0% found this document useful (0 votes)
17 views2 pages

Cosc214 Exam 17 - 18-1

Past questions

Uploaded by

davefx44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views2 pages

Cosc214 Exam 17 - 18-1

Past questions

Uploaded by

davefx44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

BABCOCK UNIVERSITY, ILISHAN-REMO, OGUN STATE ;[

SCHOOL OF COMPUTING.AND ENGINEERING, DEPT. OF COMPUTER SCIE


:Ce .
DEGREE EXAMINATION: SECOND SEMESTER FINAL EXAM 2017/2018 -
· .COSC 214 Introduction to Digital Computer Systems II 3 Credits
·•: l;XAMINE.RS: Dr. (Engr.) Sam Ogunlere
·_ . ·, DATE: April 2018 Total Marks: 60, Time allowed: 2 Hours . . •
INSTRUCTIONS: ·Answer all questions in section A, and any other two questions m section B

QUESTIONS - SECTION A (40 Macks)____n_,- --

field of computing that involves designing software and hardware that_can perfonn actions like
· reasoning, and learning is called what?
· · _ ~ - A small program used to perfonn a specific task, usually related to maintaining a computer is
(V "' (a) Application (b) . -Utility (c) Operating System , (d) System file
\./3· Coinputer
· (a)
system hardware consists of which of the following?
Systen1 tfnfili system software (b)
. \
PowerPom~ ~ xcel _a nd NISz
Offi
ice
(c) Operating System~ Utilities (d) System Umt & Peripherals
~ - The computer Bus-that is used to indicate memory locations generated by the microprocessor bus master is known as
5 Which of the Network topolo-gy is extremely reliable,-market-=proven, but n2t-too expensive to maintain
'\
What technology is behind the first computer that could run ccnrventional computer programs wlth multitas~ g
capability? - (a) VLSI (b) LSI (c) MSI :' (d) SSI \~
A software application used to LQcate and display web pages is called?
a) Web Server b) Web Pages c) hypertext d) Web browser
0 · The BCD number l00J,Ol l0-corresponds to the Binary number of:
\,

.2+ ', t /{, t Q~


\

a) 10010110 b) l l 00000 c) 11100001 d) J 1(~.0100.!_ ·~

( /9. Light pen, Mouse, Projector, External Hard Drive and Scanners are, examples of:
a) Peripherils (b) Utilities (c) Computer Accessories (d) Hard components '
· Collecting-personal infonnation and effectivelY. posing~ anotl\er individual j s a criIB~.Jcnow_!!,~ =_ .
_ ... --~- a) ' &pooli;Ug _ -N'_ _ Spoofing cv ' Identit)Atheft d) Haelcing ' = • - : ~
---~ Wh-;--u~i~ -ci)~tifer; iiaisllie1riiiil~i ~ifu.~"iiili~1icfi~'atte~aieftayntg,r,
(a) A bit (b) A byt_e (c) A kilobyte (d) A megabyte - ·

ut. Who invented the first Electrical Numerical Integrator and Calculator (ENIAC)?
a) , Howard & Aiken (b) Blaise & Pascal (c) Eckert & Mauchly (d) Ada & John
13 : Select all output devices from the list below. '
'\(_ ...i~ -
t-- \)

(a) Plotters, Printers, Mouse, Joystick (b) Monitor, ScannE,- SP.~ak~~t Keyboard "\(_ -\r>J;~
(c) Keyboard, Mouse, Scanner, Joystick (d) Scann~r, Speakers, Plotters, Printers . ~ ' \ I)

An intentionally disruptive program that spreads from program to ~rot am or from disk to disk is kno~n
a) _ Trojan horse b) Virus c) Time bomb d) Worms
~::'\t 1

.. ... .. .. ..... . .. ........translates source code to machine language in batches ·,-t "i
(a) Assembler (b) Compiler (c) ' Interpreter (d) Translator ..\\ V. \ o
Equality comparator is also known as? -·· • , , , ,/ \c '
(a) XOR i ate XNOR gate (c) NOR gate d) NAND gate 0
\ £\
In positive logjc, logic state 1 corresponds to: '
a) Positive yoltage b) higher voltage level c) Zero voltage d) Lower voltage level
In Embedding \ofOEL, if the source data change, destination data changes also?
(a) True :. (b) False
lJ When you sav~ a file as 'plain text', it is stored in what format?
V (a) · TEXT, (b) CHARACTER (c) MACRO ASCII. .::-.:.,.te)~ ,DATA .- i;

- ?o/ An irreversibl~ memory process can be found in which of the following?


