2ND TERM MOCK EXAMINATION (I)
2ND TERM MOCK EXAMINATION (I)
17, Otedola Street, Off Fred Williams Street, Gudugba Bus-stop, Iju Lagos State
Tel: 07018202224, 08127338399. E-Mail: [email protected]
1. The first calculator was built by (a) Marie jacquard (b) Blaise Pascal (c) Charles Babbage (d) John Napier
2. A similarity between data and information is that both (a) can be displayed on the monitor (b) are computer inputs (c) are
processed facts (d) are computer results
3. The computer hardware can be classified into (a) ALU and control unit (b) System Unit and Peripheral (c) Central
Processing Unit and Control Unit (d) Input and Output Unit
4. Which of the following is not among the features of a presentation package (a) Animation (b) Insertion of range and cell
(c) Insertion of video and audio (d) Slide and Slide show
5. The central processing unit is connected to the (a) Expansion boards (b) Expansion slots (c) Memory Chip (d)
Motherboard (e) System Unit
6. Which of this package is appropriate for preparing payroll of workers (a) Corel Draw (b) Microsoft Access (d) Ms – Excel
(e) Word pad
7. Modern computers compared to earlier computers are (a) Less reliable (b) faster and larger (c) larger and stronger (d)
faster and smaller
8. EDSAC was produced using a concept known as (a) Circuit Switching (b) Packet Routing (c) Packet Switching (d) Stored
Program
9. The process of running more than one program concurrently is known as (a) Multithreading (b) Multitasking (c)
Multiprogramming (d) Multipurpose
A
Z
B
10. The logic gate symbol above represent (a) AND gate (b) NAND gate (c) NOR gate (d) OR gate
11. The equation for the symbol above is (a) Z = A + B (b) Z = A.B (c) Z = A + B’ (d) Z = A.B’
12. One function of the operating system is (a) Power supply allocation (b) file corruption and deletion (c) hardware upgrade
(d) resource allocation
13. The process of testing the logic of algorithm to ensure they give correct result is known as (a) Debugging (b) Desk
checking (c) Flowcharting (d) Pseudo coding
14. The protocol for email transmission is known as (a) HTTPS (b) DHCP (c) IP (d) SMTP
15. Ethical practices requires computer users to (a) Shutdown properly after using the computer (b) hack into people’s
computer (c) intrude into people’s privacy (d) copy software without the license
16. Duplicating copyrighted electronic or digital content without the author’s approval is considered (a) Felonious (b) Ethical
(c) Treasonable (d) Unethical
17. Serial files are (a) sorted using a key (b) sorted in a particular order (c) Stored as they come (d) Stored in any storage
media
18. In number system, base 16 is called (a) Hexadecimal (b) Decimal (c) Duodecimal (d) Octal
19. A computer program that gathers information about a person or organization without their knowledge is known as (a)
Adware (b) Time bomb (c) Trojan Horse (d) Spy ware
20. The following are the effects of virus infection in a system except (a) Deletion of files (b) slow operation (c) hard disk
failure (d) display of unwanted messages
21. A collection of wires through which data are transmitted from one part of the computer to another is known as (a)
Address (b) Bus (c) Driver (d) Register
22. COBOL was developed for (a) Business Operations (b) Game developers (c) Mobile Application Developers (d) Search
Engine Optimization
23. The IF…….Then statement in BASIC is called (a) An assignment statement (b) An object (c) A class (d) A control statement
24. Which of the following stage of the SDLC (System Development Life Cycle) is post operational stage (a) Analysis (b) Design
(c) Investigation (d) Maintenance
25. The following are types of error in programming except (a) Grammar error (b) Syntax error (c) Logic error (d) Arithmetic
error
26. An algorithm can be described as (a) the output of the instruction to computers (b) the requirement to be processed (c)
problem definition (d) a sequence of instruction for solving problems
27. In networking, bandwidth means (a) Class of IP address used in the network (b) Number of interconnected computers in
the network (c) Transmission capacity of a communication channel (d) Types of nodes in a communication channel
28. The following are functions of a database management system except (a) back up and replication (b) Format operation (c)
rule enforcement (d) Security of data
29. In Ms Excel, the average of 10 numbers given as B1, B2,……….B10 is (a) =(B1 + B2……..+B10)/10 (b) @SUM(B1:B10) (c)
#SUM(B1:B10)/10 (d) =B1+B2+……..+B10/10
30. In graphics, a subscripts text refers to a text that is positioned (a) A little above a normal line (b) A little bit below a
normal line (c) at the end of a line of text (d) at the front of a line of text.
31. In database application, the field length determines (a) the maximum number of characters the field can accommodate (b)
maximum number of operations that can be performed on the field (c) level of security of the database (d) maximum
number of data types the field can contain.
