2022 First Term Mr. Eneojo
2022 First Term Mr. Eneojo
VALLEY VIEW
METROPOLITAN AVENUE
JSS 3
COMPUTER SCIENCE
1. What is the full meaning of ALU? a) All Logic Utility b) Another Logic Unit c) Application Logic Unit
d) Arithmetic and Logic Unit
2. One of these is a disadvantage of using ICT? a) saves time b) innovative c) fast d) expensive
5. A computer has __________ a) Machine and electronics b) peripheral and hardware c) program
and software d) hardware and software
6. Which of these is another name for RAM of a computer’s memory? _______ memory.
a) secondary b) primary c) tertiary d) storage
1. (i) List any five (5) examples of search engines. (ii) Highlight any five (5) ways of bridging the digital
divide.
2. (i) List any five (5) internet activities you know. (ii) Enumerate any five (5) features of the Old
Economy.
3. (a) Explain briefly the three types of databases. (b) Write out the procedure for creating a table in
Design View of Microsoft Access
4. (a) Explain any three uses of spreadsheets. (b) Highlight any three disadvantages of a
computerized database.
5. (a) Explain the term Digital Revolution. (b) Explain any three features of Microsoft Excel Package.
PETRA CARE INITIATIVE (FOUNDATIONS ACADEMY)
VALLEY VIEW
METROPOLITAN AVENUE
SS 3
DATA PROCESSING
SECTION A: SELECT YOUR MOST PREFERRED OPTION FROM THE OPTIONS LETTERED A TO D
TO ANSWER THE QUESTIONS IN THIS SECTION
1. Which of the following application packages is used for creating websites? a) CorelDraw b) Microsoft
Access c) Microsoft FrontPage d) Microsoft PowerPoint
2. Foreign key is a field in a relational table that refers to the _______ key of another table. a) Candidate
b) Primary c) Composite d) Surrogate
3. A non-electronic means of transmitting information is ______ a) e-mail b) print c) radio d) telephone
4. The types of information commonly used in word processing documents are __________ a) icons and
clip-arts b( animations and audio c) lines and tables d) texts and images
5. A short line indicating the conclusion of a document is ________ a) end mark b) insertion point c) page
break d) scroll box
6. The conceptual representation of the data structures required by a database is _________ a) binary
model b) data model c) relational model d) database design
7. In Microsoft Word, foreign or misspelt words are underlined in which colour? a) blue b) green c) pink d)
red
8. The feature in Microsoft Word that automates numbering and placement of footnotes is called _______
a) headers and footers b) alignment c) cross referencing d) cut and paste
9. Which of the following is a document that can be created in a spreadsheet environment? a) forms b)
letters c) memos d) payrolls
10. A non ICT based gadget is _____ a) fax b) saxophone c) telephone d) smart phone
11. The security risks to database systems include the following except _______ a) constant update of
antivirus software b) data corruption caused by the entry of invalid data c) physical damage to database
servers d) unintended activities by authorized database users
12. An effect that can run between slides to signal a shift from one slide to the next is ________________
a) animation b) design theme c) slide show d) transition
13. A bad etiquette in the computer laboratory is __________ a) covering the system with dust cover after
use b) eating and drinking while using the computer c) good mannerism d) respect to fellow users
14. What was the hallmark in the development of the third generation computers? a) expanded memory b)
hybrid motherboard c) integrated circuit d) integrated GUI
15. Which of the following is a type of data model? a) conceptual b) physical c) hierarchical d) logical
16. Protocols are used by computers to ______ data. a) calculate b) communicate c) process d) store
17. The traditional storage of data that is organized by customers, stored in separate folders in filing
cabinets is an example of which database system? a) flat file b) hierarchical c) network d) object-
