Professional Documents
Culture Documents
UNIT 2- Paper 01
I hour 30 minutes
I. Th is test consists of 45 items. You will have 1 hour and 30 minutes to answer them .
On your answer sheet, find the number which corresponds to your item and shade the space
5.
I having the same I_etter as the answer you have. chosen. Look at the sample item below.
Sample ftem
(A)
(B) 2
Sample Answer
I (C)
(D)
3
8
The best answer to this item is "3", so (C) has been shaded.
r,r 6. If you want to change your answer, erase it completely before you fill in your new choice.
' ;'
7. When you are told to begin, turn the page and work as quickly and as carefully as you can. lf
you cannot answer an item, go on to the next one. You may return to that item later.
r 9.
IO.
Figures are not necessarily drawn to scale.
(A)
◄
--- ---TOP
GRAPE
APPLE
(B)
GRAPE -◄
,.._--TOP
APPLE
• (C)
GRAJ>E TOP
BANANA
(D)
GRAPE
_____
.__APPLE __]
◄◄
a--TOP
3. Which of the fo ll owi ng state me nt s is true Item 5 refers to the following diagrams
for both a linear search and a binary search? whi c h show two items stored in a queue .
(C) D EQU EU E, D EQ U EU E,
ENQUEUE(L), ENQUEUE(K),
ENQUEUE(J)
7. Figure I shows the state of a stack before 8. Which of the following sets of steps would
the pop operation is performed. Figure 2 complete the algorithm?
shows the state after the pop operation
is performed . Which of the followino0 (A) I - flag = true
combinations of arrows correctly identifies lI - add l to count
the top of the stack structures? III - count = n - 1
IV - WRITE target not found
Figure I -
~
I
II (B) I - flag= true
-.
III
11 - add 1 to count
s ◄ Ill - count = n
B IV - WRITE target found
·N .
IV
• (C) I - flag •= true
II - add 1 to count
III - count= n-1
IV - WRITE target found
V
Figure 2 -
(D) l - flag = true
II - add l to count
VI
s -- -
Ill - count= n
B - VII
~
_.
IV - WRITE target not found
N VIII
(A) I and-v
(B) II and VJ
(C) III and Vll
(D) IV and VIII
GO ON TO THE NEXT PP
022150 I 0/CAPE 20 I 8
- 5-
•
- 6 -
POSlTION
30 32 24 18 7
4
I 3
5
REP EAT
flag = false
0 2 3
FOR pos= 1 ton - I DO
IF(list[pos) > list[pos + I]) THEN
13. Using the selection sort algorithm , what I
would the array above look like after Il
three passes? llI
IV
(A) 3 7 18 24 32 30 END IF
END FOR
POSITION 0 1 2 3 4 5 subtract l from n
UNTIL flag = false or n = 1
(8) 3 7 24 18 30 32
Item 15 refers to the following segment of Item 16 refers to the following scenario.
an incomplete algorithm for performing a
selection sort on an array /is l in ascending A doctor is assigned to one or more
patients who are assigned to a specific ward .
order.
Attributes of a patient include patient ID and
FOR i = 0 to n- 2 DO information on his/her condition. The ward
min = i also has an ID.
FORj =i+ I ton- I DO
IF I THEN 16. Which of the ER diagrams below BEST
min= j illustrates this information?
END IF
SWAP list[i] and_-'CI..:....I_ (A) Doctor
END FOR
END FOR Treats
1 Condition
• (C) Doctor
Ward
(D) Doctor
1
Treats
has
1---- ----- Condition
1
24 . Wh ich of the fo ll ow ing nre exa mple s or 28 . So ftware evolution may £3EST be defined as
n onfunct ional rcq ui rc rn cnls? lh c
,
changing customer requirements
(B) II and III only (D) modification of software to satisfy
(C) I, II and Ill only changes in customer and market
(D) I, II, III and IV requirements
I
I
25. Which of the following attributes does NOT 29. Which of the following is considered a
contribute to a system 's maintainability? functional requirement?
(A) Interface
26 Which ofthe following phrases describe the (8) Component
contents ofan entry in a data dictionary? (C) Architectural
(D) Data structure
I. The name of the element
II. The type and format of the ele1111ent
Ill. A list of related elements 31. Which of the following pieces of information
is NOT contained in a process control block?
