Cape 2 Multiple Choice

Published on June 2016 | Categories: Documents | Downloads: 50 | Comments: 0 | Views: 1007
of 5
Download PDF   Embed   Report

Comments

Content

DINTHILL TECHNICAL HIGH SCHOOL
ADVANCED PROFICIENCY EXAMINATION
COMPUTER SCIENCE
UNIT 2- FURTHER TOPICS IN COMPUTER SCIENCE

PAPER 01
Mock Examination
(April 2010)

Upper Six

Time: 1 ½ hrs

This paper consists of 45 multiple choice questions.

INSTRUCTIONS TO CANDIDATES
Each item in this PAPER has four suggested answers lettered (A), (B), (C), (D).
Read each item you are about to answer and decide which choice is best. Shade
the letter on your bubble sheet that corresponds with your choice.

DO NOT open this examination paper until instructed to do so.
Answer ALL questions.

________________________________________________________________________
Teacher: D. Campbell

© 2010 DTHS IT DEPT.

Page 1 of 5

1.

Which of the following is a stack operation?
A.
B.
C.
D.

2.

What would the queue look like when two
jobs have been printed and two new jobs,
Job7 and Job8 have joined the queue?

Enqueue; push;
Dequeue; pop;
Pop; enqueue;
Push; pop;

A.
Job4

4.

Job4

5.

6.

Job7

7.

Job3

Job6

Job2

Job3

Job4

Rear

The binary search is BEST described as
A. a search of only a section of a given list of
elements
B. a search of un-order elements
C. a search which takes a divide and conquer
approach
D. being very fast when using a very short list

8.

A one dimensional array is shown below.
int array[arraySize] = {1, 2, D, 4, 5};

Which element is NOT valid for this array?
A.
B.
C.
D.
9.

1
2
D
4

What is the index value for the array
element 5 in the array below?

int n[Size] = {1,2, 3, 4, 5};

Which of the following ADTs is PUSH
associated with?

A.
B.
C.
D.

A queue
A stack
A pointer
A variable

5
4
1
0

10. Which of the following expressions is
equivalent to c = c+1?

Refer to the following diagram representing
a queue of jobs waiting to be printed for this
question.
Job4

Job2

Rear

Front

A queue
A stack
A pointer
A variable

Job3

Job6

D.

Which ADT is BEST described as FIFO
structure?

Job2

Job7

Rear
Job7

A queue
A stack
A pointer
A variable

Front

Job6

Front

Which ADT is BEST described as LIFO
structure?

A.
B.
C.
D.

Job5

C.

7
4
6
5

A.
B.
C.
D.

Job8

Rear

Front

What is the value of i at the end of the
pseudocode?

A.
B.
C.
D.

Job7

B.

x = 1;
i = 1;
while (x < 10)
begin
x = 2*x
i= i + 1;
end;

3.

Job6

Front

Refer to the following pseudocode for this
question

A.
B.
C.
D.

Job5

Job5

A.
B.
C.
D.

Job6

c++
c-+
c- c = 1 +1

Rear
11. What is the final value of x when the code int
x; for(x=0; x<10; x++) {} is run?

© 2010 DTHS IT DEPT.

Page 2 of 5

A.
B.
C.
D.

10
9
0
1

B.

const int MAX = 5;
int main ()
{
int numbers[MAX];
int index;

13.

What are three parts of a feasibility analysis?

A.
B.
C.
D.

legal, environmental and political feasibility
political, legal and technical feasibility
technical, political and economic feasibility
economic, legal and technical feasibility

What is the array name?

19. Which one of the following is included in the
software requirements specification?

A.
B.
C.
D.

A. error handling
B. data description
C. functional description
D. performance description

MAX
index
numbers
const int

What is the array size?
A.
B.
C.
D.

14.

18.

C.

Refer to the codes shown below for questions 12 14.

12.

D

identification of current virtual and logical
system(s)
identification of current physical and logical
system(s)
identification of current corporate strategies

20. A software project classifies system entities,
their activities and relationships. The classification
and abstraction of system entities is important.

Not shown
0
5
MAX – 1

Which modeling methodology most clearly shows
the classification and abstraction of entities in the
system?

What data type would be valid for the array?
A.
B.
C.
D.

A.
B.
C.
D.

Characters
Strings
Not specified
Integer

21. Which three non-functional system
requirements are affected by system
architecture?

15. What does the following code do?
stack.push(12);
A.
B.
C.
D.
16.

data flow model
event driven model
object oriented model
entity-relationship model

A.
B.

Cost, security and usability
Security, performance and
maintainability
C.
Usability, maintainability and
performance
D. Performance, security and maintainability
E. Maintainability, cost and usability

Remove the element 12 from list
Add the element 12 to list
Set stack size to 12
Set stack line to run 12 times

Which term is used to describe a software
feature that allows it to have appropriate
user interface and adequate documentation?

