View Kamer

COMPUTER SCIENCE PAPER 1 A/L – 2022

Welcome to your COMPUTER SCIENCE PAPER 1 2022

1. Alternative sets of instructions could be used to solve a given problem. To do so quickly, in which of the following classes of machines should you select your machine?

2. Paul invented his job to done on machines when they are available, and to use hardware he could not afford to buy. It was the best he works on a:

3. It is used to provisionally hold bulky data to end from executing program for immediate use or for other processes. It is a

4. What is the result of the following in one’s complement notation? 01 110 101 -01 001 100

5. What is R in the following circuit diagram?

6. Which of the following corresponds to the truth table adjacent?

A

B

C

F

F

F

F

T

T

T

F

F

T

T

T

7. Which of the following must be encodes in a machine’s instruction code?

8. A machine’s CPU takes arguments for its binary operations from a stack. Surely it is a

9. In immediate mode addressing of machines

10. It is said to exploit creativity to satisfy expert users to manage scenarios for profitable outcomes, which could also be recreational. It must be

11. It is a good repetitive task, organizes information for senior management to act one, typically using data from routine daily information. It must be

12. We use them to make sure our love ones are okay, to get information from various parts of the world, and even to track information in organizations

13. In handling data, which of the following is a brench of privacy?

14. Which of the following is a computer threat that affect network availability to authorized users?

15. In the early days of computing, operating systems evolved in the following order

16. Spatial database record

17. Some types of software must be used whenever we use a machine and so set up the environment in which to carry out machine as well as end user tasks. They are:

18. Which of the following compiler phases have ensure the programs instruction components are correctly put together

19. Joe an occasional user of his machine, avoids technical details and works mostly on his programs. Jill manages the technical details of the servers for many people, and often scripts specialised commands. It is the best for joe and jill to respectively use:

20. How does demand paged memory allocation differ from paged and segmented allocation

21. Suppose jobs J1, J2 and J3 require 8,5 and 2 units of time respectively to execute and a first come first served scheduling policy is used.in which order should they arrive in order to ensure the smallest total wait time

22. Which of the following cannot be guaranteed to normalization?

23. In relational databases which one of the following is NOT true?

24. In relation to database integrity, data consistency means the data

25. Which of the following is most conveniently used to describe how data will eventually be treated in executing program units

26. Given the use of computers by employees, which last requires human intervention at the workplace?

27. It encodes data from channels to transmit over possibly long distances, before restoring to respective channels

28. Ngongsu at branch office has to research on a critical project and so must readily get information from organizations she trust. However, she must confidentially communicate her findings to Zoe head office. Overall, they are better off using

29. Data from computer was getting too fast to another, and sometimes too slowly. To harness this problem, Nchang thought the data sent must be;

30. In relation to database access which of the following is correct?

31. For a certain database , the box adjacent shows for each row attributes in the cell column (A) on which those in the right column (B) depend. Which sets of relations are in 3rd normal forms and use all the dependencies. If key attributes are underlined?

Attributes

 A

B

u

V, w, l

w

X, y

z

x

32. Assuming identifier names are of obvious meanings, the SQL query: SELECT dish FROM menu WHERE hotel stars >=3 AND town = Moh

33. In the relation R below each student has a unique Id and email address, a non-unique student name, and letter grades for courses (eseId) he/she took. Which set of relations is equivalent to R in the third normal form (3NF), if key attributes are underlined?

34. In order to print the nodes of the tree beside in ascending numerical order, how should it be traversed?

35. Which data type always requires an index to access it?

36. What input device might a multiple-choice questionnaire writer use to input completed forms into a computer?

37. Joe develops a software application from identified subtasks that have mostly been implemented. He only needs to work out how best to combine them into a working solution. The best design strategy to use is

38. What is the value of p at the end of the algorithm adjacent?

39. Programming languages (PL) functions are designed to return a value. The values returned by PL functions or procedures are returned

40. Semantics of a language describes how:

41. Meh is to set up an environment for students to learn on a given software application . he has to make sure the software runs as expected. It is best Meh consults its:

42. Which of the following is strictly speaking NOT part of debugging?

43. Waterfall model is not suitable for

44. Which of the following sorting algorithms is not divides and conquer type?

45. It helps the software developer’s understanding of what the user wants, some challenges to resolve, and the kind of software delivery to expect. The activity must be

46. Nde implemented sent messages within a program by sorting data memory an stating the order in which instructions are executed. For this task, he surely used a(n):

47. Which of the following is a functional requirement?

48. Which of the following is true about software verification?

49. A function is defined as follows


what is the value of f(-3, -3)?

 

50. We examine a program to make sure each of its components obtains the correct behavior from all the other components it must have