0

IB Computer Science HL

Description: IB Computer Science HL
Number of Questions: 57
Created by:
Tags: information technology
Attempted 0/54 Correct 0 Score 0

A closed-loop system can provide a feedback loop. True or false?

  1. True

  2. False


Correct Option: A

What is a characteristic of a digital sensor?

  1. A single, variable output

  2. Does not use electricity

  3. Outputs a stream of 1s and 0s

  4. Can only measure temperature


Correct Option: C

What is NOT an advantage of using computer control systems?

  1. Computers can respond quickly to changes

  2. Computers are always ready to respond

  3. Computers do not require sensors

  4. Computers can operate in hazardous environments


Correct Option: C

Which of the following is NOT an actuator?

  1. Electric fan

  2. Thermostat

  3. Heater

  4. Lamp


Correct Option: B

What is paging?

  1. Providing more virtual RAM than physical RAM exists

  2. RAM overflow

  3. Increasing virtual RAM capacity by compressing data

  4. Using RAM to store and access files like a disk


Correct Option: A

What is a system interrupt?

  1. A device requests the processor's immediate attention

  2. The CPU asks the device if there has been an update

  3. The process by which a CPU prioritises applications

  4. The current CPU instruction is dropped to process new data


Correct Option: A

Smartphones are computers. True or false?

  1. True

  2. False


Correct Option: A

An analogue radio is a computer. True or false?

  1. True

  2. False


Correct Option: B

Digital cameras are computers. True or false?

  1. True

  2. False


Correct Option: A

What is not a function of the CPU?

  1. Addition

  2. Allocating memory to applications

  3. Processing graphical information

  4. Storing data long-term


Correct Option: D

What is this function an example of?

  1. Recursion

  2. For loops

  3. Iteration

  4. Abstraction


Correct Option: A

What is a recursive function?

  1. A function that calls itself

  2. A function that uses nested for-loops

  3. A function that does not produce an output

  4. A function that takes multiple inputs


Correct Option: A

What is a base case?

  1. The point at which the recursion loop will stop

  2. The element of a program that can be represented recursively

  3. An error causing the recursion loop to stop

  4. A for loop


Correct Option: A

What type of linked list is this?

  1. Doubly linked

  2. Circularly linked

  3. Doubly circularly linked

  4. Normal linked list


Correct Option: A

How does a linked list differ from an array?

  1. The size is dynamically allocated

  2. The size is static

  3. It is last-in-first-out

  4. It is first-in-first-out


Correct Option: A

Which data structure is first-in-first-out?

  1. Stack

  2. Queue

  3. Linked list

  4. Binary tree


Correct Option: B

Which data structure is last-in-first-out?

  1. Stack

  2. Queue

  3. Linked list

  4. Binary tree


Correct Option: A

What is a mutator method?

  1. A getter function

  2. A setter function

  3. A constructor

  4. An overridden method


Correct Option: B

Will having two or more constructors in a class cause an error?

  1. Always

  2. Never

  3. Not necessarily

  4. All of the above


Correct Option: C

What allows a class to have multiple implementations of the same behaviour?

  1. Polymorphism

  2. Abstraction

  3. Aggregation

  4. Inheritance


Correct Option: A

What does the access modifier "private" mean?

  1. Only its own class can access it

  2. Any class can access it

  3. Only its package can access it

  4. Only its subclasses can access it


Correct Option: A

What is the restriction of unauthorised data accessing between classes called?

  1. Encapsulation

  2. Abstraction

  3. Inheritance

  4. Overloading


Correct Option: A

What can a temporary connection between two classes be called?

  1. Aggregation

  2. Dependency

  3. Inheritance

  4. Overloading


Correct Option: B

What can a permanent connection between two classes be called?

  1. Aggregation

  2. Dependency

  3. Inheritance

  4. Overloading


Correct Option: A

What does UML stand for?

  1. Unified modelling language

  2. User method locator

  3. Unilateral mode logger

  4. Unlinked markup language


Correct Option: A

Identify the odd one out

  1. Integer

  2. Float

  3. Array

  4. Boolean


Correct Option: C

What does a compiler do?

  1. Converts a program into machine code before it is run

  2. Converts a program into machine code when it is run

  3. Helps a programmer debug their code

  4. All of the above


Correct Option: A

Which of the following is NOT a high-level programming language?

  1. Assembly

  2. C#

  3. Java

  4. Ruby


Correct Option: A

Which sorting algorithm moves the highest value to the end of the array with each pass?

  1. Bubble sort

  2. Selection sort

  3. Binary sort

  4. Boingo sort


Correct Option: A

Binary search only works on sorted data. True or false?

  1. True

  2. False


Correct Option: A

What is it called to deal with multiple things at once?

  1. Redundancy

  2. Concurrency

  3. Abstraction

  4. Planning ahead


Correct Option: B

What is it called to make software compatible with a range of future possibilities?

  1. Redundancy

  2. Concurrency

  3. Abstraction

  4. Planning ahead


Correct Option: D

What is it called to have more resources than necessary to complete a task?

  1. Redundancy

  2. Concurrency

  3. Abstraction

  4. Planning ahead


Correct Option: A

What is a group of computers connected together on the scale of a home or office called?

  1. LAN

  2. WLAN

  3. WAN

  4. PAN


Correct Option: A

Which of the following transmission methods can carry data the fastest?

  1. Coaxial

  2. Fibre optic

  3. Satellite

  4. Copper phone line


Correct Option: B

Which of the following is NOT a lossy format?

  1. jpg

  2. flac

  3. mp4

  4. mp3


Correct Option: B

What is a denial of service attack?

  1. A client refusing to provide service

  2. Too many requests causing a server to refuse connections

  3. A server contacting too many clients and shutting them down

  4. A vulnerability exploited to gain access to a system


Correct Option: B

What does UDP stand for?

  1. User datagram protocol

  2. Unified data protocol

  3. Unified datagram protocol

  4. User data protocol


Correct Option: A

UDP verifies that all packets have arrived. True or false?

  1. True

  2. False


Correct Option: B

What does TCP stand for?

  1. Transport control protocol

  2. Transfer control protocol

  3. Transmission control protocol

  4. Transaction control protocol


Correct Option: A

What is twos complement?

  1. A way of storing negative numbers

  2. A way of storing even numbers

  3. A way of storing decimals

  4. A way of storing strings


Correct Option: A

What is ASCII?

  1. A way of representing characters as binary

  2. An IDE

  3. A protocol for internet communication

  4. An exclamation


Correct Option: A

What is 00110010 (binary) in hexadecimal?

  1. 32

  2. 2E

  3. 2F

  4. 30


Correct Option: A

What is 11001010 (binary) in decimal?

  1. 202

  2. 188

  3. 206

  4. 200


Correct Option: A

What is 66 (decimal) in hexadecimal?

  1. 42

  2. 3A

  3. F2

  4. 4B


Correct Option: A

What is 25 (decimal) in binary?

  1. 00011001

  2. 00001011

  3. 00111001

  4. 00010001


Correct Option: A

What are 1 billion bytes are called?

  1. Gigabyte

  2. Terabyte

  3. Megabyte

  4. Gigabit


Correct Option: A

What are 1000 1s and 0s are called?

  1. Kilobyte

  2. Kilobit

  3. Kilooctet

  4. Megabyte


Correct Option: B

What is a single 1 or 0 is called?

  1. Byte

  2. Bit

  3. Kilobyte

  4. Octet


Correct Option: B

Which option is NOT a deployment issue?

  1. Disks are impractical to distribute and use

  2. Downloads could use up internet quotas

  3. Automatic updates install updates in the background

  4. Manual updates are slow to roll over


Correct Option: C

What is software that is run entirely on internal systems called?

  1. Software as a service

  2. Platform as a service

  3. Infrastructure as a service

  4. Enterprise IT


Correct Option: D

What is software that is accessible through a web portal and operated externally called?

  1. Software as a service

  2. Platform as a service

  3. Infrastructure as a service

  4. Enterprise IT


Correct Option: A

What model shows what your product might look like?

  1. Wireframe model

  2. Recommended project model

  3. Possible project model

  4. Device diagram model


Correct Option: A

What is a way of showing how the various functions of your program interact?

  1. Flow chart

  2. Gantt chart

  3. Context diagram

  4. Prototype


Correct Option: A
- Hide questions