2004 CE CS Paper II C Version
2004 CE CS Paper II C Version
COMP STUD
PAPER II
Instructions:
1. Read carefully the instructions on the Answer Sheet and insert the information required (including the
Subject Code) in the spaces provided.
2. When told to open this book, you should check that all questions are there. Look for the words ‘END OF
PAPER’ after the last question.
4. ANSWER ALL QUESTIONS. You should mark all your answers on the Answer Sheet.
5. You should mark only ONE answer for each question. If you mark more than one answer, you will
receive NO MARKS for that question.
A. a mobile phone
B. a graphics tablet
C. a dictionary in a compact disc with videos and sound recorded
D. a desktop computer
3. Which of the following statements about electronic fund transfer systems is not correct?
4. Peter finds that whenever it is raining or there is a storm, his Internet access at home becomes unstable. Which of the
following communication media will cause this problem?
5. Mr. Lee wants to discuss a project with his overseas business partners. Which of the following is most helpful for him to
communicate with his partners?
A. video on demand
B. a search engine
C. teleconferencing
D. file sharing
6. Which of the following is/are the advantage(s) of direct access over sequential access?
A. an increase of 1 byte
B. no change
C. a decrease of 1 byte
D. a decrease of 2 bytes
8. A user uses a computer to edit a document file and download a file from the Internet at the same time. What is the operating
mode of the computer?
A. multi-user
B. batch processing
C. multitasking
D. interactive processing
9. After changing an application in a computer system from batch processing to real-time processing, what will the effect be?
A B C D E
1 Item 1 Item 2 Item 3 Total amount
2 March 1,000 1,500 800
3 April 1,200 1,100 1,000
4 May 1,300 1,200 750
5
She wants to find the total amount of items 1, 2 and 3 in each month. She types a formula in cell E2 and then copies it into
cells E3 and E4. Which of the following formulae does she type?
A. =SUM(B$2+C$2+D$2)
B. =SUM($B2:$B4)
C. =SUM($B2:$D2)
D. =SUM(B$2:D$2)
CODE ITEM
1 A mouse
2 B keypad
3 CD printer
4 5 tablet
5 B scanner
CODE cannot be used as a key field because .
A. CODE in the third record has two characters, which is not the same as others
B. it is more than 1 byte wide
C. the contents of CODE in the second and fifth records are the same
D. the content of CODE in the fourth record is not alphabet
12. Peter and Mary use search engines to find the same information. They end up with different search results. Why?
13. Mr. Ng sends an email to Ms. Cheung. Later he receives a message from the system administrator saying that the mail server
did not send out his email. Which of the following is/are the possible reason(s)?
If only these three figures are used, which of the following figures cannot be made without resizing the figures or inserting
any new figures?
A. B. C. D.
16. A company allows users to download its four software programs P, Q, R and S for free. Users are allowed to use P on a trial
basis, Q with an expiring date, R with limited program functions and S with source code provided for modification. Which
software program is not a shareware program?
A. P
B. Q
C. R
D. S
17. Peter finds that his computer is infected by a computer virus after doing the following actions.
Which of the following actions are most likely to have caused this infection?
(1) Accessing a file stored on a floppy disk given to him by his classmate
(2) Downloading and installing a game from the Internet
(3) Changing the wallpaper of the screen
(4) Opening a text file attached to an email
A. (1) and (2) only
B. (2) and (3) only
C. (3) and (4) only
D. (1) and (4) only
18. The main purpose of implementing a password system for logging onto computer systems is to protect the computers from
.
A. system failure
B. computer viruses
C. anonymous emails
D. unauthorized access
19. In order to protect personal data on the Internet, which of the following actions is most appropriate?
A. Purchasing a legal software package and creating copies for friends to try
B. Accessing a computer system without authorization but not viewing or deleting any files
C. Distributing a large amount of different freeware to friends
D. Converting a legal musical CD into musical files and sharing them on the web
21. works closely with users to evaluate their requirements and to design new information systems for them.
A. A programmer
B. A network administrator
C. A computer technician
D. A system analyst
A. cannot boot up
B. needs to have its battery replaced
C. can still work if the hard disk is formatted
D. can still work if the size of the RAM is enough
25. Which of the following benefits most from adding one or more CPUs in a personal computer?
A. printing documents
B. copying files to a compact disc rewritable (CDRW).
C. sorting records in a database
D. surfing the Internet
26. Which of the following are the advantages of using a bar code reader over a keyboard to input data?
27. In a university, there are many computer networks. Every workstation in each network has a unique 12-bit code as shown
below:
The first 5 bits of the code are used ot identify the networks while the other 7 bits are used to identify the workstations. How
many networks in the university and workstations in each network can the coding method represent?
network workstation
A. 5 7
B. 16 64
C. 31 127
D. 32 128
28. Suppose that n bits are used to represent integers by two’s complement method. If one additional bit (i.e. n+1 bits) is used,
which of the following statements is correct?
