Allan Dcit 101 - 2023
Allan Dcit 101 - 2023
* STUDENTIDZ
Q UNIVERSITY OF GHANA
b. AND gate y 1
1 1
-
c. NOT gate
d. None ofthe above F
7. The NOR gate is OR gate followed by .........;...............
a. AND gate A1 _ _
. c. NOTgate
b. NAND ga1te
hexadecimal?
’
_
a. 1 ‘
b. 2
c. 3
d. 4
31. Which of the following is NOT a reason why computer scientists _
write binary numbers in
a. Less likely to make a mistake when copying or converting a digit string
b. Easier to convert from binary to hex or vice versa, than from binary to
denary
c. Fewer digits are used to represent any number
d. None of the above
32. Which of the following correctly describes ll\/|l\/lEDlATE addressing mode?
a. the operand contains the address of the value to be used
b. the operand is the actual number to be used
c. the actual address is calculated using two base points
d. none of the above
33. Which of the following correctly describes INDIRECT addressing
mode?
a. the operand contains the address of the value to be used
b. the operand is the actual number to be used
c. the actual address is 'calculated using two base points
d. none of the above
34. The operating system is classified as
a. application software
b. utility software
c. both a and b
d. systems software
35. Which of the following is NOT a resource that is managed by the operating
system
a. Processor
b. l\/lain memory
c. secondary storage _
d. server ·
36. An is an integer that can never be negative and can take only 0 or positive
values.
a. Signed integer
b. Unsigned integer _ ·
c. Signed bytes
d.Range
37. When using sign-and-magnitude representation, which of the following
correctly describes
the effect of the digit in the most significant bit?
a. Os represent negative integers
b. 1s represent positive integers
c. both Os and 1s represent positive integers
d. Os represent positive integers
38. Why are network ca bles twisted?
a. To increase speed
b. To decrease heat
c. To reduce the amount ofdata spent
d. To reduce EIVI interference
39. Attenuation __ the quality of signals in transmission media
a. Boosts ‘
5
‘
b. Red uces 4
~ c. Delays °
·d. T T °
Improves40.
Repeaters _ the quality of signals during transmission
a. Cancels Q 1
b. Regenerates 1l 1 Q Q
c. Delays ·
d. Reduce - 1 —
41. Unguided transmissions are more secure than guided transmission. 1
a. True T
b. False
42. The main types of transmission media are ‘°
l Q
a. Guided and Unguided media
' b. Physical and Automatic
c. Longer and wide A
d. Used in physical links
43. The following are features of aguided media, except
a. Secure Q
b. Low cost _ Q
c. Flexible and lightweight Q4
d. High cost Q Q
1 44. is a layer of material with a lower refractive index that covers the core of a fiber
optic cable. · —
QQ i 4 Q
a. Coaxial
b. Optic ~ 1
c. Cladding
d. Twist Q Q
45. Which of the following is not consideredto be a primary
memorya.
Hard drive
b. Register ·
c. Cache T
_ · d. l\/Iain memory
46. Which ofthe following is considered to be main memory Q Q
a. Hard drive
b. auxiliary storage Q
c. Register Q
d. None of the above Q
4_ 47. Computer memory is organized into a hierarchy ~
T b. False Q Q·
a. True 1
b. False .
c. lt depends on the make ofthe computer Q
d. All of the above ‘ .
48. The fastest memory is furthestaway from the CPU
a. True T
Q
c. It depends on the make of the computer 1
d. None of the above 1 1
Q 49. Which of the following isn’t true about Hard drive?
a. Large storage capacity
b. Slow
6
l
·‘ c. Fast access time V
d. Cheap _
50. The processor has direct access to which of the following
a. Register
b. Hard drive
c. Auxiliary storage
· d. All ofthe above
51. Which of the following may is usually described as volatile memory
a. ROM
b. Hard drive
c. RAM
d. None of the above
52. A memory is said to be volatile because
l of which of the following reasons
a. lt may suddenly explode
b. Switching on power may cause it to lose data
c. It loses data if power is off
d. None of the above
53. Which of the following statements best describes read only memory?
a. lt is non—volatile
l
b. lt is volatile
c. data can read from it only once
d. Options a and c
54. Compared to SRAM which of the following is not true about DRAM
a. Cheap to make
b. Has more capacity per chip
c. lt is made from flip flops
d. Req uires less power to operate
55. A logic proposition is a statement that is .
a. True
l b. False
c. either True of False
d. always true
56. Which of the following are basic Boolean operators
a. AND
b. OR
c. NOT
d. All of the above
57. Not A is True if .
a. A is false
b. A is True and B is True .
c. A is True or B is True ‘
d. All ofthe above
58. A NAND B is True if
a.Ais False and Bis False ~
b. A is False or B is False
c. A is True or B is True but not both of them
d. None of the above
59.
A B X
0 0 0
7 .
~ 0 1 fA 0 I
A _
. A1
1 0 O A
1 1 ·
The truth table above can be said to best describe which of the following? _
a. An OR gate _ A
I
I b. A XOR gate
c. A NAND gate
A
d. An AND gate .
60. A
.
A 6 IA x
O O O A
O 1 a 1 A
1 1 I1 .
1 0 1
The truth table above can be said to best describe which of the following? a I A
a. An OR gate
A
b. A NOR gate ' _
c. A NAND gate
.
d. An AND
A gate ·
61. ’ A A
·
A B x I
. 0 0 T I
‘ 1 ·
O 1 1 .
1 0 1
1 1 I 0
W The truth tabTle above can be said to best describe which of the following?
a. An OR gate A
b. A XOR gate ·
c. A NAND gate
A
A d. An AND gate
A 62. a ‘
A B X
O 0 I 0
0 1
1 A 1 °
·A_ I
0 1
a. AnOR gatel I‘
1 1 O
·
I I
The truth table above can be said to best describe which of the following?
b. A XOR gate
c. A NAND gate T °
_
_
d. An AND gate
63. Which of the is not true about SRAM A °
a. Maintains its power so long as computer is switched on °
*b. It is made from capacitors
c. has shortenaccess times
d. is used to make cachememory
I 64. Which of the following correctly describes principle of locality of reference
a. Recently referenced items are likely to be referenced again in the near future A
b. Items with nearby addresses tend to be referenced close together in time
8
· ~ c. Both options a and b
. d. None of the above
° 65. A device driver is a piece of
a. software
b. hardware
c. Both options a and b
d. None ofthe above
66. Any device connected to a computer requires a device driver to operate it
_ a. True
b. False
c. Applicable only to devices connected to the motherboard
d. Options a and c are correct
67. Which of the following are true about hard disk?
a. Has a number of rlgid platters
b. The surface of the platter is made of ferrous oxide
c. Platters are mounted on a central spindle
d. all of the above
68. Which of the following are true about hard disk?
a. Each platter has a_ read/write head mounted on the arm
‘
b. The surfaceof the platteiriis divided into concentric tracks
c. Tracks are divided into storage blocks- 512bytes
d All of the above
69. Recording density is a factor that can determine disk capacity
a. True ·
b. False
c. Not always
d. None of the above
70. Areal density is a factor that can determine disk capacity
a. True
b. False
c. Not always
d. None of the above
71. The capacity of a disk may be determined using the following relation
C=N=¤<S*T>¤<SP*P
Where N is number of bytes per sector
S is the average number of sectors per track
T is the number of tracks per surface
SP is number of surfaces per platter
P is the number of platters per disk
Given that a disk has the following:
• 512
bytes per sector
• 300
sectors per track on average
— • 20,000
tracks per surface
•
2 surfaces per platter
• 5
platters per disk
What will be the capacity of the disk?
a. 28.6 Kbytes
b. 28.6 l\/lbytes
V c. 28.6 Gbytes
d. 28.6
Tbytes9
~ 72. Which of the following relations is correct I A „ . _ · .
. a. Disk access time = access time —I- data transfer time ‘
b. Disk access time = seek time + data transfer time
c. Disk accessltime = rotational lantency + data transfer time ” _
d. Disk access time = settle time -I- data transfer time D
· V·
73. Data transfer time ls
a. the time required to transfer data between the register and cache
b. the time reqtiired to transfer data between hard drive and auxiliary storage
c. the time required to transfer data between the system and the disk
d. All of the above · ° .
74. Which of the following are true about data transfer time?
a. only internal data transfer rate '
b. Only external data transfer rate
c.
bothaandbd.
none of the agbove
75. This is a code that tells the computer which basic operation it must perform
a. Machine code
b. Operation code ·
c. Language code
d. Software l .
‘ 76. The following are features of an assembly language program except ”
a. Macros l _ —
b. System calls ° .
c. Directives E
d. None of the above
77. A binary code with defined number of bits that comprises an opcode and very often one
operand is known as A
a. Machine instruction code
b. machine codei
c. Operation code
d. Language code . I
78. lmmediate, direct, indirect and indexed are addressing modes for Ioad—ing values into the 4
I register l
a. True .
·
b. False _
79. The opcode operand INC <register> simply means ”
a. Increase the value stored in the register by 1
b. Increase the value stored in the register by 2 .
c. Increase the value stored in the register by 3
d. Increase the value stored in the register by 5
80. System software unlike application software is smaller in size and less interactive
a. True . ,
B. False ;
81. provides the visual interface that enables the user to communicate with the
computer system. . _
a. Operating System ‘
b. Opcode Instructions '
c. The Edsim 51D1 software .
d. None ofthe above ‘
_
82. A program that performs a very specific task, usually related to managing system resources,
10 .
_ supporting users and developers in their work is known as
° a. An application software
b. An operating system .
c. A utility program
d. A program
83.Virus checker and Backup software are utility programs
a. True
B. False
84. Protecting your computer system and the information it contains against unwanted access,
damage, destruction or modification
’
is termed
a. Data security
b. Data protection
c. ownership protection
d. computer security
85. Computer security threats and risks includes
a. Internet and Network attacks
b. Hardware theft
c. software theft
d. All of the above
86. James I\/lole was hired by DCS organisation to break into the organisations computer, James
can be describe as a
a. A script kiddie
b. unethical employee
c. A corporate spy
d. Cyberterrorist
87. A computer program that affects, or infects, a computer negatively by altering the
way the computer works without the user’s knowledge is known as
a. worm
b. Rootkit
c. computer virus
d. Trojan Horse
88. A compromised computer, known as a , is one whose owner is unaware the
computer is being controlled remotely by an outsider.
a. bot
b. botnet
c. zombie
d. virus
89. A is a group of compromised computers connected to a network such as the
Internet that are used as part of a network that attacks other networks
a. bot
b. botnet
c. zombie
d. virus
90. An attribute in one table that refers to the primary key of another table is known as
a. Primary key
b. Foreign key
c. Security key
d. Privacy key
91. In the relational database, an attribute is a column in the relational table
a. False
11
b. True T
‘ ‘
92. The database administrator is a system which uses the Database l\/lanagement System to
customize the database to suit user and programmer requirements.
a. True
b. False ·
93. An attribute or ia combination of attributes for which there is a value in each tuple and th·at ‘
value is unique is known as °
a. Security key _
b. Foreign key 2
. c. Primary key
d. Privacy key ‘
” 94. l\/lember(l\/lemID, lVlemGivenName, BandName), l\/lember in this case is ”
a. An Attribute
b. Atable name 0 . . · _ T .
v
- c. A primary key .
d. A foreign key
. 95. l\/lember(l\/IemlD, lVlemGivenName, BandName), BandName in this case is
a. An Attribute
— ' ” ‘
b. Atable name .
c. A primary key
d. A foreignÄkey
96. The database system is designed to allow multiple entries of the primary key. . Ä
a. True -
· b. False TÄl
97. Primary key ensures entity integrity whereas ensures referential integrity.
T _ a. Security key ·
b. Database; key ~ ' _
_ V
c. Foreign key ·
_ d. Primary key Ä . .
98. A class of fifty students has been assigned to a single tutor. You have been tasked to create
a relational database
; for the above. What will be the appropriate relation between
M the entities
’ T
Student and Tutor
a. one to one ‘
b. many to many · ' ‘
· ° c. many to one ° 5 »
_ . d. one and only one .
Ä 99. Ten buses have; been assigned to transport fifty individuals from Legon to KNUST. lf a
. relational database is needed to store this information, what will be the relationship between
thei two tables T
_ a.onetoone „Ä
b. many to many T
c. many to one l
”
d. one and only one
100. is the; process of arranging a group of data attributes into sensible groupings for
implementation asirelational tables. ‘
· l
Ä a. Relationship
b. ·Normalisation A a
c. Data l\/Iodelling · Ä
d. Data redundancy
12 ‘