ST.
PAUL COLLEGE SAGAMU
2ND TERM EXAMINATION 2023/2024 SESSION
SUBJECT: COMPUTER STUDIES CLASS: SS3 TIME: 1HR 30 MINS
SECTION A: ANSWER ALL QUESTIONS IN THIS SECTION
NAME:
CLASS: DATE: INVILGILATOR:
PAPER III
Answer all questions.
Eacsh question is followed by five options lettered A to E. Choose the correct option for each question
and shade in pencil on your answer sheet the answer space which bears the same letter as the option
you have chosen. Give only one answer to each question and erase completely any answer you wish to
change. Do all rough work on this question paper.
1) The placing of links on the internet to steal private information when clicked by users is known as
A. Cyber bullying. B. cyber terrorism. C. phishing. D. scanning. E spanning.
2) The practice of keeping documents from corruption and unauthorized access is data
A. Collation. B. integrity. C. manipulation. D. privacy. E security.
3) The method by which information is converted into secret code that hides its true meaning is
A decryption. C. modification. Encryption. D. security. E. spanning.
4) The register which keeps track of the next memory address of the instruction to be executed is
A. Accumulator. B. index. C. memory buffer. D. memory data. E. program counter.
5) What is the binary equivalent of the decimal number 19? A. 10001 B. 10011 C. 10101 D. 10110 E.
11001
6) The disadvantage of random method of accessing files is that A. arbitrary enquiries are easy to
handle. B. files do not have to be sorted sequentially into key field. C. it is good for interactive
applications. D. records can be accessed in milliseconds. E. there is high complexity in programming.
7) The cable used for long distance and high performance data networking is A. coaxial. B. fibre optic.
C. power. D. shielded twisted pair. E. unshielded twisted pair.
8) Communication system is a A. channel for transmitting coded information. B. model that allows
communication between two stations, transmitters and receivers. C. network of connected
computer systems. D. platform for collecting and disseminating information. E. portal for
communicating information.
9) The two major modes of execution in high level programming languages are and interpreting. A.
compiling B. development C. formatting D. installation E. reading
10) Which of the following is not a high level programming language? A CISCO B COBOL C. FORTRAN D.
LISP E. SQL
11) High level languages differ from low level languages because A. debugging is complex. B. they are
also called machine language. C. they are machine independent. D. they are not portable. E. they
need assembler for translation.
12) In database, relationships are defined by A. association between entities. B. friendship between
database users. C. linkage of computers to share database data. D. storage of data such that it is
accessible remotely. E the types of records involved.
13) Which of the following is a BASIC programming language statement? A. FLOAT B. INT C. REM D.
SWITCH E. VOLATILE
14) A collection of system software that controls and coordinates the overall operations of a computer
system is A .application program. B. data processing. C. operating system. D. program scheduling.
E. utility program.
15) Which of the following is a characteristic of LAN network? A It allows users to handle the
interconnection of devices. B. It can be wirelessly connected to WPAN. C. It is a private network. D.
It offers only short range network solution up to ten meters. E. The initial setup cost of installation is
high.
16) The operation of a logic gate may be described either by algebra. Or Boolean A. character strings B.
logic operations C. logic symbols string variables D. Truth tables
17) Ctrl+Alt+Del will cause a computer to A. format. B. hibernate. C. restart. D. shut down. E. sleep.
18) Which of the following fields can uniquely identify a record in a database? A. Age B. Birth date
Registration number D. School name E Time
19) The phases of database design include conceptual, physical. And A. general B. intellectual C. logical
D. relational E. statistical
20) Which of the following statements contradict the functions of a processor? It A. controls the
sequence of operation. B. controls the use of main memory. C. executes processes. D. sends
command to all parts of computer. E. supplies data into the computer.
21) The section of the CPU which selects, interprets and executes instructions is unit. A. control B. input
C. memory D. output E. register
22) One of the characteristics of a good program is A. accuracy. B. ambiguousness. C. buffering. D.
complexity. E. redundancy.
23) The factors considered in classifying computers are A. Generation, purpose B. C. size, height D. type,
label E. user friendly, accuracy
Which of the following is a graphic package? A. Adobe Dreamweaver B. AmiPro C. CorelDraw D. Lotus 1-
2-3 E. Microsoft Word
24) Which of the following professionals uses AutoCAD application in their field? A. Bakers B. Bankers C.
Educationists D. Engineers E. Transporters
25) VLSI is an acronym for A. Very Large Scale Integration. B. Very Limited System C. Virtual Large Scale
Integration. D. Virtual Limited System Information. E Visual Language Specification Instruction.
26) Integrated circuits used in computer systems are made up Information. A. hydrogen. B. iron. C.
silicon. D. silver. E. zinc.
27) In computer programming, a storage location identified by memory address is A. array. B. data. C.
database. D. element. E. variable.
28) A disadvantage of sequential file organization is that
29) An example of first generation computers programming language is A. BASIC. B. FORTRAN. C. LISP D.
low level. E. structured query.
30) The intersection of rows and columns in Microsoft Excel is known as A. cells. B. fields. C. graphs. D.
records. E. tables.
31) A malicious software disguised as a useful program to the computer system is A. boot sector.
Memory resident. C. rootkit. D. Trojan. E. worm.
32) If (A+B). (C. D) = Y. What is the value of Y if A1, B1, C= 0 and D = 1? A. 0 B. 1 C. 2 D. 10 E. 11
33) Which of the following is an alternative logic gate? A. AND B. NOR C. NOT D. OR E. XNOR
34) In Microsoft Word environment, the keyboard command Ctrl + will undo the last action.
35) The following are types of computer memory except A. EPROM. B. MDROM. C. PROM. D. RAM. E.
ROM.
36) Convert 7510 to octal number. A. 1078B. 1125 C. 113 D. 124 E 1438
37) A key in a database can A. create a new database design. B. display a drop down menu for selection
of data. C. erase a record from records in database. D. exclusively identify a record from other
records. E. format the database management system.
38) A computer network covering a small geographical area is referred to as A. LAN. B. MAN. C. PAN. D.
VPN. E. WAN.
39) The symbol that separates username from domain name in an e-mail address is A. B. @ C. %. D. +
40) Cropping is a feature in graphics package that allow users to A. align the document in use. B. corrupt
the work file. C. enlarge the documents in use. D. remove unwanted portion of document. E. restart
the program.
41) The request of data from a database is a/an A. form. B. information. C. key.D. query.
42) The first step in developing a program is A. computation. B. instructions coding. C. maintenance
documentation. D. problem definition. E. testing.
43) Programs currently running on a computer system are held in the A. keyboard. B. monitor. C.
processor. D. RAM. E. ROM.
44) A collection of related fields that represents single entities in computer file is A. character. B.
memory. C. record. D. register. E. table.
45) What is the hexadecimal equivalent of the binary number 10001001? A. 85 B. 86 C. 88 D. 89 E.
46) Which of the following stores data temporarily during execution of instruction? A. ALU B. Input unit
C. Output unit D. Register E. ROM
47) The BCD equivalent of 135 is A. 111101. B. 001011101. C. 100110101. D. 000100110101
48) An opening on the motherboard of a system unit where expansion cards can be inserted is known as
A. extension board. B. extension box. C. expansion port. D. expansion slot.
49) The process of converting data into information is known as data A. analysis. B. collection. C.
processing D. collation.
50) Which of the following is an example of information? A. Student's score in a test B. Recorded
observations C. List of items D. set of data items
Paper II
Answer any four questions
1) (a) Explain briefly the concept of database. (1
marks)
(b) Define the following terminologies in database:
(i) Character (1
mark)
(ii) Field (1
mark)
(c) State two benefits of internet to our society. (1
marks)
(d) Differentiate between a file and folder. (1
marks)
2) (a) With the aid of a diagram, explain the following network topologies:
(i) Bus topology (3
marks)
(ii) Star topology (2
marks)
(b) Explain the meaning of the following computer crimes:
(ii) Piracy (3 marks)
(iii) Pornography (2 marks)
3) (a) (i) What is an operating system? (2
marks)
(ii) Mention two types of operating system. (2 mark)
(b) (i) Draw the logic gate diagram for the Boolean expression: (A+B) + (C.D) = E. (3
marks)
(ii) Illustrate in tabular form, the number system chart of 2, 8, 10, 16 (3
marks)
4) (a) With the aid of a diagram, explain the stages of system development circle. (2
marks)
(b) (i) Draw two flowchart symbols and state their functions. (3
marks)
(ii) What are high level languages? (1
mark)
(iii) Distinguish between machine and assembly language. (2 marks
(iv) Network interface (1
marks)
(v) Network protocol (1
marks)
5)
(Question 5 a,b,c: 5 marks)
d) (i) Convert 9AE in hexadecimal to octal number system. (2 marks)
(ii) Write a BASIC program to calculate the sum of squares of odd numbers between 1 and 50.
(3
marks)
Use the information in the spreadsheet below to answer questions 6 (a)-(i-v)
6. (a) (i) Write the formula to calculate the total score in Mathematics. (2 marks)
(ii) Write two spreadsheet formulas to calculate Paul’s average score in the four subjects
(2 mark
(iii) What spreadsheet function can be used to determine the highest score in English? (2 marks)
(iv) Outline the procedure for calculating Vera’s total score in all the subjects and give the Result
In cell H8 (2mark)
(v) If the minimum pass mark is an average score of 60, write a formula to determine if Etta
Passed or failed ( 2marks)
(b) (i) State one use of the application mentioned in 6 (1 marks)
(ii) Outline the procedure to launch the application from its shortcut on the desktop. (2 marks)
(iii) After launching the application, what is the name of the slide that appears by default? (1 marks)
(iv) Identify the part labelled I. (1/2 marks)
(v) Write the keyboard shortcut that would also perform the function of the part labelled I
(1/2 marks)