0% found this document useful (0 votes)
37 views7 pages

Document 3

The document contains a past exam for an Introduction to Computing course. It includes 47 multiple choice questions testing knowledge of computing fundamentals like hardware, software, operating systems, networking, security and algorithms.

Uploaded by

zcv6nmdcpg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views7 pages

Document 3

The document contains a past exam for an Introduction to Computing course. It includes 47 multiple choice questions testing knowledge of computing fundamentals like hardware, software, operating systems, networking, security and algorithms.

Uploaded by

zcv6nmdcpg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

UNIVERSITY OF GHANA

1~1~lt
• 87
~-~
(All rights reserved)

COLLEGE OF BASIC AND APPLIED SCIENCE

SCHOOL OF PHYSICAL AND APPLIED SCIENCES

DEPARTMENT OF COMPUTER SCIENCE

B.AlBSc FIRST SEMESTER UNIVERSITY EXAMINATIONS:


201412015

DEPARTMENT OF COMPUTER SCIENCE

CSITI03 - Introduction to Computing


(3 CREDITS)

EXAMINER: GRACE GYAMFUAH YAMOAH (MRS)

TIME ALLOWED: 2 ~HOURS


2

Answer ALL questions in Section A and


any TWO questions in Section B
SECTION A
Answer ALL the Questions in this Section: Each Question Carries 1 Mark [50 Marks]

1. The CPU consists of


a. Input, Output and Processing
b. Control unit, primary storage and secondary storage
c. Control unit; arithmetic logic unit and primary storage
d. input, processing and storage

2. Which of the following is true about primary storage?


a. It is a part of the CPU
b. It allows very fast access to data
c. It is relatively more expensive
d. All of the above

3. Which of the following is the most powerful type of the computer?


a. Main frame b. Super conductor c. Microcomputer d. Super
Computer

4. Software instruction intended to satisfy a user's specific processing needs


are called
a. System Software b. Process Software c. Documentation d.
Application Software

5. Which one of the following can produce the [mal product of machine
processing in a form usable by humans?
a. Storage h. Control c. Input device d. Output device

6. A source program is the program written in .......... language.


a. English b. Symbolic c. High level d. Low-level

7. A collection of 8 bits is called


a. Byte b. Record c. Word d. Nibble

8. Transmission of computerized data from one location to another is called


a. Data transfer h. Data flow c. Data communication d.
Data management

9. Which of the following items is not used in LAN?


a. Computers h. Modem c. Printer d. Cable

10. What device converts computer output into a form that can be transmitted
over a telephone line?
a. Teleport b. Multiplexer c. Concentrator d. Modem

11. Clock speed is measured in a. Bits per second b. Baud c. Bytes d. Hertz

12. A kilo byte is equal to bytes a. 1000 b. 1024 c.2048 d.512


1
Examiner: Grace Gyam!uahYamoah (Mrs)
I.
13. Communication circuits that transmit data in both directions but not at
the same time are said to be operating in which mode?
a. simplex b. half-duplex c. full-duplex d. asynchronous mode

14. A hub is a. a router b. a bridge c. repeater d. all of the previous

15. Which of the following memory is volatile?


a. RAM b. ROM c. EPROM d. PROM

16. Which of the following statement is not true?


a. magnetic core memory, RAMs and ROMs have constant access time
b. magnetic tape is non-volatile
c. semiconductor memories are used as mass memory medium
d. An EPROM can be programmed, erased and reprogrammed by the user
with an EPROM programming instrument

17. The primary purpose of an operating system is


a. to make the most efficient use of the computer hardware
b. to allow people to use the computer
c. to keep system programmers employed
d. to make computers fast.

