1.
What is the decimal value of the hexadecimal number 777?
Explanation
The decimal value of a hexadecimal number can be found by multiplying each digit of the hexadecimal number by the corresponding power of 16 and then summing up the results. In this case, the hexadecimal number 777 has three digits: 7, 7, and 7. When multiplied by the corresponding powers of 16 (16^2, 16^1, and 16^0), the results are 1792, 112, and 7, respectively. Adding these results together gives us 1911, which is the decimal value of the hexadecimal number 777.
2.
__________ is a way by which we can prevent data interception
Correct Answer
C. Data Encryption
Explanation
Data encryption is a way by which we can prevent data interception. It involves converting the original data into an unreadable form using encryption algorithms. This ensures that even if the intercepted data is accessed by unauthorized individuals, they will not be able to understand or use it without the decryption key. Encryption provides a secure method of protecting sensitive information during transmission or when stored on devices, thereby safeguarding against unauthorized access and maintaining data confidentiality.
3.
Which of the following statements is/are true?
Correct Answer
D. All of the above
Explanation
The given answer "All of the above" is correct because all three statements are true. A megabyte is approximately equal to 1 million characters, a terabyte can store roughly 1 trillion characters, and it can also store more than just a few books.
4.
- Convert 765(octal) to hexadecimal
Correct Answer
1F5
Explanation
To convert from octal to hexadecimal, we can first convert the octal number to binary and then convert the binary number to hexadecimal. In this case, the octal number 765 can be converted to binary as 111 110 101. Then, grouping the binary digits into groups of four from right to left, we get 0111 1101, which is equal to 1F in hexadecimal. Finally, adding the remaining digit 0 at the leftmost position, we get the hexadecimal number 1F5.
5.
Convert AD1(hexadecimal) to decimal
Correct Answer
2769
Explanation
To convert a hexadecimal number to decimal, each digit of the hexadecimal number is multiplied by the corresponding power of 16 and then summed. In this case, the hexadecimal number AD1 is converted to decimal by multiplying the digit A by 16^2 (256), the digit D by 16^1 (208), and the digit 1 by 16^0 (1). Adding these values together gives the decimal equivalent of 2769.
6.
Data encryption is __________
Correct Answer
B. The process of transforming data into an unintelligible form
Explanation
Data encryption is the process of transforming data into an unintelligible form. This is done to protect the confidentiality and security of the data, as encrypted data can only be accessed and understood by authorized parties who possess the encryption key. Encryption ensures that even if the data is intercepted or stolen, it cannot be easily understood or used by unauthorized individuals.
7.
________ was prominent in 5th generation computers
Correct Answer
B. Very Large Scale Integration
Explanation
Very Large Scale Integration (VLSI) was prominent in 5th generation computers. VLSI refers to the process of integrating a large number of transistors onto a single chip, allowing for greater functionality and increased computing power. This technology was a significant advancement in computer architecture during the 5th generation, enabling the development of more powerful and efficient computers.
8.
Which of the following statements is/are true?
Correct Answer
C. A&B
Explanation
The given answer, A&B, is correct. A megabyte is roughly 1 million characters and a terabyte can store roughly 1 trillion characters. Therefore, both statements A and B are true.
9.
What is the approximate value of 453 kilobyte in megabyte?
Correct Answer
B. 0.453
Explanation
453 kilobytes is equal to 0.453 megabytes. This can be determined by dividing the number of kilobytes by 1024, since there are 1024 kilobytes in a megabyte. Therefore, 453 divided by 1024 equals 0.453.
10.
What is the result of the following hexadecimal arithmetic :10240 - 82A3
Correct Answer
C. 7F9D
Explanation
The result of the hexadecimal arithmetic 10240 - 82A3 is 7F9D.
11.
What does an RGB value of (0, 0, 0) represent?
Correct Answer
A. Black
Explanation
An RGB value of (0, 0, 0) represents black. In the RGB color model, each value corresponds to the intensity of red, green, and blue respectively. A value of 0 means there is no intensity of that color, resulting in the absence of any color. Therefore, when all three values are 0, it represents the absence of all colors, resulting in black.
