Seccond Term Examination (S.S.S.1 To S.S.S.2) MR Charles
Seccond Term Examination (S.S.S.1 To S.S.S.2) MR Charles
1. Software is referred to as the {2016} 8. A suite of software that controls and manages
[A] Generic term for computer programs the basic operation of a computer is {2019}
[B] Physical components of the computer [A] Application software
[C] Part of the computer for communication [B] Management system
[C] Software program
[D] Part of the computer which is breakable
[D] System software
2. The software whose output is intended 9. The major advantage of free software is that it
for the human user is called {2016} is {2019}
[A] Application software [A] Free and contains unlimited components
[B] Firmware [B] Licensed and available always
[C] Malware [C] Licensed and can be copied by anyone
[D] System software [D] Superior in quality but not robust
3. A set of programs, routines and 10. The operation of a computer and peripherals
procedures that are used to operate the attached to it is controlled by {2020}
computer hardware is called {2017} [A] Application software
[A] Firmware [B] Hardware
[B] Shareware [C] Liveware
[C] Software [D] system software
[D] Utility 11. An advantage of Graphical User Interface
4. In a computer, the sets of instruction that (GUI) over Disk Operating System (DOS) is
direct it in performing a particular task is that it allows the use of {2014}
called {2014} [A] Diskette
[A] Information [B] Keyboard
[B] Program [C] Mouse
[C] Data [D] Monitor
[D] File 12. Which of the following is not function of an
5. A major function of system software is
operating system? {2015}
{2014}
[A] Analysis of the computer components
[A] Collection of files
[B] Translation of machine language into [B] Ensuring the proper functioning of
machine code hardware
[C] File management [C] Maintenance of directories in external
[D] Arrangement of files in ascending order storage
6. The act of translating data into a secret [D] Opening and closing files
code is known as {2017}
13. The operating system, translators and utility
[A] Authentication
programs are examples of {2015}
[B] Authorization
[C] Encryption [A] Application software
[D] Piracy [B] Customized software
7. The most important system software in a [C] Network software
computer system is the {2018} [D] System software
[A] Control programs
[B] Language translator
[C] Operating System
[D] Utility programs
14. Which of the following file formats is [B] C, D and E
supported in all windows operating [C] B, C and D
systems? {2017} [D] F, G and H
[A] BSD 22. Antivirus software is an example of
[B] EXT {2020}
[C] FAT [A] Application software
[D] NTFS [B] Operating system
15. To hibernate in windows Operating [C] System software
System means {2017} [D] Utility software
[A] Restart the computer in safe mode Use Table 3 to answer questions 23 to 25
[B] Restart the computer in hibernate mode {2014}
[C] Shut down the computer and terminate all A B C D
running applications
[D] Shut down the computer without closing all 1 BOOKS SUPPLIED TO SENIOR
the running applications HIGH SCHOOL
16. The command line prompt of MS-DOS
2 SHSI MATHS ICT ENGLISH
operating system is represented as {2018}
[A] C: >. 3 SHSII 3450 4500 5678
[B] C:\.
[C] C:\> 4 SHSII 8765 6580 9000
[D] C\:>
17. A collection of software that allows the 5 SHSIII 2456 4009 4400
computer to operate is called {2019}
[A] General-Purpose software
23. In Table 3, the content of cell C5 is
[B] Utility software [A] 2456
[C] Operating system [B] 4009
[D] Specific software [C] 4400
18. The Windows PC and the Apple [D] 3450
Macintosh are examples of two different
24. The number of cells that contain data in
{2019}
row 1 is
[A] Input devices
[A] 1
[B] Platforms
[B] 3
[C] Programs
[C] 5
[D] Storage devices
[D] 7
19. Three major types of language
25. Which of the cells in Table 3 contains
translators are {2019}
numeric data with the least value?
