KINGDAVIDCOMPREHENSIVECOLLEGE
P.O.BOX 1377 Tel: 243.53.13.87 / 677.78.18.01
KDCC E-mail:
[email protected] SOUBOUM - DOUALA
SECOND SEQUENCE EVALUATION
Duration 1hr Subject: Computer sc
STUDENT NAME_______________________________________________________________________
NO______________________
Date____________________
LOWER SIXTH SCIENCE
SECTION A: MCQ. Mark an (x) on the letter of the correct answer
1. Transmission media are usually categorized as __________
a. fixed or unfixed
b. determinate or indeterminate.
c. guided or unguided.
d. metallic or nonmetallic.
2. ___________ cable consists of an inner copper core and a second conducting outer sheath.
a. Twisted pair
b. Fiber-optic
c. Radio
d. Shielded twisted pair.
3. Which of the following is not a guided medium?
a. Twisted – pair.
b. Coaxial cable
c. Fiber-optic
d. Atmosphere
4. Which of the following primarily uses guided media?
a. Cellular telephone system
b. Local telephone system
c. Satellite Communications
d. Radio broadcasting
5. The amount of uncertainty in a system of symbol is called ______
a. bandwidth
b. entrophy
c. loss
d. Quantum
6. Coaxial cable has conductors with ________
a. equal resistance
b. the same diameter
c. a common axis
d. above the common axis
7. A device that converts digital signals into analog signals is __________
a. a packet
b. gateway
c. modem
d. repeater
8. All of the parts in a computer talk to each other by sending _________
a. digital signals
b. smoothly varying signal waves
c. analog signals
d. light
1. Username and password are used for users.
a) Identification and authentication
b) Encryption
c) personal identification
d) access to computers
2. What is a firewall in computer network?
a) The physical boundary of network
b) A network topology
c) A system designed to prevent unauthorized access
d) A web browsing software
3. People who gain unauthorized access to computers for the fun of it, but do not intentionally do
damage, are __
a) Employees
b) Hackers
c) Crackers
d) Cyberbully
4. What kind of device that an authenticates a person's identity by translating a personal
characteristic, such as a fingerprint reader?
a) Authentication
b) Personal
c) Biometric
d) Identification
5. ____________ is to protect data and passwords.
a) Encryption
b) Biometric device
c) Possessed objects
d) PIN
6. Which of the following are known as office-oriented application software?
a) Interpreters, Compilers, editors
b) Network software, backup system
c) Word processors, spreadsheets, database
d) Both a and c
7. Which utility software or program is used to reduce the size of files to increase the amount of
disk space in the computer system?
a) Disk cleanup
b) File compression
c) Disk fragmentation
d) Troubleshooting program
8. In Operating Systems, which of the following is/are CPU scheduling algorithms?
a) Priority
b) Round Robin
c) Shortest Job First
d) All of the mentioned
9. _____________ is a program that displays an online advertisement in a banner or pop-up
window on Web pages, email, or other Internet services.
a) Advert
b) Spyware
c) Spam
d) Adware
10. A computer program that functions as an intermediary between a computer user and the
computer hardware is called
a) Software
b) Hardware
c) operating system.
d) Driver
11. Give the process that converts readable data into unreadable pattern to prevent unauthorized
access.
a) Piracy
b) back up
c) biometric scanning
d) encryption
12. Which software is used to manage and control the hardware components and allows interaction
between the hardware and the other different types of software?
a) Application software
b) System software
c) Utility software
d) Operating system
13. To access the services of the operating system, the interface is provided by the ___________
a) Library
b) System calls
c) Assembly instructions
d) API
14. Which one of the following is not true?
a) kernel remains in the memory during the entire computer session
b) kernel is made of various modules which cannot be loaded in running operating system
c) kernel is the first part of the operating system to load into memory during booting
d) kernel is the program that constitutes the central core of the operating system
15. When a process is in a “Blocked” state waiting for some I/O service. When the service is
completed, it goes to the __________
a) Terminated state
b) Suspended state
c) Running state
d) Ready state
SECTION B: ANSWER ALL QUESTIONS
1. a. What is a process scheduler? State the characteristics of a good process scheduler?
b. What is scheduling? What criteria affects the schedulers performance?
c. Explain time slicing. How its duration affects the overall working of the system.
d. What is Shortest Remaining Time, SRT scheduling?
e. Find out which algorithm among FCFS, SJF And Round Robin with quantum 10, would give
the minimum average time for a given workload.
f. Differentiate between the following
i. Batch processing and real time processing?
ii. Multiprogramming and multiprocessing os Operating Systems Process Scheduling
2. A coffee company has coffee shops located across the country. Each shop has its own Local Area
Network (LAN). The company wants to connect the shops in a Wide Area Network (WAN).
a. Describe two characteristics of a WAN
b. Describe two characteristics of a LAN.
c. Describe one piece of hardware that each shop will need to connect their LAN to the
company's WAN
d. Differentiate between synchronous and asynchronous data transmission
e. Differentiate between simplex and half duplex data transmission including examples
f. Differentiate between parallel and serial data transmission
3. Suppose that the following processes arrive for execution at the times
4. Suppose that the following processes arrive for execution at the times indicated. Each process
will run for the amount of time listed. In answering the questions, use non-preemptive scheduling,
and base all decisions
on the information you have at the time the decision must be made.
Process Arrival Time Burst Time
P 0.0 8
1
P 0.4 4
2
P 1.0 1
3
a. What is the average turnaround time for these processes with the
FCFS scheduling algorithm?
b. What is the average turnaround time for these processes with the
SJF scheduling algorithm?
c. The SJF algorithm is supposed to improve performance, but notice
that we chose to run process P at time 0 because we did not know
1