22. Which statement about a prototype is true?
A.

A.
B.
C.
D.

It is a functional model of the entire
system.
B. It is the complete untested product ready
for final review by the customer.
C.
It is necessary in order to accurately
verify that the product is progressing in
accordance with requirements
specifications.
D. It is a full-scale model of the entire
system at some partial stage in
development showing the functional form
of the system.

Dependability
Maintainability
Efficiency
Usability

17.

You are auditing current customer practices
potentially amenable to software
application(s). Which should be part of the
audit?

A.

identification of current logical and virtual
system(s)

© 2010 DTHS IT DEPT.

23. What is usability in software engineering?

Page 3 of 5

the ability of the end user to use the
product successfully
B. a measure of the relative effort required
to learn how to use a software product
C. the degree to which the product integrates
with the environment in which it is used
D. a metric that describes the degree to
which a software product meets its
requirements

utilizes these four phases: Planning, Risk
Analysis, Engineering and Evaluation?

A.

24. What is the purpose of a test case specification
in software engineering?
A.

to specify the sequence of actions for the
execution of a test
B. to specify inputs, predicted results, and a
set of execution conditions for a test item
C. to list the test procedures to be performed
on the integration of the software with
hardware
D. to list the specific tests to be conducted on
the integration of each software module
with other modules

A.
B.
C.
D.

30. Which of the following BEST describes a sink
in a DFD?
A. The origin of the data
B. The receiver of the information
C. Place to keep the data for later use
D. A series of steps that manipulate data
31. Which OSI layer signals “all clear” by making
sure the data segments are error-free?
A.
B.
C.
D.
32.

25. In which stage of software development is
codes produced?
A.
B.
C.
D.

Requirements
Implementation
Design
Testing

33.

Requirements
Implementation
Design
Testing

27. Which of the following actually automate the
production of code using information
gathered and produced during one of the
software development phases?
A.
B.
C.
D.

Structured Chart
HIPO chart
CASE Tool
Object Tool

28. What does this symbol
represent in a DFD?
A.
B.
C.
D.

Process
Data store
Real time link
Data flow

29. Which of the following life cycle models

© 2010 DTHS IT DEPT.

Table
Resource
Network
Client

A process of transferring data by placing it
in a temporary working area where another
program may access it for processing at a
later point in time is called
A.
B.
C.
D.

36.

Session layer
Application layer
Presentation layer
Transport layer

A _________________ links two or more
computers together to communicate
and share resources.
A.
B.
C.
D.

35.

Star
Bus
Ring
Token ring

Which layer of the OSI model has the
important role of providing error checking?
A.
B.
C.
D.

34.

Application layer
Session Layer
Transport Layer
Network Layer

Which topology is the easiest to modify?
A.
B.
C.
D.

26. From which phase are deliverables used to
develop system codes?
A.
B.
C.
D.

Prototyping
Spiral
Fountain
Waterfall

Polling
Interrupt
Spooling
Paging

Which layers make up the upper OSI model
layer?
A. Physical, Data link, network

Page 4 of 5

B. Session, Application, Physical
C. Data link, Network, Presentation
D. Session, Presentation, Application
37.

How do SSL-enabled URLs begin?
A.
B.
C.
D.

38.

Which of the following terms describes the
use of disk space to simulate RAM?
A.
B.
C.
D.

39.

Polling
Paging
Buffering
Thrashing

43.

The term used to describe a device that has
the ability to pro-actively signal the
processor as soon as it has completely its I/O
task.
A.
B.
C.
D.

41.

Thrashing
Throttling
Virtual Memory
Buffering

Which of the following terms describes the
retrieval of data from secondary storage in
same-size blocks?
A.
B.
C.
D.

40.

shttp://
http://
https://
hssl://

A.
B.
C.
D.
44.

Polling
Interrupt
Spooling
Buffering

45.

Multiplexing
Multitasking
Dual process
Simplex

Which of the following access methods for
mobile networks uses cellular telephone
systems in the 800-MHz and 1.9-GHz
bands?
A.
B.
C.
D.

In the process management model the term
used to describe a process that is currently
being executed is:

TDMA
CDMA
GSM
HCSD

In the process management model the term
used to describe a process that is queuing
and prepared to execute when given the
opportunity is:

When a device such as a CD Burner is
tasked with writing data to a disc, it would
be a waste of both time and resources to stop
all other programs from running until the
CD Drive had completed its task. As
processors are incapable of doing nothing, it
would instead constantly check whether the
CD Drive had yet completed its task. This
method of checking process constantly is
termed:

A.
B.
C.
D.

A.
B.
C.
D.

A.
B.
C.
D.
42.

An OS that is capable of executing many
processes concurrently is called:

Ready
Running
Blocked
Executed

Ready
Running
Blocked
Executed

© 2010 DTHS IT DEPT.

Page 5 of 5

Throttling
Thrashing
Polling
Bootstrapping

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close