Third Term Examination
Class : JSS 1
Subject : Computer Studies / ICT
Name : _____________________________________
Instruction : Answer all questions correctly.
1. Computer is used in education for the following except _________. (a) E-learning (b) E-Library (c) E-chopping (d) E-Database
2. Usefulness of computers at home include the following except __________. (a) playing games / watching TV (b)×internet access (c) eating food (d) recreational purpose
3. The process by which computer is switched off after use is called ____________. (a) booting (b) System loading (c) shutdown (d) switch off
4. Which of these is a feature of computer? (a) It works on a very high speed (b) It is reliable (c) It is consistent (d) all of the above
5. The title bar displays __________________. (a) Formatting toolbar (b) the headings for each drop menu (c) the name of the program and the title of the current document (d) information about the active document
6. VDU means ___________________________. (a) Visual Discount Unit (b) Visual Display Unit (c) Video Display Unit (d) Visible Display Unit
7. Computer room must not be for _________. (a) drinking (b) researching (c) teaching (d) practical assignment
8. ICT tools enable people to do the following except ___________. (a) access information (b) share information (c) analyse information (d) cook information
9. Data which has been processed to a more useful and meaningful form is known as ___________. (a) processed data (b) message (c) information (d) meaningful
10. Conversion of data to information is a process called ____________. (a) Information processing (b) data processing (c) word processing (d) computer processing
11. Raw facts in computer environment is called _________. (a) output (b) information (c) data (d) E-mail
12. Benefits of ICT includes the following except _____________. (a) access to information (b) job losses (c) innovative ways of interaction (d) speed up transaction
13. The bar located below the Title bar is ___________. (a) status bar (b) tool bar (c) menu bar (d) scroll bar
14. To save an existing document with a different file name, click ___________________. (a) Save on the Office button (b)Save button on the standard toolbar (c) Save as button on the office button (d)” Save as button on the standard toolbar
15. Which of these equipment helps to retain power for normal shutdown of the computer system is called _______________? (a) UPS (b) stabilizer (c) surge protector (d) generator
16. Keyboard cannot be used for the following except ____________. (a) Entering data (b) Watching (c) Eating (d) Running
17. Standard keyboard is numbered from ________. (a) F1 – F12 (b) F1 – F10 (c) F1 – F13 (d) F1 – F14
18. Keyboard is an example of ________ device. (a) Output (b) Input (c) System Unit (d) CPU
19. One of the following is not an input device. (a) Mouse (b) Printer (c) Plotter (d) Keyboard
20. Poor ventilation in the computer room may lead to _________. (a) Straining of the eyes (b) System overheating (c) Noise making (d) Program overloading
21. Maintaining a dust free environment means ___________. (a) Keeping dust (b) Taking care of dust (c) Keeping the computer away from dust (d) Making sure that dust is free from the air
22. The computer room can also be referred to as ___________. (a) Ware house (b) Computer laboratory (c) Computer hall (d) Computer premises
23. All except one is not allowed in the computer room. (a) Noise making (b) Eating (c) Running (d) Typing
24. Computer ethics means the standard of conducts as they relate to computer ____________. (a) Operation (b) Users (c) Analyst only (d) Machine
25. The set of rules which govern the computer __________ is called the computer room management ethics. (a) warehouse (b) professionals (c) laboratory (d) users
26. The equipment installed in the computer room to prevent erratic power supply from damaging our equipment is called __________. (a) Stabilizer (b) UPS (c) Power and signal cables (d) Power pack
27. Which of the following is a misuse of the computer? (a) Hacking (b) Protection from power problem (c) Using dust cover (d ) Anti-virus installation
28. Which of the following means unlawful duplication of any copyrighted material? (a) Spamming (b) Piracy (c) Plagiarism (d) Scam
29. A computer program designed specially to cause a malfunctioning of the computer system is called _________. (a) Virus (b) Pirate (c) Antivirus (d) Flame
30. Cyber war refers to _________. (a) Crime against humanity (b) The display of indecent pictures or images (c) A crime committed in a cyber Cafe (d) The negative use of the computer to damage information system
Section B : Theory
Instruction : Answer all the questions.
1a. Write the full meaning of the following:
i. UPS – _____________________________________
ii. ICT – ______________________________________
1b. List four examples of ICT gadgets
i. ___________________ ii. ____________________
iii. __________________ iv. ____________________
2a. Define Computer ethics
2b. State two uses of ICT in our everyday life
3a. Define Word Processing
3b. List five examples of Word Processor
3c. List three uses of Word processor