Final Examination Semester 3 / Year 2011
|
|
- Opal Clark
- 5 years ago
- Views:
Transcription
1 Final Examination Semester 3 / Year 2011 COURSE : INFORMATION TECHNOLOGY COURSE CODE : BUSS1063 TIME : 2 1/2 HOURS DEPARTMENT : COMMERCE LECTURER : LEE HUAH Student s ID : Batch No. : Notes to candidates: 1) The question paper consists of 4 pages, 4 sections and 27 questions. 2) Answer all questions. 3) Use the Standardized Answer Form for all sections. 4) Return the question paper with your answer booklet.
2 Section A: Choose one proper answer for the following questions. (10 questions X 2 = 20 marks) 1) Some computers are able to maintain simultaneous connections to many users through a technique called A) nanolinking. B) hot syncing. C) spider syncing. D) parallel processing. E) timesharing. 2) Which of these statements is true? A) Software companies could produce error-free products if they were willing to reduce profits. B) Some large software systems, such as Linux, contain no bugs. C) Software testing can prove the existence of bugs, but it cannot prove that the software is 100 percent bug-free. D) Techniques for producing bug-free software are used for critical military applications, but they re too expensive for most other applications. E) All of these statements are true. 3) What does the speed of the computer depend on? A) The architecture of the processor B) The clock speed of the processor C) The word size of the processor D) The number of processors E) All of the above 4) Hard disk drives have the disadvantage that A) they hold less information than CDs do. B) they are more likely to fail than other computer components. C) they cannot be backed up. D) their contents are lost when they lose power. E) All of the above 5) An application program is A) a program that lets users create new applications. B) a program that lets users apply for jobs. C) a program that lets someone use a computer for a particular purpose. D) a program that updates the operating system of a computer. E) none of the above. 1/4
3 6) Which of these is the correct hierarchy for a standard database? A) Database, field, record, table B) Database, table, record, field C) Database, record, field, table D) Database, record, table, field E) Database, table, field, record 7) What happens when you boot up a PC? A) Portions of the operating system are copied from disk into memory. B) Portions of the operating system are copied from memory onto disk. C) Portions of the operating system are compiled. D) Portions of the operating system are emulated. E) None of the above 8) Which of the following does not affect bandwidth? A) The amount of network traffic B) The software protocols of the network C) The type of network connection D) The type of information being transmitted E) The physical media that make up the network 9) Which of the following is not typically performed by management information systems (MIS)? A) Providing detailed reports, summary reports, and exception reports B) Extracting relevant data from databases of the transaction processing systems C) Providing managers with information needed to make decisions D) Making recommendations for improving performance E) Organizing and summarizing data in useful ways 10) Which statement about machine translation is true? A) The most successful programs do word-by-word translation backed up by huge dictionaries containing all known words in both languages. B) The most successful programs extract the meaning of the underlying text then use their understanding of the author s intent to guide the translation. C) Many programs use a statistics-based approach based on a huge number of examples of correct and incorrect translations. D) The most successful machine language programs first translate the source text into a neutral language, usually Esperanto, then translate from the neutral language into the desired target language. E) Computer translation programs are generally written in natural languages such as COBOL or BASIC. 2/4
4 Section B: Key terms test questions. (10 questions X 3 = 30 marks) Explain the following key terms which used in information technology. 1) Social responsibility 2) Decision table 3) Firmware 4) Optical character recognition (OCR) 5) Phishing 6) Firewall 7) Algorithm 8) Relational database 9) Social networking 10) File-management utility 3/4
