We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
MEGALIY INTERNATIONAL SCHOOL
406-LINE, APO MECHANIC ESTATE, APO, ABUJA
FIRST TERM EXAMINATION FOR 2024/2025 ACADEMIC SESSION
SUBJECT: COMPUTER STUDIES
CLASS: JSS THREE TIME: 2HRS
1. ______________are a. Internet set of providers
individuals that have Association of Nigeria obtained sufficient b. Internet set of education and training in programs for Nigeria the field of computers and c. Internet service earn their livelihood from protocol and Nigeria their chosen profession d. Internet service a. System analysts providers Association of b. Computer scientists Nigeria c. Computer professionals 5. NCC means____________ d. Programmers a. National 2. These are some of the communication and examples of computer commission professional b. Nigeria communication except___________ council a. Computer users c. Nigeria communication b. Computer operators council c. Computer analysts d. National community d. Computer programmers commission 3. _________________ is not a 6. A computer professional quality of a good computer that writes and codes professional programs is called a a. Being dull ___________ b. Being hardworking a. System analyst c. Being honest and b. Computer programmer trustworthy c. Mechanical engineer d. Possessing the required d. System administrator education and training 7. NIG means _____________ 4. ISPAN means ____________ a. Nigeria internet group b. Niger interest group c. Nigeria international attach itself to computer group files or application d. Nile internet group a. Anti-virus 8. Which of the following b. Norton professional bodies is not c. Ad ware related to the computer d. Trojan horse a. NCC 14. Under what situation b. ITAN can a virus attack a c. ISBN computer system? d. NIG a. When power is out 9. ________________ is not b. When an infected flash among the general is used categories of viruses c. When you boot your a. Macro virus computer b. Polymorphic virus d. When you splash water c. Metamorphic virus on your computer d. Multipartite virus 15. Which is odd among 10. All these are the following examples of virus except a. Dr Solomon a. Alabama virus b. PC cillin b. I love you virus c. Bit defender c. Jerusalem virus d. Trojan horse d. McAfee virus 16. Which of the 11. _________ is an following is NOT a example of an antivirus characteristics of a a. Avast relational database? b. Smart cop a. Structured data c. Logic bomb organization d. Mario b. Flexible scaling 12. Other programs that c. Relationship between attack the computer are all tables except d. Widespread industry a. Trojan horse adoption b. Worms 17. Hierarchical c. Norton databases were commonly d. Spyware used in 13. __________ is a self- a. Real-time traffic replicating computer code systems that can partially or fully b. Early online shopping d. Low demand for platforms internet services. c. Modern social media Sub-objectives networks d. Engineering design 21. To surf on the applications internet is also to 18. Which of the _____________ following factors is least 22. The meaning of important when choosing a internet is ______ database form? 23. ATCN stands for a. Data type and structure _____________ b. Relationship 24. Which professional complexities fixes the physical parts of c. Budget constraints the computer______ d. Operating system 25. Anti-virus is a compatibility software package 19. Which of the TRUE/FALSE following is not a 26. Unsolicited limitation of the old digital commercial emails is economy that contributed commonly known as to the digital divide? __________ a. Focus on physical 27. ISP stands for infrastructure _______________ b. High cost of technology 28. What software and services package is used to type a c. Emphasis on digital letter? literacy training 29. What anti-virus d. Limited inclusivity in installed in the school tech design computer? 20. The lack of internet 30. ____________ virus access in rural areas is infects both file and bad primarily due to sector. a. Insufficient government regulation Section C: Theory b. Preference for weird Answer any five (5) questions connections c. Difficulty implementing 1. If your brother has been wireless technologies experiencing virus challenges in his computer system, explain to him 4. Define the term digital three sources through divide and explain two which a computer can be main factors that infected with a virus and contribute to it. the possible solution. 5. Discuss the negative b. State three symptoms of consequences of the computer virus attack digital divide on education c. List three computer anti- and employment virus software available opportunities in for use developing countries. 2. Define computer b. Identify three factors that professional. contribute to the digital 3. Write briefly on divide in your region i. Computer operator 6. List two forms of database ii. System analyst and explain one. iii. Programmer