[A] Assembler, Compiler and Editor
[A] A5
[B] Assembler, Compiler and Interpreter
[B] B5
[C] Compiler, Debugger and Editor
[C] C5
[D] Debugger, Assembler and Interpreter
[D] D5
20. The term compiler in computer
26. An example of a specific purpose
programming refers to a {2019}
application package is the {2015}
[A] Key punch operator of the computer
[A] Payroll program
[B] Person who compiles source programs
[B] Database program
[C] Person who writes the computer
[C] Spreadsheet program
programming codes
[D] Word processing program
[D] Program which translates source program
into object program
Use the MS Excel table below to answer
21. The disk operating system will label three
questions 27 to 29. {2015}
hard drives as {2019}
A B C D
[A] A, B and C
1 BOOKS SUPPLIED TO SENIOR HIGH 33. In MS Excel, comments used in cells
SCHOOL are called {2017}
[A] Cell tip
2 SHSI MATH ICT ENGLIS [B] Smart tip
S H [C] Soft tip
[D] Web tip
3 SHSII 2456 658 5678
34. The absolute address of cell G5 in a
0
spreadsheet application is represented by
4 SHSII 3450 400 4400 {2017}
9 [A] $G5
[B] G$5
5 SHSII 8765 450 9000 [C] $G$5
I 0 [D] $G5$
S/ A B C D
N
27. The content of cell D3 is
[A] 3450 1 Stock List of Tayo Okeke as at May,
[B] 4400 2014
[C] 4500
[D] 5678 2 Quoted Share Curren Value
28. The number of cells that contain data in Stock Unit t Unit
row 1 is Price
[A] 1 (N)
[B] 3
[C] 4 3 Tanzel 44,000 50 2,200,000
[D] 5 Pic
29. The number of cells that contain
4 Kaptol 125,00 80 10,000,00
numeric data in the table are
0 0
[A] 4
[B] 8 5 BankKL 75,000 140 10,500,00
[C] 9 M 0
[D] 12
30. The default number of sheets of a 6 Arix Oil 10,000 250 2,500,000
workbook is {2016}
7 TOTAL VALUE
[A] One
[B] Two
[C] Three
Use the MS Excel table below to answer
[D] Four
questions 35 and 36 {2017}
31. The chart type that does not have the
X and Y axes display is the {2016}
35. The formula used to compute the
[A] Area chart
TOTAL VALUE in cell D7 is
[B] Bar chart
[A] = sum (D2:D7)
[C] Pie chart
[B] = sum (D3:D7)
[D] Scatter diagram
[C] = sum (D2:D6)
32. When a worksheet is deleted from a
[D] = sum (D3: D6)
workbook, it is {2016}
36. Which of the columns needs to be
[A] Lost forever
adjusted to accommodate the cells contents?
[B] Sent to the recycle bin
[A] Column A
[C] Sent to the original folder
[B] Column B
[C] Column C
[D] Stored permanently in main memory
[D] Column D
37. The largest component in a 43. The set of instructions written by
spreadsheet is {2018} computer experts to solve specific task of the
[A] Cell user is called {2019}
[B] Range [A] Operating system
[C] Workbook [B] Application software
[D] Worksheet [C] System software
38. Which of the following programs is an [D] Utility software
application specific? {2018} 44. In MS Excel, the cell that contains the
[A] CorelDraw pointer or cursor is called {2019}
[B] Microsoft Access [A] Active cell
[C] Microsoft Word [B] Current cell
[D] Payroll System [C] Default cell
39. The following programs are general [D] Passive cell
purpose application software except {2018} 45. One major difference between paper
[A] CorelDraw spreadsheet and electronic spreadsheet is
[B] Editor {2019}
[C] MS Access [A] Arrangement of columns
[D] MS Word [B] Headings formatting
40. The use of spreadsheet packages [C] Arrangement of rows
include: {2018} [D] Speed of processing
I. Preparing organization’s logo 46. To hold row and column titles in places
II. Performing sensitivity analysis so that they do not scroll when the user scrolls
III. Preparing reports for senior a worksheet, click the {2019}
management [A] Freeze panes command on the windows
IV. Preparation of profit forecast menu
Which of the following options is true? [B] Hold titles command on the edit menu
[A] II and IV only [C] Split command on the windows menu
[B] III and IV only [D] Show grid command on the windows menu
[C] I, II and III only 47. A cell with a red triangle in the top-right
[D] II, III and IV corner in a spreadsheet application signifies
41. The common features of formula and {2019}
function in spreadsheet are: {2018} [A] An error in the cell
I. Entry is preceded by = or + symbol [B] A comment for text in the sell is red
II. They have fixed formats [C] That the font colour be entered into the cell
III. They operate with cell addresses
[D] That a formula cannot be entered into the
IV. Their results are displayed
cell
Which of the following option(s) is/are true?
48. Spreadsheet packages can be used for
[A] I, II and III only
{2019}
[B] I, III and IV only
[A] Database and painting
[C] II, III and IV only
[D] I, II, III and IV [B] Drawing and painting
42. Arrange the following spreadsheet [C] Budgeting and inventory
window parts in a hierarchical order by size. [D] Word processing and drawing
{2018} 49. Which of the following programming
I. Worksheet languages needs no translator for it to
II. Cell run? {2014}
III. Workbook [A] High Level Language
IV. Range [B] Low Level Language
[A] III, I, IV and II [C] Machine Language
[B] III, IV, II and I [D] Assembly Language
[C] II, III, IV and I 50. An example of a programming
[D] IV, I, III and II language that uses mnemonic code is {2015}
[A] Assembly program
[B] BASIC program [D] FORTRAN program
[C] COBOL program
51. Software is referred to as ____ [D] Piracy
[A] Generic term for computer programs 56. The advantages od “GUI” over “DOS” is
[B] Physical components of the computer that is allows the use of ____
[C] Part of the computer for [A] Diskette
communication [B] Keyboard
[D] Part of the computer which is [C] Mouse
breakable [D] Monitor
52. The most important system software in a 57. QBASIC keywords does not include on of
computer system is the ____ the following
[A] Control programs [A] FIND
[B] Language translator [B] LET
[C] Operating system [C] REM
[D] Utility programs [D] STOP
53. The software whose output is intended for 58. Machine language instruction are
the human use is called ___ expressed in ___
[A] Application software [A] Binary
[B] Firmware [B] Decimal
[C] Malware [C] Hexadecimal
[D] System software [D] Octal
54. In a computer, the sets of instructions that 59. The IF…. THEN statement in BASIC
direct it in performing a particular task is programming is ___
called__ [A] A transfer of control
[A] Information [B] Used to redirect a statement
[B] Program [C] Used to eliminate the need for
[C] Data prompting each INPUT statement
[D] File [D] A conditional branch statement
55. The act of translating data into a secret 60. Which of the following networks covers
code is known as ____ the widest range?
