0% found this document useful (0 votes)
13 views

Lsa Exam

Computer science exams for lowersixth science

Uploaded by

Jiji Slearnd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Lsa Exam

Computer science exams for lowersixth science

Uploaded by

Jiji Slearnd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

SECTION A: MCQ

Instructions: Answer ALL questions

1. Which Network Layer is responsible for

Encryption?

A. Application

B. Transport

C. Network

D. Link

2. Which of these Protocols is found in the

application layer?

A. IP

B. UDP

C. TCP

D. SMTP

3. Which of these Protocols is found in the

transport layer?

A. HTTP

B. SMTP

C. TCP

D. WIFI

4. What type of network is the Internet?

A. WAN

B. PAN

C. Broadband

D. LAN

5. What device sits in the centre of a star network?

A. Switch

B. Brouter

C. Router
D. Hub

6. What does a wireless network use to transmit

data?

A. Radio Waves

B. Microwaves

C. Light

D. Gamma Rays

7. A device that connects LANs together is a…

A. Router

B. Repeater

C. Bridge

D. Switch

8. What is the purpose of encryption?

A. To stop hackers

B. To prevent data from being read in transit

C. To reduce file sizes

D. To route packets of data

9. What is the purpose of a Firewall?

A. To detect viruses on a system

B. To prevent unauthorized connections

coming into and out of a Network

C. To stop students having fun

D. To organize data

10. What is the purpose of Authentication?

A. To prove that a user is who they claim to be

B. To check a password

C. To switch packets of data

D. To stop data being read

11. Which of the following protocols is used by web


browsers to access websites securely?

A. HTTP

B. HTTPS

C. IMAP

D. FTP

12. Which of the following protocols is used to send

emails between servers?

A. HTTP

B. FTP

C. SMTP

D. IMAP

13. Which of the following protocols is used to

transfer files across a network?

A. TCP

B. FTP

C. UDP

D. IP

14. Which data transfer method is the fastest?

A. Copper cabling

B. Fibre Optic cabling

C. Wireless

D. Coaxial cabling

15. What type of address uniquely identifies a

networked device?

A. IP

B. MAC

C. TCP

D. NIC

16. Which of these cannot be used as a method of


identification?

A. Encryption

B. MAC Address

C. Username

D. IP Address

17. Which Network Layer is responsible for

Encryption?

A. Application

B. Transport

C. Network

D. Link

18. What is the correct order of Network Layers?

A. Transport, Network, Application, Link

B. Application, Transport, Netwide, Link

C. Application, Transport, Network, Link

D. Link, Transport, Application, Network

19. What is TCP used for?

A. To send information across the internet in

packets

B. To ensure that information is sent to the

correct computer

C. To send mail across the internet

D. To transmit webpages across the internet

20. Which best explains what happens when a new

device is connected to the Internet?

A. A device driver is assigned to the device.

B. An Internet Protocol (IP) address is assigned

to the device.

C. A packet number is assigned to the device.


D. A Web site is assigned to the device.

21. Which of the following operating system reads

and reacts in actual time?

A. Quick Response System

B. Real Time System

C. Time Sharing System

D. Batch Processing System

22. The essential difference between an operating

system like Linux and one like Windows is that

A. Windows can run with an Intel processor,

whereas Linux cannot

B. Linux is a proprietary whereas Windows is

not

C. There are multiple versions of Linux, but

only one version of Windows

D. Any programmer can modify Linux code

which is not permitted with Windows

23. Which runs on computer hardware and serve as

platform for other software to run on?

A. Operating System

B. Application Software

C. System Software

D. All of the above

24. A traveling agency has a computerized system

whereby reservations can be made online. This is

an example of a (n):

A. Real-time processing system

B. Batch processing system

C. Decision support system


D. Off-line processing system

25. People who coordinate the development of an

information system are referred to as:_____

A. System users

B. System programmers

C. System analyst

D. Systems administrators

26. The number of attributes in a relation is called

A. Cardinality

B. Degree

C. Tuples

D. Entity

27. The turn-around time of a user job is the

A. Time since its submission to the time its

results become available.

B. Time duration for which the CPU is allotted

to the job.

C. Total time taken to execute the job.

D. Time taken for the job to move from

assembly phase to completion phase

28. Validation and verification checks are performed

to ensure

A. Data security

B. Data integrity

C. Data protection

D. Software security

29. Which of the following is designed to control the

operations of a computer

A. Application Software
B. System Software

C. Utility Software

D. User

30. The field that uniquely identifies a record in a

database is called:

A. Foreign Key

B. Primary Key

C. Secondary Key

D. Compound Key

31. Which of the following makes use of real time

processing?

A. Calculation of terminal averages

B. Reservation systems

C. Payroll systems

D. Billing systems

32. A preemptive scheduling algorithm that allocates

time slices to process in memory is

A. Shortest job first

B. Shortest remaining time next

C. Round Robin

D. None of the above

33. When using software, one should make sure to

avoid being a pirate by verifying

A. A digital Certificate

B. That software is virus free

C. The software key

D. The behaviour of the software

34. One of the following is not data compression

software. Identify the odd software


A. WinZip

B. WinRAR

C. WINDRAR

D. ISO

35. Which of the following statements is NOT true

of primary keys?

