Professional Documents
Culture Documents
1. Revision
2. The Art of Information processing
3. Process of Information Transmission 1
4. Process of Information Transmission 2
5. Medium of Information Transmission
6. Mid Term Break
7. Computer Ethics
8. Safety Measures
9. Operating System 1
10.Operating System 2
11.Revision
12.Examination
WEEK 1 – 4
THE ART OF INFORMATION PROCESSING / PROCESS OF INFORMATION
TRANSMISSION 1/ PROCESS OF INFORMATION TRANSMISSION 2 /
MEDIUM OF INFORMATION TRANSMISSION
THEORY
1. Explain the following terms
i. Information Transmission
ii. Information analysis
iii. Information processing
iv. Digital information (8 Marks)
2. Compare wireless and cable communication (6 Marks)
3. List and explain 5 ancient methods of transmitting information (10 Marks)
4. State and explain 5 modern methods of transmitting information (10 Marks)
5. List and explain 2 means of transmitting information with 2 examples each (10
Marks)
6. Explain the 3 modes of receiving information (6 Marks)
(WABP Information and Communications Technology for JSS 1 by Olatunde Akano
et al, Page 88)
7. What is chart (5 Marks)
8. How does a radio carry information (10 Marks)
9. What is the use of a cell phone (10 Marks)
10.How are maps and charts related (10 Marks)
11.What does collation refer to? (10 Marks)
12.What is the use of a TV? (10 Marks)
13.What is COMMSAT? (10 Marks)
14.What all can you find in a newspaper (10 Marks)
(Data Processing textbook for SS1 by Adedapo F.O Page 124)
15.Define printing as a means of information transmission (10 Marks)
16.Describe the use of a computer in information transmission (10 Marks)
17.What is an electronic device? give 5 examples (10 Marks)
18.What are non-electronic devices? List 5 examples (10 Marks)
(Questions 14 – 17 is from Basic Science & Technology, Information Technology:
Textbook JSS1 by A.S. Omotuyole Page 32)
WEEK 5
COMPUTER ETHICS
1. All of the followings are ways of taking care of computer except…………
(a) Making use of a stabilizer (b) Ensure that the computer is covered when not is use
(c) An engineer should be called to repair the fault (d) The computer should be moved up
and down
2. Stabilizer should be used in order to prevent high current voltage when using computer
(a) True (b) False (c) True & false (d) None of the above
3. Computer room management ethics include the following except
(a) Maintaining dust free environment (b) Appropriate ventilation (c) Appropriate lighting
system (d) Appropriate darkness system
4. The following must not be brought into the computer room except
(a) Water and Food (b) Appropriate ventilation (c) Appropriate lighting system
(d) Appropriate darkness system
(Basic Science & Technology; Information Technology Workbook Page 21 Q1-4)
5. Computers are very sensitive to the following except ________ (a) Dust (b) Humidity
(c) Noise making (d) Power supply
6. Among computer ethics is the use of rug, this is done in order to (a) Reduce ventilation
(b) Increase coolness (c) Prevent theft (d) Suppress dust
7. A set of moral principles that regulates the use of computer is called ________ (a) Use
of computer (b) Computer ethics (c) Computer problem (d) Computer core
8. The following are computer ethics except ________ (a) Avoid liquid dropping unto the
system (b) Using dust cover (c) Checking email regularly (d) Invasion of privacy
9. Another name for computer room is __________ (a) Computer laboratory (b) Computer
library (c) Computer store (d) Computer house
10. Computer room must not be used for _________ (a) Teaching (b) Learning (c)
Researching (d) Resting
11. Computer system comprises of the following except ________ (a) Hardware (b) People
ware (c) Software (d) Share ware
12. Rules in the computer room are the following except ________ (a) Arranging chairs in
a comfortable way (b) Use dust cover to cover the system (c) Do not put computer on the
floor (d) Use wet towel to clean the computer
13. The ethical issues that concerns the collection and the use of data about individuals is
called ________ (a) Behavior (b) Identification (c) Information (d) Privacy
14. __________ is a program used to prevent virus or remove virus from a computer
system (a) Microsoft word (b) Anti- virus (c) Virus (d) Operating system
15. Which of the following would be considered as an ethical access to computer?
(a) Changing your grades from the schools main office (b) Using the computer catalogue to
search for book (c) Reading confidential information from a government database
(d) Changing misspelt words on the schools website
16. An honest moral code that should be followed while using the computer is _________
(a) Safety measures (b) Computer ethics (c) Moral laws (d) Computer roles
17. For the Safety of computer operators, you must do the following except _________
(a) Illuminating the computer room (b) Maintaining dust free environment (c) Keep liquid
in the computer room (d) Sit in a correct posture while using the system
18. The use of _________ will protect the computer against power problems (a) Network
(b) UPS (c) ICT (d) Internet
19. __________ refers to the necessary precautions taken when using the system
(a) Morals (b) Safety measures (c) Computer ethics (d) Network
20. All the following are examples of real security and privacy except________
(a) Hackers (b) Identity theft (c) Virus (d) spam
(Basic Science & Technology; Information Technology Textbook Page17 Q5-20)
(THEORY)
1. List 5 ways of taking good care of computers (10 Marks)
2. State 5 rules and regulations in the computer room (10 Marks)
3. Mention 4 reasons for appropriate use of the computer (8 Marks)
4. What is computer ethics (2 Marks)
(WABP Information and Communications Technology for JSS 1 by Olatunde Akano
et al, Page 88)
5. What is spam and phishing
6. What is the importance of dust free environment
(Data Processing textbook for SS1 by Adedapo F.O Page 124)
WEEK 6
SAFETY MEASURES
1. How can you keep your computer and other devices safe from harm? (a) Eat snacks and
have drinks beside your computer (b) Use your laptop as a table for food and drink (c) Use
your computer in a workspace away from food and drink (d) Grab your device with one
hand to move it around.
2. What should you do if someone other than a parent asks for your computer password?
(a) Give it to them if they seem trustworthy. (b) Do not give them your password.
(c) Give it to them, but then change your password the next day.
(d) Give them someone else's password instead.
3. Where should you go to control the types of websites you can go to online?
(a) Bookmarks (b) Settings (c) Browser history (d) Tools
(Question 1-3; https://study.com/academy/practice/computer-safety-quiz-worksheet-
for-kids.html)
4. A small piece of computer code that can repeat itself and spreads from one computer to
another by attaching itself to another computer file. (a) Virus (b) Worms (c) Spyware (d)
Ransom ware
5. Self- repeating and do not require a computer program to attach themselves
(a) virus (b) Worms (c) Spyware (d) Ransomware
6. _______ can be installed on the computer automatically when the attachments are open,
by clicking on links or by downloading infected software (a) virus (b) Worms (c) Spyware
(d) Ransom ware
7. A type of malicious program that demands payment after launching a cyber-attack on a
computer system (a) virus (b) Worms (c) Spyware (d) Ransomware
8. Trojan is one of most common (a) virus (b) Worms (c) Spyware (d) Ransom ware
9. A type of computer crime used to attack, steal user data, including login name, password
and credit card numbers (a) Phishing (b) Pharming (c) Man-in-the-middle attack
(d) Cookies
10. A scamming practice in which malicious code is installed on a personal computer or
server, misdirecting users to fraudulent web sites without their knowledge or permission.
(a) Phishing (b) Pharming (c) Man-in-the-middle attack (d) Cookies
11. An attack where the attacker secretly relays and possibly alters the communication
between two parties who believe they are directly communicating with each other (a)
Phishing (b) Pharming (c) Man-in-the-middle attack (d) Cookies
12. Which of the following deals with procedures, practices and values? (a) Piracy (b)
programs (c) virus (d) computer ethics
13. Commercial programs made available to the public legally are known as (a) freeware
(b) wares (c) free soft (d) software
(Question 4-13; http://aptitude.brainkart.com/topic/chapter-17--computer-ethics-and-
cyber-security-314/)
14. Which one is not a social media website? (a). Facebook (b) Pinterest
(c) Google (d) Twitter
15. Which one is not an act of software piracy?
(a). Buy your own licensed copy of software.
(b). Make a copy of the licensed software and distribute it to others.
(c). Buy only one copy of software but install it in more than one computer.
(d). Give your friend a copy of the music CD you bought online.
16. Which one is the safety measure for children to be taken while working online?
(a). Don’t buy anything online without your parent’s permission.
(b). Don’t respond to any message that makes you feel uncomfortable.
(c). Acknowledge the online information used in your school assignments/projects.
(d). All of these.
17. Which one is not a cybercrime?
(a). Peep into someone else’s computer when he is entering e-mail password
(b). Unauthorized access to information (c). Steal a brand new computer
(d). Send hate messages to your friend
18. You should take parents’ permission: (a) to share your password (b) to
post personal videos or photos. (c) to buy anything online (d) All of these.
(Question 14-18; https://www.happycompiler.com/ethics-safety/)
19. Is the illegal access to the network or computer system.
(a) Security (b) Cracking (c) Virus (d) Piracy
20. Running other software on idle computer without the knowledge of the organization is
called theft of ____ (a) Software (b) Computer (c) Computer time (d) Use
(Question 19-20; https://meritnotes.com/computer-quiz/computer-ethics-quiz/2-6894/)
THEORY
1. State 5 safety measures that needs to be taken when using the computer (5 Marks)
2. What are the security measures you can take to protect the computer room and gadgets?
(10 Marks)
3. Mention some precautions you can take to maintain order and safety in the computer
room (10 Marks)
Comprehensive Computer Studies for Junior Secondary Schools 2 UBE 8. Page 72
(by A. S. Omotuyole)
4. Discuss 5 security measures that should be provided in a computer room (10 Marks)
WABP Information and Communications Technology Textbook for JSS 1 by
Olatunde Akano et al, Page 24.
5. What are the point to be kept in mind while using a computer
WEEK 7 & 8
OPERATING SYSTEM
1. Which of the following is not an operating system? (a) Windows (b) Linux (c) Oracle
(d) DOS
2. What is the maximum length of the filename in DOS? (a) 4 (b) 5 (c) 8 (d) 12
3. When was the first operating system developed? (a) 1948(b) 1949 (c) 1950 (d) 1951
4) When were MS windows operating systems proposed? (a) 1994 (b) 1990 (c) 1992
(d) 1985
5) Which of the following is the extension of Notepad? (a) .txt (b) .xls (c) .ppt (d) .bmp
6) What else is a command interpreter called? (a) Prompt (b) kernel (c) shell
(d) command
7) What is the full name of FAT? (a) File attribute table (b) File allocation table (c) Font
attribute table (d) Format allocation table
8) BIOS is used______ (a) By operating system (b) By compiler (c) By interpreter (d) By
application software
9) What is the meaning of Booting in the operating system? (a) Restarting computer
(b) Install the program (c) To scan (d) To turn off
10) When does page fault occur? (a) The page is present in memory. (b) The deadlock
occurs. (c) The page does not present in memory. (d) The buffering occurs.
11) Banker's algorithm is used _________ (a) To prevent deadlock (b) To deadlock
recovery (c) To solve the deadlock (d) none of these
12) When you delete a file in your computer, where does it go? (a) Recycle bin (b) Hard
disk (c) Taskbar (d) none of these
13) Which is the Linux operating system? (a) Private operating system (b) Windows
operating system (c) Open-source operating system (d) None of these
14) What is the full name of the DSM? (a) Direct system module (b) Direct system
memory(c) Demoralized system memory (d) Distributed shared memory
15) What is the full name of the IDL? (a) Interface definition language (b) Interface direct
language (c) Interface data library (d) None of these
16) What is bootstrapping called? (a) Cold boot (b) Cold hot boot (c) Cold hot strap
(d) Hot boot
17) What is the fence register used for? (a) To disk protection (b) To CPU protection
(c) To memory protection (d) None of these
18) If the page size increases, the internal fragmentation also ________ (a) Decreases (b)
Increases (c) Remains constant (d) None of these
19) Which of the following is a single-user operating system? (a) Windows (b) MAC
(c) MS-DOS (d) None of these
20) The size of virtual memory is based on which of the following? (a) CPU (b) RAM
(c) Address bus (d) Data bus
21) If a page number is not found in the translation look aside buffer, then it is known as a?
(a) Translation Look aside Buffer miss (b) Buffer miss (c) Translation Look aside Buffer
hit (d) All of the mentioned
22) Which of the following is not an application software? (a) Windows 7 (b) Word Pad
(c) Photoshop (d) MS-excel
23) Which of the following supports Windows 64 bit? (a) Window XP (b) Window 2000
(c) Window 1998 (d) None of these
24) Which of the following windows does not have a start button? (a) Windows 7
(b) Windows 8 (c) Windows XP (d) None of these
25) Which of the following operating systems does not support more than one program at a
time? (a) Linux (b) Windows (c) MAC (d) DOS
26) Which of the following is a condition that causes deadlock? (a) Mutual exclusion
(b) Hold and wait (c) Circular wait (d) No preemption
27) Who provides the interface to access the services of the operating system?
(a) API (b) System call (c) Library (d) Assembly instruction
28) Where are placed the list of processes that are prepared to be executed and waiting?
(a) Job queue (b) Ready queue (c) Execution queue (d) Process queue
29) Who among the following can block the running process? (a) Fork (b) Read (c) Down
(d) All of these
30) Which of the following does not interrupt the running process? (a) Timer interrupts (b)
Device (c) Power failure (d) Scheduler process
31) What is Microsoft window? (a) Operating system (b) Graphics program (c) Word
Processing (d) Database program
32) Which of the following is group of programs? (a) Accessories (b) Paint (c) Word (d)
All of above
33) Which of the following is an example of a Real Time Operating System?
(a) MAC (b) MS-DOS (c) Windows 10 (d) Process Control
34) Which of the following operating systems do you use for a client-server network?
(a) MAC (b) Linux (c) Windows XP (d) Windows 2000
35) Which windows was introduced to My Computer?
(a) Windows 10 (b) Windows XP (c) Windows 95 (d) Windows 98
36) What type of commands are required to perform various tasks in DOS?
(a) Internal commands (b) External commands (c) Valuable commands (d) Primary
commands
37) What is the number of characters contained in the primary name of the file of MS-
DOS? (a) Up to 8 characters (b) 3 characters (c) Up to 10 characters (d) None of the above
38) Which command is used to fetch a group (.doc) of files that have just been deleted?
(a) Undelete (b) Undelete/all (c) Undelete *.doc (d) All of above
39) Which of the following is system software? (a) Operating system (b) Compiler
(c) Utilities (d) All of the above
40) Which program runs first after booting the computer and loading the GUI?
(a) Desktop Manager (b) File Manager (c) Windows Explorer (d) Authentication
(https://www.javatpoint.com/operating-system-mcq)
THEORY
1. Explain the main purpose of an operating system?
2. What is multitasking?
3. Differentiate internal commands from external commands.
4. What are the advantages of a multiprocessor system?
( https://career.guru99.com/top-50-operating-system-interview-questions/amp/)
5. What is the relationship between operating systems and computer hardware?
6. What is the difference between Job and Process
7. What are the advantages of multiprogramming?
(https://www.tutorialspoint.com/operating_system/os_exams_questions_answers.htm)
8. What is meant by GUI? Name a popular GUI.
9. What purpose does the operating system serve to the computer and the user?
10. What is the difference between copying and moving files and folders?
(https://amitabhsirkiclasses.org.in/operating-system-theory-questions/)