Here are some questions that will help you score high grade in your second term examination
Jss 3 Second Term Examination
1) The following are importance of a computer as a tool for processing data except ___________ (a) Fast access to information (b) increased accuracy (c) perform a lot of mistake (d) efficient storage facilities
2) Which of the following is not a stage in data processing circle __________ (a) data manipulation (b) data gathering (c) data input stage (d) data processing
3) A piece of software which replicate itself and corrupts programs and data is referred to as __________ (a) Anti – virus (b) disease (c) corrupt documents (d) virus
4) The gap between those with regular effective access to digital technologies and those without is known as _________ (a) distance (b) communication gap (c) disconnection (d) digital divide
5) Application packages that can be used to perform analysis, manage numbers, organize data, do calculations, draw graph is called ____________(a) search tool (b) data base (c) spreadsheet (d) worksheet
6) Buying and selling via the internet which is often regarded as internet shopping is known as __________ (a) ATM (b) credit cards (c) E – commerce (d) Communication
7) Which of the following is not a feature of graphic package? (a) Menu bar (b) Tool bar (c) printable area (d) word bar
8) People who are not computer professionals but who make use of computers for their day to day activities are referred to as ____________ (a) Computer analysis (b) computer technicians (c) computer scientists (d) computer users.
9) Examples of computer viruses are the following except (a) Trojan horse (a) Jerusalem (c) black avenger (d) file virus
10) The process of copying data and storing it separately from the original copy is known as __________ (a) data package (b) back up (c) password (d) retrieving
11) The two main types of memories are _________ and __________ (a) REM, ROM (b) RAM, PORT (c) RAM, ROM (d) SCORE, BOARD
12) Which of the following is the smallest unit of storage? (a) Byte (b) bit (c) kilobyte (d) Megabyte
13) A program or software designed to detect and erase virus is ___________ (a) eraser (b) antivirus (c) virus (d) flash
14) The qualities of a good computer professional include the following except __________ (a) must commit cybercrime (b) must be knowledgeable (c) must have basic related qualification (d) must be able to work with others.
15) ___________ is a set of programs that controls a computer hardware and manage the use of programs. (a) Operating system (b) system software (c) application packages (d) utilities
16) The main circuit board to which all the internal and external devices in the system unit are connected is known as the ___________ (a) whiteboard (b) motherboard (c) dashboard (d) blackboard
17) Qualities of good computer professional are the following except. (a) must be very to work with others as team (b) must be able to correct errors on the computer (c) must be able to commit computer crime such as fraud (d) must ensure the security of data in an organization.
18) Convert 1510 to binary. (a) 1111 (b) 1001 (c) 1110 (d) 1011
19) HTTP stands for __________ (a) Hypertext transfer protocol (b) hyper tension transfer protocol (c) hypertext tube protocol (d) higher transfer text protocol
20) Time consuming, labor based, analogous machine are features of ___________ (a) Internet economy (b) new economy (c) old economy (d) public economy
SECTION B (Theory)
1) Define the term “Digital divide”
b) Differentiate between computer professional and computer users.
c) List six (6) computer profession.
2a) List ten (10) qualities of good computer professionals and explain any 5. (20 marks)
b) Find the OR and NOR and NAND in the table below.
Leave a Reply