0% found this document useful (0 votes)
13 views2 pages

Jss 2 Ict Final

The document contains objective and theory questions for JSS2 ICT students, focusing on internet usage, computer ethics, and safety measures. It includes 20 multiple-choice questions worth 20 marks and 5 theory questions from which students must answer 3. The objective questions cover topics such as internet browsers, file sharing, and computer lab rules.

Uploaded by

cokerisaiah98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

Jss 2 Ict Final

The document contains objective and theory questions for JSS2 ICT students, focusing on internet usage, computer ethics, and safety measures. It includes 20 multiple-choice questions worth 20 marks and 5 theory questions from which students must answer 3. The objective questions cover topics such as internet browsers, file sharing, and computer lab rules.

Uploaded by

cokerisaiah98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

JSS2 ICT Third Term - Objective and

Theory Questions
Objective Questions (20 Marks)
1. Which of the following is used to access web pages on the internet?
A. Word Processor B. Spreadsheet C. Internet Browser D. Antivirus

2. One of the benefits of the internet is:


A. It reduces productivity B. It isolates users C. Access to information D. Promotes
laziness

3. Which of these is an example of