(A) land U only
(B) land III only (A) Amount of CPU time used
(C) II and fII only (B) Estimated time to completion
(D) I, II and Ill (C) Job priority
(D) Process ID
. '?
. BEST describes ' paging .
32. Whi ch of the followlllg phrases
· aller chunks · II d
(A) The division of documents mto sm rn called frames to main memory ca e pages
(B) The assignment of chunks of a progra called frames to different secondary storage llledia'
(C) The assignment of chunks of a progarn II d pages to chunks of memory called frames
(D) The assignment of chun ks o fa program ca e
MODEM COMPUTER
MODEM
(A) routing
(8) addressing
(C) modulation and demodulation
(D) multiplexing and expandability
34 . The tenn ' firewire ' refers to a 36. Which of the following statements is true
about a process being scheduled with a non-
(A) type of cabling that allows com- preemptive algorithm?
munication between computers
(B) software running on a computer (A) It is placed at the top of the ready
that protects it from external queue if it has a higher priority
attacks
(C) •
high-speed serial bus system
than all the processes already in
the queue.
(D) type of computer virus (B) Once it enters the running state, it
is allowed to run to completion
or until it yields the processor.
35. A webmaster has decided to design his (C) Once it enters the running state, it
website offiine and upload tJ1e various files
is given a fixed amount of time
and graphics to the web server remotely.
to use the CPU after which other
processes get a chance to use the
Which of the following methods would be
CPU .
BEST suited for providing the FASTEST and (D) Once it enters the running state, it is
MOST secure way of uploading the data?
given a variable amount of time
(A) FTP to use the CPU depending on its
(B) priority.
GSM
(C) HTML
(D) UML
37. Wh ich of the fo llow ing lc;1t11rcs is NOT a Ite m 41 refe rs to the fo ll ow ing diagram .
funct ion of an opcrnt ing system?
40. lf a node fails in a ring network, how many Item 43 refers to the following diagram .
other stations are affected?
Process A
(A) Half of the stations
(B) All other stations
(C) No other computer
(D) Only the computer directly attached Process B
to the failed computer
43. What does the above diagram represent?
(A) Deadlock
(B) Round robin
(C) Interrupt
(0) Fetch-decode-execute cycle
END OFTEST
IF YOU FINISH BEFORE TIME IS C~LLED, CHECK YOUR WORK ON THIS TES
CANDIDATE PLEASE NOTE!
PRINT your name on the line below and retum 0 10
this booklet with your answer sheet. Failure to TEST CODE 02215
do so may result in dlsqualilicatioo.
I. This test consists of 45 items. You will have I hour and 30 minutes to answer them.
Sample Item
How many selection lines does an 8 x 1 multiplexer have? Sample Answer
(A) 1
(B) 2
(C) 3
0
0 (D) 8
<t
The best answer to this item is "3", so (C) has been shaded.
6. If you want to change your answer, erase it completely before you fill in your new choice.
7. When you are told to begin, tum the page and work as quickly and as carefully as you can. If you
cannot answer an item, go on to the next one. You may return to that item later.
(A) I and V
(B) II and VI
(C) III and VII
(D) IV and VIII
9. The target value is 19. A binary search is 11. Which of the following lists will NOT be
employed. What is the second value to be obtained at any point while applying the
compared with the target value, 19? selection sort algorithm?
13. A queue is implemented using a one-dimensional array. Which of the following actions BEST
describes the dequeue operation performed using the array?
17. Which of the following outputs is a result 21. The MAIN goal of component testing is to
of using a CASE tool?
(A) expose faults in the components
(A) Cost/benefit analysis (B) demonstrate that the system meets
(B) Program definition its requirements
(C) Feasibility study (C) increase the supplier's confidence
(D) Prototype that the system meets its require-
ments
(D) test how one component interacts
18. Which of the following is LEAST helpful with others in the system
in an error message presented to a user?
;·.-i-,·:
,,•i ,'f
•~':f;
_;,;:
-9-
Insulator
I
I
Iniler
I
Insulator
conductor
conductor
(A) Coaxial
(B) Fibre optic
(C) Firewire
(D) Shielded twisted pair
34. The term 'firewire' refers to a 35. A webmaster has decided to design his
website offline and upload the various files
(A) type of cabling that allows com- and graphics to the web server remotely.
munication between computers
(B) software running on a computer Which of the following methods would be
that protects it from external BEST suited for providing the FASTEST
attacks and MOST secure way of uploading the
(C) high-speed serial bus system data?
