0% found this document useful (0 votes)
57 views8 pages

Ict SSS One, Two and Three

The document is an examination paper for ICT students at Excellent Pearls School, containing multiple-choice questions covering various ICT topics. It includes questions on definitions, functions, and components related to computers and communication systems. The exam is structured for two different classes, SS1 and SSS2, with questions designed to assess students' understanding of ICT concepts.

Uploaded by

john duru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views8 pages

Ict SSS One, Two and Three

The document is an examination paper for ICT students at Excellent Pearls School, containing multiple-choice questions covering various ICT topics. It includes questions on definitions, functions, and components related to computers and communication systems. The exam is structured for two different classes, SS1 and SSS2, with questions designed to assess students' understanding of ICT concepts.

Uploaded by

john duru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

88888888888888888888888888888888888888888888888888888888

8888888888888888888

EXCELLENT PEARLS SCHOOL


14 OKOH CLOSE, ELIADA LAYOUT, RUMUOGBA, PORTHARCOURT.
Second Term Examination Time:
…………………..

Name: ………………………………………………………..
Subject: I C T Class: SS. ONE Date: July………
2020
SECTION A: OBJECTIVE QUESTION.
Choose from the options A-D

1. ICT stands for


(a) information, communication and technical
(b) information, community and technology
(c) information, communication and technology
(d) introduction, communication and technical
2. Which of these is not an example of communication system?
(a) telephone
(b) computer
(c) television
(d) car
3. The telecommunication system for broadcasting and receiving pictures
and sound over long distance
(a) telephone
(b) computer
(c) television
(d) car
4. Internet is defined as a global electronic communication
(a) network
(b) community
(c) connection
(d) nutcase
5. One of these is not a benefit of communication system
(a) it speeds up the processes of transaction
(b) It provides online business services
(c) It enhances data security
(d) Encouragement of advanced free fraud (419)
6. The following are disadvantages of ICT except A. fraud B. virus C. faster
communication D. none
7. ICT has turned the whole world into a ……A. global village B. galaxy C.
universe D. none
8. The production of goods with or without human intervention using computer
is known as …….A. automation B. AI C. expert system D. vacuum tube
9. E-commerce stands for ……..A. electric commerce B. electronic commerce
C. electrical commerce. D. none
10. ATM means ……. A. Automatic Teller Machine B. Automated Teller
Machine C. Auto Teller Machine D. None

11. __________ is any part of the computer that you can physically touch. (a)
Hardware (b) A device (c) A peripheral (d) An application
12. The metal or plastic case that holds all the physical parts of the computer
is the :
(a) System unit (b) CPU (c) Mainframe (d) Platform.
13. Which of the following is a storage device?(a) Tape (b) Hard Disk (c)
Floppy Disk (d) All of the above. (a)
14. ________ help prevent power surges. (a) Surge Suppressor (b) Spike
Protector (c) UPS system (d) High grade multi meter.
15. Which device uses a DMA channel? (a) Modem (b) Network card (c)
Sound card (d) All of the above.
16. The brain of any computer system is_______. (a) ALU (b) Memory (c)
CPU (d) Control unit
(a) Which of the following is used as “input device” for the computer?
(a) Printer (b) VDU (c) TV (d) Light pen
17. An input device that is able to interpret pencil marks on paper media is
known as________.
(a) Magnetic Disk (b) Optical Mark Reader (c) Card puncher (d)
Magnetic tape.
18. A process known as _______ is used by large retailers to study trends.
(a) Data mining
(b) Data selection (c) POS (d) data conversion.
19. Which of the following is NOT one of the major data processing functions
of a computer?
(a) Gathering data (b) processing data into information (c) analyzing
the data or information
(d) storing the data or information
20. __________ is data that has been organized or presented in a meaningful
fashion.
(a) A Process (b) software (c) storage (d) Information.
21. The name for the way that computers manipulate data into information is
called:
(a) Programming (b) Processing (c) Storing (d) Organizing
22. Computers gather data, which means that they allow users to _______
data. (a) Present (b)input (c) output (d) store

