EBSU COS 101 PAST QUESTIONS
Answers after the questions.
- The use of computer to carry out crime related activities is called _
A. Stealing
B. Automated Stealing
C. Cybercrime
D. Tech-based bugle - Transistors are special features of which generation of computer classification?
A. First
B. Second
C. Third
D. Fourth - _ is the technology used in first generation
A. Transistor
B. Integrated circuit
C. Large scale integrated circuit
D. Vaccum tube - _ is the technology for the Third generation of Computer classification is associated
A. Vaccum Tube
B. Transistors
C. Integrated Circuit
D. None of the above - What year was vacuum tube invented?
A.
1995 – 1964
B. 1964 – 1972
C. 1946
D. 1990 to date
- Who is the father of Computers?
a) James Gosling
b) Charles Babbage
c) Dennis Ritchie
d) Bjarne Stroustrup - Which of the following is the correct abbreviation of COMPUTER?
a) Commonly Occupied Machines Used in Technical and Educational Research
b) Commonly Operated Machines Used in Technical and Environmental Research
c) Commonly Oriented Machines Used in Technical and Educational Research
d) Commonly Operated Machines Used in Technical and Educational Research - Which of the following is the correct definition of Computer?
a) Computer is a machine or device that can be programmed to perform arithmetical or logic
operation sequences automatically
b) Computer understands only binary language which is written in the form of 0s & 1s
c) Computer is a programmable electronic device that stores, retrieves, and processes the data
d) All of the mentioned - What is the full form of CPU?
a) Computer Processing Unit
b) Computer Principle Unit
c) Central Processing Unit
d) Control Processing Unit - Which of the following language does the computer understand?
a) Computer understands only C Language
b) Computer understands only Assembly Language
c) Computer understands only Binary Language
d) Computer understands only BASIC
Advertisement
- Which of the following package allows individuals to use personal computers for storing and
retrieving their personal information?
a) Personal assistance package
b) Graphics package
c) Spreadsheet package
d) Animation package - Which of the following computer language is written in binary codes only?
a) pascal
b) machine language
c) C
d) C# - Which of the following is the brain of the computer?
a) Central Processing Unit
b) Memory
c) Arithmetic and Logic unit
d) Control unit - Which of the following is not a characteristic of a computer?
a) Versatility
b) Accuracy
c) Diligence
d) I.Q. - Which of the following is the smallest unit of data in a computer?
a) Bit
b) KB
c) Nibble
d) Byte
- Which of the following unit is responsible for converting the data received from the user into a
computer understandable format?
a) Output Unit
b) Input Unit
c) Memory Unit
d) Arithmetic & Logic Unit - Which of the following monitor looks like a television and are normally used with non-portable
computer systems?
a) LED
b) LCD
c) CRT
d) Flat Panel Monitors - Which of the following is not a type of computer code?
a) EDIC
b) ASCII
c) BCD
d) EBCDIC - Which of the following part of a processor contains the hardware necessary to perform all the
operations required by a computer?
a) Controller
b) Registers
c) Cache
d) Data path - Which of the following is designed to control the operations of a computer?
a) User
b) Application Software
c) System Software
d) Utility Software - Which of the following device use positional notation to represent a decimal number?
a) Pascaline
b) Abacus
c) Computer
d) Calculator - Which of the following is used in EBCDIC?
a) Super Computers
b) Mainframes
c) Machine Codes
d) Programming - Which of the following are physical devices of a computer?
a) Hardware
b) Software
c) System Software
d) Package - Which of the following defines the assigned ordering among the characters used by the
computer?
a) Accumulation
b) Sorting
c) Collating Sequence
d) Unicode - Which of the following storage is a system where a robotic arm will connect or disconnect off-
line mass storage media according to the computer operating system demands?
a) Magnetic
b) Secondary
c) Virtual
d) Tertiary
- Which of the following is known as the interval between the instant a computer makes a request
for the transfer of data from a disk system to the primary storage and the instance the operation is
completed?
