There are several key points discussed in the document:
- There are 4 main types of loops used in programming: for, goto, do, and while loops. Pseudocode and algorithms are also discussed.
- Project management, CAD, plagiarism, memory types, programming tools, compilers, interpreters, assemblers, and common programming languages are defined.
- Questions are provided about computer concepts like program development cycles, flowcharts, error types, hardware components, and protocols.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
20 views6 pages
CSC 110
There are several key points discussed in the document:
- There are 4 main types of loops used in programming: for, goto, do, and while loops. Pseudocode and algorithms are also discussed.
- Project management, CAD, plagiarism, memory types, programming tools, compilers, interpreters, assemblers, and common programming languages are defined.
- Questions are provided about computer concepts like program development cycles, flowcharts, error types, hardware components, and protocols.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6
CAMBRIDGE TUTORIALS A.K.A DR.
o ELSA – The enhanced industry standard
TERRY, PD AND ESQUIRE’S ARENA architecture. SALIENT POINTS IN CSC 110 o Project management is a program used to plan, o There are 4 types of loops: The FOR NEXT schedule and control resources – people, costs and statement, The GOTO statement, The DO LOOP equipment required to complete a project on time. statement and The WHILE WEND statement. o CAD – computer aided design o Pseudo code is a short hand way of describing a o Plagiarism is the expropriation of another writers computer program. text findings or interpretations and presenting it as o An algorithm is a finite set of well-defined one’s own. instructions for accomplishing some task which, o PROM – Programmable Read Only Memory given an initial state, will result in a corresponding o EPROM – Erasable Programmable Read Only recognizable end state. It is a sequence of precise Memory instructions for solving a problem in a finite o EEPROM – Electrically Erasable Programmable amount of time, Read Only Memory o Digit means numeral, while digital refers to o Programming tools are a collective name given to communications. the set of software that aids the user and the o To transmit your computer’s digital signals over programmer in writing programs, developing telephone lines you need to use a modem to applications software and in performing some translate them into analog signals special hardware and software functions related to o Software flows through the compute’s circuits as programming. coded pulses of electricity. o A compiler is a program that translates the o Work stations are used mainly by engineers, instructions of a high level language program to a scientist, and special effects creators for machine cod before execution. E.g. COBOL sophisticated purposes. compiler, PASCAL compiler. o A sever is a central computer that holds o An Interpreter is a high level language program collections of data and programs for many PCs, translator that translate a line of source program workstations and other computers, which are instruction and executes it before proceeding to called cleints. the next line. o ENIAC – Electronic Numerical Integrator and o An assembler is a special software that translates Computer assembly language programs into machine code o UNIVAC – Universal Automatic Computer before program execution. o ENIAC was the first operational computer in o High level languages include: BASIC, VISUAL United States in 1946 BASIC, COBOL, C, FORTRAN, PASCAL, etc. o Connectivity is the ability to connect computers, o BASIC – Beginners All-purpose symbolic telephones, and other devices to other computers, instruction code. devices and sources of information. o COBOL – common business oriented language o Speeds of microcomputers are measured in o FORTRAN – Formula Translator megahertz (MHZ). o ALGOL – Algorithmic Language o The speeds of larger computers are measured in o LISP – List Processing millions of instructions per second (MIPS) and Floating-point operations per second (FLOPS). RHEMA QUESTIONS IN CSC 110 o Expansion cards are circuit boards that provide 1. In developing an algorithm, which of these is mix memory or control peripheral devices. not one of the steps you follow (a) identify o Types of expansion cards include: memory cards, patterns, repetitions and familiar task (b) carry out video adapter cards, graphics accelerator cards the plan (C) understand the problem (d) device a e.t.c. plan (e) coding the plan. o ISA – The Industry Standard Architecture Bus 2. Analysis, design, coding and execution are o PCI – The Peripheral Component Interconnect stages of (a) program development cycle (b) Bus constructing a program flows chart (c) building an algorithm (d) documentation and maintenance (e) 13. To get internet access for mobile phones, the none of the options listed protocol used is (a) TCP/IP (B) WAP (C) FTP (D) 3. Which of these is used to represent the PPP (E) SLIP logical relationship of computer routines within 14. None but one of these is used by architects to inputs, master files, transaction files and outputs show clients the preview of a building and (a) program flowchart (b) run flowchart (c) landscapes? (A) telecommuting (b) computer system flowchart (d) programming flowchart (e) modeling (c) command and control (d) virtual none of the above meeting (E) computer aided design. 