0% found this document useful (0 votes)
15 views

COMPUTER

The document outlines the 2024/2025 mock examination for SS 3 students in the Catholic Diocese of Abakaliki, focusing on the subject of Computer. It consists of two sections: Section A contains 60 objective questions worth 30 marks, while Section B includes 10 theory questions worth 40 marks, requiring students to answer four questions. The exam covers various topics related to computer science, including hardware, software, networking, and programming.

Uploaded by

Sam Okebaram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

COMPUTER

The document outlines the 2024/2025 mock examination for SS 3 students in the Catholic Diocese of Abakaliki, focusing on the subject of Computer. It consists of two sections: Section A contains 60 objective questions worth 30 marks, while Section B includes 10 theory questions worth 40 marks, requiring students to answer four questions. The exam covers various topics related to computer science, including hardware, software, networking, and programming.

Uploaded by

Sam Okebaram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CATHOLIC DIOCESE OF ABAKALIKI

DEPARTMENT OF EDUCATION
2024/2025 MOCK EXAMINATION FOR SS 3
SUBJECT: COMPUTER TIME: 2HRS
SECTION A: OBJECTIVE QUESTIONS (30 Marks)
INSTRUCTION: Answer all the questions in this section. Each question carries ½
marks.
In this section, choose from options lettered A- D, the answer to the question and
write the Alphabet that bears the correct answer.
1. ____________ stores data permanently and cannot be affected by power failure?
(a) RAM (b) CPU (c) ROM (d) DVD.
2. _______ are media that connect the microprocessor. (CPU) to each of the RAM.
ROM and Input/Output (1/0) (a) RAM (b) Buses (c) Register (d) ROM.
3. Features of a Presentation package will not be complete without (a) Zoom
(b)Themes (c) Insert (d) Slide show.
4. Which of the following applications is not a presentation package? (a) Adobe page
maker (b) Microsoft power point (c) Windows movies maker (d) Adobe flash.
5. __________ Generation of computer used transistor, (a) 6th (b) 2nd (c) 3rd (d) 1st.
6. Given that 2610 = x2, x is (a) 101112 (b) 110112 (c) 110102 (d) 111102.
7. The acronym HTTP stands for (a) Hyper Text Transfer Protocol (b) Higher Transfer
Text Protocol (c) Hardware Test Technology Protocol (d) Hard Text Transfer
Protocol.
8. What is the full meaning of the acronym USB? (a) University Student Body
(b)Universal Server Bus (c) Universal Serial Bus (d) Universal Science Board
9. In 1960 _______ developed the ARPANET, a computer network, which today has
become internet, (a) Us Department of Science and Technology (b)-Us Department
of Defense (c) US Department of Space (d) US Department of Computer science.
10. ________ invented the difference engine and later developed the analytical
engine, (a) Charles Babbage (b) Blaise Pascal (c) Bill Gate (d) Robin Obas.
11. What is 1111 12 in base 10? (a) 29 (b) 30 (c) 31 (d) 32.
12. The flowchart symbol is a/an____ symbol, (a) Process (b)Terminal (c) Input
(d) decision.
13. GUI means___________(a) Great Universal Intercede (b) Grand Universal
Interface (c) Graphical User Interface (d) Grand User Intercede.
14. The World Wide Web (WWW) is credited to __________ in 1990. (a) Charles
Babbage (b) Blaise Pascal (c) Tim Berners lee (d) Bill Gate.
15. What is 79 in hexadecimal? (a) FF (b) 5A (c) 4F (d) 63
16. Who is regarded as the world's first female programmer? (a) Melinda Gate (b)Ada
Augusta (c) Florence Lugard (d) Dorothy Packard.
17. Which of the following is not a Programming Language? (a) Java (b) Visual Basic
(c) Pascal (d) PowerPoint.
18. What is the meaning of PHP? (a) Hypertext Preprocessor (b) Programming Hyper
Processor (c) processor hyperlink program (d) programming hardware protocol
19. _____________refers to the default page of website, (a) House site (b) Home page
(c) Internet page (d) Google page.
20. The following are examples of Antivirus software except? (a) Avast (b) AVG
(c) MCAfee (d) Logic Bomb.

