0% found this document useful (0 votes)
58 views56 pages

Objecive Question Computer

Computer examination

Uploaded by

ezekielgideona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views56 pages

Objecive Question Computer

Computer examination

Uploaded by

ezekielgideona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 56

cmpnote blog

cmpnote blog provides Computer Science, Information Technology and Data Processing lesson notes
and other educational support materials.

MORE…

JSS One Objective Exam Questions in computer Studies

Click Here for More OBJ questions in other Subjects and Classes

objective questions in computer studies/ICT for JSS 1

1. One major problem with early counting devices is that

A. they occupy small space

B. they waste time

C. they can be used to count large numbers

D. they were fast

2. UNIVAC is an acronym that stands for

A. Universal Automatic Computer

B. Universal Array Computer

C. Unique Automatic Computer

D. Unvalued Automatic Computer

3. Integrated Circuits (ICs) are related to which generation of computers?

A. First generation
B. Second generation

C. Third generation

D. Fourth generation

4. Microprocessors as switching devices are for which generation of computers

A. First Generation

B. Second Generation

C. Third Generation

D. Fourth Generation

5. Which generation of computers is still under development

A. Fourth Generation

B. Fifth Generation

C. Sixth Generation

D. Seventh Generation

6. The beginning of commercial computer age started with the invention of …………… the computer.

A. UNIVAC

B. EDVAC

C. ENIAC

D. Herman Hollerith census machine

7. Who suggested Stored Program Concept?

A. John Mauchley

B. J.P. Eckert

C. John Vonn Neumann

D. Joseph Jacquard

8. Who invented the first Microprocessor in 1971?

A. Ted Hoff
B. Philip Emeagwali

C. The Chinese

D. John Napier

9. Who is credited with the idea of using punch cards to control patterns in a waving machine

A. John Vonn Neumann

B. Joseph Marie Jacquard

C. Blaise Pascal

D. Gottfried Leibniz

10. A set of 11 rods where numbers were carved and used for multiplication and division aids is known
as

A. Pascaline

B. Napier’s Bones

C. Stepped Reckoner

D. Slide Rule

11. When were the transistors invented?

A. 1947

B. 19387

C. 1957

D. 1967

12. Third-generation computers were made from

A. Vacuum tubes

B. Transistors

C. Integrated circuit

D. Punched card
13. Abacus was invented by

A. Chinese

B. Japanese

C. Joseph Jacquard

D. Blaise Pascal

14. One of the following machines was used to process census information in the U.S.A. in 1890.

A. Herman Hollerith Machine

B. Jacquard’s Loom

C. Pascaline

D. Gottfried Leibnitz

15. Who developed the concept of the integrated circuit in 1958

A. Jack Kilby

B. John Barden

C. William Brattain

D. All of the above

16. Which of the following is an early counting device

A. Pebbles

B. Abacus

C. Napier’s Bone

D. Desktop

17. Devices that involve the use of physical force to operate them are called?

A. Electronic devices

B. Mechanical devices

C. Electro-mechanical devices

D. Early counting devices


18. Who invented the Slide Rules?

A. Robert Bissakar

B. Charles Babbage

C. Gottfried Leibnitz

D. Blaise Pascal

19. Abacus is mainly used for

A. addition and multiplication

B. division and subtraction

C. addition and subtraction

D. division and multiplication

20. Which of the following devices is considered an electronic counting device

A. ENIAC

B. Napier’s bone

C. Abacus

D. Pascaline

21. The acronym ALU stands for …….

A. Arithmetic Logic Unit

B. All Long Unit

C. Automatic Logic Unit

D. Arithmetic Long Unit

22. Which of the following devices was invented by Charles Babbage

A. Pascaline

B. Analytical engine

C. Abacus
D. Napier’s bone

23. Which of the following is classified as an electro-mechanical counting device

A. ENIAC

B. Abacus

C. Napier’s bone

D. Slide rule

24. In 1981 IBM introduced its first computer for home users. The acronym IBM stands for

A. International Business Man

B. International Business Machine

C. Internal Bus Machine

D. International Building Machine

25. ENIAC was invented by

A. John Napier and Robert Bissaka

B. John Mauchly and Presper Eckert

C. Charles Babbage

D. Blaise Pascal

26. Which of the following is NOT true about the pascaline

A. it was invented by a French mathematician

B. it was also called an analytical engine

C. it was named after Blaise Pascal

D. None of the above

27. The 5th generation computers were based on the technique of AI. AI stands for

A. All International

B. Artificial Intelligence

C. Artificial International
D. Almighty Intelligence

28. The acronym ENIAC stands for

A. Electronic Numerical Integrator And Computer

B. Electronic Nations Integration And Computer

C. Electrical Numerical Integrator and Computer

D. All of the above

29. The Second Generation Computer was based on

A. Vacuum Tube

B. Silicon Chips

C. Transistor

D. Bio Chips

30. Who is referred to as the father of computers?

A. Robert Bissakar

B. Charles Babbage

C. Gottfried Leibnitz

D. Blaise Pascal

31. Raw facts, figures and symbols are

A. Information

B. Processing

C. Data

D. Processing cycle

32. All the following are stages in data processing cycle EXCEPT?

A. Data connection

B. Data gathering
C. Input stage

D. Output stage

33. The sequence of stages in processing data is:

A. Data

B. Data collation

C. Cycle

D. Data processing cycle

34. Data can be entered into the computer via the following input devices EXCEPT?

A. Printer

B. Keyboard

C. Joystick

D. Mouse

35. The computer has an edge over other devices in processing data for its:

A. ability to perform rapid and accurate calculations

B. ability to work continuously in the water and fire

C. ability to store a small volume of data and information

D. all of the above

36. The assembling of data in standard others is

A. Data connection

B. Data collation or preparation

C. Data gathering

D. Data storage

37. Data are kept in the __________ memory of the computer after processing.

A. CPU
B. Motherboard

C. Main

D. Printer

38. The computer sends out the result of data processing on paper using an output device called

A. a monitor

B. a printer

C. a scanner

D. a keyboard

39. The term GIGO means

A. Get in get out

B. Garbage in Garbage out

C. Garbage in get out

D. all of the above

40. Alphanumeric data consist of

A. digits

B. letters

C. special characters

D. all of the above

41. In data processing, the stage whereby data are entered into a computer for processing is called

A. Input stage

B. processing stage

C. data collation

D. data accessing stage

42. The stage of data processing where the results gathered from processing data is sent out for the user
to see and use is:
A. Data connection

