COMPUTER SS2 2ND QUE. Mid Term Test Computer Studies
Edu Delight Tutors
Mid Term Test Computer Studies
COMPUTER SS 2
Second Term Questions
COMPUTER SS2 2ND QUE.
SECTION A
1. A collection of wires through which data is transmitted from one part of a computer to another is known as _______
A. Address B. Bus C. Register
2. Computer data processing is grouped into the following EXCEPT one.
A. Conversion B. Manipulation C. Register
3. The following are types of register EXCEPT ___________
A. CMR B. CIR C. MDR
4. ___________ register acts like a buffer and holds data that is transferred from the memory to the processor.
A. MDR B. CIR C. CPU
5. __________ is a collection of related fields
a. Data b. Field c. Record d. file
6. The smallest unit of information stored in computer file is called ________
a. Files b. Data item c. Record d. Indexed
7. A file with reasonable amount of permanency is known as__________ file.
a. Reference files b. Master file c. Transaction file d. serial file
8. ________ refers to the unforeseen loss of data or information.
a. Backup b. Data loss c. Overwriting d. Antivirus
10. _______ is the process of making copies of files, so that the additional copies may be used to restore the original after data loss event.
a. Manipulating b. Data Loss Event c. Backup d. Duplication
11. An occurrence of data loss can be called ________________
a. Data Loss Event b. Data Loss Occurrence c. Data Loss Show d. Data Loss occasion
12. The following are limitations of computerized file system EXCEPT one.
a. Vulnerable to virus attacks b. Incompatible data file c. Cheap to set it up d. Data are often duplicated
13. The following are examples of a word processor EXCEPT one.
a. Corel Draw b. Microsoft Word c. Word Perfect d. Perfect Writer
14. _______ is the use of computer software to create, edit, view, store, retrieve and print text document.
a. Word Processor b. Word Communication c. Word Processing d. Word Application
15. The following are types of display effect of a Font Style EXCEPT one
a. Italics b. Underline c. Times New Roman d. Bold
16. ________feature create a text with spacing before and after.
a. Indent and Spacing b. Superscript c. Change Case d. Double strike through
17. The following are the Water fall Development cycle stage EXCEPT______
a. Investigation Stage b. System analysis Stage c. System manufacturing Stage
d. System design Stage
18. The oldest and classical method of SDLC is called_________ a. Waterfall Mean
b. Waterfall Model c. Waterfall Median d. Waterfall Mode
19. . One of the following is NOT an information system component part. a. People
b. Communication Network c. IT room d. Data/ Information
20. The following are classical types of information system EXCEPT one.
a. Transaction Processing Systemb. Development Processing System
c. Management information Systemd. Executive information system
21. ___________is the person that uses analysis and design techniques to solve business problem using information technology.
a. Programmer b. Data Entry Staff c. System Analyst d. Computer Engineer
22. The following are skills of a system Analyst EXCEPT one
a. Information Technology knowledge and programming expertise
b. Solving the problem using figures
c. People Management knowledge and skill
d. Understanding business problem
23. ___________is the process of understanding in details what a system should accomplish it and what is required to accomplish it.
a. System Design b. System Analyst c. System Analysis d. SDLC
24. The following are advantages of System Development Life Cycle EXCEPT one
a. Help in inefficient allocation of resources to systems development project
b. Promotes consistency among systems development project
c. Simple and easy to use
d. Easy to manage due to the rigidity of the model
25. The actual writing or coding of program in a particular programming language is known as_________
a. Debugging b. Program Coding c. Program Executing d. Program Decoding
26. The following are characteristics of a good program EXCEPT one.
a. Accuracy b. Clarity c. Compatible d. Readability
27. The following are characteristic of an interpreter EXCEPT one
a. Execution is fast b. The resulting code is some sort of intermediate code c. The resulting code is interpreted by another program d. relatively little time is spent analyzing and processing the program
28. _________ is a list of instruction issued to the computer to perform a particular task.
a. Algorithm b. Computer program c. Hardware d. Peripherals
29. _________ is the step by step procedure of solving a particular problem.
a. Problem b. sequence c. algorithm d. symbol
30. _________ is the diagrammatic representation of a step by step procedure of solving a particular problem.
a. Algorithm b. Program c. Flowchart d. sequential solution
31. The following are characteristic of a flowchart EXCEPT one
a. Flowcharts are read and drawn from bottom to top b. Flowcharts end symbol signifies the end of a program c. Flow line are used to connect the flowchart symbols
32. Different flowchart symbols are used for different operation.
33. The flowchart symbol represents _____________
a. Pre-define b. Decision c. Input d. Processing
34. BASIC means BEGINNNERS ALL-PURPOSE SYMBOLIC INSTRUCTION ……………..
(a) Code (b) Centre (c) Computer
35. ………………….. used to assign (or give) values to variables
(a) REM (b) INPUT (c) LET
SECTION B (THEORY)
1. Write the function of the following BASIC keywords
(a) LET (b) INPUT (c) PRINT (d) REM (e) RUN
2. Define algorithm and flowchart
i. Draw a flow chart to calculate the area of a triangle with base, b and height, h.
ii. Define a program
3. List the steps involved in program development
i. Describe the first stage in system development cycle
ii. Explain at least five (5) systems Analyst problem solving Approach
4. Explain the following; I. System II. Information System III. Subsystem
5. Write out the steps to carry out the following;
(i) Change Case (ii) Subscript (iii) Superscript List and explain the three methods for files security
6. List and explain the different method of accessing files.
i. List and explain types of file organization method.
ii. State two differences between register and main memory.