Welcome to your COMPUTER SCIENCE PAPER 1 2024
1. It uses the same instruction sequences o process in the same way large amounts of data streamed to it. At best it must be
2. Suh has data to process, at the same time, on powerful machines in various parts of the world. It is best he does this on a(n):
3. We seek it for long-term storage, temporary storage for executing instructions and data, and for sheer bulk. It is a:
4. What is the result of the following in ones complement notation? +10 110 001 – 10 001 010
5. Which of the following circuits corresponds to a reexpression of the Boolem formula?¯("(A .B )+A .B ?" )
6. Which of the following corresponds to the truth table adjacent?
7. What guides the machine on how to execute any instructions given it?
8. A machine CPU takes arguments for its binary operations from the accumulator. It surely is a:
9. In indexed mode addressing of machines:
10. It is used for work, for teaching and learning, without preliminary training, for instant feedback and suitable displays. it must be a(n)
11. It is good at repetitive tasks, a good replacement for humans in hostile environments. It must be
12. It is good for incidents reporting, tracking evolution over time, across distances, and must manage large amount of data
13. In handling data, which of the following is NOT a breach of privacy?
14. Which of the following is a computer threat that affects content owned by another?
15. Which of these terms from the early days of operating systems is most correctly defined?
16. Temporal databases record
17. It enables the independent reuse of program-level functionalities in other programs as they are readied for execution. They are
18. Which of the following compiler phases best work together so that strings of symbols are given the meaning expected of the program when executed
19. Mbu, a system administrator just want to navigate Google earth to locate some information for friends. On the other hand, Ngwe is new to systems administration and wants to learn. It is best for Mbu and Ngwe to respectively use
20. Which of the following makes it easier to swap locally executing code into memory?
21. In what circumstance(s) would it be best to use a shortest job first policy?
22. In which of the following scenarios would normalization NOT be of Help?
23. In relational databases which of the following is true?
24. It allows one to access, update and otherwise manipulate the data found in z DBMS
25. Which of the following is mostly conveniently used to specify the requirements of a program to develop?
26. It is used to make sure that management and others have needed data in tailored and well-presented forms. All in the organization can acquire is skills
27. It lets data from channels go over long distances, before possibly being resent to other devices
28. It lets one forward data to other networks in an internet, no matter how distant they are
29. Bisuh receives data from various parts of the world, in varying quantities and rates and, most critically, only when she is ready to handle the dat. Data transmission must be
30. In relation to database security, which of the following does Not detect or prevent threats
31. She physically realizes the design implementation, security and controls of the database system as well as the maintenance and performance of the operational system. She is certainly a
32. Assuming identifier names are of obvious meanings. The SQL query: SELECT author FROM booklist WHERE published >=5 livesln = ‘kom’
33. Which of the following statements is false? A relation is second normal form (2Nf) if:
34. Computing arithmetic expressions (from left to right) has to check operator precedence such as BEDMAS. To avoid this and execute them in transforming the expression using
35. Which of these data types is least suited to repeatedly process data in the same way?
36. In a small restaurant service, current clients, the day’s menu and drinks options are each given a 4-bit code. If half the client ID’s menu and drinks options are currently available, how many client food drinks triples can still be encodes?
37. A software application provides services and resources identified to mostly self-contained subtasks, with explicit interfacing for use of services and resources. The best design strategy to use is
38. An algorithm initially sets variables r and s 10 and 0. If r≥ it then subtracts 3 from r and adds 2 to s and repeatedly does so until r
39. What are the values of x and y just after h is last called, if its first call is h(10.17)?
40. Two variables in a code fragment can have the same name and be used without confusion because they have different
41. Sina wants to make sure a system software component he updated does not impede the functioning of other existing applications. It is best sina consult the system’s
42. We examine executed code to establish its execution patterns in order to make suitable corrections
43. In complexity theory, a hard problem is/has
44. In computability, the term semi-decidable means that in general at problem
45. It emphasizes the production of a working system that achieves the goals of the software
46. A high-level feature most convenient to use if a value is occasionally changed in implementations of a program is
47. Different components of a task could be executed independently at the same time, though one much fewer processors. For this, we designed a(n)
48. It has entities that interact via clear rules to communicate with each other, and to apply their influences on each other. The best programming language paradigm to use is
49. In programs, it holds values we access and is called by different names. But when we used it to communicate between self contained program units, we must call it
50. We examine software to make sure it conforms to the customer’s specified requirements. It must be