B. data gathering

C. input stage

D. output stage

43. The importance of shutting down the computer properly after use is to

A. let it cool down

B. avoid damage to the memory files of the computer

C. make sure it is not stolen.

D. protect it from infectious virus

44. UPS stands for:

A. Under power supply

B. uninterruptable power supply

C. uninterruptible petrol supply

D. Use power sometimes

45. The importance of maintaining adequate and proper ventilation in the computer laboratory is:

A. To avoid damage caused by heat

B. To prevent damage caused by water

C. To prevent dust from damaging the computer.

D. To prevent attacks by computer viruses

46. A UPS is a device that can be used to:

A. Store electricity

B. store data for processing

C. protect the computer from heat

D. blow off the dust from within the computer

47. The computer sends out the result of data processing on screen using an output device called
A. a monitor

B. a printer

C. a scanner

D. a keyboard

48. Sometimes computer engineers can use ______ to blow off the dust from within the computer

A. Blower

B. air conditioner

C. printer

D. dryer

49. The output of data processing is?

A. Raw facts

B. raw figures

C. formation

D. information

50. All the following are computer peripherals EXCEPT?

A. System unit

B. mouse

C. keyboard

D. monitor

51. One important function of a maintenance officer is to:-

A. Shutdown the computer

B. Check all computers before and after use.

C. Eat and drink in the computer room

D. Arrange tables and chairs for computer users.


52. The importance of arranging tables and chairs comfortably is to:

A. ease movement within the computer laboratory

B. make it free from dust

C. Prevent damage because of heat

D. ensure a steady flow of electricity

53. The singular form of data is:

A. Datas

B. Datum

C. one data

D. A data

54. In data processing, the stage whereby data are converted into useable form is:

A. Input stage

B. processing stage

C. data collation

D. data accessing stage

55. An example of a cooling system is:

A. UPS

B. Blower

C. Dryer

D. Air conditioner

56. Which of the following is a computer room management ethics:

A. Eating and drinking in a computer room

B. Maintaining adequate lighting

C. sweeping the computer room monthly

D. all of the above


57. In data processing, the stage of collecting data for processing is called

A. Data collation

B. Data gathering

C. Input stage

D. Processing stage

58. In data processing, the stage that describes where data are kept after processing is called?

A. Storage stage

B. main memory

C. input stage

D. monitor

59. One method for gathering data is:

A. Interview

B. processing cycle

C. data collation

D. storage stage

60. Before data are gathered, one of the following must be taken into consideration

A. The relevance of the data

B. the size of the main memory

C. the stages in the data processing

D. all of the above

61. All the following are stages in data processing cycles EXCEPT?

A. Data connection

B. Data gathering

C. Input stage

D. Output stage
62. One of the following is a computer room management ethics:

A. Eating and drinking in a computer room

B. Maintaining adequate lighting

C. sweeping the computer room monthly

D. all of the above

63. ICT stands for …

A. International and Communication Technology

B. Information Communication and Timing

C. Information and Communication Technology

D. Internal connection Technology

64. The application of scientific knowledge for practical purposes especially in industry is:

A. information

B. Technology

C. communication

D. science

65. One of the following is a visual mode of transmitting information

A. Oral

B. Radio

C. Printing

D. Telephone

66. Which of the following is NOT an ancient method of transmitting information?

A. Oral communication

B. Beating drum

C. Telephone
D. Town crier

67. The sequence of stages in processing data is called:

A. Data

B. Data collation

C. Cycle

D. Data processing cycle

68. Data can be entered into the computer via the following input devices EXCEPT?

A. Printer

B. Keyboard

C. Joystick

D. Mouse

69. The computer has an edge over other devices in data processing for its:

A. ability to perform rapid and accurate calculations

B. ability to work continuously in the water and fire

C. ability to store a small volume of data and information

D. all of the above

70. The assembly of data in standard order is

A. Data connection

B. Data collation

C. Data gathering

D. Data storage

71. Data are kept in the __________ memory of the computer after processing

A. CPU

B. motherboard

C. Main
D. Pinter

72. The computer sends out the result of data processing on paper using an output device called?

A. monitor

B. printer

C. scanner

D. keyboard

73. The computer sends out the result of data processing on screen using an output device called?

A. monitor

B. printer

C. scanner

D. keyboard

74. The term GIGO means

A. Get in get out

B. Garbage in Garbage out

C. Garbage in get out

D. all of the above

75. An example of alphabetic data is

A. H,D,J,F,J

B. 2,3,4,5

C. 2+3+4=9

D. #,$,%,&

76. The acronym GSM stands for

A. Girls in Science and Mathematics

B. General street Madness

C. Global system for Mobile communication


D. Gloria, Stephanie and Martina

77. A device that broadcasts information in form of both voice and pictures to people in a different
location is called

A. Fax machine

B. Telex

C. Radio

D. Television

78. The method used to disseminate information to the person the message is meant for through face-
to-face discussion is called

A. Oral communication

B. Town crier

C. Bush burning

D. Beating Drums

79. The acronym ATM stands for

A. Automatic Text Machine

B. Automated Teller Machine

C. A Television Machine

D. Automatic transfer Machine

80. The term used for buying and selling goods on the internet is called

A. d-commerce

B. e-buying

C. e-commerce

D. e-mail

81. SIM stands for:

A. Someone’s identity mobile

B. subscriber identity module


C. satellite international module

D. SIM identity for mobile phone

Use this figure to answer questions 82 to 83

82. The name of the figure is

A. a fax machine

B. a photocopy machine

C. a Telephone

D. a radio

83. The figure above is used for transmitting

A. sound and pictures

B. text and graphics

C. smoke signal

D. scanning machine

84. Who is referred to as the father of computer


A. Charles Babbage

B. Grace Hopper

C. Thomas Edison

D. Joseph Jacquard

85. The following are electronic counting devices except?

A. personal computers

B. ENIAC

C. Palmtop

D. Charles Babbage’s Analytical Machine

86. One of the following is an early counting device

A. Finger

B. John Napier’s Bone

C. John Von Neumann machine

D. Charles Babbage’s Analytical Machine

87. Second-generation computers are characterized largely by the use of

A. Integrated circuit

B. Vacuum tube

C. Transistors

D. Microprocessor

88. The importance of maintaining adequate and proper ventilation in computer laboratories is to:

A. To avoid damage caused by heat

B. to prevent damage caused by water

C. to prevent dust from entering the computer.

D. to protect computers from the infection of virus


89. UPS is a device used to:

A. store electricity

B. Store data for processing

C. Protect the computer from heat

D. blow off the dust from within the computer

90. Sometimes computer engineers can use ______ to blow off the dust from within the computer

A. Blower

B. Air conditioner

C. Printer

D. Dryer

Click Here for the Answers

Comments

HTTPS://CLASSBASIC.COM25 September 2020 at 21:03

Hi, good work. There questions for Primary schools @ classbasic.com

REPLY

Ajayi oluwatosin precious20 August 2021 at 20:57

I love your works

thanks so much

but why dont you add practice question to it, so that will can answer it and know our scores

REPLY
PROF.LUCIOUS HAWARD21 October 2021 at 14:15

Are you in a financial crisis, looking for money to start your own business or to pay your bills?

GET YOUR BLANK ATM CREDIT CARD AT AFFORDABLE PRICE*

We sell this cards to all our customers and interested buyers

worldwide,Tho card has a daily withdrawal limit of $5000 and up to $50,000

spending limit in stores and unlimited on POS.

YOU CAN ALSO MAKE BINARY INVESTMENTS WITH LITTLE AS $500 AND GET $10,000 JUST IN SEVEN
DAYS

email [email protected]

you can also call or whatsapp us Contact us today for more enlightenment *

+1(539) 888-2243*

WE ARE REAL AND LEGIT...........2019 FUNDS/FORGET ABOUT GETTING A LOAN..*

WHATSAPP CONTACT======>>>> +1(539) 888-2243

IT HAS BEEN TESTED AND TRUSTED

REPLY

Anonymous27 September 2022 at 11:40

Best site ever for ICT teachers and students. how can one sponsor/appreciate this great work?

REPLY

Anonymous13 September 2023 at 15:20


NICE WORK BUT, NO ANSWERS TO YOUR QUESTIONS.

REPLY

Okolo Joseph13 September 2023 at 15:23

Checkback within 3 days

Anonymous12 February 2024 at 18:12

Hi can I know your name

Okolo Joseph12 February 2024 at 19:01

Check about me tab

Post a Comment

Popular posts from this blog

90 Objective Examination Questions in Major Subjects

An examination is a formal test that you take to show your knowledge or ability in a particular subject,
or to obtain a qualification. This section of my blog is designed to provide 90 objective examination
questions covering first, second and third term work in major subjects. Basic Science Computer
Studies/Information Technology Biology Financial Accounting Basic Technology Business Studies Physical
and Health Education Civic Education Christian and Religious Studies Physics Economics Geography
Cultural and Creative Arts (CCA) Prevocational Studies Chemistry Mathematics You can support
CMPNOTE BLOG through the details below Account number: 0229727053 Account name: Joseph Okolo
Bank: Guarantee Trust Bank (GTB) CLICK Here for Support Through PAYPAL

READ MORE
Complete Computer Studies/ICT Curriculum for JSS 1 to SSS 3

Curriculum refers to the lessons and academic content taught in a nation, state, school or a specific
course or program. This post contains a complete curriculum in Computer Studies as compiled by the
Nigeria Ministry of Education. First, second and third terms scheme of work can be extracted from it. To
access the simply click on the links below. JSS ONE CURRICULUM IN COMPUTER STUDIES TOPIC
Historical Development of Computer CONTENT . Early counting devices · Fingers · Fingers · Stones · Sticks
· Pebbles · Cowries 2. Mechanical Counting Devices · Abacus · Slide rule, ETC OPERATIONAL OBJECTIVES
Students should be able to: 1. List early counting devices 2. State the problems in counting large
numbers with those devices 3. Name mechanical counting devices 4. Name electro-mechanical counting
devices TEACHING AIDS Fingers, Toes, Sticks, stone, Charts, etc JSS ONE COMPLETE CURRICULU

READ MORE

JSS One Objective Questions in Computer Studies/Information Technology

1. One major Problem with early counting devices is that A. they are always accurate B. they waste time
C. they can be used to count large numbers D. they were fast 2. UNIVAC is an acronym that stands for A.
Universal Automatic Computer B. Universal Array Computer C. Unique Automatic Computer D. Unvalued
Automatic Computer Click Here to view all Questions

READ MORE

Powered by Blogger

Theme images by Veronica Olson

About me

Home

JSS 1 Note

JSS 2 Note

JSS 3 Note

SSS 1 Note

SSS 2 Note

SSS 3 Note

Exam Questions

Syllabus
Computer Studies Scheme of Work

Report Abuse

cmpnote blog

cmpnote blog provides Computer Science, Information Technology and Data Processing lesson notes
and other educational support materials.

HOME JSS 1 COMPUTER NOTES JSS 2 COMPUTER NOTES JSS 3 COMPUTER NOTES SSS 1 COMPUTER
NOTES SSS 2 COMPUTER NOTES SSS 3 COMPUTER NOTES

JSS Two Objective Exam Questions in Computer Studies

Click Here for More OBJ questions in other Subjects and Classes

Answer is at the bottom

1. Binary codes are used in which of the following programming language

A. Machine language

B. Assembly language

C. High level language

D. None of above

2. The term gigabyte refers to

A. 1024 bytes

B. 1024 kilobytes

C. 1024 megabytes
D. 1024 gigabyte

3. A byte consists of

A. One bit

B. Four bits

C. Eight bits

D. Sixteen bits

4. FORTRAN programming language is more suitable for

A. Business Applications

B. Marketing Applications

C. Scientific Applications

D. None of the above

5. The two major software are;

A. Input software and Output software

B. System software and application software

C. Utility software and translator software

D. Graphic software and word processing software

6. Operating system, utility software and translators are types of

A. Application software

B. Hardware

C. System software

D. Translators

7. The following are examples of application software EXCEPT?

A. Graphic software

B. LINUX

C. Spreadsheet software
D. Word processing software

8. DOS stands for

A. Disk operating system

B. Display operating system

C. Delete operating system

D. Data operating system

9. A number system that uses only two digits, 0 and 1 is called

A. Decimal number system

B. Hexadecimal number system

C. Octal number system

D. Binary number system

10. The acronym for BASIC is

A. Beginner’s All Symbolic Instruction Code

B. Beginner’s All-purpose symbolic Instruction Code

C. Believer’s All-purpose Symbolic Instruction Code

D. Beginner’s All-purpose Synthetic Instruction Code

11. The native language of the computer is

A. Machine Language

B. BASIC Language

C. High Level Language

D. PIDGIN language

12. The following are BASIC Key Statements Except?

A. PASTE
B. PRINT

C. INPUT

D. LET

13. The following are graphic packages EXCEPT…

A. Ms-word

B. CorelDraw

C. Instant Artist

D. Photoshop

14. Packages designed mainly for drawing and designing purposes are called?

A. Database packages

B. Graphic packages

C. word packages

D. spreadsheet packages

15. Application software used for performing accounting and statistical calculations is called?

A. Word processing software

B. Graphic software

C. Spreadsheet software

D. Utility software

16. The SI unit of storage in computer is the

A. bits

B. bytes

C. nibble

D. word
17. The graphical representation of the steps involved in solving a given problem is

A. program

B. flowchart

C. algorithm

D. machine language

18. BASIC was developed by

A. John Kemeny and Thomas Kutz

B. Blaise Pascal and Charles Babbage

C. Philip Emeagwali and Tim Berners-lee

D. All of the above

19. A program that changes high level languages into machine language is called

A. translator

B. BASIC

C. java

D. Pascal

20. All the following are examples of high level languages EXCEPT

A. translator

B. BASIC

C. C++

D. Pascal

21. What is the correct format of the algebraic expression 2wxy in BASIC arithmetic expression?

A. 2+W+Y

B. 2W + 2XY

C. 2*W*Y

D. All of the above


22. Which of the following is not a language translator

A. assembler

B. compiler

C. interpreter

D. terminator

23. The BASIC key word REM stands for

A. remark

B. remain

C. redo

D. remember

24. The last statement in BASIC programs is

A. INPUT

B. END

C. LET

D. FINISH

25. Programming language ideal for business environment is

A. BASIC

B. PASCAL

C. COBOL

D. C++

26. Programming language that allows for a program to be written in forms that are readable to human
beings is called

A. Assembly language

B. Machine language

C. High level language

D. all of the above


27. Utility programs are also known as

A. service program

B. operating system

C. graphic program

D.

