0% found this document useful (0 votes)
42 views2 pages

Computer Studies JSS 3

The document is a Computer Studies examination for JSS 3, consisting of objective and theory sections. It covers topics such as computer professionals, viruses, database management systems, and internet search engines. The objective section includes multiple-choice questions, while the theory section requires written responses on related topics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views2 pages

Computer Studies JSS 3

The document is a Computer Studies examination for JSS 3, consisting of objective and theory sections. It covers topics such as computer professionals, viruses, database management systems, and internet search engines. The objective section includes multiple-choice questions, while the theory section requires written responses on related topics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

COMPUTER STUDIES JSS 3

SECTION A (OBJECTIVE TEST)

1. Computer Professionals include the following except ________ (a) Computer Managers (b)
Computer Educators (c) Computer Users (d) System Analysts
2. Those that teaches computer studies at various levels of education are referred to as ________
(a) Programmer (b) Computer educator (c) System Analyst (d) Trainers
3. Which of these is not a quality of a good computer professional ______ (a) Good communication
Skill (b) Dynamism (c) Integrity (d) Indolence
4. The functions of computer operator include _______ except (a) Policy making (b) Data entry (c)
Training (d) Program development
5. _______ is in charge of the computer department in an organization (a) Computer manager (b)
System analyst (c) Computer educator (d) Computer policy maker
6. Computer professional body include the following except _______ (a) Nigeria Computer Society
(b) Nigeria Internet Group (c) Non Governmental Organization (d) Information Technology
Association of Nigeria
7. The aim of NCS include the following except ________ (a) To educate citizens on their role in
government (b) To promote the training of computer scientists and engineers (c) To promote
the sharing of information about art of information processing among specialists and the
general public (d) To encourage integrity and trustworthiness of computer professional
8. _______ established the Nigeria Computer Society and National information Technology
Development Agency (a) CPRN (b) IMIS (c) NIG (d) ITAN
9. The computer professional Registration Council of Nigeria (CPRN) was established in (a) 1995 (b)
1895 (c) 2016 (d) 2015
10. _________ designs Computer Based Systems (a) Computer educator (b) Computer manager (c)
System analyst (d) Computer operation
11. Computer virus as programs are written by people called (a) Programmers (b) Virus perpetrators
(c) Analysts (d) Hackers
12. Which of the following is not true of a virus (a) It is self replicating (b) It is highly infections (c) It
infects other programs or files (d) It causes HIV/AIDS
13. _________ is a virus that first infect an executable file in the computer (a) Executable files virus
(b) Boot sector virus (c) Attack on Document virus (d) Executable project virus
14. Which of the following is not a virus (a) Sleeper (b) Trojan horse (c) Worm (d) Penicillin
15. Source of computer virus include the following except (a) UPS (b) Infected flash CD ROM (c) e-
mail (d) Infected flash dick
16. Which of the following is an antivirus (a) Worm (b) Logic bomb (c) Norton (d) Jerusalem
17. Virus warning sign are the following except _______ (a) Unwanted Screen message display (b)
Slowing down of response time (c) Incomplete saving of files (d) Mouse disconnection
18. _______ is a software designed to detect and kill viruses (a) Worm (b) USB (c) Antivirus (d) File
Manger
19. Virus infection can lead to (a) Loss of data (b) Power Failure (c) Loss of laptop (d) Printer
breakdown
20. Virus cannot be caused by (a) Infected CD ROM (b) Infected Flash disk (c) Data entry through
keyboard (d) Internet downloading
21. DBMS stands for____________________ (a) Database Management season (b) Database
Management System (c) Database Movement System (d) Database Meaningful Spaces
22. DBMS are used for the following except __________ (a) Creating Data (b) Storing Data (c)
Querying Data (d) Breaking Data
23. Which of the following is not a Database terminology (a) Webpage (b) Data (c) Field (d) Record
24. ______ is an identifier for a record or a group of records used to sort or retrieve information
from a database (a) Key (b) File (c) Index (d) Data
25. DBA stands for _____________________ (a) Database Assembly (b) Database Administrator (c)
Database Accumulator (d) Database Algorithm
26. The overall design of the database is called (a) Query (b) Schema (c) Field (d) Record
27. Which of these is not a form of database? (a) Relational model (b) Flat file model (c) Top down
model (d) Hierarchical model
28. ___________ model has many-to-many relationships (a)Network model (b) Association model
(c) Hierarchical model (d) Relational model
29. Data could take the form of the following except (a) Numbers (b) Words (c) Pictures (d) Files
30. Which of these is not a field? (a) Phone numbers (b) Sex (c) Come (d) Age

SECTION B (THEORY)

1. (a) State 5 computer professionals


(b) State 5 qualities of a good computer professional
(c) List 4 computer professional bodies or association in Nigeria
2. (a) Define Virus
(b) List 4 examples of Virus
(c) State 4 uses of search engine
3. (a) List 5 internet search engine
(b) Mention 3 source of virus
4. (a) State 4 virus warming signals
(b) What is an antivirus?

You might also like