S.S.3 Questions
S.S.3 Questions
S.S.3 Questions
3 QUESTIONS
1. A file shown on the screen by a small graphic E. Reliability
picture is called a/an 8. Data can be transmitted in three ways, they
A. Disk are__________ line.
B. Gate A. Bi-duplex, half duplex and full duplex
C. Folder B. Full duplex, multiplex and simplex
D. Icon C. Half duplex, simplex and complex
E. Switch D. Multiplex, complex and full duplex
2. The following are various types of network E. Simplex, half duplex and full duplex
topology, except 9. A device that enables data to be transmitted
A. Bus over telephone lines by converting digital
B. Hub signals to analog and vice versa is referred to
C. Mesh as
D. Tree A. Converter
3. Which of the following is not a graphic B. Demodulator
application package? C. Modem
A. Animation software D. Modulator
B. CAD software E. Translator
C. Desktop publishing 10. The process where computer execute two or
D. Ms Access more programs simultaneously is referred to
E. Paint programs as multi-
4. If A=0, and B=1 are inputs for a NOR gate A. Loading
operation, the logical output for A+B is B. Sorting
A. 0 C. Surfing
B. 1 D. Tasking
C. 1,0 E. Threading
D. -1 11. Which of the following is an example of a
E. 0,1 BASIC language keyword?
5. The following are examples of daisy wheel A. Copy
printer, except B. Cut
A. Dot matrix C. Input
B. Ink jet D. Move
C. Laser E. Translate
D. Line 12. A table of values arranged in rows and
E. Thermal transfer columns, in application package is known as
6. Which year did GSM mobile phone operation A. Arrays
start in Nigeria? B. Database
A. 1999 C. Graphics
B. 2003 D. Matrix
C. 2002 E. Spreadsheet
D. 2000 13. A/AN ________ is an electronic activity that
E. 2001 involves interaction with a user interface to
7. Advantages of a computerized files include generate visual feedback on a video device.
the following, except A. Game
A. Fast to access B. Operating system
B. Laborious C. Power point
C. More secured D. Simulation
D. Neatly modified E. Teleconferencing
14. Which of the following keys is not found on a E. Symbolic input
computer keyboard? 21. A/AN__________ language is an artificial
A. Delete language that can be used to control the
B. End behavior of machine.
C. Escape A. Database management system
D. Home B. Natural
E. Open C. Programming
15. The type of command used for checking D. Software
network functionality and validity of IP E. Structured query
address is 22. Super computers differ from other
A. Browse computers because they are
B. Chat A. Easier to install and operate
C. Ping B. Less powerful
D. Router C. Microprocessor based
E. Surf D. Powered by transistors
16. The first OSI layer that uses unit of data E. Used for complex calculations.
called “packet” is 23. One of the advantages of an indexed method
A. Application of file organization is that
B. Date A. Any records can be accessed in
C. Network milliseconds
D. Protocol B. Files are easy to arrange
E. Session C. Files do not have to be sorted into key
17. Which of the following is not categorized as a field sequence
member of network architecture? D. It is cost effective
A. Arcnet E. Several files can be updated
B. Ethernet simultaneously.
C. Internet 24. An area of memory reserved for temporary
D. Pronet storage of data, allowing faster access when
E. Token ring the next program is executed is called
18. The medium through which information is A. Buffer
transferred or moved from one network B. Cache
device to another is called a/an C. Data bank
A. Adapter D. ROM
B. Cable E. SRAM
C. Printer 25. Advantages of word processing include the
D. Registered jack(RJ) following, except
E. Switch A. Documents can easily be sent
19. READ statement performs the same action as electronically
A. DATA B. Editing text
B. END C. Hyperlinks features can be used
C. INPUT D. Ability to check typing errors
D. OUT E. Symbols and equations are easier to write
E. REM than create on the computer.
20. The first stage in developing computer 26. The protection of data or file against
program is unauthorized users can be achieved using
A. Defining the problem the following ways, except
B. Documenting the program A. Changing the file’s attributes/extension.
C. Preparing data for input B. Moving the file to recycle bin
D. Running the program
C. Restricting access to computer B. Bus
installations C. Circuit
D. The use of passwords D. Disk
E. Using encryptions E. Drive
27. The unique identifier of records in databases 33. In binary code expression, which of the
is represented by following stands for digit three?
A. Attributes A. 00000001
B. Fields B. 00000011
C. Primary keys C. 00000101
D. Tables D. 00000111
E. The first records E. 00000110
28. In a word processor, the first operation 34. How many numbers of bytes is required to
involved in moving a paragraph from one store characters and numeric values in one
place to another is double precision?
A. Clicking on edit menu and select copy A. 1
B. Highlighting the paragraph to be moved B. 2
C. Right clicking and drag C. 4
D. Right clicking and select copy D. 6
E. Right clicking and selecting cut E. 16
29. The most versatile tool available on the 35. Which of the following is not an example of
internet which consists of pages that can be DBMS?
linked to other pages using hypertexts is A. Foxbase
called. B. Fortran
A. Electronic mail C. Ms Access
B. Internetworking D. Oracle
C. Operating system E. Rbase
D. Searching tool 36. Which of the following is not a function of
E. World wide web the data base management system?
30. Which of the following connectors is most A. Creating data files
suitable for terminating connection involving B. Distributing
telephone cables? C. Making reports
A. Firewire D. Querying of data
B. PS/2 E. Storing data
C. RJ11 37. A group of attributes or fields in a database is
D. RJ45 known as a
E. USB A. Data
31. In Boolean Algebra, which of the following B. File
gate is referred to as logical inversion? C. Query
A. AND D. Record
B. NAND E. Table
C. NOR 38. A program that converts statements written
D. NOT in one language to another is called
E. OR A. Assembler
B. Compiler
32. A temporary storage area, usually in RAM C. Interpreter
that act as a holding area, enabling the D. Inverter
central processing unit to manipulate data E. Translator
before transferring it to a device is called 39. Which of the following is not a logic
A. Buffer function?
A. ADD B. 1000MB
B. AND C. 1024TB
C. NAND D. 2000MB
D. NOT E. 8000B
E. OR 46. In a word processing environment, the icon X
40. Convert 10910 to octal will ________ a program when clicked.
A. 558 A. Close
B. 1058 B. Delete
C. 1158mation C. Format
D. 1558 D. Open
E. 1588 E. Save
41. In project management, a conceptual model 47. The fastest and the most powerful and most
used to describe the stage of information expensive computer is known as
development project from initial feasibility A. Desktop
study through maintenance of the completed B. Laptop
application is called C. Mainframe
A. Algorithm D. Minicomputer
B. Database management system E. Supercomputer
C. Flowchart 48. In computing, an element which links from
D. Program development stages one document to another or within the same
E. System development life cycle. document iscalled____________
42. The data communication that allows users to A. hyperlink
transmit copies of a document or messages B. pointer
to one or more location in split seconds is C. web browser
referred to as D. web page
A. Blog E. web address
B. E-mail 49. Information printed on paper is referred to
C. Fax as____________
D. Scanning A. carbon copy
E. Website B. hard copy
43. Which of the following is not a benefit of C. print copy
internet? D. soft copy
A. E- commerce E. bad copy
B. E-learning 50. Which of the following terms in a
C. Information spreadsheet is identified by a letter and a
D. Record keeping number?
E. User name A. Column
44. A/An_____________ saver is a window B. Row
application option that displays a set pattern C. Cell
or moving graphics on the monitor when the D. Range
keyboard or mouse is not used for a period E. Primary key
of time. 51. What displays the content of the active cell
A. Desktop in Excel?
B. Image A. Name box
C. Screen B. Row headings
D. Surface C. Formula bar
E. Touch D. Task pane
45. What is the actual value of 8G in bytes? E. None of the above
A. 1024MB
52. The legal right to control the production and B. Desktop
selling of a book, play, film and software is C. Delete bin
known as ______________ D. Recycle bin
A. production right E. Cycle bin
B. copy right 58. Select the odd one out
C. trade mark A. Interpreter
D. patent B. Operating system
E. plagiarism C. Compiler
53. Which of these is a bad practice in the usage D. Assembler
of ICT tools? E. Source compiler
A. Making or receiving phone calls while 59. The most widely used commercial
driving programming language is_______________
B. Not receiving phone calls while charging it A. BASIC
C. Use of air conditioning to improve dry B. ADA
atmosphere C. FORTRAN
D. Use of footstools to adjust leg positioning D. COBOL
when working on computers E. PASCAL
E. Browsing the internet 60. To move to the bottom of a document,
54. To search for information on various topics, press________________
which of the following packages is used? A. Auto summarize
A. Database B. Home
B. Encarta C. End
C. Presentation D. Ctrl + end
D. Spreadsheet E. Ctrl + home
E. Word processing
55. By default, your documents print in
_________ mode
A. Landscape
B. Portrait
C. Page setup
D. Print view
E. Print preview
56. Which one of the following is an extension of
video file format in computers?
A. jpg
B. exe
C. mpg
D. bmp
E. none of these
57. When files and folders are deleted from the
computer, they go into the ____________
A. Briefcase
SECTION B: THEORY
INSTRUCTION: Answer any four questions
1. Highlight 3 differences between sequential and serial methods of file organization.
b. Mention 4 types of computer virus.
c. State 3 ways of preventing computer virus
2. Mention any 5 network protocols you know and state their full meanings
3. Draw and produce the truth table of the NOR gate.
b. Explain the following:
i. Bus topology
ii. Mesh topology
iii. Ring topology