a) Disk utilization time
b) Drive utilization time
c) Disk access time
d) Disk arrival time - Which of the following devices provides the communication between a computer and the outer
world?
a) Compact
b) I/O
c) Drivers
d) Storage - Which of the following are the input devices that enable direct data entry into a computer
system from source documents?
a) System Access devices
b) Data acquiring devices
c) Data retrieving devices
d) Data Scanning devices - Which of the following is the device used for converting maps, pictures, and drawings into digital
form for storage in computers?
a) Image Scanner
b) Digitizer
c) MICR
d) ScServe
- Which of the following can access the server?
a) Web Client
b) User
c) Web Browser
d) Web Server - Which of the following is known as the language made up of binary-coded instructions?
a) High level
b) BASIC
c) C
d) Machine
ANSWER
- C 2. B 3. D 4. C 5. C 6. B 7. D 8. D 9. C
- C 11. A 12. B 13. A 14. D 15. A 16. B 17. C 18. A 19. D
- C 21. B 22. B 23. A 24. C 25. D 26. C 27. B 28. D 29.
B 30. A 31. D
CSC 101 Past Questions
1- Computer Science seeks to develop algorithms for problem solving. TRUE or FALSE?
Answer
TRUE
Advertisement
2- What is the full meaning of the acronym ALU?
Answer
Arithmetic and Logic Unit
3- The highest digit in a given number base N is given by the formula ..
Answer
N – 1
4- The table that shows the possible combination of inputs and outputs to a logic gate is ….
Answer
Truth Table
5- Another name for “base 2 ” is
Answer
Binary
6- The two basic components of the computer system are ..
.. and ..
Answer
Software and Hardware
7- Which of the following is not an attribute of computer system? versatility, accuracy, monotony and speed ..
Answer
Monotony
8- The major characteristics of second generation computers is …
Answer
The use of electronic switches which based on discrete diode and transistor technology
9- The fourth generation computers existed between the year1971-1980; TRUE or FALSE..
Answer
TRUE
10- In computer field VLSIC stands for…
Answer
Very Large Scale Integrated Circuit
11- The two classification of computer based on purpose are general purpose and …
Answer
Special purpose
Types of computer based on purpose
- General purpose
- Special purpose
Classification of computers according to purpose - super computers
2.mainframe computers - minicomputers
- microcomputers
5.workstation computer - server computer
12- The two types of booting are and …..
Answer
1.Cold booting
2. warm booting
13- Computer peripherals are classified
into…
..and….
Answer
Input device and Output Device
14- The language the computer understands is called …
Answer
Machine language
15- Operating system is an example of …
.. software
Answer
System software
16- The computer primary memory whose content is
VOLATILE is ..
Answer
RAM
17- The manipulation of data by computers into more useful form is called data;..
Answer
Processing
18- The linkage of computers and other devices for the purpose of sharing information is called
Computer;..
Answer
Network
ANOTHER 50 QUESTIONS
- What does CPU stand for?
a) Central Processing Unit
b) Central Program Unit
c) Computer Personal Unit
d) Centralized Processing Unit
Answer: a) Central Processing Unit - What is the primary function of an operating system?
a) To manage hardware and software resources
b) To provide internet access
c) To run applications only
d) To increase system speed
Answer: a) To manage hardware and software resources - What is RAM used for in a computer?
a) Permanent storage
b) Temporary storage while tasks are being processed
c) To store the operating system only
d) To connect to peripheral devices
Answer: b) Temporary storage while tasks are being processed - Which of the following is an example of system software?
a) Microsoft Word
b) Adobe Photoshop
c) Windows 10
d) Google Chrome
Answer: c) Windows 10 - What is a computer network?
a) A group of computers that are physically connected
b) A collection of software applications
c) A system for managing databases
d) A program that analyzes data
Answer: a) A group of computers that are physically connected - Which of the following is not a programming language?
