Vous êtes sur la page 1sur 5

DINTHILL TECHNICAL HIGH SCHOOL

ADVANCED PROFICIENCY EXAMINATION


COMPUTER SCIENCE
UNIT 2- FURTHER TOPICS IN COMPUTER SCIENCE

PAPER 01
Mock Examination
(April 2010)

Upper Six

Time: 1 hrs

This paper consists of 45 multiple choice questions.

INSTRUCTIONS TO CANDIDATES
Each item in this PAPER has four suggested answers lettered (A), (B), (C), (D).
Read each item you are about to answer and decide which choice is best. Shade
the letter on your bubble sheet that corresponds with your choice.

DO NOT open this examination paper until instructed to do so.


Answer ALL questions.

________________________________________________________________________
Teacher: D. Campbell

2010 DTHS IT DEPT.

Page 1 of 5

1.

Which of the following is a stack operation?


A.
B.
C.
D.

2.

What would the queue look like when two


jobs have been printed and two new jobs,
Job7 and Job8 have joined the queue?

Enqueue; push;
Dequeue; pop;
Pop; enqueue;
Push; pop;

A.
Job4

4.

Job4

5.

6.

Job7

7.

Job3

Job6

Job2

Job3

Job4

Rear

The binary search is BEST described as


A. a search of only a section of a given list of
elements
B. a search of un-order elements
C. a search which takes a divide and conquer
approach
D. being very fast when using a very short list

8.

A one dimensional array is shown below.


int array[arraySize] = {1, 2, D, 4, 5};

Which element is NOT valid for this array?


A.
B.
C.
D.
9.

1
2
D
4

What is the index value for the array


element 5 in the array below?

int n[Size] = {1,2, 3, 4, 5};

Which of the following ADTs is PUSH


associated with?

A.
B.
C.
D.

A queue
A stack
A pointer
A variable

5
4
1
0

10. Which of the following expressions is


equivalent to c = c+1?

Refer to the following diagram representing


a queue of jobs waiting to be printed for this
question.
Job4

Job2

Rear

Front

A queue
A stack
A pointer
A variable

Job3

Job6

D.

Which ADT is BEST described as FIFO


structure?

Job2

Job7

Rear
Job7

A queue
A stack
A pointer
A variable

Front

Job6

Front

Which ADT is BEST described as LIFO


structure?

A.
B.
C.
D.

Job5

C.

7
4
6
5

A.
B.
C.
D.

Job8

Rear

Front

What is the value of i at the end of the


pseudocode?

A.
B.
C.
D.

Job7

B.

x = 1;
i = 1;
while (x < 10)
begin
x = 2*x
i= i + 1;
end;

3.

Job6

Front

Refer to the following pseudocode for this


question

A.
B.
C.
D.

Job5

Job5

A.
B.
C.
D.

Job6

c++
c-+
c- c = 1 +1

Rear
11. What is the final value of x when the code int
x; for(x=0; x<10; x++) {} is run?

2010 DTHS IT DEPT.

Page 2 of 5

A.
B.
C.
D.

10
9
0
1

B.

const int MAX = 5;


int main ()
{
int numbers[MAX];
int index;

13.

What are three parts of a feasibility analysis?

A.
B.
C.
D.

legal, environmental and political feasibility


political, legal and technical feasibility
technical, political and economic feasibility
economic, legal and technical feasibility

What is the array name?

19. Which one of the following is included in the


software requirements specification?

A.
B.
C.
D.

A. error handling
B. data description
C. functional description
D. performance description

MAX
index
numbers
const int

What is the array size?


A.
B.
C.
D.

14.

18.

C.

Refer to the codes shown below for questions 12 14.

12.

identification of current virtual and logical


system(s)
identification of current physical and logical
system(s)
identification of current corporate strategies

20. A software project classifies system entities,


their activities and relationships. The classification
and abstraction of system entities is important.

Not shown
0
5
MAX 1

Which modeling methodology most clearly shows


the classification and abstraction of entities in the
system?

What data type would be valid for the array?


A.
B.
C.
D.

A.
B.
C.
D.

Characters
Strings
Not specified
Integer

21. Which three non-functional system


requirements are affected by system
architecture?

15. What does the following code do?


stack.push(12);
A.
B.
C.
D.
16.

data flow model


event driven model
object oriented model
entity-relationship model

A.
B.

Cost, security and usability


Security, performance and
maintainability
C.
Usability, maintainability and
performance
D. Performance, security and maintainability
E. Maintainability, cost and usability

Remove the element 12 from list


Add the element 12 to list
Set stack size to 12
Set stack line to run 12 times

Which term is used to describe a software


feature that allows it to have appropriate
user interface and adequate documentation?

22. Which statement about a prototype is true?


A.

