0% found this document useful (0 votes)
22 views12 pages

Allan Dcit 101 - 2023

This document is an examination paper for the BSc Computer Science/Information Technology program at the University of Ghana, covering various topics in computer science. It includes multiple-choice questions on subjects such as databases, logic gates, binary and hexadecimal conversions, and computer memory. The exam is structured to assess students' understanding of fundamental concepts in computer science and information technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views12 pages

Allan Dcit 101 - 2023

This document is an examination paper for the BSc Computer Science/Information Technology program at the University of Ghana, covering various topics in computer science. It includes multiple-choice questions on subjects such as databases, logic gates, binary and hexadecimal conversions, and computer memory. The exam is structured to assess students' understanding of fundamental concepts in computer science and information technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

* STUDENTIDZ
Q UNIVERSITY OF GHANA

(All rights reserved)

BSC COMPUTER SCIENCE/INFORIVIATION TECHNOLOGY FIRST SEMESTER


UNIVERSITY EXAMINATIONS: 2023
DEPARTMENT OF COMPUTER SCIENCE Q
DCIT 101/CSCD 101: INTRODUCTION TO COMPUTER SCIENCE (3 Credits)
Instruction: Attempt ALL questions. Write your answer in the summary table below.
TIME ALLOWED: One and haM(1.5) HOURS
Your answers must be provided in the table below)

Examiner: F.A. Katsriku


‘ 1
Answer ALL questions. Each question carries 1 mark
—. 1. A collection of data designed to be used by different people is called a/an 1 1*
a. Organization ‘
1 b. Database ·
c. Relationship { 1
d. Schema
· 2. What does SQL stand for? 1 1
_
a. Structured Query Language
F b. Structural Querying Language
c. Standard Query Language _
d. Secondary Query Language ·
3. The binary number 10101 is equivalent
1 to decimal number ....................1...........
a. 19
b. 12 ‘ _ M.
y1 1 ·
c. 27 .
d. 21 · 1 1
14. f
The universal gate is ..........................1.....
a. NAND gate F
b. OR gate
c. NOT gate
d. None of the above 4 ‘
5. The inverter is
...................a.
NOT gate
b. OR gate F
c. AND gate
d. None of the above
a. ORgate
6. The inputs of a NAND gate are connected together. The resulting circuit is ......,..............1.....

b. AND gate y 1
1 1
-
c. NOT gate
d. None ofthe above F
7. The NOR gate is OR gate followed by .........;...............
a. AND gate A1 _ _
. c. NOTgate
b. NAND ga1te

d. None of the above {


· 1

8.The NAND gate is AND gate followed by .....................................


F a. NOT gate .
1
b. OR gate {
c. AND gate {
_ d. None ofthe above ·
9. Any digital circuit can be made by the repeated use of .......................................... .„
a. OR gates
_ b_. NOT gates
1
c. NAND gates . „
d. None.of the above _ · .
10. The only function of NOT gate is to ..............Q..................
a. Stop a signal ·
b. lnvert input signal 1
c. Act as a universal gate y
1 2 F ·
• ‘
d. None of the above
_‘ 11. When an input signal 1 is applied to a NOT_gate, the output is ..................................
a. 0
b. 1
c. Either 0 or 1
d. None of the above
12. In Boolean algebra, the bar sign ( — ) indicates .......................................
a. OR operation
b. AND operation
c. NOT operation
d. None of the above
13. A machine cycle refers to F
a. Fetching an instruction V
b. Clock speed
c. Fetching, decoding and executing an instruction
d. Executing and instruction
F 14. The code used to boot up a computer is stored in
a. RAM
b. ROM
c. PROM
d. EPROM
15. In accessing a disk block the longest delay is due to
a. Rotation time
b. Seek time
c. Transfer time
d. Access time
16. Which of the following is/are not part(s) ofthe CPU?
a. ALU
b. The Control unit
c. The Registers
d. System bus
17. What is the eq uivalent in hexadecimal for the decimal number 973?
a. 4BC
b. CB4 ·
c. 6D
· d. 3CD
18. Which of the following is not a type of processor?
a. PowerPC 601
b. Motorola 8086
c. Motorola 68000
d. Intel Pentium
19. What Is the minimum number of bits required to store the Hexadecimal number FF?
a. 2
b. 4
c. 6
d. 16
20. What is a parity bit?
a. It is used to indicate uppercase letters
b. It is used to detect errors
c. It is the first bit in a byte
3
‘ _
Y.
d. lt is the last bit in a byte
_
~ 21. What is the word size of a 8086 processor? ·
“ ‘
· a. 8 bits (
„ b. 16 bits
c. 32 bits (T ·
d. 64 bits ·_
22. The sum of -6 and -13 using 2’s complement addition is
a. 11101101 ( (
b. 11110011 Y
( Y ' Y (
c. 11001100 (
d.
1110001123.
Which one of the following CPU registers holds the address
( of the instructions (instructions
in the program stored in memory) to be executed next?
a. MAR (Memory address register) _
Y i ‘ Y
.
b. MBR (Memory Buffer Register)
c. AC (Accumulator) ‘ (
d. PC (Program Counter) . _ .
24. What are the major components of a CPU?
a. Control Unit, Register Set, Arithmetic Logic Unit ‘
b. Control Unit, Memory Unit, Arithmetic Logic Unit
c. Memory Unit, Arithmetic Logic Unit, Auxiliary Memory
d. Register Set, Control Unit, Memory Unit
25. A denary number system is the same as a decimal number system TRUE or FALSE
— a.'b.
TRUE .
FALSE .
26. The total number of possible digits in a denary
Y number system is
a. 2 ‘
(
b. 8 ~ ( _
c. 16 (
· d. 10
27. How many possible digits are there in a hexadecimal number system?
a. 2 ( . _
b. 8 .
(
c. 16
ad,.
Y
Which of the following steps correctly shows how to convert the following
1028.
00011110101010100
hexadecimal?a. into
Divide the binary into groups of four starting from the left most, write the denary for
each group, convert each denary into its hexadecimal equivalent
b. Divide the binary into groups of four starting from the right most, write the denary for
each group, convert each denary into its hexadecimal equivalent
c. Any of the above steps
d. None of the above (
. 29. lf the denary number 373 is to be converted to a binary representation, how many bits will
· be needed?
a. 2
b. 4 Y ·
9d.
c.
8

· ·- 30. Given that data can only be stored using an integer number of bytes, how many bytes are
required to store the number 373?

hexadecimal?

_
a. 1 ‘
b. 2
c. 3
d. 4
31. Which of the following is NOT a reason why computer scientists _
write binary numbers in
a. Less likely to make a mistake when copying or converting a digit string
b. Easier to convert from binary to hex or vice versa, than from binary to
denary
c. Fewer digits are used to represent any number
d. None of the above
32. Which of the following correctly describes ll\/|l\/lEDlATE addressing mode?
a. the operand contains the address of the value to be used
b. the operand is the actual number to be used
c. the actual address is calculated using two base points
d. none of the above
33. Which of the following correctly describes INDIRECT addressing
mode?
a. the operand contains the address of the value to be used
b. the operand is the actual number to be used
c. the actual address is 'calculated using two base points
d. none of the above
34. The operating system is classified as
a. application software
b. utility software
c. both a and b
d. systems software
35. Which of the following is NOT a resource that is managed by the operating
system
a. Processor
b. l\/lain memory
c. secondary storage _
d. server ·
36. An is an integer that can never be negative and can take only 0 or positive
values.
a. Signed integer
b. Unsigned integer _ ·
c. Signed bytes
d.Range
37. When using sign-and-magnitude representation, which of the following
correctly describes
the effect of the digit in the most significant bit?
a. Os represent negative integers
b. 1s represent positive integers
c. both Os and 1s represent positive integers
d. Os represent positive integers
38. Why are network ca bles twisted?
a. To increase speed
b. To decrease heat
c. To reduce the amount ofdata spent
d. To reduce EIVI interference
39. Attenuation __ the quality of signals in transmission media
a. Boosts ‘
5

b. Red uces 4
~ c. Delays °
·d. T T °
Improves40.
Repeaters _ the quality of signals during transmission
a. Cancels Q 1
b. Regenerates 1l 1 Q Q
c. Delays ·
d. Reduce - 1 —
41. Unguided transmissions are more secure than guided transmission. 1
a. True T
b. False
42. The main types of transmission media are ‘°
l Q
a. Guided and Unguided media
' b. Physical and Automatic
c. Longer and wide A
d. Used in physical links
43. The following are features of aguided media, except
a. Secure Q
b. Low cost _ Q
c. Flexible and lightweight Q4
d. High cost Q Q
1 44. is a layer of material with a lower refractive index that covers the core of a fiber
optic cable. · —
QQ i 4 Q
a. Coaxial
b. Optic ~ 1
c. Cladding
d. Twist Q Q
45. Which of the following is not consideredto be a primary
memorya.
Hard drive
b. Register ·
c. Cache T
_ · d. l\/Iain memory
46. Which ofthe following is considered to be main memory Q Q
a. Hard drive
b. auxiliary storage Q
c. Register Q
d. None of the above Q
4_ 47. Computer memory is organized into a hierarchy ~

