Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
112 views
CSC Past Question
Computer science past questions
Uploaded by
kebokuemmanuel01
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CSC past question For Later
Download
Save
Save CSC past question For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
112 views
CSC Past Question
Computer science past questions
Uploaded by
kebokuemmanuel01
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CSC past question For Later
Carousel Previous
Carousel Next
Save
Save CSC past question For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 14
Search
Fullscreen
sc2UU examination 10. 1. 12. 13, 14. 15. 16. 17. 18. 19. 20. 21. 22. The following are level of abstraction in computing except (a) Computer Science (b) Information system (c) Information Manager (d) Computer Engineering The ___ generation of computers is associated with parallel processing and networking (a) 1° (b) 4" (c) Zero (d) 5 Numerical Information is associated with type of Information (a) Graphical (b]Quantitative (c) Qualitative (d) Figure The following are different Keyboard layout except (a) QWERTY (b) HCESAZ (c) DVORAK (d) AZERTY The following are type of Registers in Computer memory except (a) Memory Counting Register ( MCR) (b)Memory Address Register (MAR) (c| Memory Buffer Register (MBR) (d) Program Counter(PC) is a small set of data holding places that are part of the computer processor (a) RAM (b) Registers (c) ROM (d) Program holder Which of the following is not a type of Read Only Memory(ROM) (a)Programmable ROM (b) Erasable Programmable ROM (c) Electrical Erasable Programmable ROM (d)Electronic Electrical Erasable Programmable ROM The following are major components of the computer system except (a) Processor (b) Communication Devices (c) Input Devices (d) Main Memory Which of these Is an example of a system software (a) Spreadsheet Software (b)Word Processor Software (c) Utility Software (d) Graphical packages The following are the basic elements of a data communication system except (a) Sender (b)Media (c)Modem (d)Receiver The term associated with the propagation of signals across a communication medium is called (a)Transmission (b)Signals (c)Data Receiver (d) Signaling Which of the following transmission modes allow the communication channel to be used in both direction at the same time (a) Half Duplex (b)Simplex (c)Full Duplex (d) Double Duplex The following are attributes of information except (a) Accuracy (b) Cost effectiveness (c) Auditability (d) Portability The following are professions in Computing except (a) Information Management (b) Researchers (c) Teacher (d)Programmer Who invented the difference engine (a)Joseph Marie (b)Blaise Pascal (c) Abacus (d) Charles Babbage is a digital circuits used to perform arithmetic and logical operation in the central processing unit (a) Cache (b) Control Unit (¢) ALU (d)Adder is an example of output devices (a) Magnetic tape (b) Light Pen (c) Scanner (d)Projector Report Generator is a type of generations of programming languages (a)4" (b)2"(c) 1 (d) 5 ____ is not a criteria for classifying computers (a) Architecture (b) Cost (c) Amount of main memory (d) Software Type Which of the following is a type of access method in secondary memory (a) Information access (b) Direct Access (c) Data Access (d) Program access The following are components of an algorithm (a)lteration (b) Selection (c) Ambiguity (d)Sequence Which of the following is not an example of BASIC character set (a) Blank Character (b) Number (c) Alphabet (d) dash23, 24, 25. 26. 27. 28, 29. 30. 31. 32, 33. 34, 35. 36. 37, 38. 39. 40. 41. 42. 43. 44, 45. 46. 47. 48. 