word processing software

28. The above flow chat symbol is called

A. decision symbol

B. processing symbol

C. start or end symbol

D. direction of flow symbol

29. An outlined steps needed to solve problem is called

A. flowchart

B. algorithm

C. start or end symbol

D. direction of flow symbol

30. Which of the following programs can be used for word processing

A. Notepad

B. CorelDraw

C. MS Excel

D. Paint
31. An example of a cooling system is:

A. UPS

B. Blower

C. Dryer

D. Air conditioner

32. A UPS is a device that can be used to:

A. Store electricity

B. store data for processing

C. protect the computer from heat

D. blow of dust from within the computer

33. The importance of shutting down computer properly after use is to

A. let it cool down

B. avoid damage memory files of the computer

C. make sure it is not stolen

D. protect it from virus

34. UPS stands for:

A. Under power supply

B. Uninterruptable power supply

C. Uninterruptible petrol supply

D. Use power sometimes

35. The importance of maintaining adequate and proper ventilation is to :

A. avoid damage caused by heat

B. prevent damage caused by water

C. prevent dust from damaging the computer

D. avoid loss of data


36. One important step to take when computers are not used for long is to:-

A. Unplug it

B. provide adequate ventilation

C. check your email regularly

D. Provide an anti virus

37. All the following are areas of misusing computer EXCEPT?

A. Plagiarism

B. Cyber war

C. piercing of software

D. stealing

38. Some health related challenges while sitting at a computer include the following except?

A. Neck pain

B. Backache

C. Eye strain

D. Stomach ache

39. In hexadecimal number system, C, D and E represent

A. 1,2 and 3

B. 12, 13 and 14

C. 13, 14, and 15

D. 5, 6 and 7

40. How should the feet be positioned while sitting at the computer

A. Slightly lower than the hips in a very relaxed and comfortable state

B. in almost a right angle to the upper arm

C. flat on the ground and not hanging

D. All of the above


41. The situation where programs written by people are used without their permission is called

A. Plagiarism

B. Cyber war

C. piercing of software

D. stealing

42. Convert 32 base 10 to binary

A. 1000002

B. 0000012

C. 1110002

D. 1100112

43. The ideal chairs recommended why sitting at a computer is

A. Adjustable chair

B. A plastic chair

C. an iron chair

D. a rocking chair

44. All the following are features of graphic packages except

A. tooth brush

B. colour Palette

C. menu bar

D. tool bar

45. The following are examples of Graphic packages EXCEPT?

A. CorelDraw

B. Photoshop

C. Harvard Graphics

D. MS-Word
46. The other name for Fill colour tool is

A. Paint bucket tool

B. pick colour tool

C. eraser tool

D. text tool

47. The default tool in the paint program is

A. Pencil tool

B. pick colour tool

C. eraser tool

D. text tool

48. In paint program, a tool used to spray colour over an object is

A. Airbrush

B. file colour

C. eraser tool

D. text tool

49. The computers are based on which type of number system

A. Binary

B. Octal

C. Decimals

D. Hexadecimals

50. FEED is in ……………. Number system

A. Binary

B. Octal
C. Decimal

D. Hexadecimal

51. The tool in figure 1.1 above of paint program is

A. Line tool

B. curve tool

C. polygon tool

D. Ellipse tool

52. The function of the tool in figure 1.1 of paint program is

A. for drawing straight line

B. for drawing curve from a line

C. for drawing rectangle and square of different sizes with rounded edges.

D. for erasing mistakes.

53. The paint toolbox has ______ numbers of tool

A. fourteen

B. fifteen

C. sixteen

D. seventeen

54. People who gain unauthorized access to a computer system or data belonging to somebody else are
called

A. Bouncers

B. Hackers

C. Virus

D. Programmers
55. The workspace inside the drawing window of a graphic package, which you can plan your work is
called

A. Menu bar

B. Printable area

C. Colour palette

D. Toolbox

56. The importance of using anti-glare protector is to

A. protect the ears from loud noise

B. protect the body from electric shock

C. protect the eyes against radioactive rays coming from the computer monitor

D. prevent dust from entering into the computer

57. The tool in figure 1.2 above of paint program is a

A. Letter “A” tool

B. Text tool

C. select tool

D. textbook

58. The function of the tool in figure 1.2 of paint program is used

A. For drawing straight line

B. for drawing curves

C. for drawing rectangle and square of different sizes with rounded edges.

D. Inserting text into a drawing

59. All the following are tools in toolbox of a paint program Except?

A. Select tool

B. pencil tool
C. eraser tool

D. title bar tool

60. Packages designed mainly to create and manipulate images on a computer are called:

A. Word processing packages

B. Graphic packages

C. Spreadsheet Packages

D. DBMS

61. All the following are areas of misusing computer EXCEPT?

A. Plagiarism

B. Cyber war

C. piercing of software

D. stealing

62. Some health related challenges while sitting at a computer include the following except;

A. Neck pain

B. Backache

C. Eye strain

D. Stomach ache

63. In hexadecimal number system, D, E and F represent

A. 1,2 and 3

B. 12, 13 and 14

C. 13, 14, and 15

D. 5, 6 and 7

64. All the following are features in a graphic package EXCEPT;

A. tooth brush

B. colour Palette
C. menu bar

D. tool bar

65. The following are examples of Graphic packages EXCEPT;

A. CorelDraw

B. Photoshop

C. Harvard Graphics

D. MS-Word

66. The other name for Fill colour tool is

A. Paint bucket tool

B. pick colour tool

C. eraser tool

D. text tool

67. Convert 5610 to binary

A. 1000002

B. 0000012

C. 1110002

D. 1100112

68. People who gain unauthorized access to a computer system or data belonging to somebody else are
called

A. Bouncers

B. Hackers

C. Virus

D. Programmers

69. The workspace inside the drawing window of a graphic package, which you can plan your work is
called

A. Menu bar
B. Printable area

C. Colour palette

D. Toolbox

70. How should the feet be positioned while sitting at the computer

A. Slightly lower than the hips in a very relaxed and comfortable state

B. in almost a right angle to the upper arm

C. flat on the ground and not hanging

D. All of the above

71. BASIC was developed by

A. John Kemeny and Thomas Kutz

B. Blaise Pascal and Charles Babbage

C. Philip Emeagwali and Tim Berner-lee

D. All of the above

72. A program that changes high level languages into machine language is called

A. translator

B. BASIC

C. java

D. Pascal

73. The two major software are;

A. Input software and Output software

B. System software and application software

C. Utility software and translator software

D. Compiler and Interpreter


74. Operating system, utility software and translators are examples of

A. Application software

B. Hardware

C. System software

D. Translators

75. The following are examples of application software EXCEPT?

A. Graphic software

B. LINUX

C. Spreadsheet software

D. Word processing software

76. DOS stands for

A. Disk operating system

B. Display operating system

C. Delete operating system

D. Data operating system

77. A number system that uses 0, 1, 2, 3, 4, 5, 6, 7 only is called

A. Decimal number system

B. Hexadecimal number system

C. Octal number system

D. Binary number system

78. Which of the flowchart symbols is used to show the next step

A. decision symbol

B. processing symbol

C. start or end symbol

D. direction of flow symbol


79. An outlined steps needed to solve problem is called

A. flowchart

B. algorithm

C. start or end symbol

D. direction of flow symbol

80. Which of the following program can be used for word processing

A. WPS Writer

B. CorelDraw

C. MS Excel

D. Paint

81. All the following are ICT gadgets EXCEPT?

A. Pressing iron

B. Facsimile machine

C. ATM

D. Telex

82. The process of transferring file from a remote computer to a local computer is called

A. Uploading

B. Charting

C. Downloading

D. Cyber café

83. Which of this network is the largest

A. LAN

B. PAN

C. WAN

D. MAN
84. Which of this ICT gadget can permit two or more users to conduct conversion when they are too far
apart to be heard directly:

A. Facsimile machine

B. ATM

C. Telex

D. Telephone

85. The name of figure 1.0 is

A. a fax machine

B. a photocopy machine

C. a Telephone

D. a radio

86. The figure above is used for transmitting

A. sound and pictures

B. text and graphics

C. smoke signal

D. scanning machine

87. All the following are features of an internet browser except?

A. Colour Palette

B. Scroll bar

C. Menu bar

D. Status bar

88. What does HTML represent?

A. Hyper Text Markup Language


B. High Text movie language

C. Have the major language

D. All of the above

Use the information below to answer questions 89 and 90

[email protected]

89. The address above is a/an

A. Website address

B. Email address

C. Homepage address

D. Facebook address

90. The domain name of the address above is

A. @

B. joyuva

C. gmail.com

D. [email protected]

Click Here for the Answer

Comments

socialwork21 September 2023 at 08:21

A compelling and creative movie website called WebToonss transfers the thrill of the big screen to the
online world. Webtoonss provides movie lovers all over the world with a distinctive and immersive
cinematic experience thanks to its enormous and diversified choice of movies that spans genres and
cultures.

REPLY
Anonymous28 February 2024 at 22:04

This is a great work. God bless you sir

REPLY

Okolo Joseph28 February 2024 at 22:08

You're welcome

Post a Comment

Popular posts from this blog

90 Objective Examination Questions in Major Subjects

An examination is a formal test that you take to show your knowledge or ability in a particular subject,
or to obtain a qualification. This section of my blog is designed to provide 90 objective examination
questions covering first, second and third term work in major subjects. Basic Science Computer
Studies/Information Technology Biology Financial Accounting Basic Technology Business Studies Physical
and Health Education Civic Education Christian and Religious Studies Physics Economics Geography
Cultural and Creative Arts (CCA) Prevocational Studies Chemistry Mathematics You can support
CMPNOTE BLOG through the details below Account number: 0229727053 Account name: Joseph Okolo
Bank: Guarantee Trust Bank (GTB) CLICK Here for Support Through PAYPAL

READ MORE

Complete Computer Studies/ICT Curriculum for JSS 1 to SSS 3

Curriculum refers to the lessons and academic content taught in a nation, state, school or a specific
course or program. This post contains a complete curriculum in Computer Studies as compiled by the
Nigeria Ministry of Education. First, second and third terms scheme of work can be extracted from it. To
access the simply click on the links below. JSS ONE CURRICULUM IN COMPUTER STUDIES TOPIC
Historical Development of Computer CONTENT . Early counting devices · Fingers · Fingers · Stones · Sticks
· Pebbles · Cowries 2. Mechanical Counting Devices · Abacus · Slide rule, ETC OPERATIONAL OBJECTIVES
Students should be able to: 1. List early counting devices 2. State the problems in counting large
numbers with those devices 3. Name mechanical counting devices 4. Name electro-mechanical counting
devices TEACHING AIDS Fingers, Toes, Sticks, stone, Charts, etc JSS ONE COMPLETE CURRICULU

READ MORE

JSS One Objective Questions in Computer Studies/Information Technology

1. One major Problem with early counting devices is that A. they are always accurate B. they waste time
C. they can be used to count large numbers D. they were fast 2. UNIVAC is an acronym that stands for A.
Universal Automatic Computer B. Universal Array Computer C. Unique Automatic Computer D. Unvalued
Automatic Computer Click Here to view all Questions

READ MORE

Powered by Blogger

Theme images by Veronica Olson

About me

Home

JSS 1 Note

JSS 2 Note

JSS 3 Note

SSS 1 Note

SSS 2 Note

SSS 3 Note

Exam Questions

Syllabus

Computer Studies Scheme of Work

Report Abuse
cmpnote blog

cmpnote blog provides Computer Science, Information Technology and Data Processing lesson notes
and other educational support materials.

MORE…

JSS 3 Objective Exam Questions in Computer studies

1. Individuals that have obtained sufficient education and training in the field of computer are called

A. Program Analyst

B. Computer Professionals

C. Computer commissioners

D. Computer Instructor

2. All the following are careers in the field of computers except

A. Computer Engineer

B. Programmer

C. Network Administrator

D. Bank Manager

3. Who writes codes and instructions for the computer?

A. Computer Engineer

B. Programmer

C. Network Administrator

D. Bank Manager
4. NCS is a computer professional body. NCS stands for

A. Nigeria Computer Society

B. National Commission Society

C. Nigeria Commputer studies

D. Non-governmental Commision Society

5. Which of these is a quality of a good computer professional

A. Poor analytical skills

B. Automation

C. Poor technical writing skills

D. Troubleshooting capabilities

6. A body that controls and regulates all communication operations in Nigeria

A. Nigeria Communication Commission

B. Nigeria Internet Group

C. Computer Association of Nigeria

D. Internet Service Provider Association of Nigeria

7. All of these are means through which computer viruses can spread from one system to another
Except

A. Internet download

B. Computer network

C. Infected memory devices

D. Blood transfusion

8. A computer virus that alters its signature patterns whenever it replicates is called

A. Boot sector viruses

B. Polymorphic virus
C. Resident Virus

D. Non-resident virus

9. A program written to stop and curb the spread of the virus in a computer is called

A. Auto-virus

B. Anti-virus

C. I love you Virus

D. Stone

10. All of these are examples of computer viruses except

A. Smadav

B. Trojan horse

C. I love you birus

D. November 11

11. Which of these is not a virus warning sign

A. Speeds up computer response time

B. presencee of tiny dots

C. Incomplete saving of files

D. The appearance of strange characters

12. Which of this software is an anti-virus software

A. Norton

B. Creeper

C. Code records

D. Logic bomb Alabama

13. Preventive measures against computer viruses do not include the following

A. Installing cracked software

B. Timely update of operating system


C. Timely update of anti-virus software

D. Exercise care when browsing the internet

14. The largest computer network in the world is

A. LAN

B. WAN

C. PAN

D. Internet

15. A computer network idea for schools offices and home is called

A. WAN

B. PAN

C. Internet

D. LAN

16. The acronym MAN stands for

A. Man Area Network

B. Metropolitan Area Network

C. Master Area Network

D. Main Area Network

17. All of these are internet search engines except

A. Google

B. Yahoo

C. Facebook

D. Bing

18. Websites that enable a person to find a document and other media on the internet are called

A. Google

B. Internet Search Engines


C. Network Search

D. Search query

19. A word or group of words that are typed by the user in the search bar of the search engine is called

A. search query

B. Search engine result page

C. Likes

D. Comments

20. PAN stands for

A. Programmer Area Network

B. Personal Area Network

C. Personal Area Number

D. Programmer Area Number

21. The gap between those who have effective access to digital and information technologies and those
who have little or no access at all is called

