4 and 6 as shown below. Which job is completed last if a shortest job first scheduling policy is used?

21. Which of he following is false for segmented paged memory allocation?

22. What Input device might a multi-choice questionnaire writer use to input completed forms into a computer

23. The number -17 translated into an 8-bits two’s complement binary integer is

24. The positivity binary number 10101111 translated into hexadecimal is

25. Two computers of the Von Neumann architecture are

26. Location 600 contains 601, 601 contains 607 and 607 contains 613. What are the contents of register R after the following instruction? (the parentheses indicate indirect addressing) LOAD R, (600)

27. A table in third normal form is one which

28. In mesh topology, relationship between one device and another is

29. The performance of data communications network depends on

30. Which OSI layer has routers?

31. When an entity has the primary key of another entity as an attribute, this creates

32. Which of the following is not the required condition for binary search algorithm?

33. in the database R(a, b, d,e,f) attribute b and d are dependent only on a; e only on d; and f only on d. which of these sets of relations is equivalent to R in third normal form (3NF) if key attributes are underlined?

34. When data goes through a network, data privacy is available when

35. Which data type best holds for processing in the same fashion, the names of a number of plants?

36. How many distinct memory addresses can a processor access if its machine word has 8 bytes?

37. The design strategy that identifies subtasks based on the operations carried out in them to provide a service or feature is known as

38. A binary tree whose every node has either zero or two children is called

39. The post order traversal of a binary tree is DEBFCA. Find out the preorder traversal

40. Which of the following sorting algorithms is of divide and conquer type?

41. Program readability is typically understood to be

42. It is used to observe how values change in memory locations, without altering program instructions, or altering memory locations; during debugging

43. Some programs will always guarantee an answer if there is one, but may run for ever if there is none. Such problems are

44. Algorithm or problems they solve are sometimes describes as a hard or intractable. This is often a measure of

45. Prototyping is a technique that?

46. The space factor when determining the efficiency of algorithm is measured by counting the:

47. To solve a certain problem, some of its procedures are executed on distinct machines, possibly across the world. We designed a(an)

48. The following are in distinct classes of declarative languages

49. Programming languages (PL) functions are designed to return a value: the values returned by PL functions are often passed in other functions or procedures:

50. We examine a program, executing and checking its instructions, so as to establish that it behaves as expected. We are doing