Third Term Examination
Class : JSS 2
Subject : Computer Studies / ICT
Name : _____________________________________
Instruction : Answer all questions correctly.
1. What is used to separate the two part of an email address? (a) an at @ symbol (b) number sign (c) An asterisk (d) An underline
2. _________ is a software used to enable computer user locate and access Web pages. (a) Web mobile (b) Email browsers (c) Web browser (d)×Phone browsers
3. Which one of the following protocol is not used in the internet? (a) .HTTP (b) .DNS (c) .URL (d) None
4. Every domain name contains a TLD that identifies the type of organisation which is associated with the term TLD is an acronym for _____________. (a) Top League Division (b) Translated Language Domain (c) Test Level Data (d) Top Level Domain
5. The first page retrieved when accessing a website is ___________. (a) Menu (b) Web page (c) Homepage (d) Hyperlink
6. _________ is a program loaded onto your computer without your knowledge and runs against your wishes. (a) Virus (b) Proxy (c) Worm (d) None of the above
7. The authorized use of computer and network resources is known as __________. (a) Hacking (b) Open proxy (c) Login (d) Dictionary attack
8. The fraudulent process of attempting to acquire sensitive information such as username, password or credit card details known __________. (a) Phishing (b) Hacking (c) Spamming (d) Probes
9. ___________ is the fundamental unit that connect two computer networks of different network architecture. (a) Host (b) Gateway (c) Server (d) Client
10. _________ is a collection of Web pages, images videos and other digital asset. (a) Website (b) Internet (c) Computer (d) Email
11. In a __________ design, one computer or dedicated storage device acts as a central storage unit for the network. (a) Client server (b) Peer to peer (c) Bus topology (d) Protocol
12. All are examples of search engines except _________. (a) Ask.org (b) Google.com (c) Yahoo.com (d) Cha-cha.com
13. UPS stands for _________________________. (a) Uninterrupted Power Supply (b) United Power Supply (c) Unlimited Power Supply (d) Unimaginable Power Supply
14. Which of these is not a safety measure when using a computer? (a) Using antiglare protection for your eyes (b) Water should be allowed into the computer room (c)The computer room should be well illuminated (d) Marking use of UPS and stabilizers
15. Atm means _____________. (a) Activated Teller Mercury (b) Automated Teller Machine (c) Automatic Teller Mercury (d) Automated Teller Mercury
16. The following are the uses of graphic packages except __________. (a) It is used to produce cover pages for magazines, newspapers and journals (b) It is used to create images (c) It is used for designing certificates and ID cards (d) It is used for word processing
17. Convert 110two to decimal (a) 2 ten (b) 4 ten (c) 6 ten (d) 8 ten
18. The use of ICT has reduced the whole world to _________. (a) Global image (b) Global system (c) Global village (d) Global town
19. ROM represents ___________. (a) Read Online Messages (b) Read Only Memory (c) Read On Memory (d) Read On Mass
20. The step by step method for solving a problem is called _________. (a) Algorithm (b) Flowchart (c) Documentation (d) Test
21. Line number in Basic programming is used to ___________. (a) Order the sequence of executing basic program (b) Close the screen (c) for comment (d) type information
22. The Octal system uses the digits ranging from ___________. (a) 1 – 8 (b) 1 – 9 (c) 0 – 8 (d) 0 – 7
23. A diagrammatic representation of logical steps in a program is called __________. (a) system (b) Flowchart (c) Pie chart (d) Bar chart
24. The following are disadvantages of ICT except ___________. (a) Fraud (b) Access to information (c) Job loses (d) Piracy of software
25. The magnifier icon in paint is used for __________. (a) Erasing (b) Colouring (c) Zooming (d) Drawing
26. Computer network is ___________ of two or more computers. (a) interconnection (b) repairing (c) hiring (d) working
27. The process of sending and receiving messages electrically through the computer and telephone at fast speed is ______________. (a) web mail (b) E-mail (c) compiler (d) Electronic modulator mail
28. Electronic banking requires one of the following __________. (a) telephone only (b) fax machine (c) computer and internet (d) telex
29. The guidelines for the morality acceptable use of computers in society is called __________. (a) privacy (b) morality (c) Computer ethics (d) Legal system
30. Which of the E-mail address is correct? (a) tolulope@gmail.com (b) TOLULOPE@GMAIL.COM (c) tolulope@GMAIL.COM (d) TOLULOPE@gmail.com.
Section B : Theory
Answer all questions .
1a. What is a Web browser?
1b. List three types of Web browser
1c. Write down the steps in creating an E-mail account.
2a. Write short note on the following:
i. Website – _________________________________
ii. URL – ____________________________________
iii. Hyperlink – ______________________________
2b. List three benefits of using the internet.
2c. List two abuses of using the internet.
3a. Define internet
3b. Explain the following :
i. Peer to Peer Network
ii. Client Server Network
3c. List five examples of search engines.
4a. Define Computer ethics
4b. Mention three computer ethics that you know.
4c. State two safety measures in a computer room.