5 Section C: Short answer questions. (5 questions X 6 = 30 marks) 1) What kinds of computer applications require the speed and power of a supercomputer? Give three examples. 2) Describe three techniques used in game-playing software, and explain how they can be applied to other AI applications. 3) Give three general reasons for the importance of computer networking. 4) Most computer software falls into one of three categories: compilers and other translator programs, software applications, and system software. Describe and give examples of each. 5) Describe at least three functions of an operating system. Section D: Essay questions. (2 questions X 10 = 20 marks) 1) In what ways can computer security protect the privacy of individuals? In what ways can computer security threaten the privacy of individuals? (10 Marks) 2) What is the difference between writing a program and designing an information system? How are they related?. (10 Marks) 000 4/4
N04/5/COMSC/SP1/ENG/TZ0/XX COMPUTER SCIENCE STANDARD LEVEL PAPER 1. Monday 15 November 2004 (afternoon) 1 hour 15 minutes INSTRUCTIONS TO CANDIDATES
c IB COMPUTER SCIENCE STANDARD LEVEL PAPER 1 DIPLOMA PROGRAMME PROGRAMME DU DIPLÔME DU BI PROGRAMA DEL DIPLOMA DEL BI N04/5/COMSC/SP1/ENG/TZ0/XX 88047013 Monday 15 November 2004 (afternoon) 1 hour 15 minutes
More informationFinal Examination Semester 2 / Year 2011
Southern College Kolej Selatan 南方学院 Final Examination Semester 2 / Year 2011 COURSE : COMPUTER SYSTEM COURSE CODE : CSIS 1003 TIME : 2 HOURS 30 MINUTES DEPARTMENT : COMPUTER SCIENCE LECTURER : DR. LEE
More informationCSC 101 Questions: Chapter 1: Multiple Choice: 1. When did the World Wide Web become available to users? a. 1960s b. 1970s c. 1980s d.
CSC 101 Questions: Chapter 1: Multiple Choice: 1. When did the World Wide Web become available to users? a. 1960s b. 1970s c. 1980s d. 2000s 2. When did Web 2.0 sites like MySpace and Flickr become popular?
More informationBA.(Hons) Communication. Cohort: BC/05/PT Year 2. Examinations for / Semester 2
BA.(Hons) Communication Cohort: BC/05/PT Year 2 Examinations for 2005-2006 / Semester 2 MODULE: IT and Communication MODULE CODE: COMM 1401 Duration: 2 Hours Reading Time: 10 Minutes Instructions to Candidates:
More informationIT Information Systems & Technology Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY ( EXTERNAL) Academic Year 2012/2013 1 st Year Examination Semester 1 IT1104 - Information
More informationFinal Examination Semester 3 / Year 2008
Southern College Kolej Selatan 南方学院 Final Examination Semester 3 / Year 2008 COURSE : COMPUTER ORGANIZATION & OPERATING SYSTEM COURSE CODE : CSIS2053 CLASS : CS06-C, CS07-B,CS07-C TIME : 2 ½ HOURS DEPARTMENT
More informationIntroduction to Computer World Fall 2016
Introduction to Computer World Fall 2016 Introduction to Information and Communication Technologies CSD 102 Email: mehwish.fatima@ciitlahore.edu.pk Website: https://sites.google.com/a/ciitlahore.edu.pk/ict/
More informationCSCA0102 IT and Business Applications Chapter 7. Data and Information
CSCA0102 IT and Business Applications Chapter 7 Data and Information Data and Information Data Data is raw, unorganized facts that need to be processed. Data can be something simple and seemingly random
More informationWhat Operating Systems Do An operating system is a program hardware that manages the computer provides a basis for application programs acts as an int
Operating Systems Lecture 1 Introduction Agenda: What Operating Systems Do Computer System Components How to view the Operating System Computer-System Operation Interrupt Operation I/O Structure DMA Structure
More informationLecture 2 Winter 2006 Essentials of Computing
Information Technology Lecture 2 Winter 2006 Essentials of Computing 1 Objectives Identify the five components of a computer system. Explain the four categories of hardware and their functions. Discuss
More informationTypes and Functions of Win Operating Systems
LEC. 2 College of Information Technology / Software Department.. Computer Skills I / First Class / First Semester 2017-2018 Types and Functions of Win Operating Systems What is an Operating System (O.S.)?