[A] Authentication [A] LAN
[B] Authorization [B] MAN
[C] Encryption [C] PAN
[D] WAN
SECTION B (THEORY)
Answer THREE questions in this section
1.Which of the following statements is true 7. Which of the following is not a step involved in
about registers? {2014} data conversion? {2020}
[A] It is a storage area around CPU [A] Input
[B] It is situated beside the CPU [B] Output
[C] It is situated beside the memory [C] Process
[D] It is a special high speed storage area [D] Transfer
within the CPU 8. Which of the following statement is not true
2. The term bus width in data transfer refers to about a computer file? {2014}
the {2015} [A] It is very fast to access any record within a
[A] Number of wires in the bus file
[B] Size of the data movement [B] It is created electronically
[C] Number of bits of information the RAM can [C] Initial setup is inexpensive
send to the CPU at the same time [D] File creation and access are less laborious
[D] Number of wires in the bus that carry 9. An advantage of sequential access over serial
information to the processor at a time access is that {2014}
3. A data bus that is capable of transferring 8 [A] Sequential file is slow
bytes of data at once can be rated as {2020} [B] Sequential file is detailed
[A] a 16-bit data bus [C] Sequential file does not use key
[B] a 32-bit data bus [D] Individual records can be located more
[C] a 64-bit data bus quickly
[D] an 8-bit data bus 10. Which of the following is not a biometric data?
4.The speed of data transfer in the computer {2016}
can be determined in terms of {2016} [A] Finger prints
[A] Protocol and bus speed [B] Password
[B] Bus speed and width [C] Pattern of eye iris
[C] Bus speed and storage media [D] Sound of the voice
[D] Bus width and storage media 11. Sorting of records is sufficient and a
5. The speed of data transfer in the computer necessary condition for creating {2016}
can be determined in terms of {2018} [A] Random file
[A]Protocol and bus speed [B] Indirect file
[B] Bus speed and bus width [C] Sequential file
[C] Bus width and storage media [D] Indexed sequential file
[D] Bus speed and storage media 12. Random file organization is also known as
6. The conversion of readable data to {2018}
unreadable codes in order to prevent [A] Direct file organization
unauthorized access is known as {2018} [B] Indexed file organization
[A] Authentication [C] Serial file organization
[B] Encryption [D] Sequential file organization
51. Removing a program on a computer properly 54. Data that is copied from an application is
requires ___ stored in the ____
[A] Deleting [A] Clipboard
[B] Archiving [B] Driver
[C] Disabling [C] Prompt
[D] Uninstalling [D] Terminal
52. The keyboard command used to copy text in 55. The basic computer operation involves the
MS-word document is following except ___
[A] Shift + C [A] Access
[B] Ctrl + N [B] Input
[C] Ctrl + C [C] Output
[D] Ctrl + Alt + C [D] Process
53. In order to locate a particular word in a 56. The part of the computer that holds the data
document, an easy way to do this is to use the and programs for CPU processing is the __
___ [A] Address
[A] Find command [B] Register
[B] Replace command [C] RAM
[C] Search command [D] ROM
[D] Go To command
57. The major components of a computer system 59. The smallest unit of information
are ____ representation which is addressable on the
[A] Firmware and Human ware computer memory is ___
[B] Hardware and Firmware [A] 1 bit
[C] Hardware and Software [B] 2 bits
[D] Software and Firmware [C] 4 bits
58. One attribute of the ROM is that it [D] 8 bits
[A] Stores the BIOS 60. A data bus that is capable of transferring 8
[B] Is Volatile bytes of data at once can be rated as ___
[C] Can be modified [A] A 16-bit data bus
[D] Stores the POST [B] A 32-bit data bus
[C] A 64-bit data bus
[D] An 8-bit data bus
SECTION B (THEORY)
Answer THREE questions in this section
1. Write the full meaning for each of the following in context with internet technology:
(i) ISP
(ii) IPS
(iii) PPP
(iv) WWW
(v) DNS
(vi) TCP/IP
(vii) HTTP
(viii) HTML
(ix) SMTP
(x) LAN (1marks each)
3. (a) Highlight the differences between Register and Main Memory in a tabular form (3marks)
(b) List and explain three (3) types of BUS in a computer memory (6marks)
(c) Define Register (1mark)
4. (a) Define internet (2marks)
(b) Name and explain four (4) types of register (6marks)
(c) What is a web browser? (2marks)