oriented
18. Dispensing money and checking of account balance can be done on which of the following ICT
gadgets? a) ATM b) bank pay pad c) e-commerce app d) POS
19. A computer that is capable of inputting and outputting digital and analogue signal is known as ______
a) composite b) broad c) versatile d) hybrid
20. Information processing is concerned with the following except _________ a) acquisition b) organization
c) relevance d) retrieval
21. A form of protection provided by law to authors of original works is called _________ a) authors’ block
b) piracy act c) intellectual right d) copyright
22. The abbreviation ‘NF’ in database is _________ a) Normal Fact b) Normal Form c) Notational Fact d)
Notational Form
23. In a slideshow, speaker notes needed for an image of each slide are ___________ from the audience.
a) coded b) demanded c) hidden d) received
24. An example of presentation packages is ________ a) Adobe Dreamweaver b) CorelDraw c) Keynotes
d) Microsoft Access
25. Which of the following computers is a multi-user computer that is less powerful than a mainframe? a)
desktop b) digital c) hybrid d) minicomputer
26. The category of computers used for weather forecasting is known as ________ a) general purpose
computers b) microcomputers c) special purpose computers d) super computers
27. One application of ICT in education is __________ a) automated teller machine b) electronic fund
transfer c) magnetic ink character recognition d) optical mark reader
28. An application of ICT which allows a person to participate in a meeting from a remote location is called
__________ a ) blogging b) broadcasting c) podcasting d) telepresence
29. One disadvantage of using computers for processing information is __________ a) low productivity b)
reduced running cost in the long term c) the increase in processing speed d) the need for staff
retraining
30. The process of sending and receiving information from one place to another is called information
______ a) technology b) transfer c) transmission d) synchronization
31. The capacity of a communication channel is referred to as _______ a) bandwidth b) band rate c) bit
flow d) data flow
I III
II
IV
V
32. To search for information using the interface in the figure above, the key words of the search subject is
typed into the part labeled ______ a) I b) II c) IV d) V
33. To access a website, the URL of the website is typed into the part labeled _______ a) I b) II c) III d) V
34. A user working on a computer that is running on Windows 7 issued the command: Ctrl + Alt+ Del while
typing a document. What interface is expected to be displayed on the screen? a) restart windows b)
shutdown windows c) windows hibernate d)windows task manager
35. A desktop computer is switched on and the monitor displays an error message which reads: No input
signal. The likely cause of this error is _______ a) defective monitor b) disconnected VGA c) low
memory d) power failure
36. One quality of a computer programmer is _________ a) ability to teach b) excellent analytical thinking
c) friendliness d) punctuality to work
37. Which of the following practices is a safety measure? a) wearing hand gloves while typing b) opening
the computer while still connected to the power supply c) maintaining a dust free environment d) eating
and typing at the same time
38. Indiscriminate sending of unsolicited emails to many email addresses is known as _______________
a) plagiarism b) phishing c) pharming d) spamming
39. A novice is discouraged from opening the CRT monitor for maintenance because ________________
a) it cannot be appropriately reassembled after opening b) it may harbor pests carrying infectious
viruses c) it may contain high static voltage d) the tube is fragile
40. While typing, a series of letters were highlighted and the keyboard key combination ”Ctrl + B” was
executed. The highlighted letters will be __________ a) underlined b) italicized c) deleted d) bold
SECTION B:
PART I: THERE ARE FOUR (4) QUESTIONS IN THIS PART; YOU ARE TO ANSWER ANY THREE (3).
iii) Miss Franca has a document of 50 pages. She currently needs a hardcopy of only the last 10
pages. Describe how you would perform this task.
5. A class captain was asked to create a database in MS Access for all students in the class without using
any template and name it Student_Record. The table created is to be named Students and should have
five columns/fields with the following names:
ID_Number
Full Name
Date of Birth
Age
Home_Address
ii) Add two more rows and two columns to the table.
The figure is a portion of Microsoft Word interface. Use the figure to answer question 6b.
