Ss2 Ict Second Term Exam 24

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

CELEBRITY INTERNATIONAL SCHOOL

(MONTESSORI, SCIENCE & TECHNOLOGY)

NO. 22 PHASE II, HOUSING ESTATE OPP. W.H.O FIRST GATE LOKONGOMA, LOKOJA, KOGI STATE
SECOND TERM EXAM 2023/2024 ACADEMIC SESSION
CLASS: SS2 SUBJECT: COMPUTER/ICT
SECTION A: OBJECTIVE QUESTIONS
INTRUCTION: ANSWER ALL

1. The collection of related data items or C. Reference file


field is called ----------? D. Master file
A. column 6. We have -------------- methods of file
B. record security
C. file A. 4.
D. All of the above B. 2
2. File organization is categorized into C. 3
---------- D. 7
A. 1 7. The concept that computer system is
B. 2 vulnerable to attacks thereby affecting
C. 6 the computer file is called?
D. 4 A. Data Issue
3. A/An ----------------------- file organization B. Viral infection
contains reference numbers or primary C. File insecurity
keys that uniquely identify a record in a D. Backup error
table or database. 8. String of characters use for
A. Alphabetical organization authentication and prove of identity is
B. Serial organization called?
C. Sequential organization A. Data Entry
D. Indexed organization B. Password
4. A -------------------------- File organization C. Evaluation
needs to be read from the beginning to D. All of the above.
the end in chronological order. 9. .The process of making copies of file for
A. Indexed organization future recovery should data loss occur
B. Numerical organization is called?
C. Sequential organization A. Recovery
D. Serial organization B. Backup
5. The file containing permanent C. Duplication
information usually updated D. Accumulation.
periodically is called 10. The security of computer files
A. Transaction file is_______ to break into
B. Serial file A. Tight and difficult
B. Easy B. CTRL+V
C. Fragile C. CTRL+ P
D. None D. None
11. Which of the steps is correct in order to 18. What is the shortcut to change text
save a document in Microsoft word from small to Capital letter
A. CTRL+Z A. SHIFT + C
B. CTRL+S B. CTRL+ F3
C. CTRL +V C. SHIFT +F3
D. CTRL+A D. SHIFT +F1
12. what is the shortcut to Justify the 19. keyboard shortcut to Print a document
alignment on a document page is
A. CTRL +Y A. CTRL +P
B. CTRL+J B. CTRL +T
C. CTRL+ F C. SHIFT +P
D. None D. ALT+P
13. On which Tab will you find Left, Right, 20. Keyboard shortcut to Undo a mistake is
Centre and Justify Text Alignment A. CTRL+Z
A. Insert B. SHIFT +Z
B. Page Layout C. CTRL+Y
C. View D. None
D. Home 21. Keyboard Shortcut to Find or search a
14. Where on Microsoft word can you find word in the document
The save option A. CTRL+O
A. File Menu B. CTRL+F
B. Insert Ribbon C. CTRL+S
C. Home Ribbon D. SHIFT+F
D. Page layout. 22. Keyboard shortcut to search for Help is
15. What is the shortcut to Copy a text or A. CTRL+H
image B. F2
A. CTRL+A C. F5
B. CTRL+C D. F1
C. CTRL+ P 23. Keyboard Shortcut to Bolden a text in a
D. None document
16. What is the shortcut to MOVE or CUT a A. NCTRL+O
text or an image B. CTRL+B
A. CTRL+X C. CTRL+S
B. CTRL+C D. SHIFT+B
C. CTRL+ P 24. Keyboard Shortcut to underline a text in
D. CTRL+M a document is?
17. What is the shortcut to paste an already A. CTRL+U
copied text or image B. CTRL+B
A. CTRL+B C. CTRL+S
D. SHIFT+R C. Record
25. Keyboard Shortcut to apply Italics on a D. indexed
text in a document is? 32. The collection of records is
A. AlT+O called_____?
B. CTRL+I A. File
C. CTRL+S B. Filed
D. SHIFT+I C. Data
26. Keyboard Shortcut to close a program D. None of the above
is? 33. Computer files can be classified as
A. ALT+C follows except
B. CTRL+B A. Master files
C. ALT+F4 B. Reference files
D. SHIFT+B C. Master file
27. Keyboard Shortcut to minimize a D. Register files
program in computer 34. A random access is also called?
