0% found this document useful (0 votes)
25 views

computer science paper1 2022

This document is an examination paper for Computer Science, consisting of multiple-choice questions covering various topics such as computer devices, operating systems, network security, and HTML coding. Candidates are instructed to answer all forty questions, with each correct answer scoring one mark. The exam is timed for one hour and includes specific instructions for completing the answer sheet.

Uploaded by

tzvidza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

computer science paper1 2022

This document is an examination paper for Computer Science, consisting of multiple-choice questions covering various topics such as computer devices, operating systems, network security, and HTML coding. Candidates are instructed to answer all forty questions, with each correct answer scoring one mark. The exam is timed for one hour and includes specific instructions for completing the answer sheet.

Uploaded by

tzvidza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

.

GWERU DIOCESE

COMPUTER SCIENCE 4021/1

PAPER1 Multiple Choice END OF TERM EXAMINATION


SESSION

Time 1 hour

INSTRUCTIONS TO CANDIDATES

Do not open this booklet until you are told to do so.

Write your name on the answer sheet in the spaces provided

There are forty questions in this paper .Answer all questions. For each
question, there are four possible answers, A, B, C and D. Choose one you
consider correct and record your choice.

Read very carefully the instructions on the answer sheet

INFORMATION FOR CANDIDATES

Each correct answer will score one mark. A mark will not be deducted for a
wrong answer
1. Devices which are used to receive data from central processing unit are classified as
A. output/input devices
B. digital devices
C. signalled devices
D. output devices

2. Modern computers are all based on digital technology. This means that the data is
A. handled by varying the electrical voltage
B. stored as a set of decimal numbers
C. always stored using ASCII code
D. handled as on/off electrical signals

3. The octal equivalent of 1100101.001010 is


A. 624.12
B. 145.12
C. 154.12
D. 145.21

4. The 2’s complement of 15 is


A. 0000
B. 0100
C. 0001
D. 0010

5. The output ‘Y’ of the given logic diagram is

A. Y = (A + B) C
B. Y = AB + C
C. Y = A + B + C
D. Y = A + BC

6. A small computer is used in car to show how far the driver can expect to go before
needing to refuel. This type of computer system is
A. process control
B. a simulation
C. embedded system
D. interactive

7. A workstation is connected to a network by


A. a network Interface card
B. a hub

2
C. a switch
D. a router

8. Which of these devices allow many computers to connect to a server’s network


interface card?
A. router
B. switch
C. modem
D. bridge

9. A company provides its users with a network that can be accessed from all its offices
Worldwide. This network is called
A. LAN
B. MAN
C. WAN
D. an Intranet

10. When a user on a network prints a file, it goes into print queue just before printing.
Where is this queue held?
A. on the server’s hard disk
B. in the server’s RAM
C. on the client’s hard disk
D. in the client’s RAM

11. Which one of the following errors will be handle by the operating system?
A. lack of paper in printer
B. connection failure in the network
B. power failure
C. all of the mentioned

12. Whenever a process needs I/O to or from a disk it issues a ______________


A. system call to the operating system
B. a special procedure
C. system call to the CPU
D. all of the mentioned

13. An operating system lets the user group files together for convenience. This kind of
group is called
A. a sector
B. a cluster
C. a directory
D. a block

3
14. Which of these situations is most likely to require scheduling from the operating
system?
A. real time
B. single user
C. single program
D. multi-tasking

15. ________are the rights of the owner of information to decide how much information is
to be exchanged, shared or distributed.
A. Computer Ethics
B. Intellectual property rights
C. Cyber law
D. labour law

16. The security that is provided to protect a network from unauthorised access and risks
is called
A. copyright
B. firewalls
C. network security
D. patents

17. A network security system that manages and regulates the network traffic based on
some protocols is called
A. network security
B. integrity
C. internet security
D. firewalls

18. _______ means data is protected from unauthorised changes to ensure that it is correct
and reliable.
A. privacy
B. security
C. integrity
D. defence

19. Computer simulations are sometimes used to predict the performance of a real life
situation, such as the crush behaviours of cars. One reason for using computer in this
way is
A. computer-generated results are likely to more reliable
B. you can be sure that all relevant factors are taken into account
C. more variables can be investigated at the same time
D. much greater precision is possible

20. A biologist uses a computer to model the growth of an insect population.The main
advantage of using computer modelling in this case is

4
A. the results are likely to be very accurate
B. there are very few variables to take into account
C. more generations can be tested in a limited time
D. results will always be the same

21. Primary tool used in structured design is a


A. structured chart
B. data flow-diagram
C. program flowchart
D. module

22. The approach used in top-down analysis and design is


A. To identify the top level functions by combining many smaller elements into a
single entity
B. to prepare flow charts after programming has been completed
C. to identify top level function and then create a hierarchy of lower level modules and
components
D. all of the above

23. Which of the following is not a factor in the failure of the systems development
project?
A. size of the company
B. inadequate user involvement
C. failure of systems integration
D. continuation of the project that should have been cancelled

24. A problem’s______will answer the question, What information the computer will need
to know in order to either print or display the output times?
A. input
B. output
C. processing
D. purpose
25. An ___ is defined as a set of well-defined instructions used to accomplish a particular
task.
A. algorithm
B. function
C. program
D. Procedure

26. A ___ is a compact, informal, and environment-independent description of a


computer programming algorithm.
A. stack
B. queue
C. psuedocode
D. non-linear data structure

5
27. In a flowchart, an input or output instruction is represented by _____?
A. a diamond
B. a rectangle
C. a parallelogram
D. a circle

28. The variable that does not change the value during the execution of a program is called
A. numeric
B. string
C. constant
D. none of the above

29. The function procedures are _______ by default


A. public
B. private
C. protected
D. both A and B

30. Variables are named storage locations in memory, the value of which does not change
during program ______
A. debug
B. design
C. execution
D. all of the above

31. The code in an application can be broken into logical components by ____ process.
A. modular
B. procedural
C. partitioning
D. declaration

32. Each of data files has a _______ that describe the way the data is stored in the file.
A. file structure
B. records
C. fields
D. database

33. The relational model uses some unfamiliar terminology. A tuple is equivalent to a
A. record
B. field
C. file
D. database

34. A number of related records that are treated as a unit is called


A. file
B. field
C. data
D. batch

6
35. A recursive relationship is a relationship between an entity and
A. itself
B. a sub entity
C. an instance entity
D. an archetype entity

36. Data security threats include


A. hardware failure
B. privacy invasion
C. fraudulent manipulation of data
D. all of the above

37. In SQL, which command is used to add a column/ integrity constraint to a table
A. ADD COLUMN
B. INSERT COLUMN
C. MODIFY TABLE
D. ALTER TABLE

38. What is the correct HTML code for inserting an image?


A. <img>image.gif</img>
B. <img href=”image.gif/>
C. <img src=”image.gif”>
D. None of the above

39. To add a plain color background to your web page, use which of the following?
A. <body bgcolor= “36,24,35”>
B. <body color= “# FF000”>
C.<body bgcolor= “# FF000”>
D. All of the above

40. What is the correct HTML for creating a hyperlink?


A. <a>https://w.w.w.gkseries.com</a>
B. <a name=”https://w.w.w.gkseries.com”> Gkseries.com</a>
C. <a url=”https://w.w.w.gkseries.com> Gkseries.com</a>
D. <a href=”https://www.gkseries.com”> Gkseries.com</a>

7
8

You might also like