32. Removing a program on a computer properly requires (a) Deleting (b) Archiving (c) Disabling (d) Uninstalling
33. Which of the following is not a criterion for classifying files (a) Nature of content (b) Organizational method (c) Storage
medium (d) Type of data
34. A feature on the operating system that indicates the current active applications is called (a) Icon (b) Menu bar (c) Ribbon
(d) Task bar
35. The hexadecimal number 13 expressed as a binary is (a) 00010011 (b) 00101100 (c) 00010110 (d) 00100100
36. Computers are classified using the following criteria except (a) Cost and portability (b) data representation and purpose
(c) Size and speed (d) Speed and Storage
37. An input device that converts an image into text is known as (a) Optical Character Reader (b) Optical Code Reader (c)
Optical Display Reader (d) Optical Mark Reader
38. The output of a NAND gate is 1 when (a) all inputs are 0 (b) all inputs are 1 (c) any of the input is 0 (d) any of the input is 1
39. The term Compiler in computer programming refers to a (a) Key punch of the computer (b) person who compiles source
program (c) person who writes computer programming codes (d) program which translates source program into object
program.
40. Fibre optics cable transmits signal in the form of (a) Sound (b) Electricity (c) Light (d) Microwave
41. Data transfer can be initiated through the following media except (a) Coaxial cable (b) Fibre cable (c) Trunking pipe (d)
Twisted pair cable
42. In BCD encoding system, 2510 will be represented as (a) 01100101 (b) 01010110 (c) 00100101 (d) 01010010
43. The following actions are sources of security breaches in computing except (a) carelessness (b) hacker’s threat (c) piracy
(d) viruses
44. Multiply 1012 by 112 (a) 10012 (b) 10112 (c) 11102 (d) 11112
45. Which of the following computer files can be used for updating the master file (a) Date (b) Program (c) Reference (d)
Transaction
46. In a star network, each node must (a) be connected directly to the adjacent nodes (b) be connected directly to a central
hub (c) be connected directly to common backbone cable (a) possess a token before it can transmit signal to adjacent
node
47. A field chosen to uniquely identify every record in a database is (a) Foreign (b) Local key (c) Primary key (d) Secondary
key
48. The hardware component that is responsible for fetching, decoding and execution of program instruction is (a)
Accumulator (b) Read Only Memory (c) Random Access Memory (d) Central Processing Unit
49. The copyright law is used to protect (a) right of men (b) right of minors (c) intellectual properties (d) right of women only
50. A high level language program translator which converts a source code to machine readable format and executes it one
line at time is called (a) Compiler (b) Debugger (c) Editor (d) Interpreter
PAPER II (Theory)
Answer any three (3) question from this section
QUESTION 1
a) Define the term ‘Computer’ and ‘Computer System’ and list out four features one need to look out for when planning to get
a new computer system.
b) What are computer software? List the types of computer software and explain any one
c) List out 4 devices used in the pre-computing age
d) Briefly discuss the following
(i) Slide Rule
(ii) Jacquard’s loom
e) Highlight 4 shortcomings of the pre – computing age devices
QUESTION 2
a) Differentiate between a system software and an Application software
b) What is an operating system? State 2 functions of an operating system.
c) What are computer output devices? List out the categories for classifying a monitor.
d) Describe the function of a printer and list the two types/categories of printers.
e) Give two examples each for each categories/ types of printer
QUESTION 3
a) Explain the term Data and Information and list 2 two types of data
b) In a tabular form, write out two differences between data and information
c) State the two sources of data and explain any one.
d) Explain the term ‘Security Breach’ and ‘Computer Security’
e) State 4 sources of security breach and 3 preventive measures against security breach.
QUESTION 4
a) What are computer storage devices? State the three types of computer storage
b) State 2 features/characteristics of a primary storage device
c) Write out 2 differences between the RAM and ROM
d) Write out the different units of storage as used by the computer
e) Convert the following to the specified unit of storage (i) 67,003,324,746 bytes to Gigabytes (ii) Convert 8,846,679
Megabytes to Kilobytes
QUESTION 5
a) What are logic gates? List the 3 different standard logic gate.
b) Construct a truth table for the following logic gate (i) AND (ii) NAND
c) List out 3 alternative logic gate
d) What are operating Systems? List 2 types of operating system
e) Write out 3 functions of the operating system
QUESTION 2
a) Using a star shape tool in Corel Draw, draw a 30pts star of diameter 18cm and fill it with grey color.
b) Use sharpness tool to adjust the corner sharpness of the star by 25pts
c) Place three circles: Circle 1, Circle 2, Circle 3 with diameters 10cm, 7.6cm, 5.4cm respectively inside the star.
d) Use text tool to type ARISE AND SHINE and place between circle 2 and 3.
e) Fill circle 2 with lemon color and circle 3 with white color
f) Place five star inside circle 3
g) Group your drawing
h) Type in your full name as the footer
i) Save your work in the folder you created on the desktop
QUESTION 3
a) Using a word processing application package, create a visiting card for a system administrator of a software company
using the following specifications (a) Size of the card is 3.5’’ x 2’’
b) Office and Residential address separated by a line
c) The card should be copied in three places on the same page
d) The background color must be grey scale (ii) the card should be in shadow style (iii) title ‘Visitor’: Uppercase
Font-size – 10pts
Font Type – Georgia
iv)Office Address and Residential Address – 1.15 spacing
Font-type: Cambria
Font size: 7pts
e) Insert a footer and type in your full name and index number
f) Save your work with your full name in the folder created on desktop