A.
B.
C.
D.

It is a functional model of the entire


system.
B. It is the complete untested product ready
for final review by the customer.
C.
It is necessary in order to accurately
verify that the product is progressing in
accordance with requirements
specifications.
D. It is a full-scale model of the entire
system at some partial stage in
development showing the functional form
of the system.

Dependability
Maintainability
Efficiency
Usability

17.

You are auditing current customer practices


potentially amenable to software
application(s). Which should be part of the
audit?

A.

identification of current logical and virtual


system(s)

2010 DTHS IT DEPT.

23. What is usability in software engineering?

Page 3 of 5

the ability of the end user to use the


product successfully
B. a measure of the relative effort required
to learn how to use a software product
C. the degree to which the product integrates
with the environment in which it is used
D. a metric that describes the degree to
which a software product meets its
requirements

utilizes these four phases: Planning, Risk


Analysis, Engineering and Evaluation?

A.

24. What is the purpose of a test case specification


in software engineering?
A.

to specify the sequence of actions for the


execution of a test
B. to specify inputs, predicted results, and a
set of execution conditions for a test item
C. to list the test procedures to be performed
on the integration of the software with
hardware
D. to list the specific tests to be conducted on
the integration of each software module
with other modules

A.
B.
C.
D.

30. Which of the following BEST describes a sink


in a DFD?
A. The origin of the data
B. The receiver of the information
C. Place to keep the data for later use
D. A series of steps that manipulate data
31. Which OSI layer signals all clear by making
sure the data segments are error-free?
A.
B.
C.
D.
32.

25. In which stage of software development is


codes produced?
A.
B.
C.
D.

Requirements
Implementation
Design
Testing

33.

Requirements
Implementation
Design
Testing

27. Which of the following actually automate the


production of code using information
gathered and produced during one of the
software development phases?
A.
B.
C.
D.

Structured Chart
HIPO chart
CASE Tool
Object Tool

28. What does this symbol


represent in a DFD?
A.
B.
C.
D.

Process
Data store
Real time link
Data flow

29. Which of the following life cycle models

2010 DTHS IT DEPT.

Table
Resource
Network
Client

A process of transferring data by placing it


in a temporary working area where another
program may access it for processing at a
later point in time is called
A.
B.
C.
D.

36.

Session layer
Application layer
Presentation layer
Transport layer

A _________________ links two or more


computers together to communicate
and share resources.
A.
B.
C.
D.

35.

Star
Bus
Ring
Token ring

Which layer of the OSI model has the


important role of providing error checking?
A.
B.
C.
D.

34.

Application layer
Session Layer
Transport Layer
Network Layer

Which topology is the easiest to modify?


A.
B.
C.
D.

26. From which phase are deliverables used to


develop system codes?
A.
B.
C.
D.

Prototyping
Spiral
Fountain
Waterfall

Polling
Interrupt
Spooling
Paging

Which layers make up the upper OSI model


layer?
A. Physical, Data link, network

Page 4 of 5

B. Session, Application, Physical


C. Data link, Network, Presentation
D. Session, Presentation, Application
37.

How do SSL-enabled URLs begin?


A.
B.
C.
D.

38.

Which of the following terms describes the


use of disk space to simulate RAM?
A.
B.
C.
D.

39.

Polling
Paging
Buffering
Thrashing

43.

The term used to describe a device that has


the ability to pro-actively signal the
processor as soon as it has completely its I/O
task.
A.
B.
C.
D.

41.

Thrashing
Throttling
Virtual Memory
Buffering

Which of the following terms describes the


retrieval of data from secondary storage in
same-size blocks?
A.
B.
C.
D.

40.

shttp://
http://
https://
hssl://

A.
B.
C.
D.
44.

Polling
Interrupt
Spooling
Buffering

45.

Multiplexing
Multitasking
Dual process
Simplex

Which of the following access methods for


mobile networks uses cellular telephone
systems in the 800-MHz and 1.9-GHz
bands?
A.
B.
C.
D.

In the process management model the term


used to describe a process that is currently
being executed is:

TDMA
CDMA
GSM
HCSD

In the process management model the term


used to describe a process that is queuing
and prepared to execute when given the
opportunity is:

When a device such as a CD Burner is


tasked with writing data to a disc, it would
be a waste of both time and resources to stop
all other programs from running until the
CD Drive had completed its task. As
processors are incapable of doing nothing, it
would instead constantly check whether the
CD Drive had yet completed its task. This
method of checking process constantly is
termed:

A.
B.
C.
D.

A.
B.
C.
D.

A.
B.
C.
D.
42.

An OS that is capable of executing many


processes concurrently is called:

Ready
Running
Blocked
Executed

Ready
Running
Blocked
Executed

2010 DTHS IT DEPT.

Page 5 of 5

Throttling
Thrashing
Polling
Bootstrapping

Vous aimerez peut-être aussi