0% found this document useful (0 votes)
41 views6 pages

1ST Term JHS 2 Ict Mod

The document is an examination paper for Information and Communication Technology (ICT) for Junior High School 2, covering various topics such as copyright, software types, computer components, and internet etiquette. It consists of multiple-choice questions in Section A and theoretical questions in Section B, requiring students to define terms, explain concepts, and outline procedures related to ICT. The exam aims to assess students' understanding of ICT principles and practices.

Uploaded by

gidnams
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views6 pages

1ST Term JHS 2 Ict Mod

The document is an examination paper for Information and Communication Technology (ICT) for Junior High School 2, covering various topics such as copyright, software types, computer components, and internet etiquette. It consists of multiple-choice questions in Section A and theoretical questions in Section B, requiring students to define terms, explain concepts, and outline procedures related to ICT. The exam aims to assess students' understanding of ICT principles and practices.

Uploaded by

gidnams
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

FAITH MISSION CENTRE

KEGUE, LOME-TOGO
2023/2024 ACADEMIC YEAR
first term examination
SUBJECT: information and communication technology (ict)
CLASS: j.h.S 2

SECTION A: OBJECTIVES

1. What is copyright? 3. Shareware means


a. The right to copy other ___________
people’s work a. The author will let you
b. The exclusive privilege that download it and let you pay
allows an author or owner for it
to sell his work on his or b. The author wants to give
own everyone the software for
c. The correct way to copy free
other people’s work c. You have to share the
without getting into trouble software with someone
d. The privilege to copy and 4. A student went to ACME Art
sell other people’s work Company website and copied a
2. Which of the following kinds of picture of some art for sale
software can you download without permission. This action
legally and ethically from the would be considered
internet for free? a. Legal
a. Shareware b. Ethical
b. Full version software c. Unethical
c. Giftware d. The use of public domain
d. Freeware
5. Copying a material word by 18.Which of these typing skills
word and claiming it is yours is tutorials is best for typing
called ___________ skills?
a. Copy cater a. Notepad
b. Ethical copying b. MS Word
c. The copyright buster c. Word Pad
d. None of the above d. None of the above
6. If you see a software on the 19.The P/S 2 mouse port is
internet you want to use, you usually located at the
should make sure that it is ____________ panel of the
_________ system unit.
a. Copyrighted a. Back
b. Freeware b. Front
c. Public domain c. Side
d. Ethical d. Right
7. Software that was written with 20.The acronym RAM stands
malicious intent to cause for ____________
annoyance or damage is a(n) a. Random across memory
a. Uninstaller b. Random America memory
b. Antivirus c. Random access memory
c. Virus d. Random ascertain memory
d. Modem 21.Pick the odd out of the
8. ___________ is a term used to following
describe a wide range of a. Printer
programs that secretly accord b. Scanner
and report an individual’s c. Monitor
activities on the internet? d. Projector
a. Worm 22.The ____________ contains
b. Utility the entire component in the
c. Virus system unit.
d. Spyware a. Sister board
b. Motherboard
c. Father board
d. Uncle board a. Hackers
23.All of the following can b. Organized criminals
spread virus except c. Employees
a. Pen drive d. 419
b. Diskette 10. ______ fills a computer with
c. Monitor self-replicating information
d. Compact disc a. Worm
24.The whole screen of the b. Virus
monitor is called the c. Antivirus
____________ d. Crackers
a. RAM 11. What is Netiquette?
b. Interface a. Network etiquette
c. Text area b. Net quite
d. None of the above c. Internet questions
25.Which finger is used to give d. None of the above
space while typing. 12. The process of applying
a. Little finger standard codes of behavior
b. Long finger when using the internet is
c. Thumb called
d. Index finger a. Code of conduct
30.The devices which do not b. Internet etiquette
use cable for its connection c. Hacker
are termed as d. Lurking
___________. 13.Which of the following is an
a. Wired devices ethical issue in computing?
b. Television a. Virus
c. Wireless b. Copyright
d. Displaying c. Dust
d. Power fluctuation
14. Unwanted e-mail received on
9. The largest category of the internet are called
computer criminals is a. Letters
________ b. Blogs
c. Proxy a. Input
d. None of the above b. Computing
15.The printout that comes out of c. Monitor
a printer is referred to as d. Output
_____________ 28.Which of these is an
a. Printout example of operating
b. Softcopy system that can be installed
c. A4 paper on your computer?
d. Hardcopy a. Microsoft Windows
16. Changing the name of an b. Mavis Beacon
already created file is called c. Microsoft Word
__________. d. Software
a. Formatting 29.To perform operations in
b. Renaming information processing
c. Editing cycle, how many stages
d. Spell checking must be considered?
17.Which of the following is a. 2
considered an input device? b. 5
a. Scanner c. 4
b. Monitor d. None of the above
c. Floppy disk 30. In order to arrange your files
d. Printer and document, you need
26.These devices can be used _________
to zoom a picture or a. Folder
presentation on a screen. b. Files
a. Storage devices c. Container
b. Calculators d. Computer
c. Portable recorders
d. None of the above
27.LCD belongs to which type
of devices?
SECTION B: THEORY

Instructions: Answer only (4) four questions from this section. All

questions carry equal marks (5 marks)

1. a. Define internet.

b. Mention three rules and regulations to be observed while making

use of the internet.

2. a. What is the difference between copy and cut?

b. What are the shortcuts for the following computer operations:

i. Paste

ii. Undo

iii. Cut

iv. Copy

3. a. What is the difference between numbering and bulleting?

b. Outline the steps required to apply numbering to a text.

4. a. What is text alignment?

b. Give the functions of three types of text alignment.


5. a. Differentiate between temporary and permanent storage devices.

b. List four removable storage devices.

6. List five examples for each of the following:

a. Input devices

b. Output devices

You might also like