Comp 110:Introduction To Computer Science Question Paper

Comp 110:Introduction To Computer Science 

Course:Degree Of (Bsc) In Computer And (Bsc) In Econ/Math

Institution: Kabarak University question papers

Exam Year:2013



KABARAK
UNIVERSITY
UNIVERSITY EXAMINATIONS
2012/2013 ACADEMIC YEAR
FOR THE DEGREE OF (BSC) IN
COMPUTER AND (BSC) IN
ECON/MATH
COMP 110:INTRODUCTION TO COMPUTER SCIENCE
DAY:FRIDAY DATE:11/04/2013
TIME: 2.00-4.00 P.M.
STREAM: Y1S1
INSTRUCTIONS:
Answer question one and any other two questions
Question
1
(30 Marks
)
a)
What do you understand by the following data representation
ter
minologies: bit, byte and word?
[3 marks]
b)
Consider the following integer X, represented in 32
-
bit 2''s complement
form:
0000 1001 0000 1001 0000 1001 0000 1001
What is the representation for

X?
[2 marks]
c)
With an aid of a diagram, explain the steps for th
e fetch execute cycle.
[8
marks]
d)
Outline any two advantages and two limitations of high level programming
languages.
[4 marks]
e)
Briefly explain the activities of the read and write control lines as used in
control buses of the Von Newmann Architecture.
[3
marks]
f)
Given two 32
-
bit signed integers, A and B, if the difference A

B is
computed
is it possible that overflow will occur? Define overflow and justify
your conclusion.
[4 marks]
Page
2
of
3
g)
Give the simplest explanation of what each circuit shown below actually
c
omputes. Justify your conclusions.
[6 marks]
Question
2 (20 Marks)
a)
Differentiate between Logic Gate and combinational logic circuit.
[4 marks]
b)
What makes a circuit a gate?
[2 marks]
c)
What is the relationship
between
a truth table and combinational logic
circuit?
[2 marks]
d)
Simplify the following Boolean expressions
i.
(a’b + a’b’ + b’)’
[3 marks]
ii.
ab + ab’ + a’b
[2 marks]
Question 3:
(20 Marks
)
a)
Explain the following terms in relation to
computer
security.
i)
Risks:
[2 Marks]
ii)
Threats:
[2 Marks]
iii)
Vulnerabilities:
Page
3
of
3
[
2 Marks]
iv)
Trap doors
[2 Marks]
b)
Explain
the
following
controls mechanisms that are counter measures to
threats.
i)
Physical Controls
[3 Marks]
ii)
Electronic Controls
[3 Marks]
iii)
Software Controls
[3 Marks]
iv)
Management Controls
[3 Marks]
Question
4 (20 Marks)
In thi
s question make
use of the
MIPS 32 quick reference guide supplement
provided
.
a)
Write a MIP program that would
prompt for
user name and echo
es
it on the
screen
[5 marks]
b)
Write a segment of code that puts the largest value of those in
$s0
,
$s1
and
$s2
into
$t0
.
[3 marks]
c)
Write a segment of code that puts into
$t3
the sum of the elements of the
100 element array of integers whose starting address is in
$t5
. Use a loop,
not 100 loads and adds. Do not change
$t5
.
[3 marks]
d)
Write a segment of code that reads t
wo integers from the user (no need to
prompt for input) and prints the sum of the two numbers.
[5
marks]
e)
Write a procedure (function actually) that receives two integers in
$a0
and
$a1
, and returns their product in
$v0
. Do not use the multiply instruction
-
instead write a loop that adds repeatedly. Assume both numbers are
positive
and don''t worry about the product being too large to fit in 32 bits
[4
marks]






More Question Papers


Popular Exams


Mid Term Exams

End Term 1 Exams

End Term 3 Exams

Opener Exams

Full Set Exams



Return to Question Papers