49, The following are types of error ina computer program except (a) Syntax Error (b) Data Error (c)Run time error (d)Logical error The parallelogram symbol Is used for operation in flowchart (a) Input/Output (b) Decision (c) Start/Stop (d) Processing The following are keywords in BASIC programming except (a)CLS (b)FOR (c)LATE (d) DATA is the kind of value a particular variable can hold . (a) Data Type (b) Constants (c) Data Value (d) Constant Value _____ is aname given to program entities. (a) Variable (b) Fixed Values (c)Identifier (d) Records Which of these is not a type of flow chart (a) System Flowchart (b) Data Flowchart (c) Document flowchart (d) Program Flowchart ___ is a communication means between the user and the computer (a) Programmer Language (b) Programs Language (c)Program language (d) Programming language AND, OR and NOT are examples of _ operators in BASIC programming (a) Relational Operator (b)Logical Operator (c)Arithmetic Operator (d)Comparison Operator The following are the advantages of word processing over manual typewriter except (a)Saving (b)Editing (c)Typing (d) printing. __Isa single table that contains grid of vertical and horizontal lines (a) Workbook (b)Worksheet (c)Cell (d)Ribbon. The unauthorized duplication of copyrighted computer programs (a)Hardware piracy (b)System Piracy (c)Software piracy (4) Copyright infringement. ____ disguises itself as a legitimate program but damages or erases all data once in rogue program (a)Warm (b)Time Bomb (c)Trojan Horse (d) Data Virus. In other to draw pictures or select menu options you need (a)Scanner (b)Printer (c)Light Pen (d)Joystick. A certain type of memory that stores each bit of data in a separate capacitor within an integrated circuit which contains data only when electricity is available is called {a)DRAM(b)SRAM (c)EPROM (d) EEPROM, The following except one are parts of a main computer keyboard (a]Numerical Keys (b]Factorial Keys (c)Control Keys (d)Direction Keys. A particular type of system software is designed to assist users in maintenance and monitoring activities (a)Operating System (b)Utility Software (c)Device Drivers (d)Language Translator. In assembly language, Instructions are coded using (a)Symbols (b)Formulas (c)Mnemonics (d)Libraries. An assembler directives is also called (3)Opcodes Mnemonics (b)Data Definition (c)Pseudo Opcodes (d)Macros. One of the following is an object oriented programming language (a]Java(b)Pascal (c)ADA (d)COBOL. A computer application customized or developed to meet the specific requirements of an organization is called (a)Spreadsheet (b)General Packages (c)Customized Packages (d)Desktop Software. An error found in a program is called (a)Bug (b)Issues (c|Code (d)REM The violation of a rule for writing a program in a given programming language is called {a)Runtime (b)Logical Error (c)Syntax Error (d)Test Error Which of the following is a valid variable name in Basic (a)A102 (b)5234 (c)REM (d)Tina James those not require translator for a program written in it to be executed (a)Assembly Language (b)Machine Language (c)COBOL (d)High-Level Language. Agood algorithm must be (aJambiguous (b)Definite (c)Voluminous (d)Implement. The conversion of digital signal to analog is referred to (a]Demodulation (b)Modem (c)Modular (d)Modulation. transmits data character by character (a)Synchronous (b)Asynchronous (c)Duplex (d)Radio50. 51. 52. 53. 84. 55. 56. 57. 58. 59. 62. 63. |. From Figure A, identify the error in line 20. And correct it (a) x (b] * (c) PIE (d) let 65. 66. 67. 68. 69. 70. fi 7. 73. 74, 2. 