30. An operator inputs ‘5 KA 2’ instead of ‘NG KA YI’ in a name field. Which of the following methods can detect this error?
A. Type check
B. Presence check
C. Length check
D. Check sum
31. Generally, how many bytes are required to store the following 17 characters in plain text?
電腦科+資訊科技=電腦與資訊科技科
A. 17
B. 19
C. 32
D. 34
32. Which of the following statements about assemblers, compilers and interpreters is correct?
A. Assemblers translate source programs into machine codes while the other two do not.
B. Assemblers are used in old computer models while the other two are not.
C. Interpreters translate each line of a source program into one machine code instruction.
D. Compilers translate the whole program before program execution.
33. Under normal circumstances, when liquid crystal display (LCD) monitors are compared with cathode ray tube (CRT)
monitors, which of the following statements are correct?
34. Which of the following registers mainly assist the computation of ALU?
36. Referring to the Appendix (List of Commands in Mnemonics), which of the following will be the last register involved in the
execution of the instruction ADD 1000 ?
A. ACC
B. MDR
C. MAR
D. IR
37. A programmer has written a program to computer and print a credit card monthly statement. The programmer finds that the
total amount is not equal to the sum of all individual amounts on the statement. Which of the following errors has/have
happened?
38. Which of the following is/are the reason(s) for using a graphical user interface in an operating system?
39. Mary develops a program and uploads its source code and object program onto her website. She expects that many people are
able to modify the program for their own use. Which of the following types of programming languages and translators are the
most suitable to develop this program?
x = 1;
a[0] = 4;
do
{
a[x] = a[x - 1] + x;
x = x + 1;
}
while ( x < 5 );
printf("%d\n", a[4]);
}
A. 10
B. 14
C. 18
D. 19
a = 18 % 4;
b = 200 / 6;
printf("%d", a + b / 5);
}
A. 7
B. 8
C. 10
D. 17
strcpy(x, "0");
for ( i = 1; i <= 20; i++ )
{
sprintf(s, "%d", i);
strcat(x, s);
}
printf("%d\n", strlen(x));
}
A. 30
B. 31
C. 32
D. 33
strcpy(s, "ABCDEFGHIJ");
strcpy(t, "");
n = strlen(s) / 2;
for ( k = 0; k < n; k++ )
{
strncpy(tmp, s + k, k + 1);
tmp[k + 1] = '\0';
strcat(t, tmp);
}
printf("%s\n", t);
}
A. ABCDE
B. ABCDEFGHIJ
C. AABABCABCDABCDE
D. ABCCDEDEFGEFGHI
int main()
{
int a, b;
a = 5;
b = 10;
func(a, &b);
printf("%d %d\n", a, b);
}
A. 5 5
B. 5 10
C. 10 5
D. 10 10
A. ***+++***+++***+++***
B. +++***+++***+++***+++
C. ***+++*********++++++*******
D. +++***+++++++++******+++++++
z = 0;
for ( x = 1; x <= 10; x++ )
for ( y = x; y >= 0; y-- )
if ( x + y == 4 )
z++;
printf("%d\n", z);
}
A. 2
B. 3
C. 4
D. 5
x = 0;
y = 0;
while ( x <= 13 && !(y == 16) )
{
y = x + y;
x += 2;
}
printf("%d\n", y);
}
A. 0
B. 30
C. 42
D. 56
A. 0
B. 1
C. 2
D. 4
#include, +, -, *, /, ++, --, +=, -=, *=, /=, %=, ==, %, >, <, =, >=, <=, !=, &&, ||, !, sqrt, rand, abs, strcat, strncat, strlen,
atoi, strcpy, strncpy, const, void, return, int, float, char, \0, strcmp, strncmp, true, false, FILE, main, /*…*/, if…else, for,
while, do…while, switch…case…break, break, continue, scanf, printf (%d, %f, %c, %s), \n, \t, fopen, getc, fgets, putc,
fputs, EOF, fclose
Note: Figures in brackets indicate the percentage of candidates choosing the correct answers.