More informationChapter 1: Introduction
Chapter 1: Introduction Chapter 1: Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture Operating-System Structure Operating-System Operations Process Management
More informationLecture 2 - Fundamental Concepts
Lecture 2 - Fundamental Concepts Instructor : Bibhas Ghoshal (bibhas.ghoshal@iiita.ac.in) Autumn Semester, 2015 Bibhas Ghoshal IOSY 332C & IOPS 332C: OS Autumn Semester, 2015 1 / 43 Lecture Outline Operating
More informationChapter 1: Introduction
Chapter 1: Introduction Chapter 1: Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture Operating-System Structure Operating-System Operations Process Management
More informationChapter 1: Introduction
Chapter 1: Introduction Silberschatz, Galvin and Gagne 2009 Chapter 1: Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture Operating-System Structure Operating-System
More informationIntroduction to Computers. Created By: N.AlJaffan Modified By:S.Abudawood. Copyright 2008 N.AlJaffan KSU
Introduction to Computers Created By: N.AlJaffan Modified By:S.Abudawood 1 Introduction to Computers What Is A Computer? Computer is an electronic device: device: accepts input processes data stores data
More information7/20/2008. What Operating Systems Do Computer-System Organization
Introduction to Operating Systems Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture Operating-System Structure Operating-System Operations Process Management
More informationSALVO-a fourth-generation language for personal computers
SALVO-a fourth-generation language for personal computers by MARVIN ELDER Software Automation, Inc. Dallas, Texas ABSTRACT Personal computer users are generally nontechnical people. Fourth-generation products
More informationChapter 1: Introduction. Chapter 1: Introduction
Chapter 1: Introduction Chapter 1: Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture Operating-System Structure Operating-System Operations Process Management
More informationSome popular Operating Systems include Linux Operating System, Windows Operating System, VMS, OS/400, AIX, z/os, etc.
An Operating System (OS) is an interface between computer user and computer hardware. An operating system is software which performs all the basic tasks like file management, memory management, process
More informationFaculty of Environment and Technology
Faculty of Environment and Technology Academic Year: 12/13 Examination Period: January Module Leader: Module Code: Title of Module: Craig Duffy UFCEHX-20-2 Computer Networks and Operating Systems Duration
More informationCONCEPTS OF MANAGEMENT COMPUTING
CONBUS1 NOVEMBER 2013 EXAMINATION DATE: 11 NOVEMBER 2013 TIME: 14H00 17H00 TOTAL: 100 MARKS DURATION: 3 HOURS PASS MARK: 40% (BUS-EDP) CONCEPTS OF MANAGEMENT COMPUTING THIS EXAMINATION PAPER CONSISTS OF
More informationGeneral Objective:To understand the file system management. Specific Objectives: At the end of the unit you should be able to:
F2007/Unit8/1 Unit 8 OBJECTIVES General Objective:To understand the file system management Specific Objectives: At the end of the unit you should be able to: define the file system management list the
More informationComputer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)
Computers are useful machines, but they are generally useless by themselves. Computers are usually part of a system a computer system includes: Hardware (machines) Software (programs, applications) Communication
More informationWhat Is A Trap Instruction Explain Its Use In >>>CLICK HERE<<<
What Is A Trap Instruction Explain Its Use In Operating Systems Explain how applications interact with the operating system and how control flows something on its behalf. Return from trap handlers using
More informationCSET 3400 Unix System Administration (3 semester credit hours) IT Elective
CSET 3400 Unix System Administration (3 semester credit hours) CSET Elective IT Elective Current Catalog Description: Commands and methods to install and manage a UNIX system. System administration topics
More informationUnit 11 Computer Networks P1 M1 D1 Deadline:29/09/2016. By Sarah Ameer
Unit 11 Computer Networks P1 M1 D1 Deadline:29/09/2016 By Sarah Ameer P1- Uses and features of a computer Network What is a computer network? This is group of computer systems which are linked together
More informationAll Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME
All Rights Reserved Index No No. of Pages - 10 No of Questions - 05 SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME YEAR I SEMESTER I INTAKE VIII (GROUP B)
More informationCompTIA FC0-U51. CompTIA IT Fundamentals.
