You are on page 1of 7

JESUIT MEMORIAL COLLEGE MBODO ALUU PORT HARCOURT

THIRD EXAMINATION, 2018/2019 ACADEMIC SESSION

SUBJECT: ICT
CLASS: JSS 2 TIME: 2 HOURS

Please do not open this question booklet until you are told to do so.
While you are waiting, read the following instructions carefully.

This paper consists of two


sections: I & II. Section I consist of sixty (60) multiple-choice questions and Section II consists of five essay
questions, out of which you are to answer FOUR. Both sections will last for 2 hours.

ANSWER ALL QUESTIONS IN SECTION A7y

INSTRUCTIONS TO STUDENTS

1. Use HB pencil only

2. Write your Name, Subject, and your class boldly written on the answer sheet provided. Also, write and
shade appropriately Date of Exam, your DOB, Student ID & your Examination number, where applicable, in
the spaces provided.

3. Answer each question by shading the box that corresponds to the option you have chosen.

4. Do not waste time on any question. If you find any difficult, go to the others and finish them before you
come back to the difficult one(s).

5. There must not be more than one shading for an answer. Any shading with more than one box will be
marked wrong.

6. If you change your mind about an answer, completely erase the first shading.

7. Do not start until the Supervisor tells you to do so.

Turn Over
1
SECTION A

1. Programs designed to perform specific tasks e) User manager


are known as 8. A named storage location capable of holding
a) System software data that can be modified during the
b) Utility programs execution of a program is a
c) Operating system a) Constant
d) Application software b) Loop
e) Speed c) Variable
2. What is the main purpose of a copyright? d) Number
e) String
a) To protect the user of a copyright?
b) To protect the buyer of a creative
9. ___ is not a component of a flowchart
work. diagram.
c) To protect the creator of a creative a) Input
work. b) Output
d) To protect the copier of a creative c) Definition
work. d) Process
e) To keep a creative work safe e) Decision
3. Convert decimal 36 to binary. 10. The exchange of voice communication
a) 00110100 through an Internet connection is called
b) 01000010 a) Online chat
c) 00100100 b) Email
c) Streaming Online
d) 01100010
d) VOIP
e) 10010000
e) Instant Messaging
4. One of the following is also known as a
11. The following are characteristics of analogue
service program?
computers except _____
a) Translator
a) Its values are definite
b) Executive
b) Measures physical quantities
c) Utility program
d) Operating system c) It represents continuous values
e) Device drivers d) Time is continuously observed
5. What component of a computer system holds e) None of the above
the operating system when the computer is 12. One of the negative effects of ICT is ___
not running? a) Globilisation
a) Floppy disk b) Innovation
b) Hard disk c) Creativity
c) USB d) Media Integration
d) RAM e) Internet addiction
e) All answer are correct 13. A computer that is not connected to a
6. Assembly Language ……………. network is a ___ computer.
a) Uses alphabetic codes instead of a) Client
binary numbers b) Solo computer
b) Is the earliest language to write c) Unnetworked
programs
d) Standalone
c) Need not be translated to machine
e) lonely
language
d) Is the only language understood by 14. ___ is a unique set of numbers that identifies
the computer a computing device on a network.
e) None of the above a) Network label
7. The OS functions as all the following except b) Device tag
a) Memory manager c) Binary number
b) Process manager d) IP address
c) Resource allocator e) IMEI number
d) Network manager
2
15. _____ is a combination of hardware and 22. Which of the following is not a search engine?
software that facilitates the sharing of a) Google
information between computing devices. b) Bing
a) Network c) EBay
b) Expansion card d) Amazon
c) Digital divide e) Opera
d) Peripheral 23. Which of the following is a correct format of
e) System combo Email address?
16. In MS Paint, which of the following indicates a) name@website@info
the current foreground and background b) www.nameofebsite.com
colours? c) name@website.info
a) Eraser d) name.website.com
b) Free-form e) info.com@gmail
c) Size 24. Blog is short for ______
d) Select a) Web log
e) Colour box b) Blue log
17. Search engines update their indexes with the c) Big log
use of ___ d) Band log
a) Web updater e) None of the above
b) Web crawlers 25. ______ is the term use to describe the
c) Online dictionary amount of functional phones in a
d) Internet managers geographical location
e) None of the above a) Teledensity
18. In ___ network topology, there is a central b) Telecommunication
controller or hub. c) Digital revolution
a) Star d) Technology flow
b) Mesh e) Digital divide
c) Ring 26. The followings are features of the new
d) Straight economy except…….
e) Linear a) It is digital
19. A person who attends to computers that have b) It is technology driven
broken down and maintains other computers c) Limited by time, space and distance
is known as ___ d) Involves continuous research
e) Knowledge base
a) Control staff
27. The followings are features of the new
b) Engineer
economy except…….
c) Updater
d) Librarian staff a) It is digital
e) technician b) It is technology driven
20. One of these is an international IT c) Limited by time, space and distance
professional body. d) Involves continuous research
a) CPN e) Knowledge base
b) NCS 28. The number of functional personal
c) IMIS computers in a population is a measure of
d) NIG __________
e) None a) Computerisation
21. ........... connects web pages on the internet. b) Information system
a) Connector c) Digital system
b) Link d) Digital divide
c) Hyperlink e) Digitization
d) Telelink 29. Analogue data are represented in ……………….
e) Cables a) Discrete form

3
b) Separate form e) None of the above
c) Continuous form 36. An excel workbook is a collection of
d) Hard form a) Workbooks
e) Real form b) Worksheets and sometimes chart sheets
30. A computer ________ is a malicious code c) books
which self-replicates by attaching itself to d) only worksheets
other programs. e) Cells
a) program 37. At the most basic level, a spreadsheet
b) virus contains ___ for entering data.
c) application a) Cells
d) worm b) Rows
e) crawler c) Columns
31. ____is a set of instructions secretly d) Workbooks
incorporated into a program so that if a e) worksheets
particular condition is satisfied or when a 38. Which of these industries are not involved in
particular time is reached, they will be carried the old economy
out, usually with harmful effects. A. Steel
a) Logic bomb B. Automobile manufacturers
b) virus C. GSM
c) malware D. Energy
d) worm E. None of the above
e) spyware 39. When researching on the Internet you should
32. The very first workbook opened in Excel will A. always use the first site listed, because
have a default name of it's the most popular
A. FirstBook B. just pick one because their all good
B. Workbook1 resources
C. Worksheet1 C. use one that has a .com extension
D. Sheet1 D. investigate a few, then compare and
E. Book1 contrast to find repeated facts
33. Viruses can be contracted through the E. none of the above
following means except ____ 40. ____ can detect and remove malware from a
a) clicking on email attachments computer system.
b) clicking on unknown links a) Malware remover
c) booting your devices from unknown b) PC cleaner app
CDs c) Anti-virus programs
d) Getting software from legitimate d) Utility software
sources e) Disk scanner
e) Clicking on unknown links 41. __ files have the extension of .accdb
34. In MS Excel, cells are named using a) Excel
a) Numbers b) PowerPoint
b) Letters c) Word
c) A number and a letter d) Access
d) A column letter and the row number e) Paint
e) User defined names 42. Which of the following is not a database
35. An enterprise DBMS is object?
a) Used for personal purposes a) Table
b) Can handle one query at a time b) Queries
c) process large organizational and c) Relationships
workgroup data d) Reports
d) designed for smaller, simpler e) All of the above
database applications

4
43. Apart from cells, which area in an excel c) 41A
window allows entering values and formulas d) A21B
a) Title bar e) AA51
b) Menu bar 52. Which is an example of a formula?
c) Formula bar a) =A1+A2
d) Standard toolbar b) =add(A1:A2)
e) All of the above c) A1+A2
44. A report can be generated from d) SUM(A1:A2)
A. A query e) None
B. A table 53. What is the symbol for dividing in Excel?
C. A record a) /
D. All of the above b) %
E. A and B above c) &
45. A field that uniquely identifies records in a d) #
database.is e) ÷
A. A table key 54. You want to record experiment information
B. A secondary key and create a chart that shows the rate of
C. A delete key crystal growth over a period of time. The best
D. A primary key application to use would be:
E. A Storage key a) word processing
46. In spreadsheets, ___ are descriptive pieces of b) spreadsheet
information entered in the worksheet. c) database
a) Constants d) graphics
b) Variables e) presentation
c) Labels 55. ___ database model supports both one-to-
d) Formulae many and many-to-many relationship.
e) Letters a) Network
47. The ___ function in Excel is used to determine b) Relational
the number of cells with numeric values. c) Hierarchical
a) MIN d) Flat file
b) NUMBER e) All the above
c) VALUES 56. Function which causes retrieval of any kind of
d) COUNT data from database is considered as
e) MAX a) key
48. A function inside another function is called b) query
_______ c) structure
a) Nested function d) storing cycle
b) Round function e) form
c) Sum function 57. In database tables, values of one type are
d) Text function grouped as a ___
e) Concatenated function a) file
49. A resident virus resides in the computer's * b) record
a) memory c) field
b) removable disks d) cell
c) boot sector e) range
d) hard disk 58. In order to perform a calculation in a
e) files spreadsheet, you need to use a:
50. J’hy a) Table
51. Give me an example of a cell address. b) Formula
a) 11 25 c) Field
b) 911 d) Variable

5
e) All of the above 60. The active cell:
59. What happens when dollar signs ($) are a) is defined by a bold border around
entered in a cell address? (ex. $B$2:$B$10) the cell.
a) An absolute cell address is created b) Receives the data the user enters.
b) Cell address will change when it is c) It is the formula bar.
copied to another cell. d) contains numerical values
c) The sheet tab is changed. e) Only A and B
d) The status bar does not display the
cell address.
e) All of the above

SECTION B
Answer only FOUR questions
1. a. In a tabular form, outline 2 differences between primary and secondary memory. (4
marks)
b. With examples, differentiate between a formula and a function in spreadsheet packages. (6
marks)
2. a. Write in full any 3 computer professional bodies in Nigeria. (6
marks)
b. The Internet has become so widespread that almost everyone has access to it. But with this
access comes a lot of misuse. Mention any 4 ways it is being misused. (4
marks)
3. Write short notes on the 2 categories of low level programming languages and the high level
programming languages. (10
marks)

4. a. Copy and complete the table below


Database Model Type of structure Type of relationship
supported
Hierarchical

Network

Relational

(7
marks)
b. Show diagrammatically, the database elements in their hierarchy, starting from the smallest (3
marks)

5. a. Explain any 3 types of computer viruses


(9marks)
b. One example of a search engine (1
mark)

ALL THE BEST!

6
7

You might also like