76. For communication of information and messages to take place, we use —- and ——— communication systems. (a) telephone, postal (b) nitel, nipost (c] Computer , handsets (d) All There are ------ basic elements of a communication system. (a) 2 (b)3 (c) 4 (d) 1 In Data communication, —— basic terms are frequently used. (a) 2 (b)3 (c) 4(d) 1 A collection of facts in raw form is —--- (a) Data (b) Information (c) signal (d) Signalling Electromagnetic encoding of data i (a) Data (b) Information (c} signal (d) Signalling The data transmission software perform the following — (a)Data routing (b)flow control (c) a, b (d) information routing The transmission mode used in transmit duplex (b)Full duplex (c) Simplex (4) All ig data from one point ta another is-—-- (a) Half —--- is a sequence of voltage represented in binary form. (a) Analog signal (b)Hybrid signal (c)Digital signal (d) All The device which converts digital signal into analog and the reverse is known as --— (a) MODEM (b} VisAfone (c} Globacom (d) Dial up The basic forms by which data can be converted into a form suitable for communication —~ (a)pulse of light (b) Electromagnetic waves (c) ALL (d) Electromagnetic pulse Types of network ---~ (a) LAN (b) MAN (c) All (d) WAN is interconnection of various computer system located at different places. (a) Network (b}Computer Network (c) Internet (d) network topology The network topology examples (a) Star (b] Ring (c) Bus (d) All Figure A: 5 REM Basic program to compute area of a circle 10 let pie=3.142 15 INPUT R 20 LET Area=pie"R/2 25 print “Area of a circle=' ; Area 30 END From Figure A, identify the error in line 10. [a) pie (bylet (c)” (d) All From Figure A, identify the error in line 25. (a) print (b)* (c)” (d) aand b There are --- categories of Programming languages. (a) 2 (b)3 (c] 4 (d) 1 There are --- types of bugs/errors found in program. (a) 2 (b)3 (c) 4 (d) 1. Machine and Assembly language are examples of ---- language. (a) low level (b)High Level (c) middle level (d) a, b ‘There are ---- types of program flowcharts. [a) 2 (b)3 (c} 4 (d) 1 ‘symbol is used to indicate the point at which selection are made. (a) Processing (b)Decision (cJinput/output (d)arrow symbol is used to denote the execution of an operation or event. (a) Processing (b)Decision (c) input/output (4) arrow ‘There are --- components of algorithm. (a) 3 (b) 2 (c) 4 (d) 1 ‘There are —--- ways of designing algorithm. (a) 1 (b)3 (c) 4(d) 2 Pseudocode and flowchart are ways of designing ~---- (a) selection (b)program (c] b, d (djAlgorithm Problem solving steps entails (i) analyse problem (iidefine problem (iiiJgenerate solution (iv)Analyse solution (v) evaluate solution. (a) iiiii,iv,v (b)iiiiii,v,v (C) i, iiLiv,v (d) Wi iiiy,iv ——-is the process by which unfamiliar situation is resolved (a) algorithm (b)solution (c)Programming (d)problem solving(d)copyright 78. The association of computing machinery code ask members to abide by the following except {a)honesty (b) tolerant (c}eondone copyright (d)maintain privacy 79. --- is the unauthorised duplication of copyrighted computer program . (a)software piracy (b)copyright piracy (c}computer fraud (d)unethical &0. --—- occurs when the appropriate royalty payment is not made for use of the protected work (a)software piracy (b)copyright infringement (c)computer privacy (d)infringement was invented that allowed people and products to quickly move across wide area {a)computer (b)Airplane (c)radio & Television (d)car -- was invented that made the world smaller. (a]computer (bjAirplane (c}radio & Television (a)ear 83, ---is the invention that transformed business world to the internet. (a)computer (b)Airolane (cJradio & Television (d)car 84, The following comprises the components of the ribbon on MS office environment except —- (a)insert (b]view (c)page layout (d) Copy 85. Which of the following levels of abstraction is NOT common to information system and computer engineering? a. Business & users b. Software design c. Software use d. Hardware use 86. Which of the following area in computer science describes programming of computers to mimic human brain? a. Computer graphics b. Human computer interaction c. Antificial intelligence d. Software engineering 87. In 1642, a French scientist invented ....... which represents the position of digit with help of gears 82. init Pascal's calculator The abacus Leibnitz's calculator Difference engine 88. ....... technology is often regarded as the improved technology from the transistors a. Very Large Scale Integration b. Vacuum tube ©. Mechanical devices d. Integrated circuits 89. In computer science, information sources can either be from a. Internal or External b. High or low ©. Individual or organization d. Human and computer keyboard layout is widely used in central Europe a. QWERTY b. AZERTY c. QWERTZU a b, c. 0, 90.91... 92. 93, 2, 95, 96, 97, 98, 99, d. DVORAK is known as the primary memory except a. Cache memory b. Dynamic Random Access Memory (DRAM) Magnetic tape d. Programmable Read Only Memory (PROM) Computers can be classified under the following except a. Size b. Cost Architecture d. Colour isa program routine that links peripheral device to an operating system of a computer, a. Device drivers b. Language translators © Utility system d. Assembler »- is also known as third generation language a. Low level language b. Medium level language © High level language d. Machine language What is the main function or action of the “Alt+F4” keys a. Close window b, Shutdown Switch between windows d. Close active window Each box within an Excel worksheet/window is known as a. Column cell b. Cell © Tab d._ Name box isa program that can get into a computer to destroy data and spread itself to other computers a Crime b. Worms © Trojan horse d. Virus A program that occupies computer memory and spreads quickly ike a virus is called a. Trojan horse b. Worm Bomb d. Fire e The third step to problem solving is a. Analyse the problem b. Analyse the solution ©. Define the problem d._ Select best solution100. 101, 102, 103, 104, 105, 106, 107, Which of the following is not an attribute of good pragramming a. Reliability b. Friendliness Algorithm d. Portability Which of the steps below is not a step of debugging? a. Supply the antivirus b. Recognise that a bug exists Apply the fix and test it d. Determine a fix for the bug is a name given to data-items with static values a. Constant b. Identifier c. Rules d. Variables Which of the following basic expression is wrong a. HAZY b. 4X¥/27-5*/X c AtY/2-C%X d. S"U*t-1/2tartne In the basic sample codes below, identify the wrong line of codes i. REM program ii, LET PIE” 3.142 iii, INPUT “obtain value for r:";r iv. LET Area” tita/360*PIE*r2 Vv. PRINT area of sector” ; Area vi. END ev Which of the following is a vector variable that holds a set of variables at a time a. DIM statement b. Basicinteraction statement Array d. Visual Basic. NET is a data transmission mode a. Simplet b. Half-duplex ‘ 4 simples Full-duplex Which of the following network topologies is used frequently to connect one or more small computers or peripheral devices to 2 large host computer or CPU a. Ring network b. Bus network ©. Star network 4. Protocol network108, IF 1110110, + T, "100110011, Find T (a) 10111011 (b}1011011 (c) 110110 (d) 100101 335 7 272332334 109. Find the decimal equivalent of 100001.101,(a)~"# 8 (b) 8 (c)33.25 (a) 32, 625 5 u , 272 272 4 SA 110. 