0% found this document useful (0 votes)
39 views5 pages

JSS 2 Information 3rd Term

This document contains a 40 question multiple choice exam on information technology topics like email, the internet, networks, and programming basics. It also includes 4 theory questions asking students to define key IT terms, describe devices and systems, list their features and benefits, and provide examples. The exam tests students' knowledge of fundamental IT concepts as well as practical applications and responsible use of technology.

Uploaded by

waleoladimeji04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views5 pages

JSS 2 Information 3rd Term

This document contains a 40 question multiple choice exam on information technology topics like email, the internet, networks, and programming basics. It also includes 4 theory questions asking students to define key IT terms, describe devices and systems, list their features and benefits, and provide examples. The exam tests students' knowledge of fundamental IT concepts as well as practical applications and responsible use of technology.

Uploaded by

waleoladimeji04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

JSS 2 Information technology 3rd term exam questions.

1. What is the term for unsolicited email?

A). Spam. B). Backbone. C). Unset. D). News group.

2. Internet is a _______________.

A). Dynamic system. B). Complex system. C). Decentralized system. D). All of the
above.

3. Servers are computers that provides resources to other computers connected to a __________.

A). Client. B). Maintenance. C). Supercomputer. D). Network.

4. The process of connecting to an internet account is called __________.

A). Sign in. B). Sign out. C). Log up. D). Log out.

5. Sender an email is similar to ___________.

A). Writing a letter. B). Calling on the phone. C). Drawing a picture. D). Sending a
package.

6. ______________ performs simple mathematical calculations for the CPU.

A). Bus. B). Register. C). ROM. D). ALU.

7. E mail stands for _____________.

A). Electrical mail. B). Text messages. C). Telephone signals. D). Electronic mail.

8). Which of the following format is correct for a proper email address?

A). www-peace419mail.com. B). [email protected]. C). [email protected]. D).


None of the above.

9). WWW stands for _______________.

A). Wide world web. B). Web wild world web. C). Word wild web. D). World wide web.

10. Which of the following is not a web browser?

A). Chrome. B). Facebook. C). Firefox. D). Netscape navigator.

11. The following are search engines except ___________.

A). Windows. B). Yahoo. C). Google. D). None.

12. The main page of a website is called _________.


A). First page. B). Web page. C). Home page. D). Cover page.

13. Verification of a login and password is known as _______________.

A). Authentication. B). Clarification. C). Congratulations. D). Welcoming.

14). ISP stands for _____________.

A). Internet source protocol. B). Internet service protocol. C). Internet service provider. D).
None.

15. URL stands for ______________.

A). United Resources line. B). Unity Resource Line. C). Uniform Resource Locator.
D). None.

16. In email address the ampersand symbol is attached before the host name.

A). True. B). False. C). Not sure. D). None.

17. _______________ is a software installed on a personal computer used for accessing and viewing any
information on the web.

A). Internet. B). Network. C). Browser. D). All of the following.

18. The following is an example of a network group except ______________.

A). Twitter. B). Facebook. C). Sophia. D). Nadia.

19. ___________ is where deleted messages are stored.

A). Inbox. B). Delete box. C). Recycling box. D). Trash.

20. Learning and earning a certificate outside the walls of a classroom is called ____________.

A). E-student. B). E-Teaching. C). e-learning. D). Online exam.

21. Buying and selling on the internet is called ______________.

A). E-banking. B). E-learning. C). E-commerce. D). E-Marketing.

22. Fax machine is a short name for _____________.

A). Facimile machine. B). Faxsimile machine. C). Facsimile machine. D). None.

23. Computers can communicate with other computers through a machine called _________ across a
telephone line.

A). Network. B). Modem. C). Modern. D). Model.


24. _____________ is where outgoing messages are stored.

A). Outgoing box. B). Outbox. C). Draft. D). None.

25). Some abuses of the internet include the following except ___________.

A). Cybercrime. B). Spam. C). Occultism. D). None.

26). HTTP stands for ______________.

A). Hyperlink text transfer provider. B). Hyper Text Transfer Protocol. C). Hyper Text
Transmission Protocol. D). None.

27). All of the followings are responsible ways of using the computer except.

A). Invasion of privacy. B). Avoid dropping liquid into the system. C). Protect the system from
power problem. D). Unplug the system when not in use for a long time.

28. None of the following are responsible ways of using the internet except.

A). Online fraud. B). Online stealing. C). Online chatting. D). Invasion of privacy.

29. All of the following are modern IT gadget except ___________.

A). Manual typewriter. B). Computer. C). Telephone. D). Cellular network.

30. The new technology of telephony uses ____________.

A). Electromagnetic waves. B). Sound waves. C). Air waves. D). Radio waves.

31. The site .com stands for ___________.

A). Commercial site. B). Non-profit organization. C). Government organizations. D). Large
network.

32. The following are features of a GSM except __________.

A). Caller identity. B). Call forwarding. C). Call backwarding. D). Telephony.

33. Each program in BASIC is ended by the keyword

A). Start B). End C). Begin. D). Restart.

34. The sign / in BASIC means ___________.

A). Slash B). Cut C). Divider D). None of the above.

35. REM in BASIC means ____________.

A). Rewrite B). Reminder C). Remark D). Remember.


36. The _________ function is used to get a substring inside a string.

A). MID$ B). LEFT$ C). RIGHT$ D). All of the above

37. The sign & in BASIC means_____________

A. comma B. join C. point D. ampersand.

38. BASIC programming was designed in the year

A). 1953 B).1843 C). 1963 D). 1863.

39. S in BASIC means _____________

A). Symbol B). sign C). system D). symbolic.

40. ____________ instruction is used to assign values to variables.

A). LET B. PRINT C. DATA D. READ.

Theory Questions

Answer Any Three Questions

1. i. What does the acronym IT and ICT stands for.

ii. Define both ICT and IT.

iii. State Four benefits of IT.

iv. List five IT gadgets.

2. i. State the full meaning of GSM.

ii. List five features of a GSM.

iii. Briefly describe a fax machine and state it's uses.

iv. State three disadvantages of IT.

3. i. What is a Telephone

ii. Define both the internet and website


iii. Mention five benefits of the internet.

iv. Write five email addresses.

4. i. What is an internet browser.

ii. What is chatting

iii. State five abuses of the internet.

iv. List four chatting tools and four educational network groups.

You might also like