A. Window+O A. Direct access
B. CTRL+B B. Sequential access
C. CTRL+S C. Serial access
D. Window+M D. None of the above
35. The concepts that a computer system is
28. Which is the first stage of system vulnerable to attack, thereby affecting
development lifecycle
the files in the system is called?
A. Analysis
B. preliminary studies A. Virus
C. implementation B. File theft
D. Design C. File insecurity
29. The final stage of system development D. Hacking
lifecycle is? 36. One of the one of the following is not a
A. Study review
cause of data loss
B. Implementation
C. Design A. Human error
D. Analysis B. Computer virus
30. The smallest unit of information stored C. Hardware or system problem
in a computer files is called? D. All of the above
A. Field 37. One of the following is not a criteria for
B. Record classifying computer files
C. Computer file A. Nature of content
D. Data Item B. Organization method
31. One of the following is not among the C. Storage medium
main methods of file organization on D. None of the above
disk/tape 38. ………….. is an entity of data available to
A. Serial system users that is capable of being
B. Sequential manipulated as an entry
A. Computer files
B. Field 45. ……….. Follows a project through the
C. Database initial idea or innovation to the point
D. File organization where it becomes a functional system?
39. One of the following is not a type of A. Chronological system cycle
data entry B. Description system cycle
A. Boolean C. System development cycle
B. Numeric D. Flexibility development cycle
C. Logic 46. In a word processing environment,
D. Alpha-numeric adjustment of horizontal spacing so as
40. BASIC is an acronym for; that text is aligned evenly along both
A. Beginner All Symbol Instruction Code the left and right margin is called?
B. Beginner All-purpose Symbolic A. Jurisdiction
Instruction Code B. Manifestation
C. Beginner All Symbolic Information Code C. Justification
D. Beginner All-purpose Symbolic D. Magnification
Information Code 47. One of the following is not a stage of
41. VIRUS is an acronym for; system development cycle
A. Vital Instruction Resource Under Siege A. Feasibility study
B. Vital Information Resource Under Seize B. Analysis
C. Vital Instruction Resource Under Seize C. Study review
D. Vital Information Resource Under Siege D. None of the above
42. What is the binary equivalent of the 48. All except one is the facilities available
decimal number 19? in word processing
A. 11001 A. Type document
B. 10110 B. Edit document
C. 10011 C. Store document
D. 10101 D. Shop document
43. _____ is a classification of file 49. What is the application area of word
containing relatively permanent processor
information, usually updated A. Journalism
periodically? B. Publishing
A. Reference file C. Home
B. Master file D. All of the above
C. Transaction file 50. The collection of data that is written,
D. None of the above typed, printed on paper, or created
44. The cable used for long distance and with a computer application and used
high performance data networking is? to provide information for future use is
A. Coaxial called…..?
B. Power A. Store document
C. Fiber optic B. Text document
D. Shielded twisted pair C. Typed document
D. Copy and paste document
SECTION B: (Answer question number 1 and any other 3 questions)

1. Explain in details what is Cyber security (10mrk)


2. Mention 5 features of a word processor(5mrk )
a. Explain 1 of the features above(5mrk)
3. What is the difference between E-mail and G-mail? (7mrk)
a. Mention 3 most common E-mail service providers(3mrk)
4. In a table form, write 4 each, the advantage and disadvantage of computerized files (6mrk)
a. What is the name of your current form teacher?(4mrk)

You might also like