CompTIA FC0-U51 CompTIA IT Fundamentals http://killexams.com/exam-detail/fc0-u51 or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access
More informationTopics. Operating System. What is an Operating System? Let s Get Started! What is an Operating System? Where in the Book are we?
Topics Operating System What is an OS? OS History OS Concepts OS Structures Introduction Let s Get Started! What is an Operating System? What are some OSes you know? Guess if you are not sure Pick an OS
More informationUNIT I OPERATING SYSTEMS OVERVIEW
UNIT I OPERATING SYSTEMS OVERVIEW Computer System Overview-Basic Elements, Instruction Execution, Interrupts, Memory Hierarchy, Cache Memory, Direct Memory Access, Multiprocessor and Multicore Organization.
More informationUnit 2 : Computer and Operating System Structure
Unit 2 : Computer and Operating System Structure Lesson 1 : Interrupts and I/O Structure 1.1. Learning Objectives On completion of this lesson you will know : what interrupt is the causes of occurring
More informationEEE 435 Principles of Operating Systems
EEE 435 Principles of Operating Systems Operating System Structure (Modern Operating Systems 1.7) Outline Operating System Structure Monolithic Systems Layered Systems Virtual Machines Exokernels Client-Server
More informationFinal Examination Semester 2 / Year 2007
Southern College Kolej Selatan Final Examination Semester 2 / Year 2007 COURSE : COMPUTER SYSTEM COURSE CODE : CSIS1003 TIME : 2 1/2 HOURS DEPARTMENT : COMPUTER SCIENCE CLASS : CS07-B LECTURER : ROSLINDA
More informationLast Class: Memory management. Per-process Replacement
Last Class: Memory management Page replacement algorithms - make paging work well. Random, FIFO, MIN, LRU Approximations to LRU: Second chance Multiprogramming considerations Lecture 17, page 1 Per-process
More informationEuropean University of Lefke. Instructor: Dr. Arif SARI
European University of Lefke CIS 105 Operating Systems Instructor: Dr. Arif SARI Email: asari@eul.edu.tr Introduction 1.1 Silberschatz, Galvin and Gagne 2009 Chapter 1: Introduction, Silberschatz, Galvin
More informationOperating Systems: The Genie in the Computer. Chapter 6: Operating Systems: The Genie in the Computer. What is an operating system?
Chapter 6: : The Genie in the Computer What do you have left on your computer after you strip away all of the games and application programs you bought and installed? : The Genie in the Computer In this
More informationA Review Paper on Network Security Attacks and Defences
EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY
More informationTypes of Computers. Computer Technology (S1 Obj 1-1)
Types of Computers Computer Technology (S1 Obj 1-1) Introduction There are many different types of computers available today. They are categorized into different types depending on their size and processing
More informationChapter 1: Introduction. Operating System Concepts 8th Edition,
Chapter 1: Introduction, Administrivia Project 0 due Monday. Reading: 2.1 2.7. Next Time: Operating system structure. 1.2 Outline Process management. Storage management and characteristics. Miscellaneous
More informationComputer Architecture 2/26/01 Lecture #
Computer Architecture 2/26/01 Lecture #9 16.070 On a previous lecture, we discussed the software development process and in particular, the development of a software architecture Recall the output of the
More informationAssignment Number 8 Lab Assignment Due Date: Wednesday, October 31, 2018 CS 1057 C Programming - Fall 2018
Assignment Number 8 Lab Assignment Due Date: Wednesday, October 31, 2018 CS 1057 C Programming - Fall 2018 Purpose: create a batch program use a version control system to obtain data (git) read and process
More informationDM510 Operating Systems. Jacob Aae Mikkelsen
DM510 Operating Systems Jacob Aae Mikkelsen DM510 2014 DM510 Course Introduction Teacher: Jacob Aae Mikkelsen ( jamik@imada.sdu.dk ) Teaching Assistant: Daniel Fentz Johansen ( dfjohansen@gmail.com ) Course
More informationOperating System Concepts
Operating System Concepts Introduction INFO 2603 Platform Technologies 1 Week 3: 17-Sept-2018 Outline Operating System Software Main Memory Management Processor Management Device Management File Management
More informationIntroduction to Information Technology ITP 101x (4 Units)
Objective Concepts Introduction to Information Technology ITP 101x (4 Units) Upon completing this course, students will: - Understand the fundamentals of information technology - Learn core concepts of
More informationCHAPTER 16 - VIRTUAL MACHINES
CHAPTER 16 - VIRTUAL MACHINES 1 OBJECTIVES Explore history and benefits of virtual machines. Discuss the various virtual machine technologies. Describe the methods used to implement virtualization. Show
More informationTopics. Operating System I. What is an Operating System? Let s Get Started! What is an Operating System? OS History.