E
VALLEY VIEW
METROPOLITAN AVENUE
SS 2
DATA PROCESSING
TIME: 2 HR:
SECTION A: SELECT YOUR MOST PREFERRED OPTION FROM THE OPTIONS LETTERED A TO D
TO ANSWER THE QUESTIONS IN THIS SECTION
1. Two computers, X and Y are such that the processor in X has a word size of 32 bits while that of Y is
16 bits. Which of the following statements is true? a) X can process half as much data as Y at the same
time b) X can process the same amount of data as Y at the same time c) X can process two times the
amount of data as Y at the same time d) X can process four times the amount of data as Y at the same
time
2. Which of the following is not an ancient medium of transmitting information? a) fire lighting b) beating of
drums c) telephone d) whistling
3. The type of data which consists of text, number, audio, video, graphic, and animation is called ______
a) data set b) multimedia data c) multipurpose data d) multivariable data
4. The feature in a browser that enables users to open the latest copy of a webpage is _______ a)
forward b) redirect c) redirect d) refresh
5. One characteristic feature of the second generation computers is the presence of _______ a) vacuum
tubes b( transistors c) integrated circuits d) microchips
6. Safety measures to be observed when using computers include all the following except ____________
a) use of anti-glare protector b) sitting posture c) maintaining a dust-free environment d) dropping
liquids in the computer room
7. MS Access is an example of a __________ a) relational model b) network model c) hierarchical model
d) flat file model
8. An internet-based system that allows people of different geographical locations to have in-person
meeting is known as _____ a) voice messaging system b) video conferencing system c) on-line mailing
system d) fax system
9. Which of the following is used to retrieve specific information from database tables? a) index b) query c)
report d) forms
10. Maintain the value and content of data is part of data __________ a) coding b) integrity c) secrecy d)
security
11. Which of these devices do not support wireless technology? a) GSM phone b) mouse c) router d)
telephone
12. Which of the following statements explain information processing? a) saving documents in a device b)
changing information detectable by an observer c) data upload to a server d) transfer of information
between devices
13. Dispensing money and checking of account balance can be done on which of the following ICT
gadgets? a) ATM b) bank pay pad c) e-commerce app d) POS
14. A computer that is capable of inputting and outputting digital and analogue signal is known as ______
a) composite b) broad c) versatile d) hybrid
15. Information processing is concerned with the following except _________ a) acquisition b) organization
c) relevance d) retrieval
16. A form of protection provided by law to authors of original works is called _________ a) authors’ block
b) piracy act c) intellectual right d) copyright
17. The abbreviation ‘NF’ in database is _________ a) Normal Fact b) Normal Form c) Notational Fact d)
Notational Form
18. Indiscriminate sending of unsolicited emails to many email addresses is known as _______ a)
spamming b) pharming c) phishing d) plagiarism
19. By default, numeric values in a worksheet are _________ a) centered b) left-aligned c) right-aligned d)
unaligned
20. Which of the following sets are available when creating a table in “Design View” in Microsoft Access? a)
Data Type, Description, and Field Name b) Description. Criteria, and Field Property c) Field Name,
Data Type and Field Property d) Criteria, Field Name and Description
21. In computing, ergonomics is a term associated with computer _________ a) ethics b) maintenance c)
malware detection d) safety measure
22. Which of the following would not secure data in a database? a) encryption b) data integration c)
personal identification number d) username and passwords
23. Which of the following operations would not close MS Word application? a)pressing the Alt + F4 keys b)
clicking the Ꭓ button on the title bar c) choosing exit from the File menu drop down box d) selecting
close from the File menu drop down box
24. The property of a system software that enables it to execute more than one program at a time is
referred to as __________ a) compiling b) virtual memory c) multitasking d) load modules
25. The following are destructive software except _________ a) drivers b) worms c) logic bombs d) Trojan
horses
26. In a relational database management system, files are organized as relations and ______ a) tuples b)
modules c) tables d) forms
27. The exchange of information over a network follows a set of rules called __________ a) transmission
rules b) transfer rules c) channels d) protocols
28. In a database management system, linking entities is used to represent _______ a) attributes b)
objects c) relationships d) relations
29. A data element that uniquely identifies one record from the other in a table is the ________ a) attribute
key b) determinant c) entity key d) primary key
30. In graphics packages, the process of removing an unwanted part of an image is known as __________
a) shaping b) resizing c) editing d) cropping
SECTION B:
PART I: THERE ARE FOUR (4) QUESTIONS IN THIS PART; YOU ARE TO ANSWER ANY THREE (3).
5. A medium scale enterprise intends to create a database to manage its staff records with the following
fields: Staff ID, Address, Photograph, and Department.
