0% found this document useful (0 votes)
20 views6 pages

CSC 110

There are several key points discussed in the document: - There are 4 main types of loops used in programming: for, goto, do, and while loops. Pseudocode and algorithms are also discussed. - Project management, CAD, plagiarism, memory types, programming tools, compilers, interpreters, assemblers, and common programming languages are defined. - Questions are provided about computer concepts like program development cycles, flowcharts, error types, hardware components, and protocols.

Uploaded by

erewavictor1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views6 pages

CSC 110

There are several key points discussed in the document: - There are 4 main types of loops used in programming: for, goto, do, and while loops. Pseudocode and algorithms are also discussed. - Project management, CAD, plagiarism, memory types, programming tools, compilers, interpreters, assemblers, and common programming languages are defined. - Questions are provided about computer concepts like program development cycles, flowcharts, error types, hardware components, and protocols.

Uploaded by

erewavictor1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CAMBRIDGE TUTORIALS A.K.A DR.

o ELSA – The enhanced industry standard


TERRY, PD AND ESQUIRE’S ARENA architecture.
SALIENT POINTS IN CSC 110 o Project management is a program used to plan,
o There are 4 types of loops: The FOR NEXT schedule and control resources – people, costs and
statement, The GOTO statement, The DO LOOP equipment required to complete a project on time.
statement and The WHILE WEND statement. o CAD – computer aided design
o Pseudo code is a short hand way of describing a o Plagiarism is the expropriation of another writers
computer program. text findings or interpretations and presenting it as
o An algorithm is a finite set of well-defined one’s own.
instructions for accomplishing some task which, o PROM – Programmable Read Only Memory
given an initial state, will result in a corresponding o EPROM – Erasable Programmable Read Only
recognizable end state. It is a sequence of precise Memory
instructions for solving a problem in a finite o EEPROM – Electrically Erasable Programmable
amount of time, Read Only Memory
o Digit means numeral, while digital refers to o Programming tools are a collective name given to
communications. the set of software that aids the user and the
o To transmit your computer’s digital signals over programmer in writing programs, developing
telephone lines you need to use a modem to applications software and in performing some
translate them into analog signals special hardware and software functions related to
o Software flows through the compute’s circuits as programming.
coded pulses of electricity. o A compiler is a program that translates the
o Work stations are used mainly by engineers, instructions of a high level language program to a
scientist, and special effects creators for machine cod before execution. E.g. COBOL
sophisticated purposes. compiler, PASCAL compiler.
o A sever is a central computer that holds o An Interpreter is a high level language program
collections of data and programs for many PCs, translator that translate a line of source program
workstations and other computers, which are instruction and executes it before proceeding to
called cleints. the next line.
o ENIAC – Electronic Numerical Integrator and o An assembler is a special software that translates
Computer assembly language programs into machine code
o UNIVAC – Universal Automatic Computer before program execution.
o ENIAC was the first operational computer in o High level languages include: BASIC, VISUAL
United States in 1946 BASIC, COBOL, C, FORTRAN, PASCAL, etc.
o Connectivity is the ability to connect computers, o BASIC – Beginners All-purpose symbolic
telephones, and other devices to other computers, instruction code.
devices and sources of information. o COBOL – common business oriented language
o Speeds of microcomputers are measured in o FORTRAN – Formula Translator
megahertz (MHZ). o ALGOL – Algorithmic Language
o The speeds of larger computers are measured in o LISP – List Processing
millions of instructions per second (MIPS) and
Floating-point operations per second (FLOPS). RHEMA QUESTIONS IN CSC 110
o Expansion cards are circuit boards that provide 1. In developing an algorithm, which of these is
mix memory or control peripheral devices. not one of the steps you follow (a) identify
o Types of expansion cards include: memory cards, patterns, repetitions and familiar task (b) carry out
video adapter cards, graphics accelerator cards the plan (C) understand the problem (d) device a
e.t.c. plan (e) coding the plan.
o ISA – The Industry Standard Architecture Bus 2. Analysis, design, coding and execution are
o PCI – The Peripheral Component Interconnect stages of (a) program development cycle (b)
Bus constructing a program flows chart (c) building an
algorithm (d) documentation and maintenance (e) 13. To get internet access for mobile phones, the
none of the options listed protocol used is (a) TCP/IP (B) WAP (C) FTP (D)