Topics Operating System I What is an OS? OS History OS Concepts OS Structures Introduction Let s Get Started! What is an Operating System? What are some OSes you know? Pick an OS you know: What are some
More informationC++ Programming Language Lecture 1 Introduction
C++ Programming Language Lecture 1 Introduction By Ghada Al-Mashaqbeh The Hashemite University Computer Engineering Department Introduction In this course you will learn C++ and the legacy C code. It is
More information8. A is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMPT, FTP and DNS are applications of the layer a. Data link b.
SET 19 1. All of the following are examples of real security and privacy risks except a. Hackers b. Spam c. Viruses d. Identity theft 2. A(n) --- system is a small, wireless handheld computer that scans
More informationFINAL QUIZ. Marlene Galea
FINAL QUIZ Marlene Galea Give 2 possible disadvantages of computerising a system Give 2 possible disadvantages of computerising a system - Dependency : users may grow increasingly dependent on the computerised
More informationTypes of Data. PE 231 Education Media AND Technology. Information. Assessment. Information Concepts
Types of Data Data Represented by PE 231 Education Media AND Technology Alphanumeric data Image data Audio data Numbers, letters, and other characters Graphic images or pictures Sound, noise, tones Video
More informationManaged Services Rely on us to manage your business services
Managed Services Rely on us to manage your business services Your business relies on a number of interconnected systems used by different departments from HR, Marketing, Sales and IT. Keeping all these
More informationCS6401- Operating System QUESTION BANK UNIT-I
Part-A 1. What is an Operating system? QUESTION BANK UNIT-I An operating system is a program that manages the computer hardware. It also provides a basis for application programs and act as an intermediary
More informationRead this before starting!
Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 4717 Computer Architecture TEST 1 for Fall Semester, 2006 Section
More informationLecture #10 Context Switching & Performance Optimization
SPRING 2015 Integrated Technical Education Cluster At AlAmeeria E-626-A Real-Time Embedded Systems (RTES) Lecture #10 Context Switching & Performance Optimization Instructor: Dr. Ahmad El-Banna Agenda
More informationUGANDA NATIONAL EXAMINATIONS BOARD Uganda Certificate of Education COMPUTER STUDIES. Paper 1. 2 hours 30 minutes
840/1 Computer Studies Paper 1 Oct./Nov. 2009 2 1 /2 Hours UGANDA NATIONAL EXAMINATIONS BOARD Uganda Certificate of Education COMPUTER STUDIES Paper 1 2 hours 30 minutes Candidate s Name: Index No.. Candidate
More informationLECTURE SCHEDULE 2. Units of Memory, Hardware, Software and Classification of Computers
LECTURE SCHEDULE 2 Units of Memory, Hardware, Software and Classification of Computers Units of Memory The memory unit is the principal storage of the computer. All the data and instructions that the computer
More informationElection System and Software
Election System and Software Examination Report January 2007 Tom Watson Examiner The following systems were examined in Austin on January 18 and 19, 2007: AutoMARK Voter Assist Terminal (VAT) 1.1.2258
More informationExaminations for Semester I / 2010 Semester II
Programme BSc (Hons) Accounting with Finance BSc(Hons) Financial Services Law BSc (Hons) Management -BATCH 1 G BSc (Hons) Management (Batch 1) General & Law BSc (Hons) Management (Batch 2) Mktg & Fin BSc
More informationChapter 1: Introduction Operating Systems MSc. Ivan A. Escobar
Chapter 1: Introduction Operating Systems MSc. Ivan A. Escobar What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware. Operating system
More informationC H A P T E R 1. Introduction to Computers and Programming
C H A P T E R 1 Introduction to Computers and Programming Topics Introduction Hardware and Software How Computers Store Data How a Program Works Using Python Computer Uses What do students use computers
More informationpeer) Poorly-connected hosts subscribe to a forwarding server packet compression and aggregation altering visual and temporal perceptions
Peer-Server Systems Peer-to to-peer: minimizes latency, consumes bandwidth Client-server: effective aggregation and filtering, increases latency Hybrid peer-server: over short-haul, haul, high- bandwidth
More informationDL/1. - Application programs are independent from the physical storage and access method.
