Second Term Examination
Subject : Information and Communication Technology (ICT).
Class: JSS 3
Instruction: Answer all the questions in section (objective) and any three (3) questions in section B (Theory).
SECTION A: Objective questions
1. A collection of related fields about a particular thing is referred to as ____________ (a) field (b) record (c) database (d) file
2. The following are types of database EXCEPT _____________ (a) Flat file model (b) Hierarchial model (c) Network model (d) Rational model
3. Database management system is defined as a/ an _____________________ (a) collection of related records (b) computer program that constructs, organizes and maintain a database (c) system that consist of fixed-length and variable length record (d) organized term of field and records
4. A collection of interrelated data organized in a manner that allows access, retrieval and use of the data is called __________ (a) Data (b) Database (c) File (d) Information
5. The full meaning of DBMS is ______________ (a) Data Base Management System (b) Data Base Manipulation System (c) Data Byte Management Software (d) Data Byte Manipulation System
6. A command that is common to both copy and cut is the __________ (a) Del (b) Paste (c) Open (d) Save
7. __________ takes you to the extreme end of the sheet. (a) End + Arrow Key (b) End + PGDN (c) End + PGUP (d) Home + PGUP
8. The three basic data types entered into Excel are ____________ (a) Text, number and formula (b) Number, text and list (c) Letter, number and list (d) Number, formula and list
9. In Microsoft Excel, document is referred to as a __________ (a) Worksheet (b) Workbook (c) Cell note (d) Cell reference
10. Saving a document for the first time involves clicking file and _________ (a) Save (b) Keep (c) Print (d) New
11. The following are chart type EXCEPT ___________ (a) Column (b) Bar (c) Line (d) Doughnut
12. A __________ is a graphical representation of numeric values. (a) Chart (b) Cell (c) Legend (d) Title
13. In a worksheet, a cell containing formula must start with __________ (a) “equal to” sign (b) “multiplication” sign (c) A letter (d) Name of the formula
14.The following are spreadsheet packages EXCEPT _________ (a) Lotus 1-2-3 (b) SuperCalc (c) CorelDraw (d) Microsoft Excel
15. The following are database packages EXCEPT __________ (a) Sybase (b) MYSQL (c) Oracle (d) Microsoft Access
16. The data type that is used for identifying values or group of values is __________ (a) Text (b) Number (c) Formula (d) List
17. Which of the following gives the correct celk reference? (a) B12B (b) B12 (c) 12B (d) +B*
18. A “NOT” Gate is called _________ (a) Stabilizer (b) Exclusive OR (c) Inverter (d) NOT OR
19. In the logic gate “OR” the output is true if ___________ (a) either of the input is true (b) either of the input is false (c) neither of the input is true (d) the input is true and false
20. Which of the following logic gate has only one input? (a) OR gate (b) XNOR gate (c) NAND gate (d) NOT gate
21. ___________ is a program written to wipe away the virus on the system. (a) Stone (b) Sleeper (c) Anti-virus (d) Amoeba
22. ___________ is a program that makes the computer system to malfunction. (a) Professional (b) Computer virus (c) Computer guru (d) HIV aids
23. Avast is ab example of anti-virus. (a) True (b) False (c) True and False (d) All of the above
24. The output is “true” when both inputs are “true”. Otherwise, the output is “false”. The above illustration is a __________ logic gate. (a) NAND logic gate (b) XOR logic gate (c) AND logic gate (d) NOT logic gate
25. Norton anti-virus is one of the examples of the anti-virus. (a) False (b) True (c) True and False (d) All of the above
26.Http stands for _________. (a) Hyper text transfer path (b) Hyper text transfer product (c) Hyper text transport path (d) Hyper text transfer protocol
27 A collection of web pages placed on a server is known as a _________. (a) Website (b) Web master (c) Web server (d) Web cam
28. A set of rules that controls how computers communicate is called _________ (a) Laws (b) Regulations (c) Provider (d) Protocol
29. A restricted site to any unauthorized user is called a _________ site. (a) Trusted (b) Secured (c) Entrusted (d) Offline
30. ________ is not an internet browser. (a) Mozilla (b) Explorer (c) Netscape (d) Nescafe
31. The maximum number of characters that the value of a field may assume is known as ___–______. (a) Dec (b) Field type (c) Field length (d) Float
32 A __________ is a small unit of information. (a) Character (b) Database (c) Field (d) File
33. A group of related records is __________. (a) Character (b) Database (c) File (d) Record
34. The following are functions of database management system EXCEPT _________ (a) Arranging data files (b) Creating data files (c) Querying the data stored in the data file (d) Reporting data
35. What is the single symbol used in data processing called? (a) Field (b) File (c) Character (d) Record
36 www means _____________. (a) World Wide Web (b) World Web Wide (c) World Wide Word (d) Word World Web
37. All of the following are users of the internet EXCEPT _____________. (a) Researchers (b) Students (c) Engineers (d) None of the above
38. The first page of a website is called the ________ page. (a) Log in (b) Starting (c) Home (d) Output
39. A private computer network within an organization is called ___________. (a) Internet (b) Extranet (c) Intranet (d) Exponent
40. A safe site from which you can download files without it causing any damage is _________. (a) Trusted site (b) Un-trusted site (c) Good site (d) Bad site
41. There are _________ basic building blocks in logic gates technology. (a) 3 (b) 4 (c) 2 (d) 5
42. The computer technology that enables transfer of textual data between computers is called _______________. (a) Network (b) GSM (c) E-mail (d) ATM
43. The world wide connectivity of the computer is referred to as _________________. (a) Telephone (b) Internet (c) Scanner (d) Digital camera
44. ISP stands for _________. (a) Internet service provider (b) Intranet service provider (c) Internal service provider (d) Integrated service provider
45. The internet applications include the following EXCEPT __________. (a) Entertainment (b) Communication (c) Online shopping (d) None of the above
46. Yahoo is a __________. (a) Browser (b) Chat group (c) Home page (d) Search engine
47. In an e-mail message, the _________ provides brief description of the message. (a) Subject (b) Closing (c) Message (d) Attachment
48. The web is accessed using a _________ (a) Browser (b) Newsgroup (c) Filter (d) Search engine
49. __________ is a multi-media interface to resources available on the internet. (a) Server (b) Network (c) Web (d) Browser
50. A restricted site to any unauthorized user is called a _________ site. (a) Trusted (b) Secured (c) Entrusted (d) Offline
SECTION B: THEORY