Nile University Computer Science Final Exam CSC 101
30 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary key in a database?

  • Unique key
  • Secondary key
  • Super key
  • Primary key (correct)
  • Which of the following is an object in a desktop DB designed primarily for data input or display?

  • Forms (correct)
  • Primary key
  • Query
  • Process
  • What is a network that allows an entity to draw income from selling or leasing products?

  • Closed source
  • Closed license
  • Closed network (correct)
  • Closed internet
  • What device connects two heterogeneous networks together?

    <p>Bridge</p> Signup and view all the answers

    What is a server that hosts all hypertext documents controlled by one organization or individual?

    <p>Web site</p> Signup and view all the answers

    What does the acronym HTML stand for?

    <p>Hyper-Text Markup Language</p> Signup and view all the answers

    Which of the following is NOT considered as information?

    <p>Sound</p> Signup and view all the answers

    How do today's computers represent information?

    <p>Bit patterns</p> Signup and view all the answers

    What is the manipulation of true and false values called?

    <p>Boolean operations</p> Signup and view all the answers

    When will an AND operation produce true?

    <p>When both components are false</p> Signup and view all the answers

    Under which condition will an OR operation produce true?

    <p>At least one component is true</p> Signup and view all the answers

    Among the given options, what is NOT a challenge in large projects?

    <p>Limited time frame</p> Signup and view all the answers

    What would be the next element on the queue after deleting twice from the elements 10, 13, 14, 15, 61, and 11?

    <p>15</p> Signup and view all the answers

    What is the term for a set of rules governing how data transmission occurs over a network?

    <p>Protocol</p> Signup and view all the answers

    Which program controls the execution of application programs and acts as an interface between the user and computer hardware?

    <p>Operating System</p> Signup and view all the answers

    What is a network that spans local governments or from city to city known as?

    <p>MAN</p> Signup and view all the answers

    Which of these is not a type of network topology?

    <p>Car</p> Signup and view all the answers

    What device is not required to connect two or more smaller networks to form a larger one?

    <p>Recursive</p> Signup and view all the answers

    What is the correct term for a storage place in the computer where data and information are kept?

    <p>Computer memory</p> Signup and view all the answers

    Which term is used to describe a scheme for organizing data in the memory of a computer?

    <p>Data Structure</p> Signup and view all the answers

    What is NOT an example of a non-linear data structure?

    <p>Queue</p> Signup and view all the answers

    Which part of the operating system handles the communication between the user and the operating system?

    <p>Shell</p> Signup and view all the answers

    Which software performs User-specific tasks?

    <p>Application software</p> Signup and view all the answers

    What performs the basic functions required during computer installation?

    <p>Kernel</p> Signup and view all the answers

    What is the purpose of auditing software?

    <p>To record and analyze system activities</p> Signup and view all the answers

    What is the term used to describe a condition where two or more processes are blocked from progressing?

    <p>Deadlock</p> Signup and view all the answers

    Which data structure exhibits FIFO (First In, First Out) characteristic?

    <p>Queue</p> Signup and view all the answers

    What technology was present in 3rd generation computers?

    <p>Integrated circuit - IC</p> Signup and view all the answers

    Which defense technique is NOT typically used for computer network security?

    <p>Anti-defense</p> Signup and view all the answers

    What type of address is needed for each machine on a network to access the Internet?

    <p>Internet Protocol Address</p> Signup and view all the answers

    Study Notes

    Introduction to Computer Science

    • A computer represents information as bit patterns.
    • Information can be in the form of numbers, video, or messages.

    Boolean Operations

    • Boolean operations involve the manipulation of true and false values.
    • AND operation produces a true output when both components are true.
    • OR operation produces a true output when at least one component is true.

    Project Management

    • Challenges in large projects include effort-intensive, high cost, technical know-how, and changing user needs.
    • Software application development is successful when it is usable, useful, and used.

    Data Structures

    • A queue is a data structure where elements are added and deleted from the same end.
    • A set of rules governing data transmission over a network is called a protocol.

    Computer Systems

    • A program that controls the execution of application programs and acts as an interface between the user and computer hardware is called an Operating System.
    • A network that spans local governments or from city to city is known as a Metropolitan Area Network (MAN).
    • A network that covers a small area, usually within a diameter of a few kilometers, is called a Local Area Network (LAN).

    Networking

    • A device that connects two or more smaller networks to form a bigger one is called a router.
    • A device that allows user to access web pages on the internet is called a web browser.
    • The internet is a network that is designed in a public domain and can be used by anyone without signing any license agreement.

    Data Storage

    • A storage place in the computer where data and information are kept is called computer memory.
    • A scheme for organizing data in the memory of a computer is called a data structure.

    Database Systems

    • A database system consists of a Database (DB) and a Database Management System (DBMS).
    • A field in a database that must always have a unique record is called a primary key.
    • Queries are ways of searching for and compiling data from one or more tables.

    Operating System

    • The operating system is divided into two parts: Shell and Kernel.
    • The Shell part of the operating system handles the communication between the user and the operating system.
    • The Kernel part of the operating system performs the very basic functions required by the computer installation.

    Computer Security

    • A condition in which two or more processes are blocked from progressing is called a deadlock.
    • A device that connects two heterogeneous networks together is called a bridge.

    Computer Fundamentals

    • Hardware devices that accept data, process data, and produce information are called computers.
    • Each machine on a network must have a unique address for the internet, called an Internet Protocol Address (IP Address).
    • The acronym HTML stands for Hyper-Text Markup Language.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Practice questions for the final exam in the course 'Introduction to Computer Science' at Nile University of Nigeria, Department of Computer Science. Test your knowledge on various topics covered by Mr. Asim, Mr. Adeniyi & Mr. Victor during the semester.

    More Like This

    Use Quizgecko on...
    Browser
    Browser