DL/1 OVERVIEW The historical approach to data processing was to have individual files dedicated to each application. This led to considerable data duplication, and therefore wasted space and additional
More informationCS420: Operating Systems
OS Overview James Moscola Department of Engineering & Computer Science York College of Pennsylvania Contents of Introduction slides are courtesy of Silberschatz, Galvin, Gagne Operating System Structure
More informationOPERATING SYSTEMS UNIT - 1
OPERATING SYSTEMS UNIT - 1 Syllabus UNIT I FUNDAMENTALS Introduction: Mainframe systems Desktop Systems Multiprocessor Systems Distributed Systems Clustered Systems Real Time Systems Handheld Systems -
More informationOPERATING SYSTEMS: Lesson 1: Introduction to Operating Systems
OPERATING SYSTEMS: Lesson 1: Introduction to Jesús Carretero Pérez David Expósito Singh José Daniel García Sánchez Francisco Javier García Blas Florin Isaila 1 Why study? a) OS, and its internals, largely
More informationChapter 1 Introduction to Computers and C++ Programming
Chapter 1 Introduction to Computers and C++ Programming 1 Outline 1.1 Introduction 1.2 What Is a Computer? 1.3 Computer Organization 1.4 Evolution of Operating Systems 1.5 Personal Computing, Distributed
More information1. A washing machine is controlled by microprocessors. The name given to this type of microprocessor is: A a mainframe computer. B an output device
SECTION A Answer ALL questions. For each question, choose an answer A, B, C or D and put a cross in the box. Mark only one answer for each question. If you change your mind, put a line through the box
More informationPreview. Process Scheduler. Process Scheduling Algorithms for Batch System. Process Scheduling Algorithms for Interactive System
Preview Process Scheduler Short Term Scheduler Long Term Scheduler Process Scheduling Algorithms for Batch System First Come First Serve Shortest Job First Shortest Remaining Job First Process Scheduling
More informationLecture 1 Introduction (Chapter 1 of Textbook)
Bilkent University Department of Computer Engineering CS342 Operating Systems Lecture 1 Introduction (Chapter 1 of Textbook) Dr. İbrahim Körpeoğlu http://www.cs.bilkent.edu.tr/~korpe 1 References The slides
More informationChapter 1: Introduction. Operating System Concepts 9 th Edit9on
Chapter 1: Introduction Operating System Concepts 9 th Edit9on Silberschatz, Galvin and Gagne 2013 Objectives To describe the basic organization of computer systems To provide a grand tour of the major
More informationHigh Performance Computing. What is it used for and why?