(D) type of computer virus
(A) FTP
l (8)
(C)
(D)
GSM
HTML
UML
(A) routing
(B) addressing
(C) modulation and demodulation
(D) multiplexing and expandibility
37. Which of the following outcomes relates 39. Which of the following phrases BEST
to the use of virtual memory? describes ' paging ' ?
(A) Results in faster execution speeds (A) The division of documents into
(B) Creates an illusion that the computer smaller chunks
has more memory (B) The assignment of chunks of a
(C) Ensures that memory works faster program called frames to main
(D) Ensures that all programs are in memory called pages
memory (C) The assignment of chunks of a
progam called frames to different
38.
secondary storage media
Which IEEE standards can be employed (D) The assignment of chunks of a
when setting up a wireless LAN for
program called pages to chunks
wireless devices needing transfer rates
of memory caJled frames
GREATER than 20 mbps?
I. 802.11 a
Item 40 refers to the following diagram .
II. 802.11 b
III. 802. l l g
(A) I only
(B) II only
(C) l and II only
(D) I and III only
·y;:t'~
, .,...
. ' .:&.-, .
- l1 -
41. Which of the following determines the 44. Which of the following is true about a
amount of time a running process gets process being scheduled with a non-pre-
to use the CPU when a round-robin emptive algorithm?
scheduling algorithm is used?
(A) It is placed at the top of the ready
(A) The order of arrival of the process queue if it has a higher priority
on the ready queue than all the processes already in
(B) The priority of the process the queue.
(C) The estimated running time of the (B) Once it enters the running state, it
process is allowed to run to completion
(D) The fixed time of the operating or until it yields the processor.
system (C) Once it enters the running state, it
is given a fixed amount of time
to use the CPU after which other
42. A running process initiates an input request processes get a chance to use the
to get data from the keyboard. Which of the CPU.
following state transitions will take place (D) Once it enters the running state, it is
when the data is made available? given a variable amount ohime
to use the CPU depending on its
(A) Ready to running priority.
(B) Running to ready
(C) Blocked to ready
(D) Blocked to running 45. In a network where the running applications
generate a significant amount of traffic,
which of the following devices would NOT
Item 43 refers to the following diagram. be suitable?
Process A
(A) Router
(B) Switch
(C) Hub
(D) Bridge
Process B
(A) Deadlock
(B) Round robin
(C) Interrupt
(D) Fetch-decode-execute cycle
END OFTEST
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
UNIT 2 – Paper 01
1 hour 30 minutes
1. This test consists of 45 items. You will have 1 hour and 30 minutes to answer them.
3. Do not be concerned that the answer sheet provides spaces for more answers than there are items
in this test.
4. Each item in this test has four suggested answers lettered (A), (B), (C), (D). Read each item you
are about to answer and decide which choice is best.
5. On your answer sheet, find the number which corresponds to your item and shade the space having
the same letter as the answer you have chosen. Look at the sample item below.
Sample Item
(A) 1 A B C D
(B) 2
(C) 3
(D) 8
The best answer to this item is “3”, so (C) has been shaded.
6. If you want to change your answer, erase it completely before you fill in your new choice.
7. When you are told to begin, turn the page and work as quickly and as carefully as you can. If you
cannot answer an item, go on to the next one. You may return to that item later.
1. The diagrams below show three items stored Item 2 refers to the following scenario.
in a stack. Which sequence of operations
would transform the stack from the initial A student is asked to implement a stack using
state to the final state? arrays. The student develops the following
operations and programming statements.
Initial State
Operation:
push(ele)
pop ( )
C TOP I. return ele
A II. if ptr ! = array_size
B III. ptr = ptr + 1
IV. ptr = ptr - 1
Final State V. ele = data [ptr]
VI. ele = data [ptr + 1]
VII. data [ptr] = ele
VIII. data [ptr - 1] = ele.
IX. if (ptr! = 0)
A TOP
C In the programming statement, data refers
B to the array which stores the data, ptr is the
address of the last element inserted into the
(A) POP, POP, PUSH(C), PUSH(A) stack and ele is the data element being acted
(B) POP, POP, PUSH(A), PUSH(C) on.
