First Term Examination
Class : JSS 3
Subject : Computer Studies
Time : 2 Hours
Name : ___________________________________
Section A : Objective Questions
Instruction : Read the question carefully and choose from the alternatives lettered a – d.
1. The difference between the people with access to computer s and the internet and those without this access is known as ___________. (a) Access. (b) Digital divide (c) Internet (d) Web
2. In a logical state, __________ is the output value of “Off”. (a) 1 (b) 0 (c) 1,0. (d) 0 and 1
3. There are_________ basic operators in the logic gate technology. (a) 6 (b) 5 (c) 4 (d) 3
4. The web browser is also known as ___________. (a) Yahoo (b) Search engine (c) Uploading (d) Downloading
5. A program used in protecting and detecting virus in the computer system is called __________. (a) Database (b) Anti – virus program (c) High level program (d) Diskette program
6. Which of the following has only one input? (a) NAND (b) EX-OR Gate (c) Not Gate (d) OR Gate
7. The process of transferring files from the internet to the computer is called ___________. (a) Uploading (b) Booting (c) Downloading (d) Editing
8. The following are computer professionals except ____________________. (a) Computer Educator (b) Computer Users (c) Computer Engineer (d) Computer Manager
9. The following are the features of new economy except __________. (a) It is digital (b) It is technology driven (c) bIt is labour based (d) Time, space and distance are irrelevant
10. ______________ carries out feasibility Studies on a system. (a) System Analyst (b) Computer Engineer (c) Database Administrator (d) Network Manager
11. The following are viruses except ____________. (a) Trojan Horse (b) Ping pong (c) Adam and Eve (d) Kaspersky
12. ____________ is a program that makes the computer to malfunction. (a) HIV/AIDS (b) Anti-virus (c) Computer Guru (d) Computer Virus
13. The following are sources of virus except __________. (a) CD-ROM (b) E-mail (c) Diskette (d) Keyboard
14. What is the output of the OR gate below? (a) 1101 (b) 1001 (c) 1010 (d) 1111
15. __________ is an example of search engine. (a) Mozilla Firefox (b) Google (c) Internet Explorer (d) Google Chrome
16. Which of the following is needed to have access to the internet? (a) speaker (b) modem (c) printer (d) photocopy
17. The information sharing model that is built on the internet is ______________. (a) Wide World Wen (b) World Wide Web (c) Wen World Wide (d) None of the above
18. A digital device is a /an _______________ device that can receive, store, process or send digital information. (a) electronic (b) wire (c) cave (d) cutting
19. The internet address may refer to the name of a ______________. (a) Web site (b) Web plan Web account (d) Web light
20. Which of these is a digital device? (a) dull phones (b) smart phones (c) fine phones (d) blue phones
21. The ability to use digital technology is known as ___________ (a) digital literacy (b) digital keyboard (c) digital internet (d) digital teaching
22. Digital gurus are digitally ____________. (a) cultured (b) behaved (c) polite (d) literate
23. The knowledge and skills in using traditional computer is called ___________. (a) Digital literacy (b) Computer literacy (c) book literacy (d) technology literacy
24. All these are notable characteristics of an MS-DOS Excel window. (a) cell (b) row (c) column (d) cardinal point
25. Computer spreadsheet cell that is highlighted with a heavy border is a ____________. (a) active cell (b) cell containing formula (c) locked cell (d) cell
26. In a computer spreadsheet, tool used to construct formula is called ___________. (a) formula bar (b) filter (c) auditing toolbar (d) format printer
27. The database environment has all of the following components except ________. (a) Users (b) Separate files (c) Database (d) Database administrator
28. __________ is an organized collection of data. (a) database (b) Web base (c) call base (d) details base
29. Many small business start out using ___________. (a) Bes spread (b) Spread sheet (c) spread data (d) data bed
30. Which two files are used during operation of DBMS? (a) query language and utilities (b) data manipulation language and query language (c) data dictionary and query language (d) None of the above.