a) Python
b) HTML
c) SQL
d) Microsoft Office
Answer: d) Microsoft Office - What does “GUI” stand for?
a) General User Interface
b) Graphical User Interface
c) Guided User Interface
d) Global User Interface
Answer: b) Graphical User Interface - What is the purpose of an algorithm?
a) To execute commands
b) To process data
c) To provide a step-by-step solution to a problem
d) To store data
Answer: c) To provide a step-by-step solution to a problem - Which of the following represents a valid variable name in programming?
a) 1stVariable
b) first-variable
c) firstVariable
d) first variable
Answer: c) firstVariable - What does the term “byte” refer to?
a) A unit of processing speed
b) A unit of data storage
c) A unit of memory
d) A unit of time
Answer: b) A unit of data storage - Which of the following is an input device?
a) Monitor
b) Keyboard
c) Printer
d) Speaker
Answer: b) Keyboard - What is the primary purpose of a database?
a) To store data in an organized manner
b) To run applications
c) To manage hardware resources
d) To protect data from unauthorized access
Answer: a) To store data in an organized manner - What is an example of a web browser?
a) Microsoft Word
b) Windows Explorer
c) Google Chrome
d) Adobe Reader
Answer: c) Google Chrome - Which of the following describes cloud computing?
a) Storing data on local drives
b) Accessing and storing data over the internet
c) Using computers in a network
d) Running applications on desktop computers
Answer: b) Accessing and storing data over the internet - What is the function of a firewall?
a) To speed up internet connection
b) To protect a network from unauthorized access
c) To store files
d) To manage software updates
Answer: b) To protect a network from unauthorized access - What does HTML stand for?
a) Hypertext Markup Language
b) High-Level Text Markup Language
c) Hyperlink and Text Markup Language
d) Hypertext Multi-language
Answer: a) Hypertext Markup Language - Which of the following is a characteristic of open-source software?
a) It is always free to use.
b) Its source code is available for anyone to modify.
c) It is maintained by a single organization.
d) It cannot be distributed.
Answer: b) Its source code is available for anyone to modify. - What is the function of a compiler?
a) To run code
b) To convert source code into machine code
c) To store code
d) To edit code
Answer: b) To convert source code into machine code - Which component of a computer is considered the “brain”?
a) Hard drive
b) RAM
c) CPU
d) Motherboard
Answer: c) CPU - What is a primary advantage of using spreadsheets?
a) They are only used for calculations.
b) They can only handle small amounts of data.
c) They allow for easy data analysis and visualization.
d) They require no training to use.
Answer: c) They allow for easy data analysis and visualization. - What does the term “malware” refer to?
a) Software designed to improve performance
b) Software that is harmful to computers
c) Software that is free to use
d) Software that enhances security
Answer: b) Software that is harmful to computers - Which of the following is not a function of an operating system?
a) Managing files
b) Compiling programs
c) Managing hardware resources
d) Running applications
Answer: b) Compiling programs - What does “URL” stand for?
a) Uniform Resource Locator
b) Uniform Resource Link
c) Universal Resource Locator
d) Universal Resource Link
Answer: a) Uniform Resource Locator - Which of the following is an example of system software?
a) Microsoft Excel
b) Ubuntu
c) Google Docs
d) Mozilla Firefox
Answer: b) Ubuntu - What is the main purpose of a search engine?
a) To store data
b) To provide access to the internet
c) To help users find information on the web
d) To protect websites from threats
Answer: c) To help users find information on the web - Which of the following describes an algorithm?
a) A set of instructions for solving a problem
b) A programming language
c) A type of data structure
d) A software application
Answer: a) A set of instructions for solving a problem - What does “IP” stand for in networking?
a) Internet Protocol
b) Internet Project
c) Internal Protocol
d) Information Packet
Answer: a) Internet Protocol - Which of the following is an example of secondary storage?
a) RAM
b) CPU
c) Hard Drive
d) Cache
Answer: c) Hard Drive - What is the primary role of a network router?
a) To connect devices to the internet
b) To store data
c) To manage user accounts
d) To protect against malware
Answer: a) To connect devices to the internet - Which of the following programming constructs allows for decision-making?
a) Loop
b) Variable
c) Conditional statement
d) Function
Answer: c) Conditional statement - What is the purpose of backup software?
a) To increase system speed
b) To protect data by creating copies
c) To run applications faster
d) To delete unnecessary files
Answer: b) To protect data by creating copies - Which of the following is a characteristic of a client-server model?
a) All devices are equal in processing power.
b) Clients request services from servers.
c) It does not require a network.
d) It is limited to local operations.
Answer: b) Clients request services from servers. - What does “SQL” stand for?
a) Standard Query Language
b) Structured Query Language
c) Simple Query Language
d) Sequential Query Language
Answer: b) Structured Query Language - Which of the following is a valid HTML element?
a)
b) [head]
c) {head}
d)
Answer: a) - What is the function of a keyboard?
a) To display output
b) To store data
c) To input data
d) To connect to the internet
Answer: c) To input data - Which of the following protocols is used for secure data transmission?
a) HTTP
b) FTP
c) HTTPS
d) SMTP
Answer: c) HTTPS - What is a disadvantage of using open-source software?
a) Lack of customization
b) Potential for security vulnerabilities
c) Higher costs
d) Limited user community
Answer: b) Potential for security vulnerabilities - Which of the following is an example of application software?
a) Windows OS
b) Microsoft PowerPoint
c) Linux
d) BIOS
Answer: b) Microsoft PowerPoint - What is the purpose of a software license?
a) To allow unrestricted use of software
b) To define how software can be used and distributed
c) To increase the cost of software
d) To prevent software from being updated
Answer: b) To define how software can be used and distributed - What is the function of a motherboard in a computer?
a) To process data
b) To connect all components together
c) To store information
d) To provide power to the CPU
Answer: b) To connect all components together - Which of the following best describes phishing?
a) A legitimate marketing strategy
b) A method for securing passwords
c) A fraudulent attempt to obtain sensitive information
d) A process of data encryption
Answer: c) A fraudulent attempt to obtain sensitive information - What is the term for the physical parts of a computer?
a) Software
b) Hardware
c) Firmware
d) Middleware
Answer: b) Hardware - What is the primary purpose of using an antivirus program?
a) To increase internet speed
b) To protect against malware and viruses
c) To enhance graphics
d) To improve battery life
Answer: b) To protect against malware and viruses - What does the term “bytecode” refer to?
a) The code that is executed directly by the CPU
b) A lower-level representation of code that can be executed by a virtual machine
c) The source code of a program
d) A type of data encryption
Answer: b) A lower-level representation of code that can be executed by a virtual machine - Which of the following describes the purpose of a cache memory?
a) To provide long-term storage
b) To increase the speed of data access
c) To protect against data loss
d) To manage peripheral devices
Answer: b) To increase the speed of data access - What is the role of the command line interface (CLI)?
a) To provide a graphical user interface
b) To allow users to interact with the system using text commands
c) To improve system performance
d) To manage network settings
Answer: b) To allow users to interact with the system using text commands - What is a URL shortener?
a) A tool for creating longer URLs
b) A service that converts long URLs into shorter, more manageable links
c) A method for encoding URLs
d) A type of web browser
Answer: b) A service that converts long URLs into shorter, more manageable links - What is the primary purpose of a data model?
a) To visualize complex data structures
b) To define how data is organized and accessed
c) To enhance system performance
d) To encrypt sensitive data
Answer: b) To define how data is organized and accessed - Which of the following is a commonly used file format for images?
a) .exe
b) .jpg
c) .txt
d) .mp4
Answer: b) .jpg - What does the acronym “BIOS” stand for?
a) Basic Input Output System
b) Binary Input Output System
c) Basic Integrated Operating System
d) Binary Integrated Operating System
Answer: a) Basic Input Output System