0% found this document useful (0 votes)
15 views

Computer

Uploaded by

accuratejohn455
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Computer

Uploaded by

accuratejohn455
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

MEGALIY INTERNATIONAL SCHOOL

406-LINE, APO MECHANIC ESTATE, APO, ABUJA


FIRST TERM EXAMINATION FOR 2024/2025 ACADEMIC SESSION

SUBJECT: COMPUTER STUDIES


CLASS: JSS THREE
TIME: 2HRS

1. ______________are a. Internet set of providers


individuals that have Association of Nigeria
obtained sufficient b. Internet set of
education and training in programs for Nigeria
the field of computers and c. Internet service
earn their livelihood from protocol and Nigeria
their chosen profession d. Internet service
a. System analysts providers Association of
b. Computer scientists Nigeria
c. Computer professionals 5. NCC means____________
d. Programmers a. National
2. These are some of the communication and
examples of computer commission
professional b. Nigeria communication
except___________ council
a. Computer users c. Nigeria communication
b. Computer operators council
c. Computer analysts d. National community
d. Computer programmers commission
3. _________________ is not a 6. A computer professional
quality of a good computer that writes and codes
professional programs is called a
a. Being dull ___________
b. Being hardworking a. System analyst
c. Being honest and b. Computer programmer
trustworthy c. Mechanical engineer
d. Possessing the required d. System administrator
education and training 7. NIG means _____________
4. ISPAN means ____________ a. Nigeria internet group
b. Niger interest group
c. Nigeria international attach itself to computer
group files or application
d. Nile internet group a. Anti-virus
8. Which of the following b. Norton
professional bodies is not c. Ad ware
related to the computer d. Trojan horse
a. NCC 14. Under what situation
b. ITAN can a virus attack a
c. ISBN computer system?
d. NIG a. When power is out
9. ________________ is not b. When an infected flash
among the general is used
categories of viruses c. When you boot your
a. Macro virus computer
b. Polymorphic virus d. When you splash water
c. Metamorphic virus on your computer
d. Multipartite virus 15. Which is odd among
10. All these are the following
examples of virus except a. Dr Solomon
a. Alabama virus b. PC cillin
b. I love you virus c. Bit defender
c. Jerusalem virus d. Trojan horse
d. McAfee virus 16. Which of the
11. _________ is an following is NOT a
example of an antivirus characteristics of a
a. Avast relational database?
b. Smart cop a. Structured data
c. Logic bomb organization
d. Mario b. Flexible scaling
12. Other programs that c. Relationship between
attack the computer are all tables
except d. Widespread industry
a. Trojan horse adoption
b. Worms 17. Hierarchical
c. Norton databases were commonly
d. Spyware used in
13. __________ is a self- a. Real-time traffic
replicating computer code systems
that can partially or fully
b. Early online shopping d. Low demand for
platforms internet services.
c. Modern social media
Sub-objectives
networks
d. Engineering design 21. To surf on the
applications internet is also to
18. Which of the _____________
following factors is least 22. The meaning of
important when choosing a internet is ______
database form? 23. ATCN stands for
a. Data type and structure _____________
b. Relationship 24. Which professional
complexities fixes the physical parts of
c. Budget constraints the computer______
d. Operating system 25. Anti-virus is a
compatibility software package
19. Which of the TRUE/FALSE
following is not a 26. Unsolicited
limitation of the old digital commercial emails is
economy that contributed commonly known as
to the digital divide? __________
a. Focus on physical 27. ISP stands for
infrastructure _______________
b. High cost of technology 28. What software
and services package is used to type a
c. Emphasis on digital letter?
literacy training 29. What anti-virus
d. Limited inclusivity in installed in the school
tech design computer?
20. The lack of internet 30. ____________ virus
access in rural areas is infects both file and bad
primarily due to sector.
a. Insufficient government
regulation Section C: Theory
b. Preference for weird Answer any five (5) questions
connections
c. Difficulty implementing 1. If your brother has been
wireless technologies experiencing virus
challenges in his computer
system, explain to him 4. Define the term digital
three sources through divide and explain two
which a computer can be main factors that
infected with a virus and contribute to it.
the possible solution. 5. Discuss the negative
b. State three symptoms of consequences of the
computer virus attack digital divide on education
c. List three computer anti- and employment
virus software available opportunities in
for use developing countries.
2. Define computer b. Identify three factors that
professional. contribute to the digital
3. Write briefly on divide in your region
i. Computer operator 6. List two forms of database
ii. System analyst and explain one.
iii. Programmer

You might also like