0% found this document useful (0 votes)
349 views7 pages

Cos 101 Possible Questions by Chisom Maxwell-1

The document is a compilation of possible examination questions for the COS 101 course, covering various topics such as algorithms, computer components, programming languages, and networking. It includes definitions, explanations, and key concepts relevant to the course material. The author, Chisom Maxwell, encourages students to study and offers support through contact information.

Uploaded by

benjaminodoh27
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
349 views7 pages

Cos 101 Possible Questions by Chisom Maxwell-1

The document is a compilation of possible examination questions for the COS 101 course, covering various topics such as algorithms, computer components, programming languages, and networking. It includes definitions, explanations, and key concepts relevant to the course material. The author, Chisom Maxwell, encourages students to study and offers support through contact information.

Uploaded by

benjaminodoh27
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

COS 101- POSSIBLE QUESTIONS

BY
CHISOM MAXWELL .N.
ALUTA 002 PLUG

…….A run-down of COS 101- POSSIBLE QUESTIONS FOR FIRST SEMSTER………

For the love of my friends

Who have struggled so hard?

To pass COS 1O1

NOTE; THIS MATERIAL CONTAINS PAST EXAMINATION


QUESTIONS COS 101 GOODLUCK AS YOU STUDY
BROUGHT TO YOU BY CHISOM MAXWELL .N.
09079537605
PRAY AND SUPPORT CHISOM MAXWELL FOR SUG
SECOND SEAT ALUTA 002

FOR QUESTIONS OR MORE MATERIALS FROM CHISOM MAXWELL YOU CAN CHAT HIM
THROUGH WHATSAPP 09079537605

BROUGHT TO YOU BY CHISOM MAXWELL .N.


09079537605
1 .Narrative, Pseudo code and Flowchart are used to describe an Algorithm

2. A logical sequence of steps that can be followed to solve a particular problem is called
Algorithm.

3. Traditional Algorithm can be written using pseudo codes.

4. When an algorithm is written using diagrammatic called flow chart.

5. Without pseudo code algorithm can be express using diagram. Features of Good Algorithm

(A) Correctness (B) Thoroughness (C) Clarity (D) Simplicity (E )Efficiency

6. Flow charting is the process of writing Algorithm.

7. Algorithm design ensures that the program Is correctly an deficiently written.

8. Data design ensures that the data requirement of program is stored accessed and processed
by the program. Meaning of Basic

9. Beginners all purpose symbolic instruction code

10. A deliberate jump to some part of the program is called transfer of control.

11. Basic is written as a separate statement.

12. In basic language program any statement after the END is ignored.

13. Component of a basic program– comments, data type , declaration, arithmetic operation
logic, separation statement, sub program and function straining include numeric(Number)(1-
100) string include letters (A– Z)

14 .Arithmetic operation includes Addition, sub-Negation multiplication Division


Exponentiation and Module.

15. The Central Processing Unit (CU) is also called Micro processor or processor.

16. There are three main type of computers namely Microcomputer, Minicomputers and
Mainframe computer.

17. Micro computers are mostly called Personal Computer (PC).

18. A Micro computer is a computer that has a Micro process chip.

BROUGHT TO YOU BY CHISOM MAXWELL .N.


09079537605
19. Personal Digital Computer the user draws character and pressesicons on the Screen with
Stylus. Basic Components of a Computer System (A) Input (B) Storage (memory) (C) Central
Processing Unit (D) Output Unit (E) Communication Five Stages of Building Java Program (A) Edit
(B) Compile (C) Load (D) Verify (E) Execute Types of Network (A) Local are

a network (LAN) (B) Wide area network (WAN or Long Haul network (C) Netro politan area
network (MAN)

20. There are two main types of coaxial cable used in LANs Base band and Broad band

21. There are basically three types of cable used in LAN twisted pair, coaxial, Fiber optic

22. Coaxial cable is designed to minimize errors during data transfer.

23. Optical Fiber cable are made up of Plastic and Pulse

24. The world wide web is sometimes referred as network of network.

25. The computer that you use to access the inter net is called a client computer.

26. From your home computers, you typically provide an internet access using phoneline ina
type of access referred to as Dial- up connection.

27. An internet server is also called Host.

28. The computer that stores web page are called Web Server.

29. A group of 8 bit is called byte.

30. Most computers operate by manipulating groups of 2, 4 or 8 bytes called word.

31. The fastest memory technology of today are volatile.

32. Information to be written only on ceat some point after manufacture are called Immutable
Storage. 33. A number is represented by a symbol called a numeral.

34. Numerals are often use for identification. The three numeral system are (A) System of real
number (B) System of complex number (C) Positional numeral system

35. LCD monitor are also known as IFT thin film transistor.

36. Color monitors need three transistors for each pixel one 4red, green blue.

37. Light-emitting diode LED monitors has higher contrast and better viewing angle than LCDs.

BROUGHT TO YOU BY CHISOM MAXWELL .N.


09079537605
38. LCDs can suffer from dead pixels while CRTs do not.

39. Non-Impact printer are faster than Impact printer. The three type of non-impact printer are
(A )Ink-jet (B) Laser and (C) Solid Ink

40. Toner-based printers is also called Laser Printer.

41. Solid Ink printers are also called Phase change printers.

42 .Single chip computers are found in devices such as (a) watch (b) cameras.

43. Primary board are called Mother board.

44. Memory is organized into several level called hierarchy.

45. When you are writing love letter, term papers, project-composed mail, etc you are creating
collection of symbols called textual document.

46. When a program meris typing out a program he is creating a textual document called
Source code. 47. A key board has not less than105 keys.

48. The first goal of data automation is to avoid mistakes and avoid having tore-enter data.

49. Guide pad is builtin lap top to move the cursor.

50. Clock speed is measured in unit so cycles perse cond which is called Hertz (Hz).

51. The most famous series of super computers were designed by the company founded and
named after sey mercray which is called cray1.

52. Super computers are used for extremely calculation intensive.

53. Main frame computer are large powerful computer.

54. Users connect to main frame computer using terminal.

55. A terminal is a device that has a screen and keyboard.

56. Peripheral process are also called output and input channel.

57. An output device is any piece of computer hardware.

58. The most common output are visual display unit (monitor) printer and speaker.

59. The computer processing unit is connected to the output through circuit called interface.

BROUGHT TO YOU BY CHISOM MAXWELL .N.


09079537605
60. Mother board is also called parent board.

61. Mono chrome monitor hast color.

62. Color monitor display more than two color.

63. Color Graphic Adaptor (CGA) support 4colours.

64. Enhance Graphic Adaptor (EGA) support 16 colors.

65. Super VGA support 16.8m color.

66. The smallest unit on the screen that can be turn on and off is called pixel.

67. Pixelis also called a dot.

68. The image produced on the computer screen is made up of pixel. 69. Work stations are
micro computers use in supporting engineers during heavy work load.

70. Thermal printers are in expensive and are widely used in calculation and fax machines.

71. Random access memory (Ram) means that any piece of information can be access.

72. The Ram is the only memory directly connected to the central process unit (processor).

73. Example of secondary storage technologies are flash memory, floppy disks, magnetic tape,
paper tape, punch card, standard ram disk and zip drive.

74. The surface of a platter is organized as a number of con centriccircle called tracks each track
is divided in to sectors.

75. Block is the unit of transfer between the disk and primary memory.

76. The operating system determines where the block for each file are placed.

77. All magnetic disks are similarly formatted or divided into three areas called Attract, sector,
cylinders. 78. Forms of disk storage(magnetic disk storage, the hard disk drive) caring for the
hard disk drive. Disk formatting and clusters.

79. A optical disk is made up of Polycarbonate (A plastic).

80. Disk have a capacity of about 700 megabytes.

81. An option for backup storage of changing data is Rewritable disk. 5 Advantages of Optical
Disk (A) Physical harder to break (B)Delicacy– it can be clean (C Magnetic– unaffected by

BROUGHT TO YOU BY CHISOM MAXWELL .N.


09079537605
magnetic field (D) Capacity– stores more file Disadvantages of Optical Disk (A) Cost of disk
(B)Duplication

82. Optimal card holds information like health record sand auto- repair records.

83. Radixor base of numeral system

84. A program in the for m it was written by the programmer is called a source program or
source code. 85.The native tongue is called the machine language.

86. Computer software is a set of Computer program.

87.The action procedures, functions or processes which the computer can perform can been
xpressed in several notation called Language.

88. A sequence of micro code instruction to perform some task is called a micro-program.

89. Machine language is the lowest level language available to the programmer.

90. Mortal, python, SQL and Ruby are example of VHLLs very high-level programming language.
91.There are three general models of execution for modern high level language programs called
Interpreted, complied and translated.

92. A program is called an application program, application or even app.

93. Email (electronic mail) is also called Electronic Letter-writing.

94. The person who created updates and maintains a website is called web master.

95. To level domain example.com

96. HTML (Hyper text mark up language) is a file format that contain sembedded instructions
called tag. 97. LANs are classified on the basis of their to pology into constrained and
unconstrained.

98. Constrained connection refers tomeshtopology.

99.Unconstrained connection refer storing, star and bus topology. All I want you is to be
courageous Becalm and be self equipped with facts and figures to conquer this exams battle. I
wish you the best of luck in your exams.

BROUGHT TO YOU BY CHISOM MAXWELL .N.


09079537605

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy