The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
A quiz made to help myself revise for Higher Computing for an SQA final exam. Questions are created using SQA 2009 higher past paper and their answer sheets.
Questions and Answers
1.
Write the binary number 1000100111 as a positive integer.
A.
512
B.
456
C.
551
D.
465
E.
5
Correct Answer
C. 551
Explanation The binary number 1000100111 can be converted to a positive integer by multiplying each digit by the corresponding power of 2 and then summing them up. Starting from the rightmost digit, the first digit is 1 and it is in the 9th position from the right. The second digit is 1 and it is in the 8th position from the right. The third digit is 1 and it is in the 7th position from the right. The fourth digit is 0 and it is in the 6th position from the right. The fifth digit is 0 and it is in the 5th position from the right. The sixth digit is 0 and it is in the 4th position from the right. The seventh digit is 1 and it is in the 3rd position from the right. The eighth digit is 0 and it is in the 2nd position from the right. The ninth digit is 0 and it is in the 1st position from the right. The tenth digit is 1 and it is in the 0th position from the right. By adding up the values of the digits in their respective positions, we get 551 as the positive integer representation of the binary number 1000100111.
Rate this question:
2.
Represent the decimal number − 73 using 8 bit two’s complement.
A.
10110111
B.
-10110111
C.
01001001
D.
-01001000
E.
1001001
Correct Answer
A. 10110111
Explanation The given answer, 10110111, represents the decimal number -73 using 8 bit two's complement. In two's complement representation, the most significant bit (MSB) is the sign bit, where 0 represents a positive number and 1 represents a negative number. In this case, the MSB is 1, indicating a negative number. The remaining bits, 0110111, represent the magnitude of the number in binary form. To obtain the negative value, we invert all the bits and add 1. Inverting 0110111 gives 1001000, and adding 1 gives 1001001, which is the given answer.
Rate this question:
3.
Most modern computers use Unicode rather than ASCII to represent text.Select the true advantages of Unicode when compared to ASCII.
A.
Unicode can represent all character based alphabets.
B.
Characters can be user/software defined.
C.
ASCII has a very limited character set.
D.
ASCII does not allow user defined characters.
E.
Unicode takes up less memory than ASCII.
Correct Answer(s)
A. Unicode can represent all character based alpHabets. B. Characters can be user/software defined. C. ASCII has a very limited character set. D. ASCII does not allow user defined characters.
Explanation Unicode can represent all character based alphabets, which means it can support a wide range of languages and scripts. Characters can also be user or software defined, allowing for customization and flexibility. In contrast, ASCII has a limited character set, which restricts its usage to a small number of characters. Additionally, ASCII does not allow for user defined characters, further limiting its capabilities. The statement that Unicode takes up less memory than ASCII is not true and is therefore not an advantage of Unicode over ASCII.
Rate this question:
4.
State the number of bits required to represent 16 777 216 colours.
A.
4
B.
8
C.
128
D.
12
E.
24
Correct Answer
E. 24
Explanation To represent 16,777,216 colors, we need to use 24 bits. This is because 24 bits can represent 2^24 different combinations, which is equal to 16,777,216. Each bit can have two possible values (0 or 1), so by using 24 bits we can represent a wide range of colors.
Rate this question:
5.
A disk editor is a common example of a (_______) software.
Correct Answer utility
Explanation A disk editor is a common example of utility software. Utility software refers to a type of software that provides additional functionality or tools to enhance the performance and efficiency of a computer system. A disk editor is specifically designed to allow users to directly access and modify the contents of a disk or storage device at a low-level, bypassing the operating system. It is commonly used for tasks such as data recovery, disk analysis, and troubleshooting.
Rate this question:
6.
Which of these are not functions of a disk editor?
A.
Allows user to get/remove file fragments
B.
Allows the user to directly edit contents of disk sectors/blocks
C.
Allows the user to create secure locations for file backups
D.
Allows user to set up firewalls within the disc
E.
Allows recovery of damaged/deleted blocks/files
Correct Answer(s)
C. Allows the user to create secure locations for file backups D. Allows user to set up firewalls within the disc
Explanation A disk editor is a software tool that allows users to directly edit the contents of disk sectors or blocks. It also enables the user to recover damaged or deleted blocks/files by accessing and modifying the disk's data. However, creating secure locations for file backups and setting up firewalls within the disk are not functions typically associated with a disk editor. These tasks are usually performed by backup software or security applications designed specifically for those purposes.
Rate this question:
7.
The bootstrap loader is part of the operating system. State the purpose of the bootstrap loader.
A.
To load information about the systems performance on start-up.
B.
To locate and load the rest of the OS at start-up.
Correct Answer
B. To locate and load the rest of the OS at start-up.
Explanation The purpose of the bootstrap loader is to locate and load the rest of the operating system at start-up. It is responsible for initializing the system and loading the necessary components into memory, allowing the operating system to fully start and execute its functions. Without the bootstrap loader, the operating system would not be able to properly start and function.
Rate this question:
8.
A trojan horse is a malicious computer program. Which are characteristic of a trojan horse.
A.
Not spread by infecting other files or self replicating
B.
Spread by infecting other files or self replicating
C.
Disguises itself or appears to be a harmless/ordinary/useful file
D.
Does not disguises itself once loaded on the system.