4. Which of these is a product identification 15. None but one of these is used by architects to code that contains a set of vertical lines and spaces show clients the preview of a building and (a) optical mark code (b) barcode (c) QR code (d) landscapes (a) telecommuting (b) computer magnetic ink code (e) none of the options modeling (c) command and control (d) virtual 5. Converting 5128 to binary gives (a) reality (e) computer aided design 10010100102 (b) 1010010002 (c) 1000101002 (d) 16. Which of these is not an application of 101001010002 (e) 10001012 ANS = 100000110 computer in medicines (a) tele-surgery (b) tele- 6. Which of these errors is the most difficult to prognosis (c) tele-diagnosis (d) tele-pathology (e) detect (a) compilation (b) execution (c) run time none (d) logical (e) syntax 17. Simplification of learning through songs and 7. Which part of the operating system is also animation is known as (a) child learning (b) close called the master program (A) control program learning (c) distance learning (d) edutainment (e) (B) chief program (c) main program (d) key open learning program (e) special program 18. An executable program produced through 8. Which of these order of sections in module object interaction occurs through (a) pseudocode is correct (a) body, header, compilers (b) linkers (c) anitivirus (d) interpreters declaration, termination (b) body, declaration, (e) utility programs header, termination (c) declaration, body, 19. Which of these is FALSE (a) EEPROM termination, header (d) header, body, declaration, means Erasable Electrically programmable read termination (e) header, declaration, body, only memory (b) DRAM means to be refreshed termination thousands of times per second (c) EPROM means 9. Which of these is an error in logic or Erasable programmable read only memory (d) arithmetic that must be detected at run time (a) The UNIVAC was the first commercial computer logical error (b) compilation error (C) syntax error (e) the development of integrated circuits was the (d) syntax and logical errors (e) semantic error hallmark of the third-generation computers 10. Which of these units will resolve the 20. Which of the following looks like ball pen following expressions x-y = x+1? (A) system unit but uses pressure instead of ink to write test and (b) memory (c) registers (d) CPU (e) control unit draw lines (a) stylus (b) graphic tablet (c) light 11. What is the difference between a camera and pen (d) joystick (e) trackball a webcam (a) all the options listed are correct (b) 21. Which of these is NOT true (a) Gopher is a cameras are always wireless components while protocol that governs the transfer of hypertext webcams are not (c) webcams are peripheral between two or more computers (b) telnet is a devices while camera are not (d) webcams are protocol that enables one computer to connect to web browser input compartments while cameras another computer (c) high level languages are are not (e) cameras are input devices while machine independent (d) TCP/IP is a collection of webcams are not protocols that govern the way data travels from 12. Education that is delivered with tutor and one machine to another across networks (e) learner geographically dispersed is (a) M-learning systems software enables computers perform (b) distance-learning (c) E-learning (d) sandwich essential operating tasks studies (e) corresponding learning. 22. All but one of the following is true (A) ENIAC means electrical numeric integrator and calculator (b) PROM is a memory chip which is manufactured blank on which data can be written 31. Which of these possibly is an advantage of only once (c) the analog computer represents data using office suit (a) all the options listed (b) the in physical quantities and operates on the data by package is free (c) the package is easy to obtain manipulating the quantities (d) registers are found (d) they are universal across all platforms (e) the in the control unit and the ALU (e) transistors possibility of file sharing. replaced vacuum tubes and ushered in the second 32. Which of these software’s under Microsoft generation of computers office suit support file sharing (a) graphic design 23. All but one is an example of a syntax error (b) communication software (c) spreadsheet (d) (a) data mismatch (b) missing apostrophe (c) use internet browser (e) word processor of reserved words as variables (d) unbalanced 33. Which of these can handle sequential parenthesis (e) use of keywords as variables. program line interpretation (a) system unit (b) 24. What type of error occurs when you enter a memory (c) registers (d) CPU (e) control unit wrong salary scale when computing the payroll of 34. Which of the following is executed by the a worker (a) logical