3. Which of these is used to represent the PPP (E) SLIP
logical relationship of computer routines within 14. None but one of these is used by architects to
inputs, master files, transaction files and outputs show clients the preview of a building and
(a) program flowchart (b) run flowchart (c) landscapes? (A) telecommuting (b) computer
system flowchart (d) programming flowchart (e) modeling (c) command and control (d) virtual
none of the above meeting (E) computer aided design.
4. Which of these is a product identification 15. None but one of these is used by architects to
code that contains a set of vertical lines and spaces show clients the preview of a building and
(a) optical mark code (b) barcode (c) QR code (d) landscapes (a) telecommuting (b) computer
magnetic ink code (e) none of the options modeling (c) command and control (d) virtual
5. Converting 5128 to binary gives (a) reality (e) computer aided design
10010100102 (b) 1010010002 (c) 1000101002 (d) 16. Which of these is not an application of
101001010002 (e) 10001012 ANS = 100000110 computer in medicines (a) tele-surgery (b) tele-
6. Which of these errors is the most difficult to prognosis (c) tele-diagnosis (d) tele-pathology (e)
detect (a) compilation (b) execution (c) run time none
(d) logical (e) syntax 17. Simplification of learning through songs and
7. Which part of the operating system is also animation is known as (a) child learning (b) close
called the master program (A) control program learning (c) distance learning (d) edutainment (e)
(B) chief program (c) main program (d) key open learning
program (e) special program 18. An executable program produced through
8. Which of these order of sections in module object interaction occurs through (a)
pseudocode is correct (a) body, header, compilers (b) linkers (c) anitivirus (d) interpreters
declaration, termination (b) body, declaration, (e) utility programs
header, termination (c) declaration, body, 19. Which of these is FALSE (a) EEPROM
termination, header (d) header, body, declaration, means Erasable Electrically programmable read
termination (e) header, declaration, body, only memory (b) DRAM means to be refreshed
termination thousands of times per second (c) EPROM means
9. Which of these is an error in logic or Erasable programmable read only memory (d)
arithmetic that must be detected at run time (a) The UNIVAC was the first commercial computer
logical error (b) compilation error (C) syntax error (e) the development of integrated circuits was the
(d) syntax and logical errors (e) semantic error hallmark of the third-generation computers
10. Which of these units will resolve the 20. Which of the following looks like ball pen
following expressions x-y = x+1? (A) system unit but uses pressure instead of ink to write test and
(b) memory (c) registers (d) CPU (e) control unit draw lines (a) stylus (b) graphic tablet (c) light
11. What is the difference between a camera and pen (d) joystick (e) trackball
a webcam (a) all the options listed are correct (b) 21. Which of these is NOT true (a) Gopher is a
cameras are always wireless components while protocol that governs the transfer of hypertext
webcams are not (c) webcams are peripheral between two or more computers (b) telnet is a
devices while camera are not (d) webcams are protocol that enables one computer to connect to
web browser input compartments while cameras another computer (c) high level languages are
are not (e) cameras are input devices while machine independent (d) TCP/IP is a collection of
webcams are not protocols that govern the way data travels from
12. Education that is delivered with tutor and one machine to another across networks (e)
learner geographically dispersed is (a) M-learning systems software enables computers perform
(b) distance-learning (c) E-learning (d) sandwich essential operating tasks
studies (e) corresponding learning. 22. All but one of the following is true (A)
ENIAC means electrical numeric integrator and
calculator (b) PROM is a memory chip which is
manufactured blank on which data can be written 31. Which of these possibly is an advantage of
only once (c) the analog computer represents data using office suit (a) all the options listed (b) the
in physical quantities and operates on the data by package is free (c) the package is easy to obtain
manipulating the quantities (d) registers are found (d) they are universal across all platforms (e) the
in the control unit and the ALU (e) transistors possibility of file sharing.
replaced vacuum tubes and ushered in the second 32. Which of these software’s under Microsoft
generation of computers office suit support file sharing (a) graphic design
23. All but one is an example of a syntax error (b) communication software (c) spreadsheet (d)
(a) data mismatch (b) missing apostrophe (c) use internet browser (e) word processor
of reserved words as variables (d) unbalanced 33. Which of these can handle sequential
parenthesis (e) use of keywords as variables. program line interpretation (a) system unit (b)
24. What type of error occurs when you enter a memory (c) registers (d) CPU (e) control unit
wrong salary scale when computing the payroll of 34. Which of the following is executed by the