High Performance Computing What is it used for and why? Overview What is it used for? Drivers for HPC Examples of usage Why do you need to learn the basics? Hardware layout and structure matters Serial
More informationM12/5/COMSC/SP1/ENG/TZ0/XX COMPUTER SCIENCE STANDARD LEVEL PAPER 1. Friday 18 May 2012 (afternoon) 1 hour 30 minutes INSTRUCTIONS TO CANDIDATES
M12/5/COMSC/SP1/ENG/TZ0/XX 22127013 COMPUTER SCIENCE STANDARD LEVEL PAPER 1 Friday 18 May 2012 (afternoon) 1 hour 30 minutes INSTRUCTIONS TO CANDIDATES Do not open this examination paper until instructed
More informationResponding to Tracking Items
Responding to Tracking Items Flags and Referrals are intended to prompt students to take some action. Assigned advisors are included in notice of these flags because they are a key resource to students
More informationTHE UNIVERSITY OF THE WEST INDIES
THE UNIVERSITY OF THE WEST INDIES Semester l Semester II Supplemental/Summer School Examinations of December /April/May /July 2017 Originating Campus: Cave Hill Mona St. Augustine Course Code and Title:
More informationWorkloads. CS 537 Lecture 16 File Systems Internals. Goals. Allocation Strategies. Michael Swift
Workloads CS 537 Lecture 16 File Systems Internals Michael Swift Motivation: Workloads influence design of file system File characteristics (measurements of UNIX and NT) Most files are small (about 8KB)
More informationPart 4: Using the Power Behind the Process Entering Data & Generating Reports
Part 4: Using the Power Behind the Process Entering Data & Generating Reports The Power Behind the Process, PowerPath s specially designed software, is an essential piece of the PowerPath System. PowerPath
More informationRemediation Clarifications
Remediation Clarifications Transcript Title Slide (no narration) Webcast Focus This webcast contains scenarios about the online examinations during the initial training of students when remediation is
More informationExample: CPU-bound process that would run for 100 quanta continuously 1, 2, 4, 8, 16, 32, 64 (only 37 required for last run) Needs only 7 swaps
Interactive Scheduling Algorithms Continued o Priority Scheduling Introduction Round-robin assumes all processes are equal often not the case Assign a priority to each process, and always choose the process
More informationFundamentals of Networking Types of Topologies
Fundamentals of Networking Types of Topologies Kuldeep Sonar 1 Bus Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two
More information6. Under which of the following categories is a laptop computer classified? (1) Microcomputer (2) Minicomputer (3) Mainframe (4) Supercomputer
General Certificate of Education (Ord.Level) Examination 2007 Information & Communication Technology I One hour Note: Answer all questions. In each of the questions 1 to 40 pick one of the alternatives
More informationInformation Communications Technology (CE-ICT) 6 th Class
Information Communications Technology (CE-ICT) 6 th Class Lecture 2: Computer Concepts (Part A) Lecturer: Objectives Hardware Concepts Types of Computer Components of a Computer System Computer Performance
More informationWed, October 12, 2011
Practical Occlusion Culling in Killzone 3 Michal Valient Lead Tech, Guerrilla B.V. Talk takeaway Occlusion culling system used in Killzone 3 The reasons why to use software rasterization (Some) technical
More informationCOURSE OUTLINE. School of Engineering Technology and Applied Science. Computer Systems and Network Technology
COURSE OUTLINE SCHOOL: School of Engineering Technology and Applied Science DEPARTMENT: Information and Communication Engineering Technology (ICET) PROGRAM: Computer Systems and Network Technology COURSE
More informationCambridge Assessment International Education Cambridge International Advanced Subsidiary and Advanced Level. Published
Cambridge Assessment International Education Cambridge International Advanced Subsidiary and Advanced Level INFORMATION TECHNOLOGY 9626/12 Paper 1 Theory MARK SCHEME Maximum Mark: 90 Published This mark
More informationICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS
Website: http:// ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Important note on English as a Second Language (ESL) and International
More informationCSC Operating Systems Spring Lecture - II OS Structures. Tevfik Ko!ar. Louisiana State University. January 17 th, 2007.
