Professional Documents
Culture Documents
Revision
Question Bank
(Multiple Choice)
Year 11
1. For computer users, holding a muscle in a constant state of contraction for long
periods of time is the most common cause of:
(a) back, neck and shoulder pain.
(b) RSI in the wrist.
(c) eye stain.
(d) aching feet.
2. Repetitive strain injuries are caused by a number of different factors. Which of the
following factors does NOT affect RSI?
(a) the number of movements made in performing a task
(b) the load or forces required to perform the task
(c) excessive noise in the work environment
(d) the muscle work needed to keep the body in the position to perform the
task
4. Which of the following is the best way for a software developer to protect their
source code from being illegally reproduced?
(a) Only distribute compiled versions of the product.
(b) Include a licence agreement within the distributed product.
(c) Distribute the software as shareware or as a commercial product.
(d) Distribute copies that require the user to compile the product prior to
execution.
Page 2 of 13
6. A person buys a piece of software and installs this software onto a computer at
home and onto another computer at work. The social or ethical issue relating to
this scenario is:
(a) piracy
(b) changing nature of work
(c) security
(d) copyright
9. A program is sold with a software licence that prevents the work being copied or
converted into another form except for the purposes of backup. Which of the
following is allowed?
(a) Sending the program to someone else in an e-mail message
(b) Decompiling the program to see it in a high-level language
(c) Saving the program on a disk which is stored but not used
(d) Changing the program so it runs on a different platform
Page 3 of 13
Hardware & Software
10. Which of the following does not require translation prior to execution?
(a) Machine language
(b) Assembler language
(c) High-level languages
(d) Declarative languages
11. Which of the following is a temporary storage location within the CPU?
(a) Bus
(b) Flag
(c) Register
(d) Interrupt
12. Which of the following is responsible for coordinating the operations of input,
processing, output and storage?
(a) Control unit
(b) Primary memory
(c) Instruction register
(d) Arithmetic logic unit
14. A device that converts hard copy documents into digital form is most likely to be:
(a) Modem
(b) Printer
(c) Scanner
(d) Tablet
Page 4 of 13
16. Secondary storage devices include:
(a) RAM, Hard Disks, Floppy disks
(b) ROM, Optical Disks, Hard disks
(c) Hard Disks, Floppy disks, Optical Disks
(d) RAM, ROM, Hard disk
17. Which of the following terms are all names for types of monitors?
(a) VDU, CRT, LCD
(b) Touch screen, CRT, LCD
(c) Touch screen, CRT, LED
(d) VDU, CPU, LCD
Page 5 of 13
22. Which unit is commonly used to express primary storage capacity for personal
computers?
(a) MIPS
(b) kilobytes
(c) megabytes
(d) megaHertz
23. The use of mnemonics, first achievement of machine-independence and the use of
artificial intelligence techniques occur in:
(a) First, fourth and fifth generation languages respectively
(b) Second, third and fifth generation languages respectively
(c) First, second and fourth generation languages respectively
(d) Second, fifth and fourth generation languages respectively
24. A keyboard layout in which the most frequently used keys are located on the
home row is:
(a) QWERTY
(b) Dvorak
(c) Maltron
(d) Alphabetic
25. Which of the following devices incorporate the reflection of a beam of light back
to a sensor?
(a) LCD screen and Cathode Ray tube screens
(b) Mouse, scanner and CD ROM
(c) Magnetic floppy and hard drives
(d) Keyboard, mouse and touch pads
Page 6 of 13
Use the following “code snippet” from a programming language to answer the
question below.
..
27. The..language that it represents is most likely an example of:
LDA #345 Code
(a) Machine
MOV 567,789
(b) Assembler
ADD 456 ACC
(c) Visual Basic
..(d) Pascal
..
28. It is critical to precisely define all the requirements prior to building the solution
when using which software development approach?
(a) The structured approach
(b) The prototyping approach
(c) The rapid application development approach
(d) The end user approach
Page 7 of 13
Planning & Implementing Software Solutions
30. Which of the following modelling tools is often thought to be easy to understand
but has the disadvantages of being time consuming to produce and long-winded?
(a) Executable code
(b) Pseudocode
(c) Flowchart
(d) Object code
31. At which phase of the software development cycle would the required outputs be
first identified?
(a) Defining the problem
(b) Planning the solution
(c) Building the solution
(d) Checking the solution
32. If x = 3 and y = 4 and z = 3 the statement ((a=z) AND (y=z)) OR (z=x) evaluates to:
(a) TEN = False
(b) True
(c) False
(d) 10
Page 8 of 13
33. Consider the following algorithm fragment. The logic of this fragment is:
(a) correct because it has only one exit and entry point.
(b) incorrect because it confuses repetition and decision.
(c) incorrect because it has no sub processes.
(d) correct because of the placement of the processes.
35. A simple algorithm contains a binary selection statement nested within one branch
of another binary selection statement. What is the maximum number of paths
through this algorithm?
(a) 2
(b) 3
(c) 4
(d) More than 4
Page 9 of 13
36. A program hangs on execution and does not respond to any user input. What is a
possible cause of this problem?
(a) Subscript out of range
(b) Using a WHILE loop without ENDWHILE
(c) Using a WHILE loop instead of a REPEAT loop
(d) The terminating condition of a loop in the program has not been met
How many times will the statements within the body of the loop be executed?
(a) 0
(b) 2
(c) 3
(d) 4
(a) 1
(b) 2
(c) 1, 2
(d) 1, 2, 3
Page 10 of 13
40. The following syntax uses EBNF.
lcase = a | b | c | d | e | f | g | h | i | j | k | l | m | n | o | p | q | r | s | t | u | v | x | y | z
ucase = A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | X | Y | Z
digit = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
name = ( lcase | ucase | _ ) { ( [ lcase | digit | ucase | _ ] ) }
Which of the following names does not conform to the given syntax rules?
(a) aaaaaaaa
(b) A_aA
(c) 123a_a
(d) __aA123
BEGIN
x=0
WHILE NOT finished
increment x
display x
get finished
END WHILE
END
Page 11 of 13
43. Variables that provide the interface between different modules within a software
product are known as:
(a) local variables
(b) functions
(c) global variables
(d) parameters
44. The most appropriate data type to use to store telephone numbers is:
(a) integer
(b) string
(c) floating point
(d) one dimensional array
46. What would be the expected output from the following algorithm fragment?
myNum = 0
WHILE myNum < 10
display myNum
myNum = myNum + 2
ENDWHILE
(a) 1 2 3 4 5 6 7 8 9 10
(b) 0 2 4 6 8 10
(c) 0123456789
(d) 02468
Page 12 of 13
Checking Software Solutions
47. What is the output after the user enters a value of ‘3’?
(a) 1, 2, 3
(b) 0, 1, 2, 3
(c) 1, 2, 3, 3
(d) 1, 2, 3, 4
48. What is the output after the user enters a value of ‘-1’?
(a) 0
(b) –1, 0
(c) No output – the program will terminate normally
(d) No output – the program will terminate abnormally
Page 13 of 13