Correct Answer(s)
A. Not spread by infecting other files or self replicating C. Disguises itself or appears to be a harmless/ordinary/useful file
Explanation A trojan horse is a malicious computer program that disguises itself or appears to be a harmless/ordinary/useful file. It does not spread by infecting other files or self-replicating. Once loaded on the system, it may continue to disguise itself to avoid detection.
Rate this question:
9.
Explain why increasing the number of registers could improve system performance.- Tick if true.
A.
Fewer fetches required from (slower) main memory/RAM/cache
B.
Access to data in registers is faster than to RAM or cache
Correct Answer(s)
A. Fewer fetches required from (slower) main memory/RAM/cache B. Access to data in registers is faster than to RAM or cache
Explanation Increasing the number of registers can improve system performance because it reduces the number of fetches required from main memory, RAM, or cache. Accessing data in registers is faster compared to accessing data in RAM or cache. Therefore, having more registers allows the system to store and access frequently used data more quickly, reducing the overall time required for data retrieval and improving system performance.
Rate this question:
10.
'Unable to run on available OS' / 'Clash with existing software' - Are these examples of Hardware incompatibility or Software Incompatibility?
A.
Hardware
B.
Software
Correct Answer
B. Software
Explanation The examples given, "Unable to run on available OS" and "Clash with existing software," are both related to issues that arise due to software incompatibility. Hardware incompatibility refers to situations where hardware components are not compatible with each other, causing issues in their functioning. However, in this case, the problems mentioned are specifically related to software, such as the inability to run on a particular operating system or conflicts with existing software. Hence, these examples fall under the category of software incompatibility.
Rate this question:
11.
Which are possible hardware compatibility issues?
A.
Lack of available memory
B.
Less powerful/unsuitable processor
C.
Unsuitable graphics/sound card
D.
Wrong operating system version
E.
Incorrect wiring for computer system display
Correct Answer(s)
A. Lack of available memory B. Less powerful/unsuitable processor C. Unsuitable grapHics/sound card
Explanation Possible hardware compatibility issues include lack of available memory, a less powerful or unsuitable processor, and an unsuitable graphics or sound card. These issues can arise when the hardware components do not meet the requirements of the software or the system.
Rate this question:
12.
All computers in a network are controlled by a single head computer. What type of network is this?
A.
Peer-peer
B.
Mesh
C.
Bollean
D.
Client-server
Correct Answer
D. Client-server
Explanation In a client-server network, all computers are controlled by a single head computer known as the server. The server manages resources, data, and communication between the clients. Clients, on the other hand, are individual computers that request and receive services from the server. This type of network architecture allows for centralized control and management, making it suitable for scenarios where a central authority needs to manage and distribute resources to multiple clients.
Rate this question:
13.
Possible technical reasons for choosing a client-server network over a peer-to-peer network.
A.
Allows for better communication between systems using instant messenger software
B.
Faster file transfer speeds
C.
Easier to do backups with centralised file server
D.
Better security of data
E.
Software servers allow better control of licensing/upgrades/remote installation
Correct Answer(s)
C. Easier to do backups with centralised file server D. Better security of data E. Software servers allow better control of licensing/upgrades/remote installation
Explanation A client-server network allows for easier backups with a centralized file server because all the data is stored in one location, making it easier to back up and restore. It also provides better security of data because access to the data can be controlled and monitored at the server level. Additionally, software servers allow better control of licensing, upgrades, and remote installation, as the server can manage and distribute software licenses, updates, and installations to the clients.
Rate this question:
14.
A graphic file is to be transferred as an e-mail attachment. Which file type would be more appropriate, and why?
A.
JPEG; Lossy, higher compression and lower file quality.
B.
TIFF; Lossy, no compression and higher file quality.
C.
JPEG; Lossless, no compression and higher file quality.
D.
TIFF; Lossless, higher compression and lower file quality.
Correct Answer
A. JPEG; Lossy, higher compression and lower file quality.
Explanation JPEG would be more appropriate for transferring a graphic file as an e-mail attachment because it offers higher compression, which reduces the file size and makes it easier and faster to send via email. However, JPEG is a lossy format, meaning that it sacrifices some image quality to achieve this compression. In contrast, TIFF is a lossless format that preserves all the details and quality of the image, but it has no compression, resulting in larger file sizes that may be more difficult to send via email.
Rate this question:
15.
"Stages are revisited/repeated" "As a result of new information/information gained later in the process""In order to improve the solution"These are examples of the (________) process.
Correct Answer iterative
Explanation The given correct answer, "iterative," is supported by the explanation provided. The statement "Stages are revisited/repeated" suggests that the process involves going back to previous stages or steps. The phrase "As a result of new information/information gained later in the process" indicates that new information is obtained during the process, which leads to the need for revisiting or repeating stages. Additionally, the phrase "In order to improve the solution" implies that the purpose of revisiting or repeating stages is to enhance the solution. All of these characteristics align with the iterative process, where steps are repeated to refine and improve the solution.
Rate this question:
16.
The username is created by joining the initial to the end of the surname, for example “CarrickE”.Name the string operation used to create the username.
A.
Repartition
B.
Strcmp
C.
Concatenation
D.
Integer
E.
Boolean
Correct Answer
C. Concatenation
Explanation The correct answer is Concatenation. Concatenation is the string operation used to join or combine two or more strings together. In this case, the initial and the end of the surname are being joined together to create the username.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.