JSS 2 Information 3rd Term
JSS 2 Information 3rd Term
2. Internet is a _______________.
A). Dynamic system. B). Complex system. C). Decentralized system. D). All of the
above.
3. Servers are computers that provides resources to other computers connected to a __________.
A). Sign in. B). Sign out. C). Log up. D). Log out.
A). Writing a letter. B). Calling on the phone. C). Drawing a picture. D). Sending a
package.
A). Electrical mail. B). Text messages. C). Telephone signals. D). Electronic mail.
8). Which of the following format is correct for a proper email address?
A). Wide world web. B). Web wild world web. C). Word wild web. D). World wide web.
A). Internet source protocol. B). Internet service protocol. C). Internet service provider. D).
None.
A). United Resources line. B). Unity Resource Line. C). Uniform Resource Locator.
D). None.
16. In email address the ampersand symbol is attached before the host name.
17. _______________ is a software installed on a personal computer used for accessing and viewing any
information on the web.
A). Internet. B). Network. C). Browser. D). All of the following.
A). Inbox. B). Delete box. C). Recycling box. D). Trash.
20. Learning and earning a certificate outside the walls of a classroom is called ____________.
A). Facimile machine. B). Faxsimile machine. C). Facsimile machine. D). None.
23. Computers can communicate with other computers through a machine called _________ across a
telephone line.
25). Some abuses of the internet include the following except ___________.
A). Hyperlink text transfer provider. B). Hyper Text Transfer Protocol. C). Hyper Text
Transmission Protocol. D). None.
27). All of the followings are responsible ways of using the computer except.
A). Invasion of privacy. B). Avoid dropping liquid into the system. C). Protect the system from
power problem. D). Unplug the system when not in use for a long time.
28. None of the following are responsible ways of using the internet except.
A). Online fraud. B). Online stealing. C). Online chatting. D). Invasion of privacy.
A). Manual typewriter. B). Computer. C). Telephone. D). Cellular network.
A). Electromagnetic waves. B). Sound waves. C). Air waves. D). Radio waves.
A). Commercial site. B). Non-profit organization. C). Government organizations. D). Large
network.
A). Caller identity. B). Call forwarding. C). Call backwarding. D). Telephony.
A). Slash B). Cut C). Divider D). None of the above.
A). MID$ B). LEFT$ C). RIGHT$ D). All of the above
Theory Questions
3. i. What is a Telephone
iv. List four chatting tools and four educational network groups.