A. They do not contain blank value

B. They are unique identifiers

C. They are always in text form

D. They may be composed of one or more

attributes

36. Proof reading and double entry are two methods

of ……………?

A. Data validation

B. Data verification

C. Data verification

D. Data encryption

37. Which of the following devices is used to mark

responses to MCQS in the GCE?

A. OMR

B. OCR

C. MICR

D. Barcode reader

38. Which of the following is not a pointing device?

A. Mouse

B. Joystick

C. Track ball

D. Touchscreen

39. Which of the following compact disks can you


buy to store music, delete any song at random

and add more songs to it when you like?

A. CD-ROM

B. CD-R

C. CD-RW

D. FLASH memory

40. A nibble is a combination of?

A. 4 bits

B. 1 bit

C. 8 bits

D. 16 bits

SECTION B

Instructions: Answer THREE questions

You are reminded of the necessity for good English and orderly presentation in your answers. In
calculations,

you are advised to show all the steps in your working, giving your answer at each stage. For your
guidance, the

appropriate mark for each part of a question is indicated in brackets

1. (i) Define the following web terminologies and give an example of each.

a) Web page.

b) Search engine.

c) Browser. (6 marks)

(ii)

a) Give three impacts of computer virus to educational institutions,

b) Suggest two measures that can be taken by a school secretary to protect the computer

from being infected by computer viruses.

c) Give two effects of a virus to a computer system. (7 marks)

(iii)

a) What do you understand by the term multimedia? (1 mark)


b) Give three ways in which the installation of multimedia centres in schools in Cameroon

would affect both teachers and students? (3 marks)

(iv) Give the difference between the following pairs of transmission modes: (3 marks)

a) Parallel and serial.

b) Simplex and full-duplex.

c) Synchronous and asynchronous.

2. i) People who work in front of the computer for long period of time usually expose the selves to some
health

problems:

a.) List and briefly explain two health hazards that directly relates to prolonged usage of computers (2

marks)

b.) What are the necessary actions you would take to prevent/solve the hazards listed above

respectively.(2 marks)

ii) Define the following terms (4 marks)

-Robot

-Videoconferencing

-Virtual reality

-Artificial intelligence

iii) Explain the uses of computers in the following areas (3 marks)

-hospitals – education – multinational cooperatives

iv)

a) Give two reasons why data misuse is mostly carried out in computer system than manual systems (2

marks)

b) State two physical solutions to computer misuse (2 marks)

c) List three malignant computer programs you know of (3 marks)

d) State to possible actions that a computer might pulse to suggest that it is infected by virus (2 marks)

a.) Give the full meaning of the following : ROM, PROM, EPROM, and EEPROM.(4 marks)

b.) Explain the term processing unit and state why it is required (2 marks)

c.) Give the difference between primary and secondary storage listing possible examples in each case (4
marks)

d.) Define the following terms :

- Interrupt and polling (4 marks)

-computer bus lines (2marks)

-cache memory (1 mark)

e.) Briefly Explain the machine instruction cycle (3 marks)

i) State what is meant by the following, giving an area of application:

a.) Optical mark reader

b.) Barcode reader

c.) Storage device (5 marks)

ii.) A common mistake is to assume that 1KB is equal to 1000 bytes, instead of 1024 bytes.

a.) Explain why 1KB is equal to 1024 bytes and not 1000bytes (2 mark)

b.) Determine the storage capacity 2 GB in bytes (2 marks)

c.) Distinguish LCD monitors and CRT monitors (4 marks)

d.) What do you understand by memory, stating two characteristics of memory (4 marks)

e.) List two examples each of memory devices using the following memory technologies (3 marks)

-magnetic storage

-semiconductor storage

-optical storage

5. (i) A hospital uses a multi-user centralized database stored on a database server to allow

staff to access patient data.

a) Define database normalization and give the criteria for a database to be in 1NF. (3 marks)

b) Name the three levels in the three-level architecture of a DBMS. (2 marks)

c) Explain the concurrent update problem which could arise with this multi-user

database. (2 marks)

d) Distinguish between data validation and data verification. (2 marks)

(ii) Giving an example in each case, explain the following terms used in operating systems:

a) Preemptive scheduling / Non preemptive scheduling (2 marks)


b) Multi-user / Multi-tasking (2 marks)

c) Multiprocessing / Multiprogramming(2marks)

(iii) a) Describe the main difference between application software and system software. (1 mark)

b) Name the four types of system software and give one use for each class. (2 marks)

c) Name the type of application software you would use for the following purposes. (2 marks)

• To create, edit and format text-based documents.

• To work with numbers, calculations, charts and graphs.

• To present a lesson in a classroom.

• To produce good news letters and company magazines

You might also like