A. New Economy divide

B. Old Economy divide

C. Digital divide

D. All of the above

22. An economy that is centred on industrialization is called

A. New Economy

B. Old economy

C. Digital Split

D. Mechanical economy

23. One of these is a feature of the new economy


A. Requires a lot of labour

B. Time-consuming

C. It is knowledge-based

D. Mechanically driven

24. All of these are benefits of the new economy except

A. Creates new jobs

B. Attracts no investment

C. Greater competition

D. Businesses can start with small capital

25. All the following are examples of DBMS packages except

A. MS Access

B. MS Word

C. Oracle

D. SQL server

26. A single piece of information about an object is called

A. Record

B. Primary key

C. Database

D. Field

27. Which of these can serve as a primary key

A. Name

B. Voter's Card number

C. Address

D. Age

28. One of these is not a form of database


A. Hierarchical

B. Record

C. Relational

D. Network

29. ...... form of database permits the organization of data in the form of a tree

A. Hierarchical

B. Record

C. Relational

D. Network

30. Software designed to mainly perform mathematical, statistical and accounting calculations is called

A. Word processing software

B. DBMS

C. Spreadsheets software

D. Presentation software

31. All of these are uses of spreadsheet software except

A. Performing artistically related operated

B. Tax estimation

C. Budget planning

D. Preparation of payrol

32. Which of these is a spreadsheet package

A. MS Paint

B. MS Excel

C. Ms Word3
D. Ms Access

33. The intersection between a row and a column is called

A. Formula

B. Label

C. Value

D. cell

34. ..... displays the cell reference of active cell

A. Name box

B. Formula bar

C. Row

D. Column

35. The first string in the MS Excel formula is

A. *

B. =

C. +

D. /

36. The formula to add Cell A3 to cell A13 in MS Excel is

A. = 3 + 13

B. SUM(A3:A13)

C. =SUM(A3:A13)

D. All of the above

37. Numeric data that are entered into the cell is called

A. Formula

B. Label

C. Value
D. cell

38. A single page in a spreadsheet is called

A. workbook

B. worksheet

C. sheet

D. book

39. A cell that is currently selected for data entry is called

A. Function

B. Cell reference

C. Active cell

D. Anchor cell

40. Which of these is not a function in Excel

A. SUN

B. COUNT

C. MAX

D. MIN

Click here for answers

Comments

Popular posts from this blog

90 Objective Examination Questions in Major Subjects

An examination is a formal test that you take to show your knowledge or ability in a particular subject,
or to obtain a qualification. This section of my blog is designed to provide 90 objective examination
questions covering first, second and third term work in major subjects. Basic Science Computer
Studies/Information Technology Biology Financial Accounting Basic Technology Business Studies Physical
and Health Education Civic Education Christian and Religious Studies Physics Economics Geography
Cultural and Creative Arts (CCA) Prevocational Studies Chemistry Mathematics You can support
CMPNOTE BLOG through the details below Account number: 0229727053 Account name: Joseph Okolo
Bank: Guarantee Trust Bank (GTB) CLICK Here for Support Through PAYPAL

READ MORE

Complete Computer Studies/ICT Curriculum for JSS 1 to SSS 3

Curriculum refers to the lessons and academic content taught in a nation, state, school or a specific
course or program. This post contains a complete curriculum in Computer Studies as compiled by the
Nigeria Ministry of Education. First, second and third terms scheme of work can be extracted from it. To
access the simply click on the links below. JSS ONE CURRICULUM IN COMPUTER STUDIES TOPIC
Historical Development of Computer CONTENT . Early counting devices · Fingers · Fingers · Stones · Sticks
· Pebbles · Cowries 2. Mechanical Counting Devices · Abacus · Slide rule, ETC OPERATIONAL OBJECTIVES
Students should be able to: 1. List early counting devices 2. State the problems in counting large
numbers with those devices 3. Name mechanical counting devices 4. Name electro-mechanical counting
devices TEACHING AIDS Fingers, Toes, Sticks, stone, Charts, etc JSS ONE COMPLETE CURRICULU

READ MORE

JSS One Objective Questions in Computer Studies/Information Technology

1. One major Problem with early counting devices is that A. they are always accurate B. they waste time
C. they can be used to count large numbers D. they were fast 2. UNIVAC is an acronym that stands for A.
Universal Automatic Computer B. Universal Array Computer C. Unique Automatic Computer D. Unvalued
Automatic Computer Click Here to view all Questions

READ MORE

Powered by Blogger

Theme images by Veronica Olson

About me

Home

JSS 1 Note

JSS 2 Note

JSS 3 Note
SSS 1 Note

SSS 2 Note

SSS 3 Note

Exam Questions

Syllabus

Computer Studies Scheme of Work

Report Abuse

cmpnote blog

You might also like