VALLEY VIEW
METROPOLITAN AVENUE
SS 1
DATA PROCESSING
SECTION A: SELECT YOUR MOST PREFERRED OPTION FROM THE OPTIONS LETTERED A TO D
TO ANSWER THE QUESTIONS IN THIS SECTION
1. The earliest data processing equipment were all manual- mechanical devices due to a) the needs of
the time b) lack of adequate funds c) absence of electricity and adequate technology d) lack of
government support
2. Regardless of the kind of data processed or the kind of device or equipment used, all data
processing systems involve a) analyzing, logic determination, and coding b) input, storage and
processing c) processing, storage, and distribution d) input, processing, and output
3. It is a process that returns to its beginning and repeats itself in the same sequence. a) repeater b)
cycle c) sequential d) none of the above
4. The conversion of raw data into a meaningful form is called a) data processing b) real processing c)
online processing d) information processing
5. Complex scientific research are usually done using a) mainframe computers b) supercomputers c)
minicomputers d) microcomputers
6. Miss Franca needs to update some work on her computer but has deleted all her files by mistake.
Luckily, she kept a printed copy, which one of the following devices would she use to rectify this
problem? a) microphone b) printer c) scanner d) optical mark recognition
7. Which component adds in the human face to bring the complete computer into a functional and
productive existence? a) humanware b) software c) hardware d) motherboard
8. Which of the following is/are considered as tools of digitalization? a) online exam b) internet c) web-
based sharing d) digital camera
9. The following are mobile operating systems except a) Android OS b) Windows phone c) Mac OS d)
iPhone OS
10. The following are sources of information except a) internet b) manipulation c) database d) magazine
11. A good information must possess the following characteristics except a) accuracy b) timely c)
irrelevant d) cost effective
12. The process of ensuring that data is obtained, shared and disposed of in a manner that it retains its
integrity in a secured manner is called a) data handling b) data model c) data management d) data
storage
13. The effect of buying and selling if goods on the internet is called a) e-communication b) e-banking
c) e-commerce d) e-mining
14. The following are positive effects ICT can have on the society except a) increasing opportunities for
education b) improving communication c) allowing people to participate on a wider, even worldwide
platform d) people having illegal access to your banking details
15. The following are positive effects ICT has on education except a) distance learning where students
can access teaching materials from all over the world b) the ability to perform impossible
experiments by using simulations c) the possibility of students to have individual learning programs
within a topic rather than everyone having to do the same thing at the same time at the same space
d) students, and sometimes, teachers can get hooked on the technology aspect rather than the
subject content
16. A collection of application software bundled in a package is known as a) software suite b)
programming pack c) office packaging d) all software
17. What does the hard drive do? a) stores information temporarily b) gives instructions c) stores
information permanently d) drives through the computer
18. The contents of this chip are lost when the computer is switched off. a) ROM chips b) RAM chips c)
dram chips d) EPROM chips
19. Which part of the computer performs arithmetic calculations? a) ALU b) registers c) logic bus d)
data bus
20. An application designed to be downloaded to a handheld device is a) system unit b) malware c)
mobile app d) Instagram
21. What is the most important piece of software on a computer? a) operating system b) programs c)
applications d) hardware
22. The difference between people with access to computers and the internet and those without this
access is known as the a) digital divide b) internet divide c) web divide d) cyberway divide
23. Word processing, spreadsheet, and photo editing are examples of a) application software b) system
software c) operating system d) platform software
24. All the following are examples of real security and privacy risks except a) viruses b) identity theft c)
hackers d) spamming
25. One byte is equivalent to a) 8 bits b) 16 bits c) 32 bits d) 64 bits
26. Select the smartest memory size. a) kilobyte b) megabyte c) gigabyte d) terabyte
27. The base of the hexadecimal number system is a) 2 b) 8 c) 16 d) 32
28. 1024 bytes equals: a) 1kb b) 1mb c) 1gb d) 1tb
29. The process of transferring files from a computer on the internet to your local computer is called a)
uploading b) forwarding c) FTP d) downloading
30. What does HTTP stand for? a) Head Tail Transfer Protocol b) Hypertext Transfer Protocol c)
Hypertext Transfer Plot d) Hypertext Transfer Plotter
VALLEY VIEW
METROPOLITAN AVENUE
JSS
DATA PROCESSING
VALLEY VIEW
METROPOLITAN AVENUE
JSS 2
COMPUTER SCIENCE