1011110.10110, is equivalent to X,.. Find X. (a) “’4 “73 16 (by 16 (c) oS gg h 16 (dg) 16 111. _ Find the Product of DC,,,.and BC, in hexadecimal (a)A013(b)A018(c)D017(d)A1'0 112. In hexadecimal, the next 4 numbers After 2FACE Is (a) 2BABA (b) 2FAD3 (c) 2FADZ (d)FACE2 113. if M,, +473, + 101111,” 111111, Find M (a)11074’'(b) 110744 (c) 11749(d) 111749 114. If 177,,, 1s added to certain number in hexadecimal and the result yield 2028,... What is the value of the number? (a) 1682 (b)2E81(c)1EA0(d)1EA1 115. Find the decimal equivalent of ABC,.., (a) 274 (b)2749 (c)2739 (4) 2738 116. Convert EFCC,.. to binary (a) 1010101110101 (b) 1110111111001100 {c)111010111010(4)11010111012 117. IFY,,." 2FACE,_-EFCC,., Find Y (a}20B02 (b) EBA (c)DODO (d)BABA 118. Find the two's complement of 1011011100 is (2} 110100100 (b} 101100100 (c) 100100100, (4) 1001000110 119. Evaluate 362,., x 715,,, (a)331712,,, (b)258830 . (c)264712,., (d) 358830, 120. Convert 47227,,, to binary (a) 111110111100 (b)110111101100 (c)100111010010111 (d) 101101111101 121. Which of the following statements is v GB” 1024 KB (d) 2 KB = 204’ bytes 122. How many byte(s) are there in the following statement “WELCOME TO DELTA STATE UNIVERSITY” (a}34 (b)264 (¢)35 (d)280 123. In base 8, the next number after 20777, in (a) 21000 (b) 2100 (c) 21100 (d) 17000 124. Convert ADA,,,to Decimal (a) 2779... (b) 227774. (€)277' (4) 2788... 125. Find the One’s Compliment of 0000000 (a) 1111111 (b)111111 (c)1101121 (4)1111110 126. Convert 111110111100, to hexadecimal (a) FBC,..(b)EFE,..(c)DFE,. (4) FDE, 127. Convert DADA,,, to Decimal (a) 27379,.,, (b) 22787,,, (c)56026,,,(d) 2788, 128. Given that Z,,"C629,, + 9A52,,.. Find Z,, (a) 16067B,, (b)16066B,, (c) 4 (d) 2 129, Find the two's compliments of 0.01011. (a) 1.10100 (b)1.10101 (c) 0.10100 (¢) 0.10101 130. _ Find the two's compliments of 1010.0011. (a) 101.1100 (b) 101.1100 (c)1011.1101 (d) 101.1101 131, Add 1101 to 111 (a) 10100, (b) 10100, (c) 4 (d) 1 132, Convert 762, to base,, (aJO5C (b}1F3 (c)1F2 (a)31F 133. 2FACE added to BAFF is (a) 049C (b) 3BSCD(c}CBSDC (d)3ASCD 134, 523,+11011, ,+7A8,,(2)100100110101(b) 100101110101 (¢)100100010010(4)011010101010 135, Convert 1011.011, to base,, (a}49.30 (b)5.75(c)14.375(d)39.11 136. Convert 250.11,, to base2 (a)11111010.110 (b)01111101.110 (c)11111010.0001 (d)01011111.1000 137. Whats the 2's compliment of 110111011101 (a)001000100010 (b)0010010001 (cJ001001100010 (4)001000100011 138. ETAC,,~ 8B6F,,(3)5S3D (b)17348 (c}7318 (d)1631B 139, Subtract BABA from BEEF (a)BSC1 (b)D143 (c)-LBCD (d)0435, (a) 1 KB” 1048 bytes (b) 1 KB” 1000 bytes (c) 1140. Find the 1's compliment of 001110011 (a)110001110 (b)110001101 (c}00110011 (d)110001100 141, Add 6123, to 2422, (a)4569 (b)8555 (c)10555 (d)1854 142. Subtract 10.1001, from 101.0110, a. 101.1101 b. 010.1101, «. 101.1101, d. 10.1011 143, Find the 1’s complement of the 010.1101, a. 10.0011, b. 11.0100, «. 101.0010, d. 101.0110, 194, Convert BCD,, to a binary number a. 110111001101, b. 110111001011, «. 110011011011, d. 101111001101, 145. How many bytes are there in Imb a. 102457 b. 104'575 ©. 1024 d. 1045875 146. Convert 42AD,, to decimal a. 17069,, b. 1706',, ©. 71069,, d. 71089,, 147. Convert 11001110, to hexadecimal a. 1198,, b. 196 c. 186 dE, 148. Four basic terms are frequently used in data communication except - Receiver (b) Data (c) Signals (d)Transmission 149. There are basic requirements for working of a communication system except --- (a)Sender (b) Receiver (c) Medium (d) information 150. 1. Identify the following variables as acceptable or unacceptable, giving your reason(s) if unacceptable in BASIC. i. ADA ii. $a ili, REVENUE iv. 9SMALL v.24 (a) 151. State four (4) types of variables including the two types commonly associated with BASIC programming. 152. Using the appropriate symbols, write the following expressions in BASIC code: (a) 4ac + Gb? feb? (b) ax? + bx +c b? 2 b? -dac153. State three reserved words in BASIC that can be used under more than one programming task. 154. Identify the types of the "expression" in the examples of the above assignment statements. 