1|Page
21. Characteristics of computer include the following except? (a) Speed (b)Accuracy
(c)Input (d) Storage.
22. These are types of standard single logic gate except____. (a) NOT gate (b)NOR
gate (c) AND gate (d) OR gate.
23. Abacus is made up of_______. (a) Beads, Rods and Frame (b) Computer, file and
object (c) breads, frame and iron (d) stick, stone and finger.
24. The connection of two or more computers to share information and resources is
called ________. (a) Server (b) Network (c) Client (d) Host
25. Ctrl + X is a shortcut for_______(a) copy (b) paste (c) edit (d) cut.
26. __________is a tabular representation of the output of a Logic Circuit for all
possible combinations of inputs and outputs, (a) Truth table (b) Data table (c)Not
gate (d) OR gate
27. As a program is executed, data flow from RAM through an interface unit wires
called _______ (a) Register (b) Bus (c) Address bar (d) ROM
28. These are examples of search engine except? (a) Mama.com (b) Google.com
(c)Ask.com (d) Google chrome.com
29. Which of the following is not a method of accessing file? (a) Random (b) Serial
(c) Circular (d) Sequential
30. Who owns Internet? (a) Bill Gate (b) Charles Babbage (c) Augusta Ada (d) No
Body.
31. A computer network is a system in which multiple computers are connected to each
other to share ________. (a) Information and Resources (b) system and
administration (c) Network and traffic (d) Central point.
32. The parts of computer system we can see with our eyes and touch with our hands
is called the computer__________. (a) Software (b) Hardware (c)Application
software (d) Hardcopy
33. Internet uses the standard protocol known as______. (a) ICMP (b) SMP (c) IP
(d)DNS
34. The Domain Name System (DNS) is a hierarchical distributed naming system for
computer services, or any resources connected to the internet or a private network,
(a) True (b) False
35. The computer that runs a network operating system allowing it to share resources
with the security and a system administrator attached to it is called______. (a) Hub
(b) Modem (c) Server (d) Scanner.
36. The address that is used in identifying the network adapter(s) that is installed on a
computer is known as (a) IP address (b) TCP address (c) MAC address (d)Network
address.
37. Computers which allow users to request shared resources on the servers while on
the network is known as__________ (a) Network host (b) Network client
(c)Network server (d) Network card
38. _________company designed the ENIAC and the UNIVAC. (a) Eckert Mauchly
computer corporation (b) Eckert Mauchly corporation (c) Babbage's corporation
(d)Jacquard's Loom Corporation.
39. The ability of the computer to hold data, instructions and information for future use
is referred to as_________. (a) Output (b) Input (c) process (d) storage.
40. __________ language uses Mnemonics, (a) Machine (b) Assembly (c) Low Level
Language (d) High level language.

2|Page
41. Any artificial object orbiting the earth for communication is called__________.
(a)mobile phone (b) Bluetooth (c) Hotspot (d) GPS.
42. Clicking, pointing and dragging are main functions of_________. (a) Keyboard
(b)joystick (c) mouse (d) monitor.
43. There are primarily three choices of operating system for running a computer.
Which are they? (a) SQL, Java and C++ (b) Windows, Linux and Apple OS (c)Input,
Output and process (d) Home premium, home edition and based.
44. Securing a computer system is always balanced against accessibility which has
three properties which are (a) confidentiality, integrity and availability (b)permission,
mandatory and threat (c) Disaster, theft and vandalism (d)Access control and
breakthrough.
45. The program designed to replicate and to spread malicious software threats to
destroy application programs which can cause permanent damage or loss of files is
called _________(a) Computer war (b) Computer crime (c) Computer virus
(d)Hacking.
46. Software is typically stored on an external long-term memory device such as
(a)RAM (b) ROM (c) Motherboard (d) Hard drive or magnetic diskette.
47. The protection of computer systems and information from harm, theft and
unauthorized use is known as? (a) Data migration (b) Access control (c)Computer
security (d) Backup
48. The application that runs in a web browser which is supported by programming
language such as the combination of JavaScript, HTML and CSS is known as
(a) Internet (b) Web application (c) Network application (d) Computer application.
49. A piece of icon or image on webpage associated with another webpage is called
(a)URL (b) Plugrm (c) Hyperlink (d) None of the above.
50. A computer program that stores data between more than one computer for
processing is known as? (a) Data mining (b) Associate software (c) Data
warehousing (d) Collaborative software.
51. URL stands for? (a) Unique Reference Label (b) Uniform Resource Locator
(c)Uniform Research Locator (d) Uniform Reference Label
52. The main function of a browser is to (a) Compile HTML (b) Interpret HTML
(c)Upgrade (d) Transfer files.
53. From what location are the first computer instructions available on boot up? (a)CPU
(b) BOOT INI (c) ROM (d) None of the above
54. Which of the following computing devices did not exist in the pre-computing age to
the 19th century? (a) Napiers (b) ENIAC (c) Slide Rule (d) Abacus
55. Convert 478 to its binary equivalent (a) 1011112 (b) 1111012 (c) 1000012
(d)1100112
56. The quick access toolbar contains the following tabs except (a) Undo (b) Redo
(c)Save (d) Numbering.
57. ______ is a transition of slide that is able to move and change when the sequence
is shown? (a) Slide show (b) Zoom (c) animation (d) Clip art.
58. The collection of the four functions of the control unit is referred to as ______
(a)Data processing (b) Machine cycle (c) function cycle (d) computing cycle.
59. The ability of a GSM customer to make call in any part of the world at any point in
time to a different location is called (a) Rummy (b) Rooming (c) Roaming
(d)Ramming.

3|Page
60. VSAT stands for _________ (a) Very Small Aperture Terminal (b) Very Small
Aperture Tools (c) Very Small Aperture Technology (d) Very Small Aperture
Telecommunication

SECTION B: THEORY (40 Marks)


Answer any FOUR questions only from this section. Each question carries equal
marks.
1a. Define ICT Gadget.
(b) List four examples of ICT Based Gadget,
(c) State four application areas of ICT.

2a. Convert 4U210 to binary.


(b) Convert 110012 to base 10.
(c) In hexadecimal number system, B, D, E represent _____,_______ and ______
respectively.

3a. List three computing devices that belong to each of the: (i) 20th Century period
(ii)19th Century.
(b) Define Computer software,
(c) List any four input devices you know.

4a. State the full meaning of the following: (i) HTML (ii) MIS (iii) GPS (iv) BASIC (v)TCP
(b) Define Computer Network,
(c) State three advantages of Computer Network in the secondary school.

5a. Define a Logic gate.


(b) Explain the following Single Standard Logic gates: (i) OR gate (ii) NOT gate (iii)AND
gate,
(c) List five features of Corel draw.

6a. List three criteria that are used in classifying computer file.
(b) State (i) three methods of file security (ii) Two advantages and two disadvantages of
computer files

7a. Outline three basic requirements for Internet connectivity.


(b) Explain the term Internet browser, (c) List five examples of Web browser.

8a. Define Programming Language.


(b) Write a simple BASIC program to calculate the area of triangle (Area=A, Base=B,
Height = H). NB: show all your workings,
(c) State three levels of programming language.

9a. Explain the term DBMS.


(b) List four applications of DBMS, (c) Briefly explain the following basic terminologies
in DBMS: (i) Data (ii) Primary key (iii) Record (iv) Field

10a. Distinguish between RJ45 and RJ11 connectors.


(b) Enumerate four Network devices you know, (c) State four types of network.
4|Page

You might also like