100% found this document useful (1 vote)
1K views7 pages

CST JSS 3 Examination Question

The document contains an exam on computer science and technology topics with 35 multiple choice questions covering subjects like computer hardware, software, careers, the internet, search engines and computer viruses. It tests knowledge of key IT concepts and terminology.

Uploaded by

Dauda Kehinde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views7 pages

CST JSS 3 Examination Question

The document contains an exam on computer science and technology topics with 35 multiple choice questions covering subjects like computer hardware, software, careers, the internet, search engines and computer viruses. It tests knowledge of key IT concepts and terminology.

Uploaded by

Dauda Kehinde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

FIRST TERM EXAMINATION 2022/2023 ACADEMIC SESSION

SUBJECT: CST TIME: 1:30 MINS


CLASS: JUNIOR ACHIEVERS THREE
SECTION A: OBJECTIVE
INSTRUCTION: Each question is followed by four options lettered A – D. Choose the correct option for
each question and shade using pencil on your answer sheet the answer space which bears the same letter
as the option you have chosen. Give only one answer to each question and erase completely any answer
you wish to change.
d. Hurdler
6. ----------- works with the computer
1. A person who has undergone on daily basis
training in computer is called a. Operando
------------ b. Operator
a. Professor c. Operation
b. Professional d. Machinist
c. Mechanic 7. The gap between individuals in the
d. Producer society who are ICT literate and
2. A good user of the computer must those who are not is --------------
possess certain attributes to ---------- a. Privacy divide
a. Throw b. Computer literacy
b. Thrive c. Digital divide
c. Mark d. Computer crime
d. Plant 8. The ability to use ICT devices is
3. Which one of these plans, research, called -----------
coordinate and recommend software a. Digital literacy
and system b. Digital crime
a. Molder c. Gadget literacy
b. Hurdler d. Privacy literacy
c. Analyst 9. Technology is only as powerful as it
d. Dreamer is ----------
4. A computer professional that teaches a. Accessible
computer lessons is called …….. b. Available
a. Teacher c. Usable
b. Doctor d. All of the above
c. Plumber 10. The new economy requires
d. Nurse ------------ to start business
5. The professional that is responsible a. Middle capital
for planning and directing computer b. Upper capital
task is called ……….. c. Low capital
a. Modeler d. Close capital
b. Manager 11. One of these is not a feature of the
c. Plotter old economy
a. Labor based 18. One of these is not a professional
b. Time consuming body in computer
c. Limited by space a. NCS
d. Not limited by time b. ITAN
12. The old economy is characterized by c. NCC
----------- d. TCC
a. Presence of ICT gadget 19. The physical parts of the computer
b. Presence of computers we can touch is called ………
c. Absence of ICT gadgets a. Software
d. None of the above b. Hardware
13. A key aspect of digital divide c. User ware
includes ------------- d. None of the above
a. Resource usage 20. The computer hardware is divided
b. Infrastructural aspect into ----------
c. Capacity building a. 2
d. All of the above b. 3
14. All these are benefits of the new c. 4
economy except ----------- d. 5
a. Globalization 21. Computer viruses are --------
b. Good use of time programs
c. Opportunities for new job a. Peopleware
d. None of the above b. Software
15. The new economy is characterized c. Hardware
by ----------- d. Intermediate
a. Presence of ICT gadget 22. Which one of these is not an
b. Absence of ICT gadget antivirus
c. Time consumption a. Windows explorer
d. Lack of space b. Windows defender
16. All these are careers in computer c. Kaspersky
except ------------- d. Avast
a. System analyst 23. Which of the following removable
b. Computer manager devices can be used to introduce
c. Computer operator viruses to computers
d. None of the above a. Flash drive
17. One of these is a quality of a good b. DVD
professional c. Hard drive
a. Good reader d. All of the above
b. High analytical skill 24. A virus that affects executable
c. Attention to details program files is called ……..
d. B and C a. Program virus
b. Boot sector virus
c. Macro virus d. Computer protector
d. Stealth virus 31. All this areas in a computer where
25. A computer virus that uses certain there can be a virus attack except-----
techniques to avoid detection is a. Computer files
called ….. b. Computer directories
a. Stealth virus c. Computer disks
b. Malware d. Computer memory
c. Polymorphic virus 32. One of these is not in the group
d. None of the above a. Background scanning
26. One of these is a computer b. Full system scan
instruction that initiates a series of c. Virus definition
additional instructions d. Virus creation
a. Macro 33. Which of the following is an
b. Micro example of a search engine
c. Malware a. MS Windows
d. Trojan horse b. Google.com
27. A software that monitors people’s c. Google chrome
activities without their consent is d. Mozilla firefox
called ……. 34. Search engines are able to search
a. Spyware for--------
b. Trojan horse a. Images
c. Adware b. Videos
d. None of the above c. Documents
28. Identify the one that is not in the d. All of the above
group 35. Which of the following is a basic
a. Multipartite virus function of the search engine
b. Boot sector virus a. Quick exchange of information
c. Macro virus between users
d. Licky virus b. Exploring the web
29. Sources of computer virus include c. Finding information
the following except --------- d. Matching queries with reference
a. CD/DVD sites that contain the queries
b. The internet 36. The process of bringing files like
c. Email attachment pictures, video clips and images from
d. None of the above the internet into one’s computer is
30. Which one of these is a software that called--------
protects the computer against virus a. Downloading
attack b. Surfing
a. Spyware c. Uploading
b. Antavirus d. Scanning
c. Antivirus
37. Search engines that rely on human b. Cell
editors to populate their database are
called--------- c. Reference
a. Human based search engines d. pointer
b. Crawler based search engines
c. Meta search engines 44. Which of these is not in the group?
d. Directories
a. Light pen
38. Search engines are the same as web
browsers b. Joystick
a. True
b. False c. Printer
39. The art of sourcing information from
d. mouse
the internet is called ----------
a. Surfing 45. One of these describes an output
b. Querying gotten from the printer
c. Sampling
d. All of the above a. Hardcopy
40. Which is not in the group b. Softcopy
a. Opera
b. Safari c. Software
c. Internet explorer
d. None of the above
d. None of the above
41. A group of related records is 46. One of these is not an application
called…….. package
a. File
b. database a. operating system
c. record
b. MS Excel
d. none of the above.
42. Which one of these is software used c. AutoCAD
to keep organized data for future
reference? d. Paint
a. MS Access 47. Which one of these is not an
b. MS word example of a graph?
c. File
d. None of the above a. Histogram