error (b) execution error (C) BIOS (a) all the options listed (b) load operating compilation error (d) run time error (e) syntax system (c) load application software (d) none of error the options listed (e) memory text 25. Finding the square root of a negative number 35. The octal equivalent of 1100101.0010102 is is an example of (A) run time error (b) syntax (a) 624.2 (b) 154.12 (c) 145.12 (d) 145.2 (e) error (c) compilation error (d) logical and 624.12 compilation error (e) logical error 36. Memories in which any location can be 26. Which of these is NOT true (a) the CASE reached in a fixed (and short) amount of time after statement is great for a test that has only one specifying its address is called (a) none of the acceptable answer (b) a combined IF statement is options listed (b) secondary memory (c) random- one that contains multiple conditions in the access memory (D) mass storage (e) sequential- decision symbol (c) the null ELSE structure is a access memory variation of the simple IF structure with the false 37. With respect to the functions of the control side being empty (d) the sequence control unit, all but one is part of the machine cycle (a) structure is the straightforward execution of one fetching (b) coding (c) decoding (d) executing (e) processing step after another (e) in the simple IF storing statement, selection occurs when a choice is made 38. Which of these is not a file management task between two alternative paths. (a) virus protection (b) copying (c) editing (d) 27. Which of these brings together the object deleting (e) listing modules, operating system routines and other 39. The capacity of an internet is referred to as utility software to produce a complete, executable (a) bandwidth (b) kilobyte (c) megabyte (d) byte program (a) linker (b) compiler (c) interpreter (d) (e) gigabyte assembler (e) loader 40. Which of these allows files to be transferred 28. Which of these is NOT true (a) warm boot is between computers (a) FTP (b) telnet (c) HTTP the process of turning on a computer after it had (D) gopher (e) TCP/IP been completely switched off (b) the resident 41. Which of these is NOT true (a) IP address portion of an operating system is called kernel (c) are not unique (b) IP addresses are global and POST checks the memory, keyboard, buses, and standardized (c) each domain name corresponds expansion slots (d) a loader copies an object to numeric IP address (d) the internet uses program held in memory into the memory area numeric IP address to send data (e) no two designated by the operating system for execution organizations can have the same domain name (E) BIOS is stored in ROM chip 42. All of the following but one is true (a) URL 29. Convert 11011.1012 to decimal (a) 27.625 consists of letters and numbers only (b) every (b) 34.90 (c) 44.56 (d) 78.90 (e) 24.55 resource available via the www , but unique URL 30. Convert 110000111.0111002 to octal (a) (c) URL represent a standardized addressing 22.348 (b) 66.348 (c) 56.778 (d) 23.458 (e) 607.348 scheme for internet resources (d) the basic structure of URL is hierarchical and moves from left to right (E) a URL identifies a particular computer in a way that ensures consideration and internet resource respect for your fellow humans (e) thou shalt not 43. The various steps to be performed within a appropriate other people’s intellectual output. system for transforming the input into output is 49. In the floppy disk drive, the disk is rotated represented in detail by (a) program flowchart (b) normally at … (a) 64 (b) 100 (C) 128 (d) 256 (e) run flowchart (c) system flowchart (d) computer 300 program (e) pseudocode 50. A hard disk _____ is a specialized chip and 44. Which of these is NOT true (a) debugging in electronic circuit that control the transfer of data, the process of finding errors in a program (b) instructions and information from a disk to the instructions in algorithm are described as starting computer (a) chip (b) read head (c) drive (d) from the top and going to the bottom (c) a controller (e) card sequence of precise steps that solve a problem is 51. The most common form of computer today is? (a) called algorithm (d) an error in a program is called micro-computers (b) embedded computers (c) a bug (e) coding is a technical word for writing a tablet PCs (d) mobile phones (e) wearable program computers 45. All of the following but one is true (a) 52. An error in a program that makes it do something missing curly brackets and semicolons are run other than what the programmer wanted is called time errors (b) entering a wrong salary scale when (a) syntax (b) logical (c) run-time (d) compilation computing the payroll of workers is a logical error (E) execution (c) syntax errors are also known as compilation 53. _________ helps users to locate resources on the errors (D) dividing a number by zero is an internet by indicating exactly where they are (a) execution error (e) syntax errors usually result google (B) gopher (C) URL (d) IP address (E) from mis-ordering symbols within expressions domain name and statements. 