compquiz 2005 - usp.ac.fj. qbasic d. sql e. java 13. putting the records of information into...

12
he South Pacific Computer Society Advancing Information Technology in the South Pacific COMPQUIZ 2005 QUESTION PAPER Total of 50 questions worth 250 marks. Time Allowed: 50 minutes +5 points for correct answer -3 points for incorrect answer 0 point for no attempt INSTRUCTIONS: Enter all answers on answer sheet. Do not begin writing until you are told to do so. Select a multiple-choice answer by putting a circle around that letter. Correct mistakes by putting an “X” through the circle or erasing it completely. If you put an “X” through a circle, it will be considered unmarked. Ambiguous marks will be counted as incorrect. Uses of any other material, including calculators are prohibited. Stop writing as soon as you are told, else you will be disqualified. Computer Quiz 2005 Page 1 of 12

Upload: trannhan

Post on 22-Jun-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

he South Pacific Computer SocietyAdvancing Information Technology in the South Pacific

COMPQUIZ

2005

QUESTION PAPER

Total of 50 questions worth 250 marks. Time Allowed: 50 minutes

• +5 points for correct answer • -3 points for incorrect answer • 0 point for no attempt

INSTRUCTIONS: Enter all answers on answer sheet. • Do not begin writing until you are told to do so. • Select a multiple-choice answer by putting a circle around that letter. • Correct mistakes by putting an “X” through the circle or erasing it completely. • If you put an “X” through a circle, it will be considered unmarked. • Ambiguous marks will be counted as incorrect. • Uses of any other material, including calculators are prohibited. • Stop writing as soon as you are told, else you will be disqualified.

Computer Quiz 2005 Page 1 of 12

he South Pacific Com puter SocietyAdvancing Information Technology in the South Pacific

1. What is the term for the most popular touch screen technology in use? A. Finger Touch Technology B. Etno Ablo Selvis C. Fire-Wire Resistive Technology D. Microsoft TouchPad E. Dell Touch Sensitive 2. In communications technology, what does the term ‘cellular’ originally represent? A. The division of geographic results into cells B. The components of a cordless phone C. The phone itself. D. A brand name. E. A communication line. 3. What is the difference between a virus and a worm in computer terminology? A. They are basically the same. B. A virus affects only PCs, while worms infect both PCs and Macintosh. C. A virus spreads through human actions like file downloads, a worm spreads without help. D. A virus affects the software where as worms are designed to mainly harm computer hardware. E. They are both application software. 4. When and why was the first computer virus created? A. 1983, as part of a Ph.D project. B. 1964, by the US army to destroy Russian computers. C. 1989, as revenge for not getting into prestigious technical college. D. 1995, due to the incresed use of the Internet. E. 1990, it was created accidently. 5. What was the model of the first microprocessor? A. Motorola 8000 MicroChip B. Advanced Micro Devices 01Alpha C. Intel 4004 Computer Microprocessor D. Dell Inspiron 5100 E. IBM MicroThink 6. When was the World Wide Web (WWW) launched? A. 1985 B. 1991 C. 1995 D. 1969 E. 2001 7. What can you do with the Internet? A. Exchange information with friends and colleagues B. Access pictures, sounds, video clips and other media elements C. Find diverse perspective on issues from a global audience D. Post and respond to inquiries on a variety of subjects E. All of the above

Computer Quiz 2005 Page 2 of 12

he South Pacific Com puter SocietyAdvancing Information Technology in the South Pacific

8. The Internet was developed in the... A. early 1990s B. late 1990s C. late 1980s D. early 1970s E. late 1960s 9. What is not always necessary for accessing the Web? A. A Web browser B. A connection to an Internet Service Provider C. A computer D. A modem E. Network protocols 10. If someone has sent you spam, they... A. Signed you up for the Meat of the Month Club B. Sent you an insulting, obscenity-laden e-mail message C. Infected your computer with a virus D. Sent you unsolicited e-mail E. Sent you a cookie 11. What is a spider? A. A computer virus B. A program that catalogs Web sites C. A hacker who breaks into corporate computer systems D. An application for viewing Web sites E. An anti-virus software 12. Which of the following is the standard language used to create databases, and store, manipulate and

retrieve information from databases. A. C++ B. PASCAL C. QBASIC D. SQL E. Java 13. Putting the records of information into alphabetical order in a database is called: A. Sorting B. Searching C. Shifting D. Inserting E. Deleting 14. A printout of records of information from a database is sometimes called a A. Form B. Page C. Message D. Report E. List