(C) PUSH(A), PUSH(C), POP, POP
(D) P O P, P O P, P O P, P U S H ( A ) , 2. Which ordering below gives a working
PUSH(C), PUSH(B) implementation for the ‘POP ( )’ operation?
3. Assume that the list is sorted. When searching the sorted list, which of the following will be found
the fastest using a binary search?
(A) ant
(B) dog
(C) fish
(D) grasshopper
4. Figure 1 below shows the state of a stack before the POP operation is performed. Figure 2 shows
the state after the POP operation is performed.
Which of the following combinations of arrows correctly identifies the top of the stack structures?
(A) I and V
(B) II and VI
(C) III and VII
(D) IV and VIII
5. Entries in a stack are ‘ordered’. What is the Items 7 refers to the following array.
meaning of this statement?
30 32 24 18 7 3
(A) The collection of stacks can be POSITION 0 1 2 3 4 5
sorted.
(B) Stack entries may be compared with 7. Using the selection sort algorithm, what
the ‘<’ operation. would the array above look like after
(C) The entries must be stored in a three passes?
linked list.
(D) There is a first entry, a second entry
(A) 3 7 18 24 32 30
and so on.
POSITION 0 1 2 3 4 5
6. Consider a circular queue, C, with a pointer
rear that references the location of the rear (B) 3 7 24 18 30 32
of the queue. The front pointer is set to zero
POSITION 0 1 2 3 4 5
before any ADT operation. The following
operations are performed on C.
(C) 3 7 18 30 32 24
enqueue, enqueue, enqueue, dequeue,
POSITION 0 1 2 3 4 5
dequeue, enqueue, enqueue, enqueue,
dequeue
(D) 3 7 18 24 30 32
Assuming that the locations range from 0
POSITION 0 1 2 3 4 5
to 4, what is the value of the pointer front?
(A) 0
(B) 1 8. Which of the following statements is
(C) 2 true?
(D) 3
(A) The bubble sort is very simple and
therefore very efficient.
(B) The selection sort performs the
same regardless of the size of
the list.
(C) The bubble sort performs less
efficient than selection sort on
longer lists.
(D) The selection sort starts by finding
the maximum element in the list
and swapping it with the middle
element.
count = 0
flag = false
REPEAT
IF (list[count] = target) THEN
I
END IF
II
9. Which of the diagrams below gives the state UNTIL flag = true or III
of the stack after the operations listed are IF flag = false THEN
performed in order? IV
END IF
(D) I – list[j] > list[min] 18. Which of the following graphical tools is
II – list[j] MOST suitable for showing how a software
development project and its subtasks
should be completed within a specified
15. In which of the following situations would timeframe?
the implementation of a queue be MOST
appropriate? (A) Data flow diagram
(B) System flowchart
(A) Translating computer language (C) Decision tree
(B) Storing information when functions (D) Gantt chart
are called
(C) Evaluating reverse polish
mathematical expressions
(D) Rescheduling CPU time for
processes using round robin
19. The evolutionary approach is being used 22. A company is interested in replacing
to develop a software application. its current software system with a new
system. The company is located in various
Which of the following are types of Caribbean territories with many employees.
evolutionary development? Which approach is MOST appropriate for
gathering information during the analysis
I. Exploratory development phase?
II. Throw-away prototyping
III. Rewind approach (A) Prototyping
(B) Distributing questionnaires at each
(A) I and II only branch
(B) I and III only (C) Observation of practices at a few
(C) II and III only branches
(D) I, II and III (D) Interviews with key people at a few
branches
26. Which life cycle model approach is BEST Item 29 refers to the following scenario.
suited for a system with critical safety and
security requirements? A car dealer uses a relational database to
store data on the orders made by customers,
(A) Waterfall approach, since software the types of cars in stock and payments
is well structured made.
(B) Evolutionary development, since
any security problems can be 29. How many entities can be identified?
easily rectified by creating a new
system (A) Two
(C) Fountain approach, since any (B) Three
security problems can be easily (C) Four
rectified by further iterations (D) Five
(D) Formal transformation, since it can
be proven that the system fulfils
requirements 30. Which of the following describe the
contents of an entry in a data dictionary?
