Higher Computing Quiz; Part 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Gracore
G
Gracore
Community Contributor
Quizzes Created: 1 | Total Attempts: 702
| Attempts: 702 | Questions: 16
Please wait...
Question 1 / 16
0 %
0/100
Score 0/100
1. All computers in a network are controlled by a single head computer. What type of network is this?

Explanation

In a client-server network, all computers are controlled by a single head computer known as the server. The server manages resources, data, and communication between the clients. Clients, on the other hand, are individual computers that request and receive services from the server. This type of network architecture allows for centralized control and management, making it suitable for scenarios where a central authority needs to manage and distribute resources to multiple clients.

Submit
Please wait...
About This Quiz
Computing Quizzes & Trivia

A quiz made to help myself revise for Higher Computing for an SQA final exam. Questions are created using SQA 2009 higher past paper and their answer sheets.

2. Write the binary number 1000100111 as a positive integer.

Explanation

The binary number 1000100111 can be converted to a positive integer by multiplying each digit by the corresponding power of 2 and then summing them up. Starting from the rightmost digit, the first digit is 1 and it is in the 9th position from the right. The second digit is 1 and it is in the 8th position from the right. The third digit is 1 and it is in the 7th position from the right. The fourth digit is 0 and it is in the 6th position from the right. The fifth digit is 0 and it is in the 5th position from the right. The sixth digit is 0 and it is in the 4th position from the right. The seventh digit is 1 and it is in the 3rd position from the right. The eighth digit is 0 and it is in the 2nd position from the right. The ninth digit is 0 and it is in the 1st position from the right. The tenth digit is 1 and it is in the 0th position from the right. By adding up the values of the digits in their respective positions, we get 551 as the positive integer representation of the binary number 1000100111.

Submit
3. 'Unable to run on available OS' / 'Clash with existing software' -  Are these examples of Hardware incompatibility or Software Incompatibility?

Explanation

The examples given, "Unable to run on available OS" and "Clash with existing software," are both related to issues that arise due to software incompatibility. Hardware incompatibility refers to situations where hardware components are not compatible with each other, causing issues in their functioning. However, in this case, the problems mentioned are specifically related to software, such as the inability to run on a particular operating system or conflicts with existing software. Hence, these examples fall under the category of software incompatibility.

Submit
4. A disk editor is a common example of a (_______) software. 

Explanation

A disk editor is a common example of utility software. Utility software refers to a type of software that provides additional functionality or tools to enhance the performance and efficiency of a computer system. A disk editor is specifically designed to allow users to directly access and modify the contents of a disk or storage device at a low-level, bypassing the operating system. It is commonly used for tasks such as data recovery, disk analysis, and troubleshooting.

Submit
5. The username is created by joining the initial to the end of the surname, for example “CarrickE”.Name the string operation used to create the username.

Explanation

The correct answer is Concatenation. Concatenation is the string operation used to join or combine two or more strings together. In this case, the initial and the end of the surname are being joined together to create the username.

Submit
6. "Stages are revisited/repeated" "As a result of new information/information gained later in the process""In order to improve the solution"
These are examples of the (________) process. 

Explanation

The given correct answer, "iterative," is supported by the explanation provided. The statement "Stages are revisited/repeated" suggests that the process involves going back to previous stages or steps. The phrase "As a result of new information/information gained later in the process" indicates that new information is obtained during the process, which leads to the need for revisiting or repeating stages. Additionally, the phrase "In order to improve the solution" implies that the purpose of revisiting or repeating stages is to enhance the solution. All of these characteristics align with the iterative process, where steps are repeated to refine and improve the solution.

Submit
7. The bootstrap loader is part of the operating system. State the purpose of the bootstrap loader.

Explanation

The purpose of the bootstrap loader is to locate and load the rest of the operating system at start-up. It is responsible for initializing the system and loading the necessary components into memory, allowing the operating system to fully start and execute its functions. Without the bootstrap loader, the operating system would not be able to properly start and function.

Submit
8. Represent the decimal number − 73 using 8 bit two’s complement.

Explanation

The given answer, 10110111, represents the decimal number -73 using 8 bit two's complement. In two's complement representation, the most significant bit (MSB) is the sign bit, where 0 represents a positive number and 1 represents a negative number. In this case, the MSB is 1, indicating a negative number. The remaining bits, 0110111, represent the magnitude of the number in binary form. To obtain the negative value, we invert all the bits and add 1. Inverting 0110111 gives 1001000, and adding 1 gives 1001001, which is the given answer.

Submit
9. State the number of bits required to represent 16 777 216 colours.

Explanation

To represent 16,777,216 colors, we need to use 24 bits. This is because 24 bits can represent 2^24 different combinations, which is equal to 16,777,216. Each bit can have two possible values (0 or 1), so by using 24 bits we can represent a wide range of colors.

Submit
10. A graphic file is to be transferred as an e-mail attachment. Which file type would be more appropriate, and why?

Explanation

JPEG would be more appropriate for transferring a graphic file as an e-mail attachment because it offers higher compression, which reduces the file size and makes it easier and faster to send via email. However, JPEG is a lossy format, meaning that it sacrifices some image quality to achieve this compression. In contrast, TIFF is a lossless format that preserves all the details and quality of the image, but it has no compression, resulting in larger file sizes that may be more difficult to send via email.

Submit
11. A trojan horse is a malicious computer program. Which are characteristic of a trojan horse.

Explanation

A trojan horse is a malicious computer program that disguises itself or appears to be a harmless/ordinary/useful file. It does not spread by infecting other files or self-replicating. Once loaded on the system, it may continue to disguise itself to avoid detection.

Submit
12. Possible technical reasons for choosing a client-server network over a peer-to-peer network.

Explanation

A client-server network allows for easier backups with a centralized file server because all the data is stored in one location, making it easier to back up and restore. It also provides better security of data because access to the data can be controlled and monitored at the server level. Additionally, software servers allow better control of licensing, upgrades, and remote installation, as the server can manage and distribute software licenses, updates, and installations to the clients.

Submit
13. Explain why increasing the number of registers could improve system performance.- Tick if true.

Explanation

Increasing the number of registers can improve system performance because it reduces the number of fetches required from main memory, RAM, or cache. Accessing data in registers is faster compared to accessing data in RAM or cache. Therefore, having more registers allows the system to store and access frequently used data more quickly, reducing the overall time required for data retrieval and improving system performance.

Submit
14. Which are possible hardware compatibility issues?

Explanation

Possible hardware compatibility issues include lack of available memory, a less powerful or unsuitable processor, and an unsuitable graphics or sound card. These issues can arise when the hardware components do not meet the requirements of the software or the system.

Submit
15. Most modern computers use Unicode rather than ASCII to represent text.Select the true advantages of Unicode when compared to ASCII.

Explanation

Unicode can represent all character based alphabets, which means it can support a wide range of languages and scripts. Characters can also be user or software defined, allowing for customization and flexibility. In contrast, ASCII has a limited character set, which restricts its usage to a small number of characters. Additionally, ASCII does not allow for user defined characters, further limiting its capabilities. The statement that Unicode takes up less memory than ASCII is not true and is therefore not an advantage of Unicode over ASCII.

Submit
16. Which of these are not functions of a disk editor?

Explanation

A disk editor is a software tool that allows users to directly edit the contents of disk sectors or blocks. It also enables the user to recover damaged or deleted blocks/files by accessing and modifying the disk's data. However, creating secure locations for file backups and setting up firewalls within the disk are not functions typically associated with a disk editor. These tasks are usually performed by backup software or security applications designed specifically for those purposes.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 19, 2010
    Quiz Created by
    Gracore
Cancel
  • All
    All (16)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
All computers in a network are controlled by a single head...
Write the binary number 1000100111 as a positive integer.
'Unable to run on available OS' / 'Clash with existing software' -...
A disk editor is a common example of a (_______) software. 
The username is created by joining the initial to the end of the...
"Stages are revisited/repeated" "As a result of new...
The bootstrap loader is part of the operating system. State the...
Represent the decimal number − 73 using 8 bit two’s complement.
State the number of bits required to represent 16 777 216 colours.
A graphic file is to be transferred as an e-mail attachment. Which...
A trojan horse is a malicious computer program. Which are...
Possible technical reasons for choosing a client-server network over a...
Explain why increasing the number of registers could improve system...
Which are possible hardware compatibility issues?
Most modern computers use Unicode rather than ASCII to represent...
Which of these are not functions of a disk editor?
Alert!

Advertisement