a worker (a) logical error (b) execution error (C) BIOS (a) all the options listed (b) load operating
compilation error (d) run time error (e) syntax system (c) load application software (d) none of
error the options listed (e) memory text
25. Finding the square root of a negative number 35. The octal equivalent of 1100101.0010102 is
is an example of (A) run time error (b) syntax (a) 624.2 (b) 154.12 (c) 145.12 (d) 145.2 (e)
error (c) compilation error (d) logical and 624.12
compilation error (e) logical error 36. Memories in which any location can be
26. Which of these is NOT true (a) the CASE reached in a fixed (and short) amount of time after
statement is great for a test that has only one specifying its address is called (a) none of the
acceptable answer (b) a combined IF statement is options listed (b) secondary memory (c) random-
one that contains multiple conditions in the access memory (D) mass storage (e) sequential-
decision symbol (c) the null ELSE structure is a access memory
variation of the simple IF structure with the false 37. With respect to the functions of the control
side being empty (d) the sequence control unit, all but one is part of the machine cycle (a)
structure is the straightforward execution of one fetching (b) coding (c) decoding (d) executing (e)
processing step after another (e) in the simple IF storing
statement, selection occurs when a choice is made 38. Which of these is not a file management task
between two alternative paths. (a) virus protection (b) copying (c) editing (d)
27. Which of these brings together the object deleting (e) listing
modules, operating system routines and other 39. The capacity of an internet is referred to as
utility software to produce a complete, executable (a) bandwidth (b) kilobyte (c) megabyte (d) byte
program (a) linker (b) compiler (c) interpreter (d) (e) gigabyte
assembler (e) loader 40. Which of these allows files to be transferred
28. Which of these is NOT true (a) warm boot is between computers (a) FTP (b) telnet (c) HTTP
the process of turning on a computer after it had (D) gopher (e) TCP/IP
been completely switched off (b) the resident 41. Which of these is NOT true (a) IP address
portion of an operating system is called kernel (c) are not unique (b) IP addresses are global and
POST checks the memory, keyboard, buses, and standardized (c) each domain name corresponds
expansion slots (d) a loader copies an object to numeric IP address (d) the internet uses
program held in memory into the memory area numeric IP address to send data (e) no two
designated by the operating system for execution organizations can have the same domain name
(E) BIOS is stored in ROM chip 42. All of the following but one is true (a) URL
29. Convert 11011.1012 to decimal (a) 27.625 consists of letters and numbers only (b) every
(b) 34.90 (c) 44.56 (d) 78.90 (e) 24.55 resource available via the www , but unique URL
30. Convert 110000111.0111002 to octal (a) (c) URL represent a standardized addressing
22.348 (b) 66.348 (c) 56.778 (d) 23.458 (e) 607.348 scheme for internet resources (d) the basic
structure of URL is hierarchical and moves from
left to right (E) a URL identifies a particular computer in a way that ensures consideration and
internet resource respect for your fellow humans (e) thou shalt not
43. The various steps to be performed within a appropriate other people’s intellectual output.
system for transforming the input into output is 49. In the floppy disk drive, the disk is rotated
represented in detail by (a) program flowchart (b) normally at … (a) 64 (b) 100 (C) 128 (d) 256 (e)
run flowchart (c) system flowchart (d) computer 300
program (e) pseudocode 50. A hard disk _____ is a specialized chip and
44. Which of these is NOT true (a) debugging in electronic circuit that control the transfer of data,
the process of finding errors in a program (b) instructions and information from a disk to the
instructions in algorithm are described as starting computer (a) chip (b) read head (c) drive (d)
from the top and going to the bottom (c) a controller (e) card
sequence of precise steps that solve a problem is 51. The most common form of computer today is? (a)
called algorithm (d) an error in a program is called micro-computers (b) embedded computers (c)
a bug (e) coding is a technical word for writing a tablet PCs (d) mobile phones (e) wearable
program computers
45. All of the following but one is true (a) 52. An error in a program that makes it do something
missing curly brackets and semicolons are run other than what the programmer wanted is called
time errors (b) entering a wrong salary scale when (a) syntax (b) logical (c) run-time (d) compilation
computing the payroll of workers is a logical error (E) execution
(c) syntax errors are also known as compilation 53. _________ helps users to locate resources on the
errors (D) dividing a number by zero is an internet by indicating exactly where they are (a)
execution error (e) syntax errors usually result google (B) gopher (C) URL (d) IP address (E)
from mis-ordering symbols within expressions domain name
and statements. 54. When you program source code are incorporated
46. Which of these is not TRUE (a) 4GLs are not into the final object code by a (A) utility program
problem oriented (b) fourth generation languages (b) loader (C) debugger (d) library (E) linker
are non-procedural (c) natural languages have 55. Which of these devices is considered not portable
profound effect on artificial intelligence and (a) floppy disk (b) CD-ROM (c) hard disk (d)
expert systems (d) natural languages are designed RAM (E) DVD-ROM
to make connections that human have with 56. Collecting someone’s printing paper and using the
computers more human-like (e) machine language person’s printer without permission would be a
instructions are written in 0s and 1s violation of which of these commands (a) thou
47. Which of these is NOT true (A) a virtual shalt not appropriate other people’s intellectual
machine operating system does not allow a single output (b) thou shalt not use other people’s
user to tun two or more different operating computer resources without authorization (c) thou
systems (b) the operating system creates an shalt not snoop around in other people computer
interface between user and other application files (d) thou shalt not interfere with other
programs (c) the operating system also numbers people’s computer work (e) thou shalt not use a
the system activities such as performance and computer to harm other people
security (d) the operating system contains 57. Converting the number 78210 to it base 5
programs that perform functions related to equivalent would give (a) 11135 (b) 322115 (c)
disk/file management (e) the primary function of 111125 (d) 101125 (e) 104115
operating systems is to allocate/assign resources. 58. When a choice is made between two alternative
48. Which of the following is not among the ten paths, which statement would be more appropriate
commandments of computer ethics? (a) thou shalt (A) Null ELSE (B) combined IF (c) CASE
think about the social consequences of the structure (d) simple IF (e) multiple IF
program or the system you are designing (b) thou 59. _____ is an identifier for a particular machine on
shalt not use the computer to bear false witness (c) a particular network (a) google (b) gopher (c)
thou shalt not copy or use proprietary software for URL (d) IP address (e) domain name
which you have not paid (d) thou shalt not use a
60. This language was considered a successor of move using WAP and GPRS (c) protocol govern
Pascal and is used for developing systems how application access the network (d) cable
software (a) oberon (b) MODULA – 2 (c) modem connections are technically capable of
smallTalk (d) LISP (E) ALGOL download speeds of up to 2mb/s (E) technically,
61. Define the track and sectors on a disk and ADSL links can provide a download speed of up
preparing it so that the operating system can write to 9mb/s.
information to it is known as (a) booting (b) 72. Which of the following language are sometimes
formatting (C) backup (d) initializing (e) referred to as very high language (a) procedural
defragmentation (b) problem-oriented (c) natural (D) object-
62. One of the most definitive sets of ethical standards oriented (E) visual programming
in computing was unveiled by (a) IEEE – Institute 73. The collective name given to the set of software
of Electrical and Electronics Engineers (b) CSTA that aids the user and the programmer in writing
– Computer Science Teachers Association (c) programs, developing application software and
ACM – Association for Machinery (d) NCS – performing some special hardware/software
Nigeria Computer Society (e) BCS – British function related to programming is (a) utility
Computer Society programs (b) programming language (c) language
63. Among the guild lines for drawing a flowchart, transistors (d) editors (e) programming tools
only _____ flow line(s) should come out from a 74. When a bank receives a cheque, it uses a MICR
process symbol (a) 1 (b) 2 (c) 3 (d) 4 (e) 5 ____ to print the amount on the cheque (A) reader
64. The protocol that is commonly used when you – sorter (b) inscriber (c) printer (d) machine (e)
download programs for your computer from embosser
internet sites or when you upload web pages to a 75. The first reported case of an algorithm written for
web server is known as (a) Telnet (b) FTP (C) a computer was ascribed to which individual (A)
Gopher (d) TCP/IP (e) HTTP Charles Babbage (b) Ada Byron (c) Alan Turing
65. Which of these languages is considered as the first (d) Herman Hollerith (e) Grace Hopper
structure procedural language (a) Oberon (b) 76. Converting the number 78210 to its base 5
MODULA-2 (c) small talk (d) LISP (E) ALGOL equivalent would give? (A) 11135 (b) 322115 (c)
66. Because video files can require a great deal of 111125 (d) 101125 (e) 104115
storage, a 6-minute video may require up to _____ 77. The protocol that is commonly used when you
(a) 16 (b) 18 (c) 6 (d) 10 (e) 30 download programs for your computer from
67. General – purpose or third generation language internet sites or when you upload webpages to a
are called_____ languages (a) procedural (b) web server is known as? (a) telnet (b) FTP (c)
