Professional Documents
Culture Documents
SUBJECT: ICT
CLASS: JSS 2 TIME: 2 HOURS
Please do not open this question booklet until you are told to do so.
While you are waiting, read the following instructions carefully.
INSTRUCTIONS TO STUDENTS
2. Write your Name, Subject, and your class boldly written on the answer sheet provided. Also, write and
shade appropriately Date of Exam, your DOB, Student ID & your Examination number, where applicable, in
the spaces provided.
3. Answer each question by shading the box that corresponds to the option you have chosen.
4. Do not waste time on any question. If you find any difficult, go to the others and finish them before you
come back to the difficult one(s).
5. There must not be more than one shading for an answer. Any shading with more than one box will be
marked wrong.
6. If you change your mind about an answer, completely erase the first shading.
Turn Over
1
SECTION A
3
b) Separate form e) None of the above
c) Continuous form 36. An excel workbook is a collection of
d) Hard form a) Workbooks
e) Real form b) Worksheets and sometimes chart sheets
30. A computer ________ is a malicious code c) books
which self-replicates by attaching itself to d) only worksheets
other programs. e) Cells
a) program 37. At the most basic level, a spreadsheet
b) virus contains ___ for entering data.
c) application a) Cells
d) worm b) Rows
e) crawler c) Columns
31. ____is a set of instructions secretly d) Workbooks
incorporated into a program so that if a e) worksheets
particular condition is satisfied or when a 38. Which of these industries are not involved in
particular time is reached, they will be carried the old economy
out, usually with harmful effects. A. Steel
a) Logic bomb B. Automobile manufacturers
b) virus C. GSM
c) malware D. Energy
d) worm E. None of the above
e) spyware 39. When researching on the Internet you should
32. The very first workbook opened in Excel will A. always use the first site listed, because
have a default name of it's the most popular
A. FirstBook B. just pick one because their all good
B. Workbook1 resources
C. Worksheet1 C. use one that has a .com extension
D. Sheet1 D. investigate a few, then compare and
E. Book1 contrast to find repeated facts
33. Viruses can be contracted through the E. none of the above
following means except ____ 40. ____ can detect and remove malware from a
a) clicking on email attachments computer system.
b) clicking on unknown links a) Malware remover
c) booting your devices from unknown b) PC cleaner app
CDs c) Anti-virus programs
d) Getting software from legitimate d) Utility software
sources e) Disk scanner
e) Clicking on unknown links 41. __ files have the extension of .accdb
34. In MS Excel, cells are named using a) Excel
a) Numbers b) PowerPoint
b) Letters c) Word
c) A number and a letter d) Access
d) A column letter and the row number e) Paint
e) User defined names 42. Which of the following is not a database
35. An enterprise DBMS is object?
a) Used for personal purposes a) Table
b) Can handle one query at a time b) Queries
c) process large organizational and c) Relationships
workgroup data d) Reports
d) designed for smaller, simpler e) All of the above
database applications
4
43. Apart from cells, which area in an excel c) 41A
window allows entering values and formulas d) A21B
a) Title bar e) AA51
b) Menu bar 52. Which is an example of a formula?
c) Formula bar a) =A1+A2
d) Standard toolbar b) =add(A1:A2)
e) All of the above c) A1+A2
44. A report can be generated from d) SUM(A1:A2)
A. A query e) None
B. A table 53. What is the symbol for dividing in Excel?
C. A record a) /
D. All of the above b) %
E. A and B above c) &
45. A field that uniquely identifies records in a d) #
database.is e) ÷
A. A table key 54. You want to record experiment information
B. A secondary key and create a chart that shows the rate of
C. A delete key crystal growth over a period of time. The best
D. A primary key application to use would be:
E. A Storage key a) word processing
46. In spreadsheets, ___ are descriptive pieces of b) spreadsheet
information entered in the worksheet. c) database
a) Constants d) graphics
b) Variables e) presentation
c) Labels 55. ___ database model supports both one-to-
d) Formulae many and many-to-many relationship.
e) Letters a) Network
47. The ___ function in Excel is used to determine b) Relational
the number of cells with numeric values. c) Hierarchical
a) MIN d) Flat file
b) NUMBER e) All the above
c) VALUES 56. Function which causes retrieval of any kind of
d) COUNT data from database is considered as
e) MAX a) key
48. A function inside another function is called b) query
_______ c) structure
a) Nested function d) storing cycle
b) Round function e) form
c) Sum function 57. In database tables, values of one type are
d) Text function grouped as a ___
e) Concatenated function a) file
49. A resident virus resides in the computer's * b) record
a) memory c) field
b) removable disks d) cell
c) boot sector e) range
d) hard disk 58. In order to perform a calculation in a
e) files spreadsheet, you need to use a:
50. J’hy a) Table
51. Give me an example of a cell address. b) Formula
a) 11 25 c) Field
b) 911 d) Variable
5
e) All of the above 60. The active cell:
59. What happens when dollar signs ($) are a) is defined by a bold border around
entered in a cell address? (ex. $B$2:$B$10) the cell.
a) An absolute cell address is created b) Receives the data the user enters.
b) Cell address will change when it is c) It is the formula bar.
copied to another cell. d) contains numerical values
c) The sheet tab is changed. e) Only A and B
d) The status bar does not display the
cell address.
e) All of the above
SECTION B
Answer only FOUR questions
1. a. In a tabular form, outline 2 differences between primary and secondary memory. (4
marks)
b. With examples, differentiate between a formula and a function in spreadsheet packages. (6
marks)
2. a. Write in full any 3 computer professional bodies in Nigeria. (6
marks)
b. The Internet has become so widespread that almost everyone has access to it. But with this
access comes a lot of misuse. Mention any 4 ways it is being misused. (4
marks)
3. Write short notes on the 2 categories of low level programming languages and the high level
programming languages. (10
marks)
Network
Relational
(7
marks)
b. Show diagrammatically, the database elements in their hierarchy, starting from the smallest (3
marks)
6
7