18. One of the main features that distinguish microprocessor from


microcomputers is
a. words are usually larger in microprocessors
b. words are shorter in microprocessors
c. microprocessor does not contain IIO devices
d. computers are not fully integrated

19. The term" Information Technology" can be summarized as:


a. Computers + Connectivity b. Computers + Network
c. Connectivity + Hardware d. Hardware + Software

20. The OS1 reference model defines the function for seven layers of protocols
a. including the user and communication medium.
b. not including the user or communication medium
c. including the communication medium but not the user
d. including the user but not the communication medium

21. Working of the WAN generally involves _ _ _ _ _ __


a. satellite b. frame delay c. ATM d. user agent

22. Which of the following techniques provides dedicated communication


channel between two stations?
a. switch network b. circuit switching c. packet switching d. none of these

23. End-to-end connectivity is provided from host-to-host in


a . network layer b. session layer c. data link layer d. transport layer

2
Examiner: Grace Gyam!uahYamoah (Mrs)
-:
"
" QO
24. A distributed network configuration in which all datajinfonnation pass
through a central computer is
a. bus network b. star network c. duplex d. multiplex

25. To connect a computer with a device in the same room, you may use
a. a coaxial cable b. a dedicated time c. a ground stationd. all of the above

26. For each instructions of program in memory the CPU goes through a
a. decode - fetch - execute sequence b. execute - store - decode sequence
c. fetch - decode - execute sequence d. fetch - execute - decode sequence

27. Which of the following is the ascending order of data hierarchy


a. bit - byte - record - field - data base - me
b. bit - byte - field - record - me - database
c. bit - byte - me - field - record - database
d. bit - record - byte - field - me - database

28. A microcomputer consists of at least an input unit, an output unit,


microprocessor unit and a _ _ _ _ __
a. stabilizer b. memory unit c. printer d. network

29. Arithmetic Logic Unit


I. perfonns arithmetic operations
II. Stores data
III. Perfonns comparison
IV. Communicate with input devices
Of the above the correct one is
a. I only b. II only c. I and II only d. I and III only

30. The speed at which the CPU processes data is measured in_ __
a. Megahertz b. Gigahertz c. Nanoseconds d. A and B

31. An unauthorized user is a network issue.


a. Security b. Performance c. Reliability d. Monitoring

32. Which topology requires a central controller or hub?


a. Mesh b. Star c. Bus d. Ring

33. Which topology requires a multipoint connection?


a. Mesh b. Star c. Bus d. Ring

34. A television broadcast is an example of transmission.


a. Simplex b. Half Duplex c. Full Duplex d. Automatic

35. _ _ is the protocol suite for th~ current Internet.


a . Tep JIP b. OSI c. UNIX d. HTIP

36. is responsible for the transparent transfer of data between end


points.

3
Examiner: Grace Gyam!uahYamoah (Mrs)
~I
a. Network layer b. Transport layer c. Data link layer d. DHCP

37. The cryptographic scheme in which the same key is used for encryption
and decryption is referred to as _ _ _ _ _ _ __
a. Asymmetric-Key Cryptography b. Symmetric-Key Cryptography
c . Both a & b d. None of the above

38. Both private and public keys are used in creating digital signatures.
a. True b. False

39. Virus replicates itself until they completely fill available resources.
a. True b. False
40. Fiber Optics is an example of guided media.
a. True b. False
41.Wireless or open air space is said to be unguided media because
a. there is no connectivity between the sender
b. sender and receiver are virtually connected
c. there is limited connectivity between the sender and the receiver
d. All of the above.
42. A firewall needs to be __ so that it can grow with the network it protects.

a. robust b. expensive c. fast d.scalable

43. A system that monitors traffic into and out of a network and automatically
alerts personnel when suspicious traffic patterns occur, indicating a possible
unauthorized intrusion attempt is called a (n) _ _ _ _ _ _ __

a .Intrusion Detection System b.firewall c.router d. anti-virus software

44. is to protect data and passwords.


a. Encryption b. Authentication c . Authorization d. Non-repudiation

45. Which of the following are the solutions to network security?


i) Encryption ii) Authentication
iii) Authorization iv) Non-repudiation
a. i, ii and iii only b. ii, iii and iv only c. i, iii and iv onlyd. All i, ii, iii and iv

46 . Communication between computers is achieved by networking computers


together using connecting devices and setting up of rules for communication to
take place. These 'rules' are more appropriately termed as _ _ _ _ _ _....,--

a. Protocols b. Internet c. Rule set d. Browser

47. The idea of cache memory is based on _ _ _ _ _ _ _ _ _ __


a. the property of locality of reference
b . on the heuristic 90-10 rule
c. on the fact that references generally tend to cluster
d. all of the above
4
Examiner: Grace Gyamfuah Yamoah (Mrs)
q2
48. Your boss wants you to connect two of his laptops directly to each other
using their network adapters. What kind of cable should you use?
a. Rolled cable b. Crossover cable
c. Straight through cable d. Patch cable
49. To determine the MAC address of a Windows computer, which of the
following commands should be used?
a. ipconfig b. ipconfig I all
c. ipconfig I release d. ipconfig I flushdns
50. Which of the protocols below is used for sending email?
a. FT~ b. SMTP c. TCP lIP d. HTTP

SECTIONB
Answer only two questions in this section. Each question carries 25 Marks
1. a. The ABC Company requires a network that can support 50 users. Which
networking model would you consider and why? [6 marks]
b. Briefly distinguish between the following:
i. Internet and Network [2 marks]
ii. Router, Switch and Hub [3 marks]

c. i. Write short notes on the following:

• TCP lIP protocol suite [4 marks]


• OSI reference model [5 marks]

ii. Discuss the similarities and differences between the OSI reference
model and the Tep lIP protocol suite. [5 marks]

2. a. You have been contracted as an expert in networking systems to build a


network for about 70 computers in a school's computer laboratory. What are
the factors you would consider in building this network for the said number of
computers? [6 marks]

b. Briefly distinguish between the following:

i. Client-Server Network and Peer-to-Peer Network [4 marks]

ii. Stand-alone OS and Network Operating System (NOS) [4 marks]

c. Encrypt "LASTQUESTION" using the playfair cipher. Keyword is


"LEMONS"[4 marks]

d. With clear sketches and suitable examples, explain the following:

5
Examiner: Grace GyamfuahYamoah (Mrs)
i. Guided media [2 marks]

ii. Unguided media [2 marks]

e. Briefly explain any two modes of interference in signal transmission. [3


marks]

3. a. As an IT manager of Ghana Commercial Bank, convince the management


of the bank why it's necessary for them to network their computers or
branches. [4 marks]

b. Differentiate between Application software and System software. [3 marks].

c. Explain the CIA security goals. [3 marks]

d. Assuming the Ghana Education Service has approached you with a


proposal to establish computer Laboratory for all secondary schools in Accra.
They propose that all the laboratories must be connected to the network so
that they can access information from a central database connected to the
network. You have also been informed that the students v.>ill be using the
computers for basic task such as word processing, e-mail, internet browsing
and typing lessons. They will also be encouraged to program, edit graphic, use
Computer-Aided Design (CAD) tools and work with large database. The
proposed computer has the following specifications: Core 2 Duo (2.33 GHz,
1333 MHz FSB) CPU, 1GB RAM and 320GB HDD.The computer configuration
and type of LAN in all the different schools must be of the same standard.

i. A member of your team suggest that the RAM of the proposed computer
configuration is insufficient based on the task the computers will be used to
performed. If you agree with the suggestion, give your reasons and suggest a
better option with reference to the case study answer the following:

ii. CPUs have cache memory. Explain why the CPU needs the cache memory.

iii. Briefly explain how the cache memory works in the computer

iv. What is the difference between cache memory and RAM?

v. what networking model or architecture can support the connection of the


computers. Explain why and why

vi. What cable can be used as a backbone for the connection?

[15 marks]

6
Examiner: Grace GyamjuahYamoah (Mrs)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy