0% found this document useful (0 votes)
14 views

CSSS3 RevisionTest23 (1)

The document outlines the structure and instructions for a Computer Studies/ICT examination for SS3 students at The Lagoon School for the 2022/2023 academic session. It includes details for both objective and essay sections, covering various topics in computer studies, such as data storage, programming, and security measures. The document also provides guidelines for students on how to conduct themselves during the examination.

Uploaded by

danthonynwaokolo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

CSSS3 RevisionTest23 (1)

The document outlines the structure and instructions for a Computer Studies/ICT examination for SS3 students at The Lagoon School for the 2022/2023 academic session. It includes details for both objective and essay sections, covering various topics in computer studies, such as data storage, programming, and security measures. The document also provides guidelines for students on how to conduct themselves during the examination.

Uploaded by

danthonynwaokolo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

THE LAGOON SCHOOL

(Secondary Section)
Subject: Computer Studies/ICT Class: SS3 Academic Session: 2022/2023

Term: 2nd Term Revision Test Duration: 2 hours

Instructions:
1. Read all instructions carefully.
2. Cross out any rough work.
3. If a supplementary sheet is used, kindly ensure that your
name is written on all the additional pages.
4. Under no circumstances should used answer booklets be
removed from the examination hall by the candidate.
5. Maintain silence and raise your hand to call the
attention of the invigilator(s).
6. Chatting with classmates and borrowing in the
examination hall are NOT allowed under any
circumstances.

Examiner’s Name: Agboni Maryfrances Signature:

HOD : Mrs. Igwe Signature:


PAPER 1
(OBJECTIVES)
Instruction: Read carefully and answer all the questions in this section
1. To store scanty data, which of c) Minimum
the following devices will you
need?
a) CD-ROM
b)flash drive
c) RAM
d)registers

2. Which of the following commands


is given to reboot a computer?
a) CTRL+ALT+DEL
b) CTRL+ALT+TAB
c) CTRL+SHIFT+DEL
d) CTRL+ALT+SHIFT

3. What language does a


browser typically interpret to
display information from
WWW?
a) COBOL
b) HTML
c) HTTP
d) JAVA

4. What happens if you press Ctrl+V


keys?
a) a capital letter V is typed
b) the selected item is pasted from
the clipboard
c) the selected drawing objects are
distributed vertically on the page
d) none of the above

5. To calculate the largest value in a set


of numbers in excel, you would use
--
?
a) Average
b)Count
d)Maximum

6. Which of the following best


controls a loop?
a) INPUT
b) IF
c) END
d) FOR-NEXT

7. A method of representing data


uses characters that are
English-based, that is, other
languages like Chinese are not
covered. Which of the
following best suits the
description?
a) EBCDC
b)BCD
c) ASCII
d)UNICODE

8. One of the following


topologies can cause total
network failure if the central
hub goes down.
a) Star
b) Ring
c) Line bus
d) None of the above

9. Convert 14.2510 to binary


a) 11102
b) 110001012
c) 1110.012
d) 10110.12
10. A compiler is a system software. 14. Tade needs to convert a High Level
Which of the following best Language to Machine Language,
describes its function? suggest which of the following
a) converts machine level language translators to use.
to high level language a) A compiler
b) converts high level language b) An editor
to high level language c) A utility program
c) It converts high level language
d) Windows 10
to machine level language
d) None of the above
15. The available page orientations in
Ms Word are
11. Why are super computers considered
a) Portrait and justify
the most powerful computers?
b) Justify and right align
a) because they are super
c) Left align and landscape
b)because they are large
d) Portrait and landscape
c) because they have the fastest
and high level of performance as
16. A group of attributes or fields in
compared to a general-purpose
a database is known as
computer
a) data
d)supercomputer
b)file
c) query
12. In the diagram below, the
d)record
area labelled A represents unit
17. In Ms Excel, what displays
Input CPU D Output the content of an active cell?
unit unit a) Formula bar
b) Name box
A c) Range
d) Task plane
a) data
b) supply 18. Which of these registered jacks is
c) information used in terminating phone line?
d) memory a) RJ11
b) RJ14
13. To store a piece of information in c) RJ25
a computer system use d) RJ45
a) binary number system
b) decimal number system
c) hexadecimal number system
d) octal number system
19. The 24. An error in a program is known as a
instruction fetched into the CPU is a) BIOS
decoded by the b) BIOC
a) Primary memory c) BUG
b) Program counter d) DEBUG
c) ALU
d) CU 25. If the output signals of any logic
gate is fed into a inverter, the result
20. What can be considered as basic is
building blocks of a digital a) AND gate
circuit? b) NOR gate
a) Logic Gate c) The same as the output signal
b) Diode d) The inverse of the output signal
c) Semiconductor
d) CMOS 26. connects web pages on
the internet
21. The QBASIC Character Set consists a) Emails
of the following except b) Hyperlinks
a) CLS c) The Internet
b) Alphabets d) Websites
c) Numbers
d) Special characters 27. To apply a criterion in your MS
database, you decided to use “?”.
22. Why is there a need for a What is expected to be
system analyst to evaluate an displayed?
existing system? a) A particular character
a) to produce a full specification of b) A string of characters
users’ requirement c) Just ?????? as symbols
b) to illustrate the solution to the d) None of the above
problem
c) to crosscheck the outputs from 28. General programs that are written to
newly developed system
help users and work as an interface
d) to review the change in
between the computer and users is
requirement
called
a) Hardware
23. In order to redo a last action in
b) Software
MS PowerPoint, use
c) Programs
a) Ctrl L
b) Ctrl G d) Computer peripherals
c) Shift F3
d) Ctrl Y
29. Which of the following 34. The set of rules for
depicts decision making used exchanging files on WWW is
in flow- charting? known as
a) Oval a) Filter
b) Parallelogram b) Cyber café
c) Diamond c) Protocol
d) Rectangle d) WWW

30. The DATA


statement is not effective without the 35. Which program is run by
use of statement BIOS to check hardware
a) CPU components are working
b) Monitor properly while the computer is
c) Scanner turned ON?
d) READ a) DMOS
b) POST
31. The following are the characteristics c) CMOS
of an algorithm except d) RPP
a) orderliness
b)finite
c) ambiguous 36. General programs that are
d)all of the above written to help users and work as an
interface between computer and users
32. B is called
efore a programme is written a) Hardware
must be done before the actual b) Software
coding. c) Programs
a) Desk checking d) Computer peripherals
b) Loading
c) Flowcharting 37. Which of the following is not
d) Compilation a network device?
a) router
33. Which of the following is NOT a b)ethernet
method of organising files on a c) switch
disk? d)star topology
a) Indexed sequential method
b) Random method 38. Device drivers, servers, windowing
c) Sorting method systems and utilities can be classified
d) Serial method as
a) operating systems
b) system software
c) utility software
d) none of the above
40. In QBASIC, how would you declare a
39. Which of the following one dimensional array?
networks cover the widest a) n DIM Arrayname
range: b)n DIM (size) Arrayname
a) LAN c) n DIM (size) Arrayname
b) MAN as Data type
c) PAN d)n DIM Arrayname (size) as Data
d) WAN type
THE LAGOON SCHOOL
(Secondary Section)
Instruction:
Paper 2 consists of 5 essay questions. You are required to answer any 3 in
1 hour for 30 marks.
Kindly ensure that your diagrams are bold, neat and well labelled as the
case may be. Good luck!
PAPER
2
(ESSA
Y)
Name:

Class:

Date:

● Write boldly and legibly in ink and


For Examiner’s use state your answers precisely.
only
Questio Mar ● Use 2B to draw where necessary.
n k
● Write your answers in the spaces
No. provided.
Objectiv ● Do not write answers beyond the
es 1 spaces
● provided for the question(s).
2
● Do not write more than one answer on
3 a line.
4
● Do not write on the bar codes at the
5 bottom of the pages.

6 ● Do not tear off any part of this


booklet. It is an examination
Tot malpractice if you do so.

al
Tot
1.Julia inputs personal data into her computer. She stores three copies of the data
using a hard disk drive (HDD), a solid state drive(SDD) and a USB flash memory drive.
(a) Identify three devices Julia can use to input personal data into her computer

…………………………………………………………………………………………….

…………………………………………………………………………………………….

…………………………………………………………………………………………….

[3mk]

(b) Six statements are shown about HDDs, SSDs and USB flash memory
drives. Tick (✓) to show which statements apply to each type of storage. Some
statements can apply to more than one type of storage.

Statement HDD SSD (✓) USB


(✓) flash
memory
drive (✓)
it has no moving parts

it is non-volatile

it uses magnetic properties to store data

it has the smallest physical size

it has the slowest read/write speeds

[5mks]

(c) Briefly describe how you would export your job for printing in Inkscape.
...............................................................................................................................................

...............................................................................................................................................

...............................................................................................................................................

...............................................................................................................................................

[2mks]

2. A firewall can be used to help keep the data secure that is stored on a computer.

(a) The given paragraph describes how the firewall operates to help keep the data

secure. Complete the paragraph using the most appropriate terms from the

given list. Not all of the terms on the list need to be used.

• Accept • Network • Reject

• Criteria • Outgoin • Software


g
• Hackin • Store
g • Output
• Storage
• Input • Processo
r

A firewall can be..............................................or hardware based. It monitors

traffic between the computer and the..............................................The user sets

............................................ for the traffic. The firewall will .........................................

or..............................................the traffic based on this. It can help prevent

.............................................and malicious software that could be a threat to the

security of the data. [3mks]


(b) Identify three other methods that could be used to keep the data secure.

Method
...................................................................................................................................
Method 2
..........................................................................................................................................
Method 3
..........................................................................................................................................
[3mks]
(c)Two legal issues considered when using ICT are Copyright and Data diddling.
What is meant by
Copyright
...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Data diddling

..........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4mks]
3. A database table, 2018MOV, is used to keep a record of movie details.

(a) State the number of records in the database table.

...........................................................................................................................................

[2mks]

(b) (i) Give the name of the field that would be used for the primary key.

............................................................................................................................................

[2mks]

(ii) State the reason for choosing this field for the primary key.

...............................................................................................................................................

...............................................................................................................................................
[2mks]

(c)Complete the table to identify the most appropriate data type for each field based

on the data shown

in the database table,

2018MOV.

[4mks]

4.(a) As a QBASIC programmer, outline four conditions that must be fulfilled by


Variables.
…..............................................................................................................................
..................

.....................................................................................................................................................

…..............................................................................................................................
..................

.....................................................................................................................................................

…........................................................................................................................
........................

.....................................................................................................................................................
[4mks]

(b) Write a simple QBASIC program to find the area of a trapezium.

.................................................................................................................................

................................................................................................................................

.....................................................................................................................................................

.....................................................................................................................................................

.....................................................................................................................................................

.....................................................................................................................................................

.....................................................................................................................................................

...................................................................................................................................................

.....................................................................................................................................................

.....................................................................................................................................................

...................................................................................................................................................

[6mks]

5(a) As a graphics designer, you have a task of creating and designing and object.

To

colour the inside and the outline, what tool would you use?
….....................................................................................................................................
[1mk]

(b) How would you carry out the task in (a) above?

.....................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

....................................................................................................................................[2mks]

(ii) Describe what is meant by https.

................................................................................................................................................

................................................................................................................................................

................................................................................................................................................

..............................................................................................................................................

[1mk]

(c) You have a presentation in minutes, Itemize the steps you would take to merge
your file with another to ensure a seamless presentation.
b) Explain the following terms as used in word processing:
i. Formatting
......................................................................................................................................

......................................................................................................................................
......................................................................................................................................

.....................................................................................................................................

ii. Editing
…................................................................................................................
.................

......................................................................................................................................

......................................................................................................................................

.....................................................................................................................................

iii. Justification
......................................................................................................................................

......................................................................................................................................

......................................................................................................................................

.....................................................................................................................................

......................................................................................................................................

......................................................................................................................................

......................................................................................................................................

.....................................................................................................................................

[6mks]

You might also like