Question 1 of 20
When a subroutine is called, the address of the instruction following the CALL instruction is sorted in/on the:
This A Level Computer Science Quiz 2017 Part 3 quiz contains 20 multiple choice questions designed to help you revise and test your A level Computer Science Quizzes knowledge. Select an answer for each question and click “Submit Answer” to see instant feedback. Take your time and try to score as high as possible!
Computer science is a dynamic and rapidly growing area that has become an integral part of the world that we live in today. Most people cannot live without the innovations around us today.
However, in the course of its studies, computer science is not an easy subject for most students to handle. Due to its rapidly changing life, students are most often not ready when faced with examination questions. This can be due to the lack of materials, information or the most haven’t attempted questions that are subject related. In our way of helping out, this quiz has been specifically designed for students who wish to test their knowledge and understanding of the subject. Based on the Advanced level syllabus, questions are carefully selected from the topics: “Data management, programming, Computer security and Networking”.
Each of the questions in the quiz has four possible answers and of which only one is correct among the four.For more such quizzes click on more or visit our website to gain more materials.
Question 1 of 20
When a subroutine is called, the address of the instruction following the CALL instruction is sorted in/on the:
Question 2 of 20
In object-oriented programming, an object is
Question 3 of 20
In general, a low-level language program
Question 4 of 20
In computability theory, a problem is said to be computable if:
Question 5 of 20
When implementing recursive programs we use
Question 6 of 20
Prototype refinement is
Question 7 of 20
In a mesh topology
Question 8 of 20
Any system generally used for real time applications is known as:
Question 9 of 20
It is NOT a measure for data security
Question 10 of 20
It is a computer crime to
Question 11 of 20
Viruses are an issue of network
Question 12 of 20
The number of connections in a full mesh topology that has n devices is given by
Question 13 of 20
The main function of a browser is to
Question 14 of 20
The concept by which we apply existing operations to new data types is
Question 15 of 20
If the state of a database no longer reflects a real life state the database is supposed to capture, then such a database state is said to be
Question 16 of 20
Recursive algorithms use a
Question 17 of 20
The benefit of prototyping is:
Question 18 of 20
A database table is in 3rd normal form if
Question 19 of 20
Given the relations CLASS (ClassID, Cycle, Teachinghours) and STUDENT (StudentID, ClassID, StudName). What is the possible relation between STUDENT and CLASS?
Question 20 of 20
When requirements analysis goes wrong, what could happen?
With the new age of technology, we must have come across so many definition...
The world of technology is quickly changing our life. The world of computer...
Computer science is a vast field encompassing various aspects related to co...
Computer science encompasses a very wide range of fields, and new ones cont...