J
21.
a) IPRO:M b)
---
PROM c) RAM d) EPROM
The layer that is responsible for ALU in the virtual machine table is known as what?
22. The internal pathway across which data is transferred to and from the processor or to and frotl} memory is called?
(a) Data Bus (b) Control Bus (c) Address Bus .(d) None of these
(
_':«'_ 0JL-- ; /
. 7S ' 0 tf y- I .....------PTO
37
¼
l' I
1-- o
.-.
/DD / 00 I I~ _ t-. \ O
> I
23 . The Dus width ofa Multiple-Board Computer is?
(a) I 6-bit (b) 84-bit (c}_ 64-bit (d) 34-bit
24. The address of the next instruction to be ex.ecuted in Intel Microprocessor is held in a 16-bit of'7
(a) IP (b) IR (c) MAR (d) PC (e) a and d
When results of operation of ALU are still required for further processing, they are temporaril y stored as what
result?
(a) OP CODE (b) INSTR UTION (c) OPERAND (d) DATA
26. A basic memory cell stores how many bits of a computer word?
(a) I • (b) 2 (c) 3 (d) 4 (e) 5 (f) 6
A Network in which resource sharing, process ing and communi cations co~iro1
·~ar~e;;.co~m
~p~i'::et~e~Iy~~~2!!!81!!@ilffi,1~111121illllN-•mm
i~ I!.
called what?
A protocol used to respond to browser requests is called?
(a) TCP/IP b) HTTP c) T ELNET d) FTP
29. The style of physical construction and the layout of the different parts of the computer is known as what?
Convert this decim al number (65 .750)10 to octal number. Ji ) 1 '
(a) 101.5 s (b) 101.6s (c) 101.4s (d) 101.3s
• 31. A multitasking operating system is capable of running multiple program s at once through the technique call ed?
a) · Share tasking b) Time sharing c) Resource sharing d) Networking
32. The technology behind the fastest memory is?
J
(a) l,)RA~ (b) SDRAM (c) SRAM (d) DDRAM
J 3. The most Insidious versions of Computer Crime are:
(a) 1/0 Processing, data Interception (b) Data Manipulation, Input Fraud
(c) Changing Programs, Extended Transaction (d) Stealing Data, Sa~ n
What is the signed number of the 2' s compliment representation of 130?
J) -126 b) -127 c) -128 d) -1 29
A technique used to guarantee that a message has not been tampered with is known as
(a) Secure Electronic Transactions (b) Digital Certificates
(c) Symmetric key encryption techniques (d) Digital signatures
~ 6. What is the alternati ve name to Exclusive OR (XOR) gate? - --· - ,,., •
~ ._J~ _ .::, -How-many..defectivelii ts can_stantlar.d..EC_C..correct2-c- - ~~ - .,..~ - _ t2'.d ' '=' · :_ --..
(a) 1 (b) 2 '(ct 3 0)-- 4 (e) 6 2 q 1 . .1(•ll
.1 10:;..

What is the result of these Binary numbers subtraction in 816 (101 IQ0l-1 I00U 0.) using 2' compliment?
a) . A (b) -A (c) -8 (d) -C (e) -D (f) -E - 13
The storage toe,! in the first generation of computers is: ;
(a) Magnetic drum (b) Tape drive (c) Magnetic tape (d) Hard disk
Which gate can you derive from this logic circuit diagram?
(a) OR (b) AND (c) NAND (d) NOR

SECTION B (20 marks)


I. (a) List th~ three categories in Cloud Computing? (3 Marks)
(b) What r!fe some of the disadvantages of cloud computing? (4 Marks)
(c) Differentiate between DRAM and SRAM (3 Marks)

(a) Why did the successful computer invention follow transistor technologies? (2 Marks) '-------.__ )
Briefly, explain the relationship between the CPU, Cache memory and RAM (3 Marks) \
.,.
(b)
v-1 (c) Descri i e the typical sequential algorithm of how the CPU executes each basic instruction (5 Marks)
.

..J.- /<a) Draw the symbols and construct the truth tables of 2-input AND, OR, & XNOR gates (3-Mar~)
V (b) Com plete the table below bv suoolvi ng the missing three forms for each cell (6 Marks)
HEXADECIMAL DECIMAL OCTAL
S/N BINARY
(a) 74
(b) 1011100
(c) 5BE
139
(d)

(c) What ii the full meaning of the followin g acronym: ASCII ? (1 Mark)

'10

You might also like