CSC 4103 - Operating Systems Spring 2008 Lecture - II OS Structures Tevfik Ko!ar Louisiana State University January 17 th, 2007 1 Announcements Teaching Assistant: Asim Shrestrah Email: ashres1@lsu.edu
More informationFile Organization Sheet
File Organization Sheet 1. What are File Structures? A File Structure is a combination of representations for data in files and of operations for accessing the data. A File Structure allows applications
More informationSirindhorn International Institute of Technology Thammasat University
Name.............................. ID............... Section...... Seat No...... Sirindhorn International Institute of Technology Thammasat University Course Title: IT Security Instructor: Steven Gordon
More informationAnnouncements. Operating System Structure. Roadmap. Operating System Structure. Multitasking Example. Tevfik Ko!ar
CSC 4103 - Operating Systems Spring 2008 Lecture - II OS Structures Tevfik Ko!ar Teaching Assistant: Asim Shrestrah Email: ashres1@lsu.edu Announcements All of you should be now in the class mailing list.
More informationChapter 12. File Management
Operating System Chapter 12. File Management Lynn Choi School of Electrical Engineering Files In most applications, files are key elements For most systems except some real-time systems, files are used
More informationbt-loganalyzer Administrators Companion Reporting
bt-loganalyzer Administrators Companion for Reporting Burst Technology, Inc. Contents Pre-Defined Report Definitions... 5 Sub Report Definitions and Samples... 9 User Audit Detail - Number of Web Pages
More informationCSC Operating Systems Fall Lecture - I Introduction. Tevfik Ko!ar. Louisiana State University. August 25 th, Contact Information
CSC 4103 - Operating Systems Fall 2009 Lecture - I Introduction Tevfik Ko!ar Louisiana State University August 25 th, 2009 1 Contact Information Instructor: Prof. Tevfik Kosar Office: 292 Coates (also
More informationGCSE (9 1) Mathematics J560/05 Paper 5 (Higher Tier) Practice paper Set 2 Time allowed: 1 hour 30 minutes
H GCSE (9 1) Mathematics J560/05 Paper 5 (Higher Tier) Practice paper Set 2 Time allowed: 1 hour 30 minutes You may use: geometrical instruments tracing paper Do not use: a calculator First name Last name
More informationAMD RAID Installation Guide
AMD RAID Installation Guide 1. AMD BIOS RAID Installation Guide.. 2 1.1 Introduction to RAID.. 2 1.2 RAID Configurations Precautions 3 1.3 Installing Windows 7 / 7 64-bit / Vista TM / Vista TM 64-bit /
More informationSUMMARY OF INFORMATION ON EACH COURSE
1. Name of Course 2. Course Code 3. Status of Course [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level 3 Diploma MQF Level 4 Bachelor MQF Level 6 Masters MQF Level 7 Doctoral MQF Level
More informationFinal Examination Semester 3 / Year 2008
Southern College Kolej Selatan 南方学院 Final Examination Semester 3 / Year 2008 COURSE : JAVA PROGRAMMING COURSE CODE : PROG1114 TIME : 2 1/2 HOURS DEPARTMENT : COMPUTER SCIENCE CLASS : CS08-A + CS08-B LECTURER
More informationCSE Computer Security (Fall 2006)
CSE 543 - Computer Security (Fall 2006) Lecture 18 - Network Security November 7, 2006 URL: http://www.cse.psu.edu/~tjaeger/cse543-f06/ 1 Denial of Service Intentional prevention of access to valued resource
More information8/25/2016. What Is a Computer? The Components of a Computer
Discovering Computers & Microsoft Office 2010 Selected Slides from Chapters 1-5 What Is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory
More informationOverview IN this chapter we will study. William Stallings Computer Organization and Architecture 6th Edition
William Stallings Computer Organization and Architecture 6th Edition Chapter 4 Cache Memory Overview IN this chapter we will study 4.1 COMPUTER MEMORY SYSTEM OVERVIEW 4.2 CACHE MEMORY PRINCIPLES 4.3 ELEMENTS
More information