problem-oriented (c) natural (d) object – oriented Gopher (d) TCP/IP (e) HTTP
(e) visual programming 78. Which of these languages is considered as the first
68. The print head of a dot matrix printer can contain structured procedural language (a) OBERON (B)
______ pins depending on the manufacturer and MODULA-2 (C) SmallTalk (d) LISP (E) ALGOL
the model (A) 6 – 20 (b) 10 – 25 (c) 12 – 23 (d) 7 79. Converting the number 34426 to its decimal
– 24 (e) 9 – 24 equivalent would give (A) 64810 (b) 81810 (C)
69. Converting 34425 to its decimal equivalent would 71310 (D) 66610 (e) 41910
give (a) 81810 (b) 33910 (C) 41910 (d) 49710 (e) 80. Which protocol allows a user’s computer once
66610 connected, to emulate a remote computer? (A)
70. A method for representing the instruction in a telnet (b) FTP (c) Gopher (d) TCP/IP (E) HTTP
module with language very similar to a computer 81. General-purpose or third generation languages are
program code is also referred to as (A) flowchart also called ____ languages (a) procedural (b)
(B) algorithm (c) logic (d) pseudocode (e) problem-oriented (c) natural (d) object-oriented
program (e) visual programming
71. Which of the following is correct (A) your internet 82. These computers are often used by Engineers,
connection is constrained by the slowest scientist and other professionals who need to run
component of the network (b) the latest mobile complex programs and often refer to personal
phones or tablet PCs offer internet access on the computers connected to a network (a) super
computer (b) workstation (c) notebooks (d) 95. The bandwidth of a communication channel can
personal digital assistant (E) iPad Mini best be described as (a) the speed at which the
83. Converting the number 23149 to its octal or base channel transmits data (b) the range of frequencies
8 equivalent would give? (a) 23628 (b) 32628 (c) within which the communication channel can
14768 (d) 34568 (e) 33618 operate (c) the strength of the communication
84. Expressing the number ABC16 in base 7 would medium (d) the efficiency and effectiveness of the
give? (a) 100147 (b) 310147 (c) 101047 (d) 110047 communication medium
(e) 610417 96. The encoding scheme that is commonly used in
85. Which version of Microsoft Windows was also IBM mainframes and can represent 256 characters
known by the codename ‘Chicago’ (a) Windows is (a) ASCII (b) Unicode (c) EBCDIC (d) BCD
3.1 (b) Windows XP (c) Windows Vista (d) (e) XS-3 code
Windows 95 (e) Windows 98 97. Having an understanding of what a computer is
86. ____ storage is used to store information and how it can be used as a resource is known as?
permanently for future use (a) Main Memory (b) (a) computer competency (b) information
Random Access Memory (c) Secondary Storage technology (C) computer literacy (D) computer
Devices (d) Registers (e) Variable science (e) computer Education
87. The Radar System used in the control tower of 98. A person who has a certain amount of experience
airports is an example of? (a) General Purpose and/or at least a two-year training in the technical
Computer (b) Dual Purpose Computer (c) Tower aspects of using computers is known as? (a)
System (D) Dedicated System (e) Multipurpose software engineer (b) computer programmer (c)
Computer computer professional (d) systems Analyst (e)
88. ______ retains its content until it is exposed to computer scientist
ultraviolet light (a) PROM (B) EEPROM (c) 99. Applying your skill with computers to meet your
DRAM (D) EPROM (E) none of the above information needs and improve your productivity
89. A method for representing instructions in a is called? (a) computer competency (b)
module with a language very similar to a information technology (C) computer literacy (d)
computer program code s also referred to as? (a) computer science (e) computer education
flowchart (b) Algorithm (C) logic (d) pseudocode 100. Which of the following statement is not correct?
(e) program (a) the word digit originally referred to the fingers
90. Amplitude and Frequency are characteristics of people used to count with (b) one of the main
____ (A) digital waves (B) discrete carrier waves characteristics of a computer is its digital nature
(C) analog Carrier Waves (d) discrete waves (c) examples of digital devices are humidity
91. The process of converting analog signals to digital recorders and pressure sensors (d) non-volatile
signals is called ___ (A) Modulation (b) means data is not lost when power is turned off (e)
Demodulation (c) Analog encoding (d) digital the CPU controls and manipulates data to produce
encoding (e) MODEM information
92. The following are functions of communication
software except (a) establish connection among
computers (b) data compression (c) remote
communication (d) error correction
93. Which of the following physical communication
channels gives the best noise protection (a)
shielded twisted pair cable (b) fiber optic cable (c)
coaxial cable (d) unshielded twisted pair cable (e)
wireless
94. Which of the following links require unobstructed
view between transmitter and receiver (a) wireless
system (B) GPS system (c) Fibre optics (d)
microwave system

You might also like