Cameroon GCE advanced level June 2025 computer science 1
Cameroon GCE advanced level June 2025 computer science 1
Here are the extracted questions from the provided images, maintaining the original format:
From image_2acefc.jpg:
- Social networking entails that
A computers network with each other.
B programs can talk with people.
C people directly engage with each other.
D objects on the internet can interact.
- A computer crime was committed because
A my bank details were posted online.
B Bi’s password was stolen from her diary.
C Arrey stole Peter’s computer.
D Joe stole from my online bank account.
- In a preemptive priority scheduling algorithm, when a process arrives at the ready queue, its priority is compared with the priority of
A all processes.
B currently running process.
C parent process.
D initial process.
- They ease software development, and supply new software to meet diverse requirements:
A user programs.
B software repositories.
C link loaders.
D subroutine libraries.
- The suitable concept for language translators to better reuse program code fragments in the correct order is
A function-return values.
B procedure call sequence.
C procedure call stack.
D parameter-passing sequence.
- The process gives the meaning of a program so that a targeted machine can execute. It must be
A code optimisation.
B code generation.
C executable code.
D parameter code.
- When the time quantum in round robin scheduling increases, it leads to a(n)
A decrease in throughput.
B increase in response time.
C decrease in response time.
D increase throughput.
- One of the following best describes a Long term scheduler:
A Increase CPU performance with a given set of instructions.
B makes the decision of which process to execute next.
C It handles the swapped out-processes.
D determines which programs are admitted to the system for processing.
- Which of the following constitutes a basic set of operations for manipulating relational data?
A Relational algebra.
B Predicate calculus.
C Relational calculus.
D SQL.
- In the ______, there is no non-key dependencies.
A first normal form.
B second normal form.
C third normal form.
D fourth normal form.
- Whenever two independent one-to-many relationships are mixed in the same relation, a _______ arises.
A functional dependency
B multi-valued dependency
C transitive dependency
D partial dependency
- For technical and non-technical people to understand how our database system works, use
A the unified modelling language.
B entity-relationship modelling.
C a data modelling language.
D a data model description.
- Which is best used to make and decide long-term decisions and strategies?
A Decision Support Systems.
B Data Communication Systems.
C Executive Information Systems.
D Management Information Systems.
- The parity bit is used in serial communication for
A error detection.
B error correction.
C collision detection.
D synchronisation.
- File transfer, mail services, access and management occurs at ____________ Layer.
A Physical
B Network
C application
D datalink
- What will be the resulting binary equivalence after subtracting 110112 from 100112 using 2’s complement?
A 001112.
B 110112.
C 010002.
D 110002.
From image_2acedf.jpg:
- If in each diagram below, circles and boxes are data and instruction streams respectively, with input streams to the left, which diagram is not used to carry out computations on today’s machine architectures:
Diagram A
Diagram B
Diagram C
Diagram D
A Diagram A.
B Diagram B.
C Diagram C.
D Diagram D.
- Since no machine can start executing without it, it is almost always stored in a
A RAM.
B Cache Memory.
C Swap Memory.
D BIOS.
- In adding two positive numbers in two’s complement arithmetic, the carry bit of the most significant bits (msb) is
A carried as the new msb of the answer.
B added as the new lsb of the answer.
C carried to the lsb of the answer.
D added to the msb of the answer.
- The Boolean function XY+XY+XY is equivalent to
A X+Y.
B X+Y.
C X⋅Y.
D X+Y.
- Which of the following corresponds to the truth table below?
| A | B | R |
|—|—|—|
| F | F | T |
| F | T | F |
| T | F | F |
| T | T | F |
A A+B⋅A⋅B.
B A⋅B+A⋅B.
C A+B+A⋅B.
D A⋅B+A+B.
- A non-erasable disk that stores digitise audio information is
A CD.
B CD-ROM.
C DVD-R.
D DVD-ROM.
- To search large databases across the web, Ngu is best advised to use a
A multi-tasking computer.
B distributed computer.
C mainframe computer.
D parallel computer.
- Which of the following is the address generated by the CPU?
A Physical address.
B Absolute address.
C Page address.
D Logical address.
- Which best bulk disseminates information to a large number of persons and can hold such information for very long periods?
A Email system.
B File system.
C Teleconferencing system.
D Library system.
- A system developed for weather forecasting is best classified as a(n)
A industrial system.
B commercial system.
C scientific system.
D executive information system.
- It does NOT demonstrate an application of computing in the arts and media
A computer games.
B computer animation.
C newspaper production.
D book production.
- Which of the following most critically depends on the use of computer technology?
A Work from home.
B Hold conference meetings.
C Deliver goods to customers.
D Disseminate information in a town.
- In computerising a company, the proposals of my client is based on technically wrong assumptions, from which you will benefit.
A I simply do the client’s bidding.
B I point out and explain the issue.
C It is business so I have a lucky deal.
D It is business so he pays extra for advice.