1.
Write the binary number 1000100111 as a positive integer.
Correct Answer
C. 551
Explanation
The binary number 1000100111 can be converted to a positive integer by multiplying each digit by the corresponding power of 2 and then summing them up. Starting from the rightmost digit, the first digit is 1 and it is in the 9th position from the right. The second digit is 1 and it is in the 8th position from the right. The third digit is 1 and it is in the 7th position from the right. The fourth digit is 0 and it is in the 6th position from the right. The fifth digit is 0 and it is in the 5th position from the right. The sixth digit is 0 and it is in the 4th position from the right. The seventh digit is 1 and it is in the 3rd position from the right. The eighth digit is 0 and it is in the 2nd position from the right. The ninth digit is 0 and it is in the 1st position from the right. The tenth digit is 1 and it is in the 0th position from the right. By adding up the values of the digits in their respective positions, we get 551 as the positive integer representation of the binary number 1000100111.
2.
Represent the decimal number − 73 using 8 bit two’s complement.
Correct Answer
A. 10110111
Explanation
The given answer, 10110111, represents the decimal number -73 using 8 bit two's complement. In two's complement representation, the most significant bit (MSB) is the sign bit, where 0 represents a positive number and 1 represents a negative number. In this case, the MSB is 1, indicating a negative number. The remaining bits, 0110111, represent the magnitude of the number in binary form. To obtain the negative value, we invert all the bits and add 1. Inverting 0110111 gives 1001000, and adding 1 gives 1001001, which is the given answer.
3.
Most modern computers use Unicode rather than ASCII to represent text.Select the true advantages of Unicode when compared to ASCII.
Correct Answer(s)
A. Unicode can represent all character based alphabets.
B. Characters can be user/software defined.
C. ASCII has a very limited character set.
D. ASCII does not allow user defined characters.
Explanation
Unicode can represent all character based alphabets, which means it can support a wide range of languages and scripts. Characters can also be user or software defined, allowing for customization and flexibility. In contrast, ASCII has a limited character set, which restricts its usage to a small number of characters. Additionally, ASCII does not allow for user defined characters, further limiting its capabilities. The statement that Unicode takes up less memory than ASCII is not true and is therefore not an advantage of Unicode over ASCII.
4.
State the number of bits required to represent 16 777 216 colours.
Correct Answer
E. 24
Explanation
To represent 16,777,216 colors, we need to use 24 bits. This is because 24 bits can represent 2^24 different combinations, which is equal to 16,777,216. Each bit can have two possible values (0 or 1), so by using 24 bits we can represent a wide range of colors.
5.
A disk editor is a common example of a (_______) software.
Correct Answer
utility
Explanation
A disk editor is a common example of utility software. Utility software refers to a type of software that provides additional functionality or tools to enhance the performance and efficiency of a computer system. A disk editor is specifically designed to allow users to directly access and modify the contents of a disk or storage device at a low-level, bypassing the operating system. It is commonly used for tasks such as data recovery, disk analysis, and troubleshooting.
6.
Which of these are not functions of a disk editor?
Correct Answer(s)
C. Allows the user to create secure locations for file backups
D. Allows user to set up firewalls within the disc
Explanation
A disk editor is a software tool that allows users to directly edit the contents of disk sectors or blocks. It also enables the user to recover damaged or deleted blocks/files by accessing and modifying the disk's data. However, creating secure locations for file backups and setting up firewalls within the disk are not functions typically associated with a disk editor. These tasks are usually performed by backup software or security applications designed specifically for those purposes.
7.
The bootstrap loader is part of the operating system. State the purpose of the bootstrap loader.
Correct Answer
B. To locate and load the rest of the OS at start-up.
Explanation
The purpose of the bootstrap loader is to locate and load the rest of the operating system at start-up. It is responsible for initializing the system and loading the necessary components into memory, allowing the operating system to fully start and execute its functions. Without the bootstrap loader, the operating system would not be able to properly start and function.
8.
A trojan horse is a malicious computer program. Which are characteristic of a trojan horse.
Correct Answer(s)
A. Not spread by infecting other files or self replicating
C. Disguises itself or appears to be a harmless/ordinary/useful file
Explanation
A trojan horse is a malicious computer program that disguises itself or appears to be a harmless/ordinary/useful file. It does not spread by infecting other files or self-replicating. Once loaded on the system, it may continue to disguise itself to avoid detection.
9.
Explain why increasing the number of registers could improve system performance.- Tick if true.
Correct Answer(s)
A. Fewer fetches required from (slower) main memory/RAM/cache
B. Access to data in registers is faster than to RAM or cache
Explanation
Increasing the number of registers can improve system performance because it reduces the number of fetches required from main memory, RAM, or cache. Accessing data in registers is faster compared to accessing data in RAM or cache. Therefore, having more registers allows the system to store and access frequently used data more quickly, reducing the overall time required for data retrieval and improving system performance.
10.
'Unable to run on available OS' / 'Clash with existing software' - Are these examples of Hardware incompatibility or Software Incompatibility?
Correct Answer
B. Software
Explanation
The examples given, "Unable to run on available OS" and "Clash with existing software," are both related to issues that arise due to software incompatibility. Hardware incompatibility refers to situations where hardware components are not compatible with each other, causing issues in their functioning. However, in this case, the problems mentioned are specifically related to software, such as the inability to run on a particular operating system or conflicts with existing software. Hence, these examples fall under the category of software incompatibility.
11.
Which are possible hardware compatibility issues?
Correct Answer(s)
A. Lack of available memory
B. Less powerful/unsuitable processor
C. Unsuitable graphics/sound card
Explanation
Possible hardware compatibility issues include lack of available memory, a less powerful or unsuitable processor, and an unsuitable graphics or sound card. These issues can arise when the hardware components do not meet the requirements of the software or the system.
12.
All computers in a network are controlled by a single head computer. What type of network is this?
Correct Answer
D. Client-server
Explanation
In a client-server network, all computers are controlled by a single head computer known as the server. The server manages resources, data, and communication between the clients. Clients, on the other hand, are individual computers that request and receive services from the server. This type of network architecture allows for centralized control and management, making it suitable for scenarios where a central authority needs to manage and distribute resources to multiple clients.
13.
Possible technical reasons for choosing a client-server network over a peer-to-peer network.
Correct Answer(s)
C. Easier to do backups with centralised file server
D. Better security of data
E. Software servers allow better control of licensing/upgrades/remote installation
Explanation
A client-server network allows for easier backups with a centralized file server because all the data is stored in one location, making it easier to back up and restore. It also provides better security of data because access to the data can be controlled and monitored at the server level. Additionally, software servers allow better control of licensing, upgrades, and remote installation, as the server can manage and distribute software licenses, updates, and installations to the clients.
14.
A graphic file is to be transferred as an e-mail attachment. Which file type would be more appropriate, and why?
Correct Answer
A. JPEG; Lossy, higher compression and lower file quality.
Explanation
JPEG would be more appropriate for transferring a graphic file as an e-mail attachment because it offers higher compression, which reduces the file size and makes it easier and faster to send via email. However, JPEG is a lossy format, meaning that it sacrifices some image quality to achieve this compression. In contrast, TIFF is a lossless format that preserves all the details and quality of the image, but it has no compression, resulting in larger file sizes that may be more difficult to send via email.
15.
"Stages are revisited/repeated" "As a result of new information/information gained later in the process""In order to improve the solution"These are examples of the (________) process.
Correct Answer
iterative
Explanation
The given correct answer, "iterative," is supported by the explanation provided. The statement "Stages are revisited/repeated" suggests that the process involves going back to previous stages or steps. The phrase "As a result of new information/information gained later in the process" indicates that new information is obtained during the process, which leads to the need for revisiting or repeating stages. Additionally, the phrase "In order to improve the solution" implies that the purpose of revisiting or repeating stages is to enhance the solution. All of these characteristics align with the iterative process, where steps are repeated to refine and improve the solution.
16.
The username is created by joining the initial to the end of the surname, for example “CarrickE”.Name the string operation used to create the username.
Correct Answer
C. Concatenation
Explanation
The correct answer is Concatenation. Concatenation is the string operation used to join or combine two or more strings together. In this case, the initial and the end of the surname are being joined together to create the username.