0% found this document useful (0 votes)
31 views4 pages

Com SSS 1

Uploaded by

Adeleke Ayo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views4 pages

Com SSS 1

Uploaded by

Adeleke Ayo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

BISMILLAHIR RAHMANIR RAHEEM

LINKSBOND COLLEGE
IGBOKEN VILLAGE, OFF IJEDE ROAD, IGBE, IKORODU, LAGOS STATE.
FIRST TERM EXAMINATION 2019/2020 ACADEMIC SESSION
CLASS: SSS 1 SUBJECT: COMPUTER STUDIES DURATION: 2 HOURS
OBJECTIVES
1. What class of hardware does system unit case belongs to? _____
A. Peripheral B. System C. External D. Memory.
2. The following are micro-computers except ______
A. Android B. Palmtop C. Notebook computer D. None of the above.
3. If you press ALT, F4 computer will ______
A. open new file B. close file C. display help D. shut down.
4. To underline text on word press __ A. Alt, U B. Ctrl N C. Ctrl, U D. Alt, N.
5. Von Byron developed ______ A. Multiplier B. Pascaline C. Punched card D.
Difference engine.
6. First electronic computer programmed in machine language was ______
A. ENIAC B. Personal computer C. MARK1 D. EDSAC.
7. Difference engine was developed in A. 1878 B. 1827 C. 1883 D. 1822
8. The following are non-impact printers except ______ A. laser B. line C. dot-
matrix D. jet.
9. The full meaning of UNIVAC is ______
A. Universe automatic computer B. Universal automation computer
C. Universal automatic calculator D. Universe automatic calculator.
10. Enhanced keyboard has maximum keys of ______ A. 101 B. 103 C. 114
D. 104.
11. The shortcut keys to copy and paste text are _______A. Ctrl p, v B. Ctrl v, c C.
Ctrl c, v D. Ctrl c, p
12. _____ is an output device used to produce graphical output.
A. Printer B. Plotter C. Microfilm D. Excel.
13. _____ was a Scottish theologian and Mathematician who invented one of the early
mechanical devices. A. Blaise Pascal B. Jacquard loom C. Charles Babbage
D. John Napier.
14. A similarity between data and information is that both,
A. can be displayed on monitor B. are computer inputs C. are processed facts D.
are computer results.
15. What is the major component of the second generation computers?
A. vacuum tubes B. integrated circuits C. transistors D. capacitors
16. ________ are components to save information for future usage.
A. Input devices B. Future devices C. Output devices D. Storage devices.
17. Data can defined as a A. set of numbers. B. collection of facts. C. type of
computer. D. computing device.
18. _____ is an output device used to produce graphical output.
A. Printer B. Plotter C. Microfilm D. Excel.
19. ________ are components to save information for future usage.
A. Input devices B. Future devices C. Output devices D. Storage devices
20. All these are BASIC operators except ______ A x B / C** D ^
21. An example of multi-user operating system is _____.
A MS-DOS B PC-DOS C UNIX D window NT.
22. Information transmission medium from location P to location Q in space is called
A. Wireless transmission B. Wired transmission C. Cabled transmission
D. Asynchronous transmission.
23. A Scottish theologian and Mathematician who invented one of the early
mechanical devices is A Blaise Pascal B Jacquard loom C
Charles Babbage D John Napier.
24. Computer can be classified according to the following except ______.
A type B usage C size D class.
25. _____ refers to method of transferring a message to many recipients at a
time. A Broadcasting B Information
system C Telecommunication D Data network.
26. Which of the following statements is not true about secondary storage media?
They A. are volatile B. are non volatile C. are
relatively cheap D. have storage capacity.
27. Soft boot is initiated by pressing
A Ctrl +Alt + Del B function key F10 C main switch D bootstrap buttons.
28. The input device best used to capture finger print is
A. scanner B. keyboard C. mouse D. printer.
29. The full meaning of UNIVAC is ______
A. Universe automatic computer B. Universal automation computer
C. Universal automatic calculator D. Universe automatic computer.
30. A set of values of qualitative or quantitative variables is said to be ______
A. data B. output C. information D. processed fact.
31. Computer keyboard is segmented into ______ A. 7 B. 5 C. 4 D 6.
32. When was the device of Marie Joseph invented? A. 1809 B. 1908 C. 1801 D.
1887.
33. The available orientation in Microsoft word are A. Portrait and justify B. justify
and right align C. left align and landscape D. portrait and landscape.
34. Which of the following components is directly located inside the computer
processor? A. ALU B. BIOS C. RAM D. ROM.
35. The ______ displays the content of the active cell in Microsoft Excel.
A Formula bar B title bar C active cell D content bar.
36. A hexadecimal ‘A0’ has the decimal value of A 80 B 100 C 160 D 183.
37. The processing steps in a flowchart are represented by ______ symbol.
A circle B. parallelogram C. rectangle D. arraw.
38. Use of eye glasses when operating computer is a
A. Safety ethic B. Maintenance ethics C. Computer ethic D. Safety measure.
39. The use of computer system for communication is known as ______.
A. Telecomputing B. Telepresence C. Computer communication D.
Teleconference.
40. Computer main memory is also known as the following except ______ .
A primary memory B secondary memory C main memory D internal
memory.
41. A virtual meeting among participants in different location is known as _____ .
A. telecommuting B. telepresence C. Video conference D. teleconference .
42. The hardware components that is responsible for fetching, decoding and
execution of program instruction is A accumulator B read only memory C
random access memory D central processing unit.
43. Diligence of a machine means _____. A. accurate B. tiredness C. tired less D.
automatic.
44. Enhanced keyboard has maximum keys of ______ A. 101 B. 96 C. 104
D. 86.
45. Who developed the first two motion calculator?
A Blaise Pascal B Herman Hollerith C William Burrough D Gottfried
Wilhelm.
46. The process where computer execute two or more programs simultaneously is
referred to as _____ A. multi-loading B. multi-sorting C. multi-surfing D.
multi-tasking
47. During presentation, slide transition can be activated by
A. Right-click B. Double click C. Mouse click D. Mouse drag.
48. In word processing applications, the symbols B, I and U are commonly used
buttons found on the A. Menu bar B. Standard toolbar C.
Formatting bar D. Drawing toolbar.
49. Provision of fire extinguisher to the computer lab is an ethic of _____.
A. Maintenance B. Safety C. Environmental D. Moral.
50. Yahoo as a search is an application of ______
A. Yahoo Corporation B. Microsoft corporation C. Yahoo incorporation D.
Microsoft incorporation.
51. All these are components of broadcasting except ______ .
A land phone B television C satellite D radio.
52. Which was the first digital electronic computer?
A. UNIVAC B. ENIAC C. Mark 1 D. analytical engine.
53. Cold boot is also know as the following except ______ .
A. warm start B. hard boot C. cold start D. hard start.
54. Which of these devices has maximum storage capacity?
A. CDs B. Magnetic tape C. Flash D. Register.
55. Evaluate the BASIC statement LET Z = 4*W^2+2*Y given that W = 5 and Y=10.
A. 50 B. 80 C. 100 D. 120
56. In changing the storage location of a file, the command to use is
A. “save as” command B. Ctrl + S keys C. “Save” command D. Alt + F, the save.
57. The process of restarting a computer is known as
A. cold booting B. warm booting C. resuming booting D. restart booting.
58. The distribution of video and audio content to a dispersed audience through
electronic media is called A. broadcasting B. communication C. information
D. messages
59. A set of programs, routines and procedures that are used to operate the
computer hardware is called A. firmware B. shareware C. software D.
utility
60. Which of the following is not a good ICT security policy? A. re-use of old password
B. frequent change of password C. backing up files and documents D. scanning e-
mail attachment for virus before opening it

You might also like