155. When is GOTO statement needed in BASIC programming,? 156. What other expression can you use in place of the SQR function? 157. What are the two basic steps taken by the computer when it encounters a FOR statement? 158. What is the flowchart symbol appropriate for the DIM statement? 159. State the various types of BASIC statements you can use to enter data into your program 160. State an important rule to be followed when using nested loops in BASIC. Identify the error(s) in the following program: 10 PRINT 20 FOR =| TO 4 STEP -2 30 PRINT 2*1 40 FOR J=1TO5 50 PRINT J 60 NEXT | 70 NEXT J 161. The data transmission protocols perform the following functions for the efficient and error free transmission of data except --— (a)flow control (b) Error control (c}data routing (d) data bridging, 162. There are three modes for transmitting data except---— (a) half duplex (b)full duplex (c) Simplex (d) half Simplex 163. The following are transmission media used to support data transmission except (a) telephone lines (b) coaxial cables (c) microwaves systems (d) Flow systems 164. The type of hardware used in data communication is -—-- (aJModems (b) controllers (c)multiplexers (d) concentrators 165. The following are types of multiplexing used to optimize the use of communication lines, except —- (a)flow control (b) controllers (c)multiplexers (d) concentrators 166, ~~ is the formal act of rules for communicating as well as rules for timing of message exchanges (a) protocol (b)Notation (c) HTML (a) LAN 167. There are basic types of Networks except ——- (a) LAN (b) MAN (c) WAN (a) PCN 168. The following are popular protocols used in data communication, except ---—- (aJHTTP (b)ETP (c)EDVAP (d) POP 169. Data type in BASIC can be classified into types. Except —- (a)Numerical (b)Constant (c) Character (d) Variable 170. --—- isa finite set of well-defined step-by-step methods, procedures or rules for solving any given problem (a)Algol (b)Algorithm (c) Java (d) BASIC 171, —— is a computer-understandable language developed mai operation of the underlying hardware of a computer system. (a) Machi (d) 172. -—~ is error due to semantic rule of a language (a)Logical error (b)Run time error (c)Syntax error (d)compile time173. The following is not a high level language --—- (a)BASIC (b)PYTHON (c)C++ (d)Assembly 174. What tool is not used in the development of an algorithm (b)pscudo code (c) data flow diagram (d)coding 175. Abacus is known to be the first calculating device used to be performed addition and subtraction easily and speedily 176. Abacus is divided into two parts called SHeaven9 and 8Earth9. 177. The lattice method is an alternative to long multiplication for numbers 178. The first mechanical calculator (Pascaline) based on gears was designed to performed addition and subtraction 179. Hollerith developed an electromechanical punched-card tabulator to tabulate the data for 1890 U.S. census. 180. John Napier9s of Scotland invented a calculating device, in the year 1617 called the Napier Bones 181. Gottfried Leibniz modified the Pascal calculator and he developed a machine which could perform various calculation based on multiplication and division 182. Difference Engine was used to solve polynomial equations. {a)flowcharts 5 183. The number 4 in diagram A is known as 184. The number 2 in diagram A is known as 185. The number 1 in diagram A is known as 186, ‘The number 5 in diagram A is known as 187. The function of the battery in the system unit is ~ 188. The disk drive controller card does the work of ~ 189. The diagram B isa screen shot for (a) Ms word (b) Ms Excel (c) Ms PowerPoint (d) Ms Access190. The diagram C isa screen shot for -—~ (a) Ms word (b) Ms Excel (c) Ms PowerPoint (4) Ms Access lick to ad title exo as sate 191. The diagram D is a screen sl (a) Ms word (b) Ms Excel (¢) Ms PowerPoint (d) Ms Access (a) Ms word (b) Ms Excel (¢) Ms PowerPoint (d) Ms Access 192. Convert 2910 to binary a. Loll02 b 111012110112, 101012 193. Convert 438 to base 10 3510 358 408 4010 194. Convert 11102 to decimal 2410 a110 2310 1410 195, Convert 24016 to decimal 48710 62210 57610 47610 196, Convert 4248 to binary 1001100102 1000101002 1000001102 10000101012 197, Convert 101.1012 to base 16 5A16 5B16 A516 BS516 198. Convert A.816 to binary 1011.01112 100.1102 1010.10002 101.0012 199. Convert D7.C4416 to octal 27210448, 327.61048, 32716048, 410.62738 200. Convert FD3216 to base 2 10101000011001012 11190011110100112 11110011110101112 11110011110100112 201. Solve 635B16 X A16 3915816 3715616 3953816 3761316 202. Solve BEEF-BABA16 42416 43716 43516ao oe FP Boge Boeke Bore ao se ao oe 42716 203. Solve 7B5416 + BDCI6 373016 873216 873016 573016 204. Convert 6210 to hexadecimal E316 sD16 3E16 D316 205. Find the 19s compliment of 111000102 oor 1012 101000112 00111112 00101012 206. Find the 29s compliment of 111000102 111000112 io100112 orto00102 11000112 207. Convert 24010 to binary to1111012 111100002 0111102 q1i11012 208. Convert 100101 from binary to deci 3210 3810 3410 s710 209. There are two kinds of drive bays known as Internal and external Small and big Input and output Inside and outside 210. The harddrive in a computer is used as ..... storage device Volatile Non-volatile Volatile and non-volatile Allof the above 211. What technology was defined in Generation 0? Parallel processing and networking Vacuum tubes Mechanical devices ‘Transistors 212. What technology was defined in Generation 5: Transistors Mechanical devices Parallel processing and networking Integrated circuitsAo oe ange 213. What technology was defined in Generation 3? Parallel processing and networking Vacuum tubes Mechanical devices Integrated circuits 214. What technology was defined in Generation 1? Parallel processing and networking ‘Vacuum tubes Mechanical devices ‘Transistors
You might also like
CSC200 Questions & Solution-1
PDF
No ratings yet
CSC200 Questions & Solution-1
14 pages
2ND TERM MOCK EXAMINATION (I)
PDF
No ratings yet
2ND TERM MOCK EXAMINATION (I)
4 pages
Computer 1
PDF
No ratings yet
Computer 1
27 pages
IT-MCQ-Fundamentals
PDF
No ratings yet
IT-MCQ-Fundamentals
7 pages
Information Technology: Test #2A - 2013 Grade 11
PDF
No ratings yet
Information Technology: Test #2A - 2013 Grade 11
8 pages
Form 5 Computer
PDF
No ratings yet
Form 5 Computer
5 pages
CSEC Jan 2011 Paper 1
PDF
No ratings yet
CSEC Jan 2011 Paper 1
8 pages
2ND Term Exam 20232024 Session Comp SSS3
PDF
No ratings yet
2ND Term Exam 20232024 Session Comp SSS3
9 pages
Multiple Choice Csec
PDF
No ratings yet
Multiple Choice Csec
9 pages
Git Prototype Paper 1
PDF
No ratings yet
Git Prototype Paper 1
6 pages
All MCQ
PDF
100% (1)
All MCQ
59 pages
C Programming MCQ
PDF
No ratings yet
C Programming MCQ
8 pages
Cci - Ict Year 12 First Term 2016
PDF
No ratings yet
Cci - Ict Year 12 First Term 2016
13 pages
Information and Communication Techn0logies Al Paper 1 2019
PDF
No ratings yet
Information and Communication Techn0logies Al Paper 1 2019
4 pages
BCA 2050 Computer Organization Model Question Paper
PDF
No ratings yet
BCA 2050 Computer Organization Model Question Paper
16 pages
2023 WASSCE Info & Comm Tech Paper 1
PDF
No ratings yet
2023 WASSCE Info & Comm Tech Paper 1
9 pages
Computing Exams Term 2
PDF
No ratings yet
Computing Exams Term 2
5 pages