54. When you program source code are incorporated 46. Which of these is not TRUE (a) 4GLs are not into the final object code by a (A) utility program problem oriented (b) fourth generation languages (b) loader (C) debugger (d) library (E) linker are non-procedural (c) natural languages have 55. Which of these devices is considered not portable profound effect on artificial intelligence and (a) floppy disk (b) CD-ROM (c) hard disk (d) expert systems (d) natural languages are designed RAM (E) DVD-ROM to make connections that human have with 56. Collecting someone’s printing paper and using the computers more human-like (e) machine language person’s printer without permission would be a instructions are written in 0s and 1s violation of which of these commands (a) thou 47. Which of these is NOT true (A) a virtual shalt not appropriate other people’s intellectual machine operating system does not allow a single output (b) thou shalt not use other people’s user to tun two or more different operating computer resources without authorization (c) thou systems (b) the operating system creates an shalt not snoop around in other people computer interface between user and other application files (d) thou shalt not interfere with other programs (c) the operating system also numbers people’s computer work (e) thou shalt not use a the system activities such as performance and computer to harm other people security (d) the operating system contains 57. Converting the number 78210 to it base 5 programs that perform functions related to equivalent would give (a) 11135 (b) 322115 (c) disk/file management (e) the primary function of 111125 (d) 101125 (e) 104115 operating systems is to allocate/assign resources. 58. When a choice is made between two alternative 48. Which of the following is not among the ten paths, which statement would be more appropriate commandments of computer ethics? (a) thou shalt (A) Null ELSE (B) combined IF (c) CASE think about the social consequences of the structure (d) simple IF (e) multiple IF program or the system you are designing (b) thou 59. _____ is an identifier for a particular machine on shalt not use the computer to bear false witness (c) a particular network (a) google (b) gopher (c) thou shalt not copy or use proprietary software for URL (d) IP address (e) domain name which you have not paid (d) thou shalt not use a 60. This language was considered a successor of move using WAP and GPRS (c) protocol govern Pascal and is used for developing systems how application access the network (d) cable software (a) oberon (b) MODULA – 2 (c) modem connections are technically capable of smallTalk (d) LISP (E) ALGOL download speeds of up to 2mb/s (E) technically, 61. Define the track and sectors on a disk and ADSL links can provide a download speed of up preparing it so that the operating system can write to 9mb/s. information to it is known as (a) booting (b) 72. Which of the following language are sometimes formatting (C) backup (d) initializing (e) referred to as very high language (a) procedural defragmentation (b) problem-oriented (c) natural (D) object- 62. One of the most definitive sets of ethical standards oriented (E) visual programming in computing was unveiled by (a) IEEE – Institute 73. The collective name given to the set of software of Electrical and Electronics Engineers (b) CSTA that aids the user and the programmer in writing – Computer Science Teachers Association (c) programs, developing application software and ACM – Association for Machinery (d) NCS – performing some special hardware/software Nigeria Computer Society (e) BCS – British function related to programming is (a) utility Computer Society programs (b) programming language (c) language 63. Among the guild lines for drawing a flowchart, transistors (d) editors (e) programming tools only _____ flow line(s) should come out from a 74. When a bank receives a cheque, it uses a MICR process symbol (a) 1 (b) 2 (c) 3 (d) 4 (e) 5 ____ to print the amount on the cheque (A) reader 64. The protocol that is commonly used when you – sorter (b) inscriber (c) printer (d) machine (e) download programs for your computer from embosser internet sites or when you upload web pages to a 75. The first reported case of an algorithm written for web server is known as (a) Telnet (b) FTP (C) a computer was ascribed to which individual (A) Gopher (d) TCP/IP (e) HTTP Charles Babbage (b) Ada Byron (c) Alan Turing 65. Which of these languages is considered as the first (d) Herman Hollerith (e) Grace Hopper structure procedural language (a) Oberon (b) 76. Converting the number 78210 to its base 5 MODULA-2 (c) small talk (d) LISP (E) ALGOL equivalent would give? (A) 11135 (b) 322115 (c) 66. Because video files can require a great deal of 111125 (d) 101125 (e) 104115 storage, a 6-minute video may require up to _____ 77. The protocol that is commonly used when you (a) 16 (b) 18 (c) 6 (d) 10 (e) 30 download programs for your computer from 67. General – purpose or third generation language internet sites or when you upload webpages to a are called_____ languages (a) procedural (b) web server is known as? (a) telnet (b) FTP (c) problem-oriented (c) natural (d) object – oriented Gopher (d) TCP/IP (e) HTTP (e) visual programming 78. Which of these languages is considered as the first 68. The print head of a dot matrix printer can contain structured procedural language (a) OBERON (B) ______ pins depending on the manufacturer and MODULA-2 (C) SmallTalk (d) LISP (E) ALGOL the model (A) 6 – 20 (b) 10 – 25 (c) 12 – 23 (d) 7 79. Converting the number 34426 to its decimal – 24 (e) 9 – 24 equivalent would give (A) 64810 (b) 81810 (C) 69. Converting 34425 to its decimal equivalent would 71310 (D) 66610 (e) 41910 give (a) 81810 (b) 33910 (C) 41910 (d) 49710 (e) 80. Which protocol allows a user’s computer once 66610 connected, to emulate a remote computer? (A) 70. A method for representing the instruction in a telnet (b) FTP (c) Gopher (d) TCP/IP (E) HTTP module with language very similar to a computer 81. General-purpose or third generation languages are program code is also referred to as (A) flowchart also called ____ languages (a) procedural (b) (B) algorithm (c) logic (d) pseudocode (e) problem-oriented (c) natural (d) object-oriented program (e) visual programming 71. Which of the following is correct (A) your internet 82. These computers are often used by Engineers, connection is constrained by the slowest scientist and other professionals who need to run component of the network (b) the latest mobile complex programs and often refer to personal phones or tablet PCs offer internet access on the computers connected to a network (a) super computer (b) workstation (c) notebooks (d) 95. The bandwidth of a communication channel can personal digital assistant (E) iPad Mini best be described as (a) the speed at which the 83. Converting the number 23149 to its octal or base channel transmits data (b) the range of frequencies 8 equivalent would give? (a) 23628 (b) 32628 (c) within which the communication channel can 14768 (d) 34568 (e) 33618 operate (c) the strength of the communication 84. Expressing the number ABC16 in base 7 would medium (d) the efficiency and effectiveness of the give? (a) 100147 (b) 310147 (c) 101047 (d) 110047 communication medium (e) 610417 96. The encoding scheme that is commonly used in 85. Which version of Microsoft Windows was also IBM mainframes and can represent 256 characters known by the codename ‘Chicago’ (a) Windows is (a) ASCII (b) Unicode (c) EBCDIC (d) BCD 3.1 (b) Windows XP (c) Windows Vista (d) (e) XS-3 code Windows 95 (e) Windows 98 97. Having an understanding of what a computer is 86. ____ storage is used to store information and how it can be used as a resource is known as? permanently for future use (a) Main Memory (b) (a) computer competency (b) information Random Access Memory (c) Secondary Storage technology (C) computer literacy (D) computer Devices (d) Registers (e) Variable science (e) computer Education 87. The Radar System used in the control tower of 98. A person who has a certain amount of experience airports is an example of? (a) General Purpose and/or at least a two-year training in the technical Computer (b) Dual Purpose Computer (c) Tower aspects of using computers is known as? (a) System (D) Dedicated System (e) Multipurpose software engineer (b) computer programmer (c) Computer computer professional (d) systems Analyst (e) 88. ______ retains its content until it is exposed to computer scientist ultraviolet light (a) PROM (B) EEPROM (c) 99. Applying your skill with computers to meet your DRAM (D) EPROM (E) none of the above information needs and improve your productivity 89. A method for representing instructions in a is called? (a) computer competency (b) module with a language very similar to a information technology (C) computer literacy (d) computer program code s also referred to as? (a) computer science (e) computer education flowchart (b) Algorithm (C) logic (d) pseudocode 100. Which of the following statement is not correct? (e) program (a) the word digit originally referred to the fingers 90. Amplitude and Frequency are characteristics of people used to count with (b) one of the main ____ (A) digital waves (B) discrete carrier waves characteristics of a computer is its digital nature (C) analog Carrier Waves (d) discrete waves (c) examples of digital devices are humidity 91. The process of converting analog signals to digital recorders and pressure sensors (d) non-volatile signals is called ___ (A) Modulation (b) means data is not lost when power is turned off (e) Demodulation (c) Analog encoding (d) digital the CPU controls and manipulates data to produce encoding (e) MODEM information 92. The following are functions of communication software except (a) establish connection among computers (b) data compression (c) remote communication (d) error correction 93. Which of the following physical communication channels gives the best noise protection (a) shielded twisted pair cable (b) fiber optic cable (c) coaxial cable (d) unshielded twisted pair cable (e) wireless 94. Which of the following links require unobstructed view between transmitter and receiver (a) wireless system (B) GPS system (c) Fibre optics (d) microwave system