23. Computers manipulate data in many way, and this manipulation is called
__________.
(a) Utilizing (b) batching (c) upgrading (d) processing
24. The first step in the transaction processing cycle is _________. (a) Data
base operation
(b) audit (c) data entry (d) user entry.
25. The way of manipulating data into information is called _________. (a)
Storing
(b) processing (c) deletion (d) organizing
26. A digital device that processes data is known as _________. (a) data
processor (b) data entry (c) DBMS (d) data base
27. In order to contain and minimize the wild spread of CoronaVirus, social
interactions has to be replaced with ____________ . A.media
interaction B. social gathering C. face to face interaction D.
communal interaction
28. One of these is an example of an Operating System. Window XP .
Window Java C. Window MediumD. Window XML
29. Two types of drum plotters are ________ and ________ A. My Company
B. external C. My Page D. internal
30. One of these components is a storage device.____________ A.
Harddrive B. CD ROM
Drive C. MotherboardD. IDE Cable
31. Utility programs are also referred as ______________ A. Soft copy
B. Hard copy C. B. service D. infrastructure
32. The text and document on the screen of a computer is called
_____________ A. Soft copy B. Hard copy C. Blue print D. Hand
copy
33. One of these is a type of graphic programs. A. Freelance B.
application C. HDMI D. Analytical
34. An example of input device is ___________ A. Keyboard B. Printer
C. Monitor
D. CPU
35. ___________ is a powerful feature that communication programs give
micro computers among A. intranet B. data passage C. connectivity
D. telecommunication
36. Software is the __________________ part of the computer A. Touchable
B. Untouchable C. New D. Indefinite
37. Popular communication includes _____________ A. ProCom B. Prodata
C. Data card D. intelcard
38. DOS means ___________A. Disk Operating System B. Data Operating
System C. Disk
Opening System D. Datum Offering System

39. ISP in the field of IT means_________. A. Internet Service


Provider B. Inter Service Plan C. In Set Plan D. None of the above

40. Database can be created using one of these means____________ A.


Row B. Data C. Column D. Using Blank Access Database
EXCELLENT PEARLS SCHOOL
14 OKOH CLOSE, ELIADA LAYOUT, RUMUOGBA, PORT HARCOURT.
EL Examination Time:
…………………………
Name:………………………….........……
Subject:ICT Class: SSS2 Date: July…..
2020
1. ……………… converts your program into a form that can be executed directly by the
computer
(a) Software (b) Interpreter (c) Hardware
2. BASIC means BEGINNNERS ALL-PURPOSE SYMBOLIC INSTRUCTION ……………..
(a) Code (b) Centre (c) Computer
3. ………………….. used to assign (or give) values to variables
(a) REM (b) INPUT (c) LET
4. ………………… statement is used to execute a program
(a) INPUT (b) RUN (c) END
5. …………….. is used to RUN a program
(a) F5 (b) F10 (c) F1

6. ________ refers to the unforeseen loss of data or information.


a. Backup b. Data loss c. Overwriting d. Antivirus

7. _______ is the process of making copies of files, so that the additional copies may be used to
restore the original after data loss event.
a. Manipulating b. Data Loss Event c. Backup d. Duplication

8. An occurrence of data loss can be called ________________


a. Data Loss Event b. Data Loss Occurrence c. Data Loss Show d. Data Loss
occasion

9. The following are limitations of computerized file system EXCEPT one.


a. Vulnerable to virus attacks b. Incompatible data file c. Cheap to set it up d. Data are
often duplicated

10. The following are advantages of computer files over manual files EXCEPT one
a. Slow and inefficient in processing of information b. Accurate information and faster
decision making c. Takes less space d. More timely information can be produced

11. One of the disadvantages of hierarchical network is that it depends heavily on the hub and its
failure affects the entire system. (a) entire system (b) part of the system (c) single system (d)
partial system.

12. One of the following is a communication medium. (a) coaxial cable (b) book (c) typewriter
(c) windows (d) episode.

13. A term used to refer to the process of accessing and viewing web pages on the internet is
called _______(a)Browse (a) internet (b) Intranet (c) WAN (d) server

14. The internet provides users with facilities for online ………. of examinations like WAEC,
NECO and JAMB (a)learning (b) registration (c) commerce (d) banking

15. Memory unit is part of __________. Input device (b) control unit (c)
output device (d) central processing unit
16. Which device can understand difference between data and programs?
Input device (b) Output device (c) Memory (d) Microprocessor
18.A normal CD-ROM usually can store up to __________data?680 KB
(b) 680 Bytes (c) 680 MB (d) 680 GB

17. Memory is made up of __________. (a) set of wires (b) set of circuits (c)
large number of cells (d) all of the above.

18. CPU speed of a personal computer is __________. (a) 32 KIPS (b) 100
KIPS (c) 1 MIPS
(d) none of the above.

19. Primary storage is __________ as compared to secondary storage. (a)


slow and inexpensive
(b) fast and inexpensive (c) fast and expensive (d) slow and expensive

20. A disk’s content that is recorded at the time of manufacture and that
cannot be changed or erased by the user is _______. (a) memory only (b)
write –only (c) once –only (d) read –only.

23. A DVD is an example of a(n) __________. (a) hard disk (b) optical disc (c)
output device
(d) solid- state storage device
24. What is the permanent memory built into your computer called? (a) RAM
(b) floppy (c) CPU
(d) ROM
25. Which of the following is a storage device that uses rigid, permanently
installed magnetic disks
to store data/ information? (a) Floppy diskette (b) Hard disk (c)
Permanent disk
(d) Optical disk
26. Which of the following are advantages of CD-ROM as a storage media?
(a) CD-ROM is an
inexpensive way to store large, amount of data and information (b)
CD-ROM disks retrieve data and information more quickly than
magnetic disks do (c)CD- ROMs make less errors than magnetic
media (d) all of the above.
27. When you save to _________, your data will remain intact even when the
computer is turned
off. (a) RAM (b) motherboard (c) secondary storage device (d) primary
storage device

28. A disk’s content that is recorded at the time of manufacture and that
cannot be changed or erased by the user is _________. (a) Read- only (b)
memory-only (c) run- only(d) write-only
29. Which of the following is not a storage device? (a) DVD (b) hard disk (c)
floppy disk (d) mouse
30. The term ‘Pentium’ is related to what? (a) Mouse (b) Hard disk (c)
Microprocessor (d) DVD
31. __________ is how computer finds out who you are. A. assessment
B. authentication C. authorization D. access checking

32. In cold booting, one of these must be observed._____________. A.


Unplug all cables B. Make sure all connections are done C. Interchange the
connections the way you like D. Non of the above.

33. Whenever a user accesses a file or folder, the file security feature
kicks in and this is called _________A. Access checkmate B. access
check C. assessment sequence D. Security check

34. Warm booting is carried out by ____________. A. Alt + Control +


Delete
B. Control + Delete + Alt C. Control + Alt + Delete D. Delete+Alt +
Control

35. Shut down is simply one of these _________. A. Putting the computer to
off B. Hibernating C. Restarting D. Designing screen savers

36. Investigative study in system development cycle involves __________A.


detail study of the system performance B. detail study of the system
speed C. detail study of the system operational performance D. detail
study of the system space

37. Hardware is the ____________ part of the computer. A. Touchable


B. Untouchable C. Soft D. Practicable

38. One of these is a database package. _________. A. Oracle B.


Miracle C. Ms Word D. FrontPage
39. Powerpoint is used for____________ A. Presentation B. Calculation
C. Data EntryD. Database

40. Slide pane is a part of Power point environment.____________ A. True


B. False C. Maybe D. None of the above

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy