This document contains a summary of an end of term examination for JHS 2 students in Information Communication Technology (ICT) in Ghana. The exam has 40 multiple choice questions testing students' knowledge of topics like computer hardware, software, operating systems, the internet, email, and word processing. It also contains 3 essay questions where students are asked to explain terms related to the internet and search engines, and identify top-level domains in website addresses.
This document contains a summary of an end of term examination for JHS 2 students in Information Communication Technology (ICT) in Ghana. The exam has 40 multiple choice questions testing students' knowledge of topics like computer hardware, software, operating systems, the internet, email, and word processing. It also contains 3 essay questions where students are asked to explain terms related to the internet and search engines, and identify top-level domains in website addresses.
This document contains a summary of an end of term examination for JHS 2 students in Information Communication Technology (ICT) in Ghana. The exam has 40 multiple choice questions testing students' knowledge of topics like computer hardware, software, operating systems, the internet, email, and word processing. It also contains 3 essay questions where students are asked to explain terms related to the internet and search engines, and identify top-level domains in website addresses.
BANKO D/A JHS END OF THIRD TERM EXAMS INFORMATION COMMUNICATION TECHNOLOGY JHS 2 SECTION A – Answer all questions
Update Ghana Network 9. Which of the following is example of antivirus
A. worm B Mcfee End of 2nd Semester Examination C. folder D. scanner ICT. JHS 2 10. Font is found on the A menu bar B. formatting toolbar C. view D. insert 1. To connect to the internet, you need the following except…… 11. Which of the following is an example of web A. printer B. modem browser software C. internet server. D. computer system A. window media player B. Mozilla firefox 2. All the following are the primary requirements for C. word office D. wordpad creating an e-mail account except…… 12. Line, block arrow and flowchart are located on A. your name B. ID and password the C. place of birth D. date of birth A drawing toolbar B formatting toolbar 3. What is the full meaning of WWW? C menu bar D. clipboard A word wide web B. world wide web 13 …………..is used to check how document will C. work world web D. wrisk wide web look like when printed 4 Computer Virus is ………………… which affect A. font B. print preview computer system C. print copies D print pages A. progam B lock 14. A device that converts softcopy to hardcopy is C update D operating software called 5. Which of the following is not a computer virus ? A monitor B. printer A Trojan horse B worm C. scanner D. projector C. file virus D avast 15. Style of font that slants the letters evenly to the 6. Programs which protect computer from been right is called affected with virus is called A. bold B arial black A scan B. antivirus C.italic D new roman C. Trojan D. worm 16. Storage devices come under what aspect of 7. Virus can be transferred from one computer to computer ware other through A) software B) hardware A pen drive B. repairing C) penware D) monitor C installing D creating 17. Input devices help to….. the computer with data 8. All the following are sources of virus except A) repair B) destrory A. networking B. downloading C) feed D) mould C. booting D e-mail 18. Files are arranged in…. A) folder B) cards C) boards D) pairs 19. A collection of data or information that has a A. Encarta B. encyclopeadia name is called…. C. kidpix D. wordpad A) collector B) file 29. When a text automatically moves to the next C) picture D) datum line at the end of a margin in a word processing 20. Files can be located on the program. It is referred to as A) hard drive B) monitor A. text wrap B. word wrap C) keyboard D. System C. text movement D. test wrap 21. A website address is typed in the ……..bar of a 30. Which of the following domain name extension browser. is used by educational institution? A. inside B. ware house A. .com B. .edu C. website D. web C. .net D. .org 22. All the following are not morally good on the 31.The http:// in a website address refers to internet except. A. domain name B. directory name A. internet fraud (sakawa) C. file game D. protocol B. watching porn pictures 32. Which of the following can be used as an input C. sending abusive emails device and the same time as an output device? D. chatting online A. microphone B. modem 23. The command that enables the user to save a C. Printer D. Speaker previously saved document under a new name is 33. Which of the following keys are used to A. new B. rename underline a text in word processing? C. save D. save as A. ctrl +B B. ctrl + H 24. The internet is a ………. C. ctrl + I D. ctrl + U A. global network of computers 34. When pursuing typing lesson, computer users B. government agency that links computers are expected to use C. software for designing programs A. 5 fingers B. 6 fingers D. special network of computers in an office C. 8 fingers D. 10 fingers 25. A hyperlink is normally ………. with blue or 35. Which of the following media stores data red colour. temporarily? A. arrow B. button A. floppy disk B. random access memory C. underlined D. start C. hard disk D. read only memory 26. What is the meaning of this domain “.com” 36. Information printed on paper is referred to as A. community B. commercial A. carbon copy B. print copy C. common D. network C. hard copy D. soft copy 27. Which of the following is a correct website 37. The button that opens a dialogue box for user to address? create an email message is A. http://ww. Cnn.com A. back B. create B. http//:www.cnn.com C. compose D. refresh C. http://www.cnn.com 38. In an email environment, the acronym BCC D.www//http:cnn.com refers to 28. All the following are educational software A. blank carbon copy B. bulk carbon copy except C. blind carbon copy D.backup carbon copy 39. One billion bytes is approximately one A. gigabyte B. kilobyte C. megabyte D. terabyte 40. Viewing television for long periods can damage an individual’s A. eye B. head C. mouth D. nose (d). i In a word processing application, what is the command button print preview used for?
1. A Identify the diagram below
SECTION B Answer question 1 and any other two (2) questions in this section
Q1 a. Study the diagrams below and answer the
questions that follows;
(b) Identify the parts labeled A,B and C in 1(a)
Answer 3 questions from this section.
Q1 {a} Explain the following terms: (i) ii iii (i) internet (ii) Search engine
(b) What does the following Top Level Domains [TLDs}
represent in a website address? (i) .com (ii) .edu (iii) .gov iv (iv) .net (v).mil (vi) .org
(v) Q2 (a) State three 3 positive uses of internet.
(b). Name the diagrams above from i to v (b). List 5 storage media. (ii) state the function of (v) above (c).Mention any 4 educational software you know. c. Complete the table below Windows Name of Function of button Windows Windows Q3 ( a). What is a computer? button button (b) State four (4) uses of a computer
(c). What is educational software?
Q4. State the purpose of the following (a) Sign in; (b) Compose; (c) Attach (d) Sign up
Perception of Health Information Management Professionals On The Importance of Computer System in Health Information Management in Obafemi Awolowo Teaching Hospital, ILE - IfE, Osun State, Nigeria
International Journal of Innovative Science and Research Technology