Computer Quiz 2005 Page 3 of 12

he South Pacific Com puter SocietyAdvancing Information Technology in the South Pacific

15. Which of the following is not an example of a database? A. Address Book B. Telephone Book C. Dictionary D. Bar Graph E. Patient records 16. Which of the following is some form of document production software? A. Word processing B. Desktop publishing C. Web authoring D. All of the above E. A and B only 17. A document production software typically allows you to define a(n) ____ that lets you apply several

font and paragraph elements with a single click. A. applique B. style C. format D. justification E. frame 18. _____ is a collection of drawings and photos designed to be inserted in documents. A. Photo art B. Word art C. Frame D. Clip art E. Picture art 19. The ____ for a document refers to the way that all of the elements of a document are arranged on the

page. A. format B. style C. font D. readability E. margin 20. Font size is measured as ____ size. A. illustration B. point C. document D. paragraph E. page

Computer Quiz 2005 Page 4 of 12

he South Pacific Com puter SocietyAdvancing Information Technology in the South Pacific

21. A single application that combines the major features of several types of applications is called ________.

A. Integrated software B. A suite C. A combo package D. High-end E. An amalgamation 22. A computer which links several PCs together in a network is called a _______. A. Minicomputer B. Server C. Client D. Mainframe E. Laptop 23. The advantage of using a spreadsheet is: A. calculations can be done automatically. B. changing data automatically updates calculations (as long as Excel is not set to calculate manually). C. more flexibility D. all of the above E. A and B only. 24. The formula =$c$3*D3 is located in cell B1. If this was copied and pasted into cell C1, what would the

resulting formula be:

A B C D 1 =$C$3*D3 ????????? 2 3 3 4 6 3 5 4 3 8 4 4 3 4 9

A. =$c$3*E3 B. =c3*e3 C. =$c$3*D3 D. =$c$3*C1 E. 24

25. One byte is the equivalent of how much text? A. One Page of text B. One sentence C. One letter D. One paragraph E. One Clipart

Computer Quiz 2005 Page 5 of 12

he South Pacific Com puter SocietyAdvancing Information Technology in the South Pacific

26. Which local company is behind the idea of creating the ICT Park in Vatuwaqa starting early 2006?

A. DATEC Fiji Ltd B. Vodafone Fiji Ltd C. JICA – ICT Project Group D. ATH E. UNDP 27. What was ‘Spacewar’? A. The first attempt at a Missile Defense System B. The first computer game (published in 1962) C. The working title for the movie ‘Star Wars’ D. The first satellite put in orbit around the earth E. The race to gain supremacy in space technology by Russia and the USA. 28. Which company recently became the provider for wireless broadband internet technology in Fiji?

A. Wireless Fiji Ltd B. Unwired Fiji C. Connect Fiji Ltd D. Telecom Fiji Ltd E. Amalgamated Telecom Holdings 29. Who is regarded as "The Father of the Internet”?

A. Charles Babbage B. Vincent Cerf C. Blais Pascal D. Robbertson Croff E. Robert Kahn 30. World’s richest man for the past years, Bill Gates holds what position at Microsoft Corporation?

A. Chief Executive Officer (CEO) B. Chairman and Chief Software Architect for Microsoft. C. General Manager Software and Hardware Solutions. D. Vice – President of Microsoft Corporation. E. General Manager of Information Products 31. Approximately how many bytes make one Megabyte A. One million B. One trillion C. One hundred million D. Two hundred million E. One thousand

Computer Quiz 2005 Page 6 of 12

he South Pacific Com puter SocietyAdvancing Information Technology in the South Pacific

Please refer to information below to answer questions 32 & 33. Computers employ several types of codes to represent character data including ASCII, EBCDIC and Unicode. ASCII requires 7bits to represent each character. A superset of ASCII, called Extended ASCII, uses eight bits to represent each character. The Extended ASCII representation of the letter “A” is 01000001 & “B” is 01000010 The corresponding octal representation of letter “A” is 101 & “B” is 102

32. If letter “S” is at the 18th position from “A”, what would be the correct ASCII representation of “S”? A. 01010011 and 123 B. 01010010 and 122 C. 01010100 and 124 D. 01010011 and 119 E. 10111011 and 101 33. If the binary Extended ASCII notation of letter “a” is 01100001, what would be the hexadecimal and

octal notations of “a” respectively? A. 2A and 141 B. 2A and 01100001 C. 61 and 141 D. 61 and 97 E. non of the above For questions 34, study the following diagram.