End Semester Exam 2021 Sample Question Paper Bba Semester Iii Skill Enhancement Course - 1 Paper: SEC-01: IT Tools For Business (ITB)
PDF
No ratings yet
End Semester Exam 2021 Sample Question Paper Bba Semester Iii Skill Enhancement Course - 1 Paper: SEC-01: IT Tools For Business (ITB)
14 pages
0595 Computer Science 1
PDF
No ratings yet
0595 Computer Science 1
5 pages
Select The Correct Answer
PDF
No ratings yet
Select The Correct Answer
14 pages
Computer Basics
PDF
No ratings yet
Computer Basics
47 pages
CSC112 Study Questions by Premier
PDF
No ratings yet
CSC112 Study Questions by Premier
12 pages
1st Year Computer one day formula
PDF
No ratings yet
1st Year Computer one day formula
24 pages
YR 12 - ICT - MOCK - 2nd TERM 2022 23
PDF
No ratings yet
YR 12 - ICT - MOCK - 2nd TERM 2022 23
7 pages
Test Bank for Starting out with Visual C#, 5th Edition, Tony Gaddis download
PDF
100% (3)
Test Bank for Starting out with Visual C#, 5th Edition, Tony Gaddis download
45 pages
Zenith’s Cos 101 PDF
PDF
No ratings yet
Zenith’s Cos 101 PDF
6 pages
Computer Mcqs
PDF
No ratings yet
Computer Mcqs
6 pages
Computer Mcqs
PDF
0% (1)
Computer Mcqs
6 pages
Csec It Paper1
PDF
No ratings yet
Csec It Paper1
4 pages
Review Questions: Multiple Choice
PDF
No ratings yet
Review Questions: Multiple Choice
8 pages
Model Question Papers. Pgdca 101 Computer Organization and Operating Systems
PDF
No ratings yet
Model Question Papers. Pgdca 101 Computer Organization and Operating Systems
6 pages
Junior WAEC Past Question Computer
PDF
No ratings yet
Junior WAEC Past Question Computer
26 pages
2019 WASSCE INFORMATION & COMM. TECH– OBJECTIVES
PDF
No ratings yet
2019 WASSCE INFORMATION & COMM. TECH– OBJECTIVES
11 pages
CSEC Theory Exam 97 - 2002 Answers
PDF
100% (1)
CSEC Theory Exam 97 - 2002 Answers
25 pages
Hillcrest 1st Term Exam
PDF
No ratings yet
Hillcrest 1st Term Exam
34 pages
796 Ict P1 Mock Questions 2024
PDF
No ratings yet
796 Ict P1 Mock Questions 2024
4 pages
SS 3 MOCK EXAMINATION Computer 2020
PDF
100% (3)
SS 3 MOCK EXAMINATION Computer 2020
8 pages
January 2012 p1
PDF
No ratings yet
January 2012 p1
7 pages
CSC 112 QUESTIONS
PDF
No ratings yet
CSC 112 QUESTIONS
5 pages
Intro To Computing Midterm 23-24
PDF
No ratings yet
Intro To Computing Midterm 23-24
10 pages
Chapter 1 Python
PDF
100% (1)
Chapter 1 Python
10 pages
GNS 102 Questio
PDF
No ratings yet
GNS 102 Questio
26 pages
Untitled Document
PDF
No ratings yet
Untitled Document
5 pages
NAPPS SS2-WPS Office
PDF
No ratings yet
NAPPS SS2-WPS Office
9 pages
2020 WASSCE INFORMATION & COMM. TECH – OBJECTIVES
PDF
No ratings yet
2020 WASSCE INFORMATION & COMM. TECH – OBJECTIVES
11 pages
HND CBT_FINAL PRESENT
PDF
No ratings yet
HND CBT_FINAL PRESENT
24 pages
CompSci U1 P1 2020
PDF
No ratings yet
CompSci U1 P1 2020
12 pages
Class 7 Computer QP
PDF
No ratings yet
Class 7 Computer QP
3 pages
Computer Objective Questions
PDF
No ratings yet
Computer Objective Questions
17 pages
CSC 111 Questions Compiled by Olarid
PDF
No ratings yet
CSC 111 Questions Compiled by Olarid
9 pages
Buy ebook Test Bank for Starting out with Visual C#, 5th Edition, Tony Gaddis cheap price
PDF
100% (16)
Buy ebook Test Bank for Starting out with Visual C#, 5th Edition, Tony Gaddis cheap price
43 pages
Ceriificate in Computing (Cic) Tbrn-End Examination: .Fune, 2008
PDF
No ratings yet
Ceriificate in Computing (Cic) Tbrn-End Examination: .Fune, 2008
20 pages
COMPUTER
PDF
No ratings yet
COMPUTER
4 pages
1st Term Evaluation Exam - 2022 Jaffna Hindu College
PDF
100% (1)
1st Term Evaluation Exam - 2022 Jaffna Hindu College
10 pages
Multiple Choice Questions
PDF
No ratings yet
Multiple Choice Questions
6 pages
Examples of-WPS Office
PDF
No ratings yet
Examples of-WPS Office
11 pages
EVAL 3 USS1-2
PDF
No ratings yet
EVAL 3 USS1-2
5 pages