A Level Computer Science Quiz 2017 Part 3

20 Questions

Quiz Description

Computer science is a dynamic and rapidly growing area that has become an integral part of the world that we live in today. Most people cannot live without the innovations around us today.

However, in the course of its studies, computer science is not an easy subject for most students to handle. Due to its rapidly changing life, students are most often not ready when faced with examination questions. This can be due to the lack of materials, information or the most haven’t attempted questions that are subject related. In our way of helping out, this quiz has been specifically designed for students who wish to test their knowledge and understanding of the subject. Based on the Advanced level syllabus, questions are carefully selected from the topics: “Data management, programming, Computer security and Networking”.

Each of the questions in the quiz has four possible answers and of which only one is correct among the four.For more such quizzes click on more or visit our website to gain more materials.

1:

When a subroutine is called, the address of the instruction following the CALL instruction is sorted in/on the:


Correct
  • 1:
    Stack pointer
  • 2:
    Accumulator
  • 3:
    Program counter
  • 4:
    Stack
2:

In object-oriented programming, an object is


Correct
  • 1:
    One instance of a class
  • 2:
    Another word for a class
  • 3:
    A class with static method
  • 4:
    A method that accesses a class
3:

In general, a low-level language program


Correct
  • 1:
    Makes more system calls than a high level language program
  • 2:
    Makes use of stacks quite often
  • 3:
    Has more lines of code for same program than a high level language
  • 4:
    Gives more accurate results than high level language
4:

In computability theory, a problem is said to be computable if:


Correct
  • 1:
    Any kind of solution can be found
  • 2:
    The problem is a mathematical problem
  • 3:
    The problem has a feasible solution
  • 4:
    The problem is a classical computing problem
5:

When implementing recursive programs we use


Correct
  • 1:
    An implicit program stack
  • 2:
    A programmer-managed stack
  • 3:
    No program stack
  • 4:
    Queues
6:

Prototype refinement is


Correct
  • 1:
    Giving a prototype enough functionality such that it becomes the final product
  • 2:
    Improving a prototype’s functionality so that they are closer to the final product
  • 3:
    Eliminating errors from a conceptual model
  • 4:
    Developing a logical model from a conceptual one
7:

In a mesh topology


Correct
  • 1:
    A computer is connected to all other computers via the internet
  • 2:
    A computer is connected to all other computers with the help of switches
  • 3:
    A computer is connected to all other computers directly
  • 4:
    A computer is connected to all other computers via other computers
8:

Any system generally used for real time applications is known as:


Correct
  • 1:
    An online information system
  • 2:
    An information system
  • 3:
    An information retrieval system
  • 4:
    An embedded system
9:

It is NOT a measure for data security


Correct
  • 1:
    Locking up work premises after work
  • 2:
    Introducing logins and passwords
  • 3:
    Storing data in many places and copies
  • 4:
    Updating a database regularly
10:

It is a computer crime to


Correct
  • 1:
    Publish someone else’s picture on the internet
  • 2:
    Copy someone else’s publication
  • 3:
    Open pornographic website
  • 4:
    Copy copyrighted material
11:

Viruses are an issue of network


Correct
  • 1:
    Reliability
  • 2:
    Feasibility
  • 3:
    Security
  • 4:
    Performance
12:

The number of connections in a full mesh topology that has n devices is given by


Correct
  • 1:
    (n(n-1))/2
  • 2:
    ((n+1)(n-1))/2
  • 3:
    (n(n+1))/2
  • 4:
    ((n-1)(n-2))/2
13:

The main function of a browser is to


Correct
  • 1:
    Compile HTML
  • 2:
    Interpret HTM:
  • 3:
    Decompile HTML
  • 4:
    Transfer HTML
14:

The concept by which we apply existing operations to new data types is


Correct
  • 1:
    Inheritance
  • 2:
    Polymorphism
  • 3:
    Encapsulation
  • 4:
    Prototyping
15:

If the state of a database no longer reflects a real life state the database is supposed to capture, then such a database state is said to be


Correct
  • 1:
    Consistent
  • 2:
    Durable
  • 3:
    Parallel
  • 4:
    Inconsistent
16:

Recursive algorithms use a


Correct
  • 1:
    Divide-and-conquer approach
  • 2:
    Modular approach
  • 3:
    Structural approach
  • 4:
    Hierarchical approach
17:

The benefit of prototyping is:


Correct
  • 1:
    Missing functions of the user can be identified
  • 2:
    Misunderstanding between software developer and user can be identified
  • 3:
    Incomplete or inconsistent user requirements may be detected
  • 4:
    All of the above
18:

A database table is in 3rd normal form if


Correct
  • 1:
    It is in 2nd normal form (2NF) and in 1st normal form (1NF)
  • 2:
    It is in 2NF and all non-key fields depend on all key fields
  • 3:
    It is in 2NF and all non-key fields depends only on the key
  • 4:
    It is in @NF and all non-key fields may depend indirectly on all key fields
19:

Given the relations CLASS (ClassID, Cycle, Teachinghours) and STUDENT (StudentID, ClassID, StudName). What is the possible relation between STUDENT and CLASS?


Correct
  • 1:
    A class must have at least a student
  • 2:
    A student must have a class
  • 3:
    A student may have no class
  • 4:
    A class may have no students
20:

When requirements analysis goes wrong, what could happen?


Correct
  • 1:
    The system may cost more than projected
  • 2:
    The system will become unreliable
  • 3:
    The system may not meet user requirements
  • 4:
    All of the above

Feature Image

A Level Computer Science Quiz 2017 Part 3