12.
Who is the first female professor of Computer Science in Africa?
Correct Answer
A. Prof. Adenike Osofisan
Explanation
Prof. Adenike Osofisan is the first female professor of Computer Science in Africa.
13.
The decision as to what data structures to use in implementing a system is best handled during ______
Correct Answer
A. Program design
Explanation
During the program design phase, the overall structure and organization of the software system is determined. This includes deciding on the appropriate data structures to use for storing and manipulating data. The choice of data structures is crucial as it directly impacts the efficiency and performance of the system. Therefore, the decision of what data structures to use is best handled during program design.
14.
One byte has ________ bits.
Correct Answer
A. 8
Explanation
One byte consists of 8 bits. This is a standard measurement in computer systems, where each bit represents a binary value of either 0 or 1. Therefore, the correct answer is 8.
15.
A ___________ error does not cause the program to abort, but produces incorrect results.
Correct Answer
C. Logic
Explanation
A logic error refers to a mistake in the program's logic or reasoning, where the program may run without any issues or errors, but the output or results produced are incorrect. Unlike a syntax error, which causes the program to fail and not run at all, a logic error allows the program to run but produces inaccurate or unexpected outcomes.
16.
Which of these is not true of abstract data structures
Correct Answer
A. A queue and a stack have two external pointers
Explanation
The statement that "A queue and a stack have two external pointers" is not true. Both a queue and a stack have internal pointers to keep track of the elements, but they do not have two external pointers. A queue follows the FIFO (First-In-First-Out) principle, while a stack follows the LIFO (Last-In-First-Out) principle. Python does support dictionaries as a data structure.
17.
What is the result of the statement:print ("1 + 3 * 2-5")
Correct Answer
D. 1 + 3 * 2-5
Explanation
The result of the statement "print ("1 + 3 * 2-5")" is the expression "1 + 3 * 2-5" itself. The print function in Python displays the output to the console, so when this statement is executed, it will print "1 + 3 * 2-5" as the output.
18.
Which of the followings is not an example of a linear data structure
Correct Answer
C. GrapH
Explanation
A graph is not an example of a linear data structure because it does not have a linear or sequential arrangement of its elements. Unlike lists, queues, and arrays which have elements arranged in a linear fashion, a graph consists of vertices and edges that can be connected in any way. A graph can have multiple connections between vertices, creating a complex and non-linear structure. Therefore, a graph is not considered a linear data structure.
19.
Which of the following lines of code comes from a first generation computer language?
Correct Answer
B. 00010 1010 1101 0001 1010
Explanation
The line of code "00010 1010 1101 0001 1010" comes from a first generation computer language. This is because it is written in binary code, which was used in the first generation of computers. Binary code consists of only 0s and 1s, representing machine language instructions that the computer can directly understand and execute.
20.
The _____ operation says if and only if all inputs are 1, the output will be 1. The output will be 0 if any of the inputs are 0.
Correct Answer
D. AND
Explanation
The AND operation is the correct answer because it follows the given condition that if and only if all inputs are 1, the output will be 1. If any of the inputs are 0, the output will be 0. This aligns with the behavior of the AND gate, which only produces a 1 output when all of its inputs are 1, and otherwise produces a 0 output.
21.
What was the first truly mass auxiliary storage device?
Correct Answer
D. Magnetic tape drive
Explanation
The first truly mass auxiliary storage device was the magnetic tape drive. Magnetic tape drives were widely used in the early days of computing to store large amounts of data. They were capable of storing large volumes of information and were relatively inexpensive compared to other storage options at the time. Magnetic tape drives were used for tasks such as data backup, archiving, and transferring data between different computer systems.
22.
Which of the options A to E gives the correct sequence for the software development methods listed below(i)Specification of needs (ii)Algorithm design (iii)Problem analysis (iv)Documentation (v)Testing and verification (vi)Implementation
Correct Answer
C. I,iii,ii,vi,v,iv
Explanation
The correct sequence for the software development methods listed is as follows: (i) Specification of needs, (ii) Problem analysis, (iii) Algorithm design, (iv) Implementation, (v) Testing and verification, (vi) Documentation. This sequence follows a logical order of steps in the software development process, starting with identifying the needs and requirements, analyzing the problem, designing the algorithm, implementing the solution, testing and verifying its functionality, and finally documenting the process and outcome.
23.
Suppose x = 1, y = -1, and z = 1. What will be displayed by the following statement?x = 1y = -1z = 1.if x > 0: if y > 0: print("x > 0 and y > 0")elif z > 0: print("x < 0 and z > 0")
Correct Answer
C. Nothing is displayed
Explanation
The condition x > 0 is not satisfied because x = 1. Therefore, the code inside the if statement is not executed. Similarly, the condition y > 0 is also not satisfied because y = -1. The elif statement is also not executed because z > 0 is not true as z = 1. Hence, nothing is displayed by the given statement.
24.
Analyze the following code.even = Trueif even = True:print("It is even!")
Correct Answer
B. The program has a syntax error in line 2
Explanation
The code has a syntax error in line 2 because the variable "even" is being assigned a value instead of being compared. The correct way to compare the value of "even" would be to use the double equals sign (==).
25.
Eliminating errors in a program is also called ______ the program
Correct Answer
A. Debugging
Explanation
Debugging is the correct answer because it refers to the process of identifying and fixing errors or bugs in a program. It involves tracing and analyzing the program's code to locate and resolve issues that may cause the program to behave unexpectedly or produce incorrect results. Debugging is an essential step in the software development process to ensure that the program functions correctly and meets the desired requirements. The other options, modularizing and clarifying, do not specifically relate to the process of eliminating errors in a program.
26.
What is the value of i printed in the following program?j = i = 0i += j + j * 5print(i)
Correct Answer
A. 0
Explanation
The value of i is 0 because the program first assigns 0 to both j and i. Then, it adds the value of j (which is 0) to the product of j and 5 (which is also 0), resulting in 0. Finally, it assigns the value of 0 to i. Therefore, when i is printed, it will display 0.
27.
Which of the following if statements assigns a value 5 to y if x is not greater than or equal to 0
Correct Answer
C. If x < 0:
y =5
Explanation
The correct answer is "if x < 0: y = 5". This statement assigns a value of 5 to y only if x is less than 0. The other if statements either assign a value of 5 to y when x is greater than 0 or when x is greater than or equal to 0.
28.
Which of the following statements is/are not true?(i) The instruction register (IR) contains the next instruction to be executed(ii) theProgram counter (PC) contains the address of the next instruction to beexecuted
Correct Answer
B. I only
Explanation
The statement "The instruction register (IR) contains the next instruction to be executed" is not true. The instruction register (IR) actually contains the instruction that is currently being executed, not the next instruction. The correct answer is i only.
29.
__________ can also be referred to as the Bandwidth of a network
Correct Answer
A. Data Transfer Rate
Explanation
The term "Data Transfer Rate" can also be used interchangeably with "Bandwidth" when referring to a network. Bandwidth refers to the amount of data that can be transmitted over a network in a given amount of time. Data Transfer Rate, on the other hand, measures the speed at which data is transferred between devices or over a network. Both terms essentially describe the capacity or capability of a network to transmit data.
30.
Machine language is composed only of ______
Correct Answer
C. Binary numbers
Explanation
Machine language is composed only of binary numbers. Machine language is the lowest level of programming language that can be directly understood and executed by a computer. It consists of a sequence of binary digits (0s and 1s) that represent specific instructions and data. These binary numbers are used to control the computer's hardware and perform various operations. Hexadecimal numbers and memory words can be used to represent and manipulate data in machine language, but the language itself is based on binary numbers. Python statements, on the other hand, are part of a high-level programming language and are not directly used in machine language.
31.