43. An intersection of row and column b. Line chart


in a spreadsheet package like MS Excel
c. Pie chart
is called ……..
d. Pick chart
a. Entry point
48. The number of arrow keys on the b. Visual
keyboard is ________. c. Audio-visual
d. Text
a. 2 55. Which of the following is odd?
b. 3 (a) Computer
c. 4 (b) Internet
d. 5 (c) Telephone
49. Which of these is not used in ICT? (d) Pencil
a. Computer 56. Information can be classified by the
b. GSM following except _________.
c. Internet a. Form
d. None of the above b. Time
50. The numeric keys on the keyboard c. Frequency
have numbers __________. d. Origination
a. 0 – 9 57. The singular form of data is
b. 0 – 10 _________.
c. 0 – 15 a. Data
d. 0 – 16 b. Datas
51. The following are sources of data c. Datum
except __________. d. Datta
a. Interview 58. Which one of these comes from the
b. Observation computer?
c. Document Analysis a. Input
d. News b. Information
52. There are _____ methods of c. Output
transmitting information d. B and C
a. 2 59. Which of the following is not an ICT
b. 3 gadget?
c. 4 a. Phone
d. 5 b. Pager
53. _______ is not a class of information c. Desktop computer
according to form of existence d. Electric bulb
a. Oral 60. The first screen displayed after
b. visual successful boot is called
c. sensory __________.
d. None of the above a. Doctor
54. The following are modes of b. Folder
receiving information except c. Desktop
______. d. Start menu
a. Audio
SECTIOIN B.

INSTRUCTIONS: Answer any four questions in all

1. Babangida have access to information resource on the internet while Okechukwu does
not. Clearly explain the divide that exists between them.
Outline the reasons for digital divide

b. Mention two main advantages Babangida has over Okechukwu

2. What do you understand by career opportunity?


b. Analyze the following scenario carefully
i. Yusuf can write computer programs
ii. Aisha repairs and maintains computer hardware
iii. Zainab designs, maintains and updates databases and
iv. Aliyu creates and maintains computer networks
What type of computer professional does Yusuf, Aisha, Zainab and Aliyu represents?

3. What do you understand by computer virus?


b. Hadiza’s computer is very slow and her file does not open. It is suspected that a
computer virus is responsible.
Mention four possible ways Hadiza’s computer got infected with the computer virus.

4. A company intends to use an application that can handle their budget and payroll
operations.
As a system analyst, what four applications would you suggest to the company?
b. Give one reason for your suggestion

5. What do you understand by database management?

b. Outline the forms of database

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy