Computer Studies JSS 3
Computer Studies JSS 3
1. Computer Professionals include the following except ________ (a) Computer Managers (b)
Computer Educators (c) Computer Users (d) System Analysts
2. Those that teaches computer studies at various levels of education are referred to as ________
(a) Programmer (b) Computer educator (c) System Analyst (d) Trainers
3. Which of these is not a quality of a good computer professional ______ (a) Good communication
Skill (b) Dynamism (c) Integrity (d) Indolence
4. The functions of computer operator include _______ except (a) Policy making (b) Data entry (c)
Training (d) Program development
5. _______ is in charge of the computer department in an organization (a) Computer manager (b)
System analyst (c) Computer educator (d) Computer policy maker
6. Computer professional body include the following except _______ (a) Nigeria Computer Society
(b) Nigeria Internet Group (c) Non Governmental Organization (d) Information Technology
Association of Nigeria
7. The aim of NCS include the following except ________ (a) To educate citizens on their role in
government (b) To promote the training of computer scientists and engineers (c) To promote
the sharing of information about art of information processing among specialists and the
general public (d) To encourage integrity and trustworthiness of computer professional
8. _______ established the Nigeria Computer Society and National information Technology
Development Agency (a) CPRN (b) IMIS (c) NIG (d) ITAN
9. The computer professional Registration Council of Nigeria (CPRN) was established in (a) 1995 (b)
1895 (c) 2016 (d) 2015
10. _________ designs Computer Based Systems (a) Computer educator (b) Computer manager (c)
System analyst (d) Computer operation
11. Computer virus as programs are written by people called (a) Programmers (b) Virus perpetrators
(c) Analysts (d) Hackers
12. Which of the following is not true of a virus (a) It is self replicating (b) It is highly infections (c) It
infects other programs or files (d) It causes HIV/AIDS
13. _________ is a virus that first infect an executable file in the computer (a) Executable files virus
(b) Boot sector virus (c) Attack on Document virus (d) Executable project virus
14. Which of the following is not a virus (a) Sleeper (b) Trojan horse (c) Worm (d) Penicillin
15. Source of computer virus include the following except (a) UPS (b) Infected flash CD ROM (c) e-
mail (d) Infected flash dick
16. Which of the following is an antivirus (a) Worm (b) Logic bomb (c) Norton (d) Jerusalem
17. Virus warning sign are the following except _______ (a) Unwanted Screen message display (b)
Slowing down of response time (c) Incomplete saving of files (d) Mouse disconnection
18. _______ is a software designed to detect and kill viruses (a) Worm (b) USB (c) Antivirus (d) File
Manger
19. Virus infection can lead to (a) Loss of data (b) Power Failure (c) Loss of laptop (d) Printer
breakdown
20. Virus cannot be caused by (a) Infected CD ROM (b) Infected Flash disk (c) Data entry through
keyboard (d) Internet downloading
21. DBMS stands for____________________ (a) Database Management season (b) Database
Management System (c) Database Movement System (d) Database Meaningful Spaces
22. DBMS are used for the following except __________ (a) Creating Data (b) Storing Data (c)
Querying Data (d) Breaking Data
23. Which of the following is not a Database terminology (a) Webpage (b) Data (c) Field (d) Record
24. ______ is an identifier for a record or a group of records used to sort or retrieve information
from a database (a) Key (b) File (c) Index (d) Data
25. DBA stands for _____________________ (a) Database Assembly (b) Database Administrator (c)
Database Accumulator (d) Database Algorithm
26. The overall design of the database is called (a) Query (b) Schema (c) Field (d) Record
27. Which of these is not a form of database? (a) Relational model (b) Flat file model (c) Top down
model (d) Hierarchical model
28. ___________ model has many-to-many relationships (a)Network model (b) Association model
(c) Hierarchical model (d) Relational model
29. Data could take the form of the following except (a) Numbers (b) Words (c) Pictures (d) Files
30. Which of these is not a field? (a) Phone numbers (b) Sex (c) Come (d) Age
SECTION B (THEORY)