34. Which device is shown above? A. A USB portable hard disk B. A USB flash drive C. An internal computer hard disk D. A motherboard E. A USB portable floppy drive

Computer Quiz 2005 Page 7 of 12

he South Pacific Com puter SocietyAdvancing Information Technology in the South Pacific

Please refer to the diagram to answer question 35

The above diagram shows RJ-45 Ethernet Cable connection which are used in setting up Local area networks. 35. Which of the following option best gives the layout for a cross-over cable? A. Both ends would have 568A color wiring. B. Both ends would have 568B color wiring C. One end would have a 568A color wiring while the other would have a 568B color wiring. D. One end would have a 568A color wiring, while the other would have an inverse mapping of a 568B color wiring E. There is nothing known as cross-over cable 36. Name a substitute networking cable which is been used now. A major advantage of this cable is that it

is immune to Electro Magnetic Interference (EMI), can transport huge amounts of data per second and is composed of tiny glass filaments.

A. Twisted Pair cable B. Coaxial cable C. RJ-45 cable D. Copper cable E. Fiber Optic cable

Computer Quiz 2005 Page 8 of 12

he South Pacific Com puter SocietyAdvancing Information Technology in the South Pacific

Please refer to the following notes to answer question 37 For the past one year, you have been using Ceaser cipher to constantly and securely communicate with your boyfriend/girlfriend via writing letters. This technique was successful in preventing your parents from catching you two, but recently they have come to know of your cipher key and were able to decrypt your letters. So both of you get together again and decide on a mutual and improved Encryption method whereby you are going to encode all of your messages sent using the Vigenere ciphers encryption method. A brief description of Vigenere ciphers is given below. Vigenere ciphers – Is an encryption technique designed by improving the mono-alphabetic encryption (Ceaser cipher). The idea behind Vigenere ciphers is to use multiple mono-alphabetic ciphers, with a specific mono-alphabetic cipher to encode a letter in a specific position in the plaintext message. You agree to use two different Ceaser ciphers, C1 (k=5), C2 (k=19) in the order; C1,C2,C1,C1,C2 and then the pattern will repeat. i.e. the first letter of the plain text will be encoded using C1, second letter using C2, third letter using C1, fourth using C1, fifth one using C2 and then for the sixth one, the entire pattern will repeat again. Plaintext Letter a b c d e f g h i j k l m n o p q r s t u v w x y z C1 (k=5) f g h i j k l m n o p q r s t u v w x y z a b c d e C2 (k=19) t u v w x y z a b c d e f g h i j k l m n o p q r s 37. Match the sentence which best encodes your message to your girlfriend/boyfriend. MESSAGE: We did it A. sleepy am i, away dad and mum. B. bx inw nm C. cy jos nm D. we did it again E. zi did te 38. What is Wi-Fi in terms of computer networking A. type of computer. B. type of network cable C. set of popular technologies and standards for wireless computer networking D. set of computer programs that help people make money on the Internet E. What in Fiji? 39. You can make telephone calls over the Internet using a technology called A. Intertel. B. Telnet C. FTP D. VoIP E. Voice over wires 40. Julian is a sales rep calling on up to 20 businesses a week. To keep track of his appointments and his

clients' addresses and phone numbers, he should use a _____. A. personal information manager B. database C. spreadsheet D. project manager E. address book

Computer Quiz 2005 Page 9 of 12

he South Pacific Com puter SocietyAdvancing Information Technology in the South Pacific

41. This Web site feature involves tailoring pages to individual users' characteristics or preferences. A. Digital Silhouettes B. customer relationship management C. Platform for Privacy Preferences D. clickstream analysis E. personalization 42. This is an industry term used to describe the progression of steps a customer goes through when

considering, purchasing, using, and maintaining loyalty to a product or service. A. collocation B. pervasive computing C. customer life cycle D. decision support system E. predication 43. This Internet business model generates revenue by offering pay-per-view Web pages, Web links, or

Web services for small amounts of money. A. eCash B. micropayment C. smart card D. electronic bill presentment and payment E. Electronic Funds Transfer 44. This is an industry term for software that analyzes data about customers to develop a better

understanding of the customer and how the customer is using a company's products and services. A. content aggregator B. adware C. spyware D. Fourier analysis E. enterprise relationship management 45. This type of Internet business charges individuals or enterprises an access fee for applications and

related services that would otherwise have to be located in their own personal or enterprise computers. A. Web services B. metered services C. knowledge warehouse D. application service provider E. Internet service provider

Computer Quiz 2005 Page 10 of 12

he South Pacific Com puter SocietyAdvancing Information Technology in the South Pacific

46. Introducing TurtleGraphics. Imagine you have a small turtle who responds to certain commands like “move forward some steps”, “move back some steps”, “turn right some angle”, and “turn left some angle”. Imagine also that this turtle carries a pen (or just leaves a trail of green slime wherever it crawls-- the pond he came out of was none too clean). As long as our turtle follows the commands without tiring, we can get it to make rather intricate patterns easily.

Four Basic TurtleGraphics Commands Here is a table of a few of the most common TurtleGraphics procedures, in this case TurtleGraphics commands.

Command Description Example fd steps Moves the turtle forward, in the direction it is facing, by the

specified number of turtle steps. fd 100

bk steps Moves the turtle backward, i.e., exactly opposite to the direction that it's facing, by the specified number of turtle steps.

bk 100

lt angle Turns the turtle counterclockwise by the specified angle measured by a number of degrees (1/360 of a circle).

lt 90

rt angle Turns the turtle clockwise by the specified angle, measured in degrees (1/360 of a circle).

rt 90

The following commands will draw a square as shown (Assume the turtle starts off pointing North):

fd 100 rt 90 fd 100 rt 90 fd 100 rt 90 fd 100 rt 90

Which of the following sequence of commands will draw the pattern below? (Assume step size is 30 and angle making the triangle is 30 and the turtle starts off pointing North)

A. fd 30 lt 30 fd 30 rt 60 fd 30 lt 30 fd 30

lt 30 fd 30 lt 30 fd 30 rt 60 fd 30 lt 30 fd 30 B. rt 90 fd 30 lt 30 fd 30 rt 30 fd 30 lt 30 fd 30

lt 30 fd 30 lt 30 fd 30 rt 30 fd 30 lt 30 fd 30 C. rt 90 fd 30 lt 30 fd 30 rt 60 fd 30 lt 30 fd 30

lt 30 fd 30 lt 30 fd 30 rt 60 fd 30 lt 30 fd 30 D. rt 180 fd 30 lt 30 fd 30 rt 60 fd 30 lt 30 fd 30

lt 30 fd 30 lt 30 fd 30 rt 60 fd 30 lt 30 fd 30 E. None of the above.

Computer Quiz 2005 Page 11 of 12

he South Pacific Com puter SocietyAdvancing Information Technology in the South Pacific

47. A programming language has special operators for incrementing or decrementing variables. The operator “++” is the incrementing operator and the operator “--“is the decrementing operator. These operators add or subtract 1 from the value of the variable. But there are two forms of these operators, “prefix” and “postfix”. The term prefix and postfix means the operator appears before and after the variable respectively.

The use of both of these forms for incrementing in an expression is given below. Assume a, i and c are integer variables.

Form Expression Expanded Form Prefix a = ++i + c i = i + 1

a = i + c Postfix a = i++ + c a = i + c

i = i + 1

The same is for decrementing variables.

Hence, for the following expression give the final values for a and i?

i = 10 a = i + 20 + ++i + i--

A. a = 53 i = 11 B. a = 52 i = 10 C. a = 52 i = 11 D. a = 53 i = 10 E. None of the Above 48. For any positive integer n, the number of times that n could be divided by 2 until n = 1 is? (floor(x) returns the

largest integer that is less than or equal to x) A. 2(log )floor n

B. 2(log 1)floor n +C. 2(log 2)floor n +D. 2(log *2)floor nE. All of the above 49. USENET is... A. A set of tools reserved exclusively for Internet administrators B. Short for United States Electronic Network C. A bulletin board system that allows for posting and responding to messages on the Internet D. A precursor to the Internet that is now obsolete E. All of the Above 50. Why were punching cards invented? A. To tabulate the US census data in 1890 more efficiently. B. Demand for better statistics during World War I C. Military demands during the 1920s required large amounts of data. D. All of the above E. None of the above

Computer Quiz 2005 Page 12 of 12