If a number is too large to be stored in memory, it _____________.
Correct Answer
B. Causes overflow
Explanation
When a number is too large to be stored in memory, it causes an overflow. This means that the number exceeds the maximum value that can be represented by the data type or memory size being used. In such cases, the program may crash or produce unexpected results, as it is unable to handle such a large number.
32.
What is the extension of any Python 33 saved file?
Correct Answer
C. Py
Explanation
The extension of any Python 33 saved file is ".py". This is the standard file extension for Python source code files. It helps to identify the file as a Python script and allows it to be executed by the Python interpreter.
33.
- Which of the followings is not a kind of Compact disc?
Correct Answer
D. None of the above
Explanation
The question asks for a type of compact disc that does not exist. The options provided are CD-ROM, DVD, CD-WORM, and None of the above. CD-ROM and DVD are both types of compact discs, and CD-WORM (Write Once Read Many) is also a type of compact disc that allows for data to be written only once. Therefore, the correct answer is None of the above, as all the options listed are types of compact discs.
34.
- The information that a program requires in order to accomplish its objective is called the----------------------
Correct Answer
A. Data
Explanation
The information that a program requires in order to accomplish its objective is called data. Data is essential for a program to perform calculations, make decisions, and produce desired outputs. It can be in the form of inputs provided by users or obtained from external sources. Without data, a program would not have anything to work with and would not be able to achieve its intended purpose.
35.
Machine language is composed only of ______
Correct Answer
B.
Binary numbers
Explanation
Machine language is composed only of binary numbers. Machine language is the lowest-level programming language understood by computers. It consists of a series of binary instructions that the computer can directly execute. Each instruction is represented by a sequence of 0s and 1s, which correspond to specific operations and data manipulations. Therefore, machine language is composed solely of binary numbers.
36.
Algorithm and Flow chart help us to
Correct Answer
B. View the problem completely and clearly
Explanation
Algorithm and flowchart help us to view the problem completely and clearly. They provide a visual representation of the steps and logic required to solve a problem. By breaking down the problem into smaller steps and organizing them in a logical sequence, algorithms and flowcharts allow us to analyze the problem more effectively. They help in identifying any potential errors or inefficiencies in the solution approach and provide a clear understanding of the problem-solving process. Overall, algorithms and flowcharts enhance problem-solving by providing a structured and visual representation of the problem and its solution.
37.
In the expression 45 / 4, the values 45 and 4 on the left and right of the / symbol are called ____.
Correct Answer
C. Parameters
Explanation
In the expression 45 / 4, the values 45 and 4 on the left and right of the / symbol are called parameters. Parameters are the values that are passed into a function or operation to perform a specific task. In this case, the / symbol represents the division operation, and the parameters 45 and 4 are being divided to give the result.
38.
A compiler performs which of the following functions
Correct Answer
B. Converts the source code into machine language code
Explanation
A compiler is a software program that takes the source code written in a high-level programming language and converts it into machine language code that can be executed by the computer's processor. This process is known as compilation. The compiler analyzes the source code, checks for errors, and translates it into a form that can be understood and executed by the computer. Therefore, the correct answer is "converts the source code into machine language code."
39.
At what phase of programming do we make use of Flowcharts and pseudocode?
Correct Answer
B. Design
Explanation
In the design phase of programming, flowcharts and pseudocode are used to plan and visualize the structure and logic of the program. Flowcharts help in representing the flow of control and decision-making processes, while pseudocode allows programmers to write out the algorithm in a more human-readable format before translating it into actual code. These tools aid in organizing thoughts, identifying potential issues, and communicating the program's design to others involved in the development process.
40.
In program design, the diamon symbol has 3 branches coming out of it; TRUE or FALSE?
Correct Answer
B. False
Explanation
The diamon symbol in program design typically represents a decision point or a conditional statement, such as an if-else statement. It usually has two branches coming out of it, one for the true condition and another for the false condition. Therefore, the statement that the diamon symbol has 3 branches coming out of it is false.