AYOGBEMI SCHOOLS
2nd Term Examination
SUBJECT: COMPUTER STUDIES CLASS: JSS 2 DURATION: 11/2 HOUR
1. The following are the uses of word processors EXCEPT (a) to create documents (b) to print
documents (c) to create memos (d) to visit websites.
2. Programs deliberately written to damage data by copying or replicating itself are called (a)
operating system (b) virus (c) anti-virus (d) software.
3. Dust free environment is one of the ............. of using computer (a) abuse (b) responsible (c)
safety measures(d) effect
4. Cramming other people’s password is one of the ………………… of computers (a) responsible
use (b) abuse (c) benefit (d) effect
5. Hackers gain ............ access to confidential files (a) authorized (b) unauthorized (c) intermediate
(d) right
6. When you purchase a product over a mobile phone, the transaction is called (a) mobile
purchases (b) web commerce (c) e-commerce (d) forex trading.
7. What does the acronym GSM stand for (a) Global System Maintenance (b) Global System for
Mobile communication (c) Global System Mobile (d) Global System Management
8. The full meaning of E-mail is (a) Electronic mail (b) Electricity meter (c) Electron mail (d)
Electron-magnetic.
9. One method of abusing the internet is ………...(a)Fraud (b) fast access to information (c)
communication (d) e-commerce.
10. A machine that allows a bank customer to withdraw cash and check his balance at any time even
at weekends and on public holiday is known as the …………. (a) Credit cards (b) ATM machine
(c) E-commerce (d) Online banking system.
11. Buying and selling via the internet which is often regarded as Internet shopping is known as
…………...(a) Credit cards (b) ATM (c) E-commerce (d) Online banking system
12. When ICT is used in governance, it is referred to as……………(a) e-politics (b) e-governance
(c) e-administration (d) e-commerce.
13. Basic programming was developed in …………. Year (a) 1950 (b) 1964 (c) 1990 (d) 1996
14. The full meaning of UPS is …………… (a) Uninterrupted Power Surge (b) Uninterrupted
Power Supply (c) Underrated Power Supply (d) Uninterrupted Protector Surge.
15. A computer system should be connected to ............... to protect the system from shutting down
abruptly and avoid damage to the computer memory (a) socket (b) extension (c) UPS (d) CPU.
16. What is used to enlarge a picture or image? (a) magnifier (b) brush tool (c) text tool (d) ellipse
tool.
17. …………. is used to select a particular portion of a drawing for the purpose of copying or
cutting (a) free form (b) line tool (c) accessories (d) pointer
18. SIM card is needed in …………... (a) GSM (b)Telephone (c) FAX (d) All options are correct.
19. The following are graphic packages EXCEPT (a) excel (b) Corel draw (c) adobe photoshop (d)
paint.
20. The use of ICT in automated traffic control mechanism to direct vehicles is known as……… (a)
communication (b)timing and control (c) seeking knowledge (d) road adaption.
21. The use of ICT in the transmission of data or information from a source to a destination is
known as ………… (a) communication (b) sharing knowledge (c) diffusion (d) timing and
control.
22. FORTRAN means (a)Formular Transmission (b) Formular Transport (c) Formular Translator (d)
Formular Transistor.
23. ……...... do not require language translator (a) machine language (b) BASIC (c) assembly
language (d) word language.
24. Among the following was the pioneer in the development of computers (a) Isaac Newton (b)
Charles Babbage (c) Johnson John (d) Bill Gate.
25. All are ICT gadgets except ………. (a) computer (b)chainsaw (c)TV (d) satellite
26. File sharing helps in ……. (a) problem (b) loadstar (c) viewing information (d) creating crime
27. Telephone transmits and receives sounds, mostly commonly the …… (a)human voice (b) robot
voice (c) digital voice (d) data voice
28. Fax is used to send and receive …….and …. over the telephone line (a) text and video (b) text
and image (c)text and mp3 (d) image and memo
29. A GSM phone has the following service except ……. (a)calls (b) programming (c)MMS
(d)messages
30. Getting on-line means being connected to………(a)computer (b)internet (c)hardware
(d)software
THEORY
INSTRUCTION: ANSWER 3 QUESTIONS
1a. Explain the following;(I) programming language (ii)Machine language (iii)Low level
language(iv) high level language
2a. Define the Graphic packages
2b. mention five examples of graphic packages software
3a. Define ICT
3b. state 5 examples of ICT gadgets
4a. state five benefits of ICT
4b. state two uses of GSM
5a. what is the full meaning of BASIC?
5b. list five basic character set