T b. False Q Q·
a. True 1
b. False .
c. lt depends on the make ofthe computer Q
d. All of the above ‘ .
48. The fastest memory is furthestaway from the CPU
a. True T
Q
c. It depends on the make of the computer 1
d. None of the above 1 1
Q 49. Which of the following isn’t true about Hard drive?
a. Large storage capacity
b. Slow
6
l
·‘ c. Fast access time V
d. Cheap _
50. The processor has direct access to which of the following
a. Register
b. Hard drive
c. Auxiliary storage
· d. All ofthe above
51. Which of the following may is usually described as volatile memory
a. ROM
b. Hard drive
c. RAM
d. None of the above
52. A memory is said to be volatile because
l of which of the following reasons
a. lt may suddenly explode
b. Switching on power may cause it to lose data
c. It loses data if power is off
d. None of the above
53. Which of the following statements best describes read only memory?
a. lt is non—volatile
l
b. lt is volatile
c. data can read from it only once
d. Options a and c
54. Compared to SRAM which of the following is not true about DRAM
a. Cheap to make
b. Has more capacity per chip
c. lt is made from flip flops
d. Req uires less power to operate
55. A logic proposition is a statement that is .
a. True
l b. False
c. either True of False
d. always true
56. Which of the following are basic Boolean operators
a. AND
b. OR
c. NOT
d. All of the above
57. Not A is True if .
a. A is false
b. A is True and B is True .
c. A is True or B is True ‘
d. All ofthe above
58. A NAND B is True if
a.Ais False and Bis False ~
b. A is False or B is False
c. A is True or B is True but not both of them
d. None of the above
59.
A B X
0 0 0
7 .
~ 0 1 fA 0 I
A _
. A1
1 0 O A
1 1 ·
The truth table above can be said to best describe which of the following? _
a. An OR gate _ A
I
I b. A XOR gate
c. A NAND gate
A
d. An AND gate .
60. A
.
A 6 IA x
O O O A
O 1 a 1 A

1 1 I1 .
1 0 1
The truth table above can be said to best describe which of the following? a I A
a. An OR gate
A
b. A NOR gate ' _
c. A NAND gate
.
d. An AND
A gate ·
61. ’ A A
·
A B x I
. 0 0 T I
‘ 1 ·
O 1 1 .
1 0 1
1 1 I 0
W The truth tabTle above can be said to best describe which of the following?
a. An OR gate A
b. A XOR gate ·
c. A NAND gate
A
A d. An AND gate
A 62. a ‘
A B X
O 0 I 0
0 1
1 A 1 °
·A_ I
0 1

a. AnOR gatel I‘
1 1 O

·
I I
The truth table above can be said to best describe which of the following?
b. A XOR gate
c. A NAND gate T °
_
_
d. An AND gate
63. Which of the is not true about SRAM A °
a. Maintains its power so long as computer is switched on °
*b. It is made from capacitors
c. has shortenaccess times
d. is used to make cachememory
I 64. Which of the following correctly describes principle of locality of reference
a. Recently referenced items are likely to be referenced again in the near future A
b. Items with nearby addresses tend to be referenced close together in time
8
· ~ c. Both options a and b
. d. None of the above
° 65. A device driver is a piece of
a. software
b. hardware
c. Both options a and b
d. None ofthe above
66. Any device connected to a computer requires a device driver to operate it
_ a. True
b. False
c. Applicable only to devices connected to the motherboard
d. Options a and c are correct
67. Which of the following are true about hard disk?
a. Has a number of rlgid platters
b. The surface of the platter is made of ferrous oxide
c. Platters are mounted on a central spindle
d. all of the above
68. Which of the following are true about hard disk?
a. Each platter has a_ read/write head mounted on the arm

b. The surfaceof the platteiriis divided into concentric tracks
c. Tracks are divided into storage blocks- 512bytes
d All of the above
69. Recording density is a factor that can determine disk capacity
a. True ·
b. False
c. Not always
d. None of the above
70. Areal density is a factor that can determine disk capacity
a. True
b. False
c. Not always
d. None of the above
71. The capacity of a disk may be determined using the following relation
C=N=¤<S*T>¤<SP*P
Where N is number of bytes per sector
S is the average number of sectors per track
T is the number of tracks per surface
SP is number of surfaces per platter
P is the number of platters per disk
Given that a disk has the following:
• 512
bytes per sector
• 300
sectors per track on average
— • 20,000
tracks per surface

2 surfaces per platter
• 5
platters per disk
What will be the capacity of the disk?
a. 28.6 Kbytes
b. 28.6 l\/lbytes
V c. 28.6 Gbytes
d. 28.6
Tbytes9
~ 72. Which of the following relations is correct I A „ . _ · .
. a. Disk access time = access time —I- data transfer time ‘
b. Disk access time = seek time + data transfer time
c. Disk accessltime = rotational lantency + data transfer time ” _
d. Disk access time = settle time -I- data transfer time D
· V·
73. Data transfer time ls
a. the time required to transfer data between the register and cache
b. the time reqtiired to transfer data between hard drive and auxiliary storage
c. the time required to transfer data between the system and the disk
d. All of the above · ° .
74. Which of the following are true about data transfer time?
a. only internal data transfer rate '
b. Only external data transfer rate
c.
bothaandbd.
none of the agbove
75. This is a code that tells the computer which basic operation it must perform
a. Machine code
b. Operation code ·
c. Language code
d. Software l .
‘ 76. The following are features of an assembly language program except ”
a. Macros l _ —
b. System calls ° .
c. Directives E
d. None of the above
77. A binary code with defined number of bits that comprises an opcode and very often one
operand is known as A
a. Machine instruction code
b. machine codei
c. Operation code
d. Language code . I
78. lmmediate, direct, indirect and indexed are addressing modes for Ioad—ing values into the 4
I register l
a. True .
·
b. False _
79. The opcode operand INC <register> simply means ”
a. Increase the value stored in the register by 1
b. Increase the value stored in the register by 2 .
c. Increase the value stored in the register by 3
d. Increase the value stored in the register by 5
80. System software unlike application software is smaller in size and less interactive
a. True . ,
B. False ;
81. provides the visual interface that enables the user to communicate with the
computer system. . _
a. Operating System ‘
b. Opcode Instructions '
c. The Edsim 51D1 software .
d. None ofthe above ‘
_
82. A program that performs a very specific task, usually related to managing system resources,
10 .
_ supporting users and developers in their work is known as
° a. An application software
b. An operating system .
c. A utility program
d. A program
83.Virus checker and Backup software are utility programs
a. True
B. False
84. Protecting your computer system and the information it contains against unwanted access,
damage, destruction or modification

is termed
a. Data security
b. Data protection
c. ownership protection
d. computer security
85. Computer security threats and risks includes
a. Internet and Network attacks
b. Hardware theft
c. software theft
d. All of the above
86. James I\/lole was hired by DCS organisation to break into the organisations computer, James
can be describe as a
a. A script kiddie
b. unethical employee
c. A corporate spy
d. Cyberterrorist
87. A computer program that affects, or infects, a computer negatively by altering the
way the computer works without the user’s knowledge is known as
a. worm
b. Rootkit
c. computer virus
d. Trojan Horse
88. A compromised computer, known as a , is one whose owner is unaware the
computer is being controlled remotely by an outsider.
a. bot
b. botnet
c. zombie
d. virus
89. A is a group of compromised computers connected to a network such as the
Internet that are used as part of a network that attacks other networks
a. bot
b. botnet
c. zombie
d. virus
90. An attribute in one table that refers to the primary key of another table is known as
a. Primary key
b. Foreign key
c. Security key
d. Privacy key
91. In the relational database, an attribute is a column in the relational table
a. False
11
b. True T
‘ ‘
92. The database administrator is a system which uses the Database l\/lanagement System to
customize the database to suit user and programmer requirements.
a. True
b. False ·
93. An attribute or ia combination of attributes for which there is a value in each tuple and th·at ‘
value is unique is known as °
a. Security key _
b. Foreign key 2
. c. Primary key
d. Privacy key ‘
” 94. l\/lember(l\/lemID, lVlemGivenName, BandName), l\/lember in this case is ”
a. An Attribute
b. Atable name 0 . . · _ T .
v
- c. A primary key .
d. A foreign key
. 95. l\/lember(l\/IemlD, lVlemGivenName, BandName), BandName in this case is
a. An Attribute
— ' ” ‘
b. Atable name .
c. A primary key
d. A foreignÄkey
96. The database system is designed to allow multiple entries of the primary key. . Ä
a. True -
· b. False TÄl
97. Primary key ensures entity integrity whereas ensures referential integrity.
T _ a. Security key ·
b. Database; key ~ ' _
_ V
c. Foreign key ·
_ d. Primary key Ä . .
98. A class of fifty students has been assigned to a single tutor. You have been tasked to create
a relational database
; for the above. What will be the appropriate relation between
M the entities
’ T
Student and Tutor
a. one to one ‘
b. many to many · ' ‘
· ° c. many to one ° 5 »
_ . d. one and only one .
Ä 99. Ten buses have; been assigned to transport fifty individuals from Legon to KNUST. lf a
. relational database is needed to store this information, what will be the relationship between
thei two tables T
_ a.onetoone „Ä
b. many to many T
c. many to one l

d. one and only one
100. is the; process of arranging a group of data attributes into sensible groupings for
implementation asirelational tables. ‘
· l
Ä a. Relationship
b. ·Normalisation A a
c. Data l\/Iodelling · Ä
d. Data redundancy

12 ‘

You might also like