27. A small company with fewer than ten I. The name of the element
employees is interested in replacing II. A list of related elements
its existing paper-based system with III. The type and format of the element
a software application. Which of the
following is MOST appropriate for (A) I and II only
gathering information during analysis? (B) I and III only
(C) II and III only
(A) Distributing questionnaires to (D) I, II and III
employees and clients of the
company
(B) Researching company practices on 31. An ‘interrupt’ may BEST be described as
the Internet a
(C) Interviewing priority clients of the
company (A) period in time when the CPU does
(D) Interviewing key people at the nothing
company (B) signal sent to the CPU for attention
(C) time when a process is blocked
(D) signal sent when a process is
28. Which of the following statements is true complete
of data flow diagrams?
32. A client is interested in setting up a wireless 35. Which of the following statements
LAN for his place of business. Very high BEST describes a distributed network
data rates (30 Mbps–40 Mbps) are critical configuration?
to the network applications of this business.
Which standard should be employed, (A) Many users are on the network.
802.11a or 802.11b? (B) There are several printers on a
network.
(A) 802.11a, since it can support the (C) All data and processing power are
desired data rates. located at one node.
(B) 802.11b, since it can support the (D) Data and processing power can be
desired data rates. scattered across many nodes.
(C) 802.11a or 802.11b will give
similar performance since these
standards do NOT differ in data 36. Which of the following pieces of informa-
rates. tion is NOT contained in a process control
(D) Neither 802.11a nor 802.11b since block?
they do NOT support transmission
over a large distance. (A) Amount of CPU time used
(B) Estimated time to completion
(C) Job priority
33. Which of the following phrases BEST (D) Process ID
describes ‘paging’?
(A) The division of documents into 37. A running process initiates an input request
smaller chunks to get data from the keyboard. Which of the
(B) The assignment of chunks of a following state transitions will take place
program called frames to main when the data is made available?
memory called pages
(C) The assignment of chunks of a (A) Ready to running
program called pages to chunks (B) Blocked to ready
of memory called frames (C) Running to ready
(D) The assignment of chunks of a (D) Blocked to running
progam called frames to different
secondary storage media
38. Which of the following determines the
amount of time a running process gets
34. A webmaster has decided to design his to use the CPU when a round-robin
website offline and to upload the various scheduling algorithm is used?
files and graphics to the web server
remotely. (A) The priority of the process.
(B) The estimated running time of the
Which of the following would be BEST process.
suited for providing the fastest and MOST (C) The time is fixed by the operating
secure method of uploading the data? system.
(D) The order of arrival of the process
(A) FTP on the ready queue.
(B) GSM
(C) UML
(D) HTML
39. The term ‘firewire’ refers to a 42. Which of the following outcomes relates
to the use of virtual memory?
(A) type of cabling that allows
communication between (A) Results in faster execution speeds
computers (B) Ensures that memory works faster
(B) software running on a computer (C) Creates an illusion that the computer
that protects it from external has more memory
attacks (D) Ensures that all programs are in
(C) high-speed serial bus system memory
(D) type of computer virus
40. If a node fails in a ring network, how many 43. In a network where the running applications
other stations are affected? generate a significant amount of traffic,
which of the following devices would NOT
(A) Half of the stations be suitable?
(B) All other stations 6y
(C) No other computer
(D) Only the computer directly attached (A) Hub
to the failed computer (B) Switch
(C) Router
(D) Bridge
41. Which layer of the OSI model handles data
transmission between host computers?
44. Which of the following statements is true Item 45 refers to the following diagram.
about a process being scheduled with a
non-preemptive algorithm?
END OF TEST
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
02215010/MJ/CAPE 2021
DO
NO
W T
RI
TE
TH ON
IS
PA
GE
DO
NO
W T
RI
TE
TH ON
IS
PA
GE
DO
NO
W T
RI
TE
TH ON
IS
PA
GE
CANDIDATE’S RECEIPT
INSTRUCTIONS TO CANDIDATE:
TEST CODE: 0 2 2 1 5 0 1 0
PROFICIENCY: ADVANCED
REGISTRATION NUMBER:
Signature: ____________________________________________________________________
Date: ________________________________________________________________________
2. Ensure that this slip is detached by the Supervisor or Invigilator and given to you when you
hand in this booklet.
INSTRUCTION TO SUPERVISOR/INVIGILATOR:
Sign the declaration below, detach this slip and hand it to the candidate as his/her receipt for this booklet
collected by you.
I hereby acknowledge receipt of the candidate’s booklet for the examination stated above.
Signature: _____________________________
Supervisor/Invigilator
Date: _________________________________