A Level Computer Science Quiz 2016 Part 3

20 Questions

Quiz Description

As a computer science student, Curiosity is one of the greatest strengths and tool you can have. It gives us opportunities that we wouldn’t have if we just accepted the results and never asked “why?.

This applies to the study of computers. Most of the inventions and innovations around the world are a product of curiosity. As such, computer science can be defined as computer science is the study of computers, including computational theory, hardware and software design, algorithms and the way humans interact with technology. When a computer scientist receives a problem, they gather information and communicate with computers using programming languages and logic.

In a way to help students keep up their curiosity about computer science about computer science a quiz has been created. This quiz comprises the topics found in the Advanced level syllabus. some of the topics might encounter “Data management, Networking, programming etc.For more inquiry about other materials, you can visit our website and other related quizzes.

1:

A data model is a collection of conceptual tools for describing


Correct
  • 1:
    Data and data relationships
  • 2:
    Data semantics and consistency constraints
  • 3:
    Data, data relationship, data semantics and consistency constraints
  • 4:
    Encryption and decryption
2:

Modify software to respond to changes in its environment is called


Correct
  • 1:
    Adaptive maintenance
  • 2:
    Corrective maintenance
  • 3:
    Pre-emptive maintenance
  • 4:
    Preventive maintenance
3:

The mechanism of deriving a class from another derived class is known as


Correct
  • 1:
    Polymorphism
  • 2:
    Single Inheritance
  • 3:
    Multilevel Inheritance
  • 4:
    Message Passing
4:

An ASCII character is said to be coded in one byte, how many bits are needed to code the word CODING


Correct
  • 1:
    42
  • 2:
    6
  • 3:
    48
  • 4:
    64
5:

For deadlock to occur:


Correct
  • 1:
    There must be mutual exclusion in resource allocation to processes
  • 2:
    There must be hold and wait of resources by processes
  • 3:
    There must be circular waiting
  • 4:
    All of the above
6:

A program that makes one kind of computer act as if it was another kind is called a(n)


Correct
  • 1:
    Virus
  • 2:
    Object code
  • 3:
    Virtual machine
  • 4:
    Source code
7:

The protocol CSMA/CD is used in a


Correct
  • 1:
    Shared media
  • 2:
    Dedicated media
  • 3:
    Giga Ethernet (optic fibres)
  • 4:
    Radio waves
8:

One negative effect of the digital divide is


Correct
  • 1:
    Increase in money laundry
  • 2:
    Rise in unemployment worldwide
  • 3:
    Further impoverishment of the poor
  • 4:
    Hunger
9:

The following transmission media are ranked in increasing order of their transmission rates and effectiveness


Correct
  • 1:
    Optical fibres, UTP Cables, Micro-Waves
  • 2:
    Optical fibres, Micro-Waves, UTP Cables
  • 3:
    Micro-waves, Optical fibres, UTP Cables
  • 4:
    Micro-Waves, UTP Cables, Optical fibres
10:

The rules that governs how entities communicate or interact in a network are


Correct
  • 1:
    Network topology
  • 2:
    OSI model
  • 3:
    Protocols
  • 4:
    Standards and protocols
11:

A network interface card (NIC) is found


Correct
  • 1:
    In every network data terminal equipment (host)
  • 2:
    In the server only
  • 3:
    In the application layer of OSI model
  • 4:
    At the terminal of every transmission media
12:

In Round Robin CPU scheduling as the time quantum increases, the average turnaround time


Correct
  • 1:
    Increases
  • 2:
    Decreases
  • 3:
    Remains constant
  • 4:
    Varies unpredictably
13:

If a computer in a network that shares resources for others to use, is called


Correct
  • 1:
    A server
  • 2:
    A Router
  • 3:
    A Switch
  • 4:
    A Hub
14:

Given the database relation CUSTOMER (CustomerID, Name, Address, Customer-status, customer type)

A suitable primary key for CUSTOMER is:


Correct
  • 1:
    Name
  • 2:
    CustomerID
  • 3:
    Customer status
  • 4:
    Customer-type
15:

A data structure may be considered as:


Correct
  • 1:
    Methods for formatting the components of data input
  • 2:
    A format for organizing and sorting data for algorithmic efficiency
  • 3:
    A representation of data in the computer
  • 4:
    A way of classifying data for better accessibility
16:

An interpreted programming language that works within another application to perform tasks and used by web designers to build interactive features in a web page is known as:


Correct
  • 1:
    Scripting language
  • 2:
    Compiled language
  • 3:
    Machine language
  • 4:
    Mark-up language
17:

In the initial phase (phase 1) of the SDLC, which of the following aspects are usually analysed?


Correct
  • 1:
    Requirements
  • 2:
    Inputs
  • 3:
    Inputs Control
  • 4:
    All of the above
18:

A field in database table that uniquely identifies a record in the table is known as


Correct
  • 1:
    Secondary key
  • 2:
    Foreign key
  • 3:
    Primary key
  • 4:
    Candidate key
19:

A database table is in 2nd Normal form if it is in 1st normal form and


Correct
  • 1:
    All non-key fields depend on a unique key
  • 2:
    All non-key fields depend on all key fields
  • 3:
    Most non-key fields depend on a unique key
  • 4:
    Most non-key fields depend on all key fields
20:

Given that a student must have a class. If class has as primary key ClassID, what foreign key field(s) is (are) found in the entity student?


Correct
  • 1:
    Class
  • 2:
    ClassID, StudentID
  • 3:
    Class cycle
  • 4:
    ClassID

Feature Image

A Level Computer Science Quiz 2016 Part 3