You are on page 1of 3

EMILIO PIAZZA a. Beginner’s All Symbolic a.

Slowing down of response


MEMORIAL COLLEGE Instruction Code time
48 OBI WALI ROAD RUMUIGBO b. Beginner’s All-purpose b. Presence of tiny dots      
PORT HARCOURT symbolic Instruction Code c. Incomplete file saving
SECOND TERM EXAMINATION c. Believer’s All-purpose d. All of the above
2020/2021 ACADEMIC SESSION Symbolic Instruction 17. Which of the following is
SUBJECT: COMPUTER SCIENCE Code                    not a language translator?       
CLASS: JSS 2 TIME: 2 HOURS d. Beginner’s All-purpose a. assembler 
SECTION A Synthetic Instruction Code b. compiler  
9. The native language of the c. interpreter              
OBJECTIVE computer is   d. terminator
1. Binary codes are used in a. Machine Language   18. The BASIC key word REM
which of the following b. BASIC Language    stands for  
programming language c. High Level Language   a. remark 
a. Machine language                d. PIDGIN language b. remain  
b. Assembly language  10. The following are sources of c. redo 
c. High level language         virus Except?         d. remember
d. None of above a. Infected memory card   19. The last statement in BASIC
b. E-mail attachment   programs is                   
2. The term gigabyte refers to c. Internet Downloads a. INPUT 
a. 1024 bytes  d. Secured File b. END 
b. 1024 kilobytes  11. One is not an example of a c. LET 
c. 1024 megabytes  computer virus d. FINISH
d. 1024 gigabyte a. Trojan horse 20. Programming language that
b. Sleeper allows for a program to be written
3. A byte consists of c. I love You in forms that are readable to
a. One bit  d. None of the above human beings is called 
b. Four bits                 12. Application software used a. Assembly language 
c. Eight bits  for performing accounting and b. Machine language 
d. Sixteen bits statistical calculations is called?    c. High level language 
a. Word processing d. all of the above
4. FORTRAN programming software      21. Utility programs are also
language is more suitable for b. Graphic software                  known as
a. Business Applications  c. Spreadsheet software      a. service program
b. Marketing Applications d. Utility software b. operating system
c. Scientific Applications  13. ______ Creates, updates and c. graphic program                  
d. None of the above    manages databases d. word processing software.
a. System analyst  22. Which of the following
5. Operating system, utility b. Programmer programs can be used for word
software and translators are types c. Database Admin.              processing?
of    d. Network Admin a. Notepad 
a. Application 14. A program that changes high b. CorelDraw                     
software                 level languages into machine c. MS Excel 
b. Hardware language is called  d. Paint
c. System software  a. translator              23. A UPS is a device that can
d. Translators b. BASIC  be used to:
c. java  A. Store electricity  
6. The following are examples d. Pascal B. store data for processing  
of application software C. protect the computer from
EXCEPT?   15. All the following are heat 
a. Graphic software examples of high-level languages D. blow of dust from within the
b. LINUX                  EXCEPT   computer
c. Spreadsheet software.  a. translator 
d. Word processing software b. BASIC 
c. C++     
7. A number system that uses d. Pascal 24. The importance of shutting
only two digits, 0 and 1 is called   down computer properly after use
a. Decimal number system  is to
b. Hexadecimal A. let it cool down      
c. Octal 16. _______ is a virus warning B. avoid damage memory files
d. Binary number system sign of the computer
8. The acronym for BASIC is C. make sure it is not stolen
D. protect it from virus
25. UPS stands for: D. Homepages 43. the term digital divide
A. Under power supply 34. All the following are ICT
B. Uninterruptable power gadgets EXCEPT? came into use the in the
supply  a. Pressing iron year ______
C. Uninterruptible petrol b. Facsimile machine
supply c. ATM a. 1990's
D. Use power sometimes d. Telex b. 1980's
26. The importance of 35. Which of these ICT gadgets
maintaining adequate and proper can permit two or more users to
c. 1999's
ventilation is to conduct conversion when they d. 2000's
A. avoid damage caused by are too far apart to be heard 44. convert 11 base ten to
heat directly:
B. prevent damage caused by a. Facsimile machine binary (base 2)
water b. ATM
C. prevent dust from damaging c. Telex
a. 1101
the computer d. Telephone b. 1011
D. avoid loss of data 36. _____ is a place which c. 1110
27. Some health-related provides internet access to the d. 1001
challenges while sitting at a public, usually for a fee.
computer include the following a. Browsing house 45. a gap between people
except? b. Cyber Cafe who have access to the use
A. Neck pain c. Home Cafe
of information technology
B. Backache d. None of the above
C. Eye strain 37. What does HTML gadgets and those who do
D. Stomach ache represent? not have is
28. All the following are a. Hyper Text Markup
features of graphic packages Language a. computer illness
except b. High Text movie language b. digital divide
A. tooth brush c. Have the major language
B. color Palette  d. All of the above c. retrieval
C. menu bar effizydonjoe@gmail.com d. old economy
D. tool bar 38. The address above is a/an
29. The following are examples a. Website address 46. printer is a/an
of Graphic packages EXCEPT? b. Email address ___device.
A. CorelDraw c. Homepage address
B. Photoshop d. Facebook address a. output
C. Harvard Graphics 39. The domain name of the b. input
D. MS-Word. address above is
30. The other name for Fill color a. @ c. processing
tool is b. Effizydonjoe d. storage
A. Paint bucket tool c. gmail.com 47. How many bits make up a
B. pick color tool d. effizydonjoe@gmail.com byte?
C. eraser tool 40.virus can enter into your a. 2
D. text tool
31. The computers are based on computer system b. 8
which type of number system c. 16
through using _____
A. Binary d. 4
a. infected diskette
B. Octal 48. Computer software are
C. Decimals b. keyboard grouped into _______
D. Hexadecimals c. logic bomb a. 4
d. normal diskette b. 8
32. a mail that is electronically
transmitted by your computer. 42. the longest key in a c. 2
A. Post office mail keyboard is ____ d. 6
B. Private mail 49. OS stands for
C. E-mail a. enter key a. object standard
D. G-mail b. space bar key b. operating system
33. A Website is a collection of c. ESC key c. option system
___________
A. World Wide Web pages or
d. shift keys d. oriented subjects
files 50. Number system can be
B. E-mails described as
C. Internet protocol
Measuring Answer ANY FOUR (4) questions
Counting from this section
Representing 1. Define ICT Gadgets.
Display
b. List five (5) importance of ICT
51. The system of counting in
in our society
tens is called?
Octal system 2. Who is a computer professional?
Binary system b. List 5 computer professionals and
Decimal system their duties
Hexadecimal system 3. What is a computer Program?
52. The decimal system has a b. List five (5) Programming
base of Language
16
8 4. What is Computer virus?
2 b. List 3 types of computer viruses
10
5. What is a search engine?
53. which number system does
the computer use? b. List 5 search engines with their
Octal web addresses.
Decimal
Binary
Hexadecimal
54. Binary number is a number
system with base
2
8
16
10
55. The binary digit which is the
electronic component which
the computer deals with are
1 and 4
1 and 2
0 and 1
2 and 3
56. convert 1210 to binary
1011112
11002
11012
11102
57. 2410 to base 2
110002
110112
10112
101002
58.

SECTION B: ESSAY

You might also like