A Level Computer Science Quiz 2020 Part 3

20 Questions

Quiz Description

The study of computers and their architecture that deals with directory of computation or the design of computers. The world is what it is today in terms of technological advancement due to the knowledge acquired from computers and its application.

In paper one of the Advance level GCE examinations, students always face a lot of difficulties because of the similarity among answers and always have a myth that it is almost impossible to have a good grade from this section of the examination. To help students change this mindset and prepare them for any computer science examination.

The quiz is made of 20 questions only. Questions are based on the topics “Data communications and networking, data algorithms and structure etc.

To have more resourceful materials such as this quiz, you can visit our website.

Good luck!!!

1:

When an entity has the primary key of another entity as an attribute, this creates:


Correct
  • 1:
    Parent-Child relationship between the tables that connect them
  • 2:
    Many to many relationships between the tables that connect them
  • 3:
    Network model between the tables that connect them
  • 4:
    A one many relation between the tables that connect them
2:

Which of the following is not the required condition for binary search algorithm?


Correct
  • 1:
    The list must be sorted
  • 2:
    There should be the direct access to the middle element in any sub list
  • 3:
    There must be mechanism to delete and/or insert elements in list
  • 4:
    Direct access to the middle element in any sub list
3:

In the database relation R (a, b, d, e, f) attribute b and d are dependent only on a; e only on d; and f only on d. which of these sets of relations is equivalent to R in third normal form (3NF), if key attributes are underlined?


<p>    In the database relation R (a, b, d, e, f) attribute b and d are dependent only on a; e only on d; and f only on d. which of these sets of relations is equivalent to R in third normal form (3NF), if key attributes are underlined?    </p>
Correct
  • 1:
    A
  • 2:
    B
  • 3:
    C
  • 4:
    D
4:

When data goes through a network, data privacy is available when:


Correct
  • 1:
    Only authorised people can control what information can be gathered or disclosed
  • 2:
    Individuals control what information can be collected or disclosed about them
  • 3:
    A system is always available to perform its intended functions on data
  • 4:
    Only authorised people can access and modify information through a network
5:

Only authorised people can access and modify information through a network


Correct
  • 1:
    Record
  • 2:
    Arrays
  • 3:
    Strings
  • 4:
    Characters
6:

How many distinct memory addresses can a processor access if its machine word has 8 bytes?


Correct
  • 1:
    64
  • 2:
    2^16
  • 3:
    8^8
  • 4:
    2^64
7:

The design strategy that identifies subtasks based on the operations carried out in them to provide a service or feature is known as:


Correct
  • 1:
    Modular design
  • 2:
    Functional design
  • 3:
    Bottom-up design
  • 4:
    Top-down design
8:

A binary tree whose every node has either zero or two children is called:


Correct
  • 1:
    Complete binary tree
  • 2:
    Binary search tree
  • 3:
    Extended binary tree
  • 4:
    Binary tree
9:

The post order transversal of a binary tree is DEBFCA. Find out the preorder transversal.


Correct
  • 1:
    ACBEDF
  • 2:
    ACBDFE
  • 3:
    ACBDEF
  • 4:
    ACBFDG
10:

Which of the following sorting algorithms is of divide-and-conquer type?


Correct
  • 1:
    Bubble sort
  • 2:
    Insertion sort
  • 3:
    Quick sort
  • 4:
    Algorithm
11:

Program Readability is typically understood to be:


Correct
  • 1:
    The comments and program instructions in a source code
  • 2:
    The manual that shows people how to run the program
  • 3:
    The book that explains to users the program’s features and how they work
  • 4:
    The document that describes how the program was constructed
12:

It is used how values change in memory locations, without program instructions, or altering memory locations; during debugging


Correct
  • 1:
    Breakpoint
  • 2:
    Watchpoint
  • 3:
    Trace point
  • 4:
    Print statement
13:

Some programs will always guarantee an answer if there is one, but may run for ever if there is none. Such problems are:


Correct
  • 1:
    Uncomputable
  • 2:
    Partially computable
  • 3:
    Undecidable
  • 4:
    Semi-decidable
14:

Algorithms or problems they solve are sometimes described as hard or intractable. This is often a measure of:


Correct
  • 1:
    How much time a human need to produce the program
  • 2:
    How much time a computer needs to execute the program
  • 3:
    How complex a program can be a programmer
  • 4:
    How complex a program can be a computer
15:

Prototyping is a technique that:


Correct
  • 1:
    Permits one to design software quickly
  • 2:
    Allows software to be quickly adapted to a user’s needs
  • 3:
    Allows developers to better understand a user’s needs
  • 4:
    Allows people to start using software before their complete implementation
16:

The space factor when determining the efficiency of algorithm is measured by counting the:


Correct
  • 1:
    Maximum memory needed by the algorithm
  • 2:
    Minimum memory needed by the algorithm
  • 3:
    Average memory needed by the algorithm
  • 4:
    Maximum disk space needed by the algorithm
17:

To solve a certain problem, some of its procedures are executed on distinct machines, possibly across the world. We designed a(an):


Correct
  • 1:
    Parallel algorithm
  • 2:
    Distributed algorithm
  • 3:
    Internet algorithm
  • 4:
    Serial algorithm
18:

The following are in distinct classes of declarative languages:


Correct
  • 1:
    Logic and functional programs
  • 2:
    Applicative and functional programs
  • 3:
    Applicative and object-oriented programs
  • 4:
    Object-oriented and logic programs
19:

Programming language (PL) functions are designed to return a value; the values returned by PL functions are often passed in other function or procedures:


Correct
  • 1:
    As output
  • 2:
    As parameter
  • 3:
    By value
  • 4:
    By reference
20:

We examine a program, executing and checking its instructions, so as to establish that it behaves as expected. We are doing:


Correct
  • 1:
    Black box testing
  • 2:
    White box testing
  • 3:
    Code inspection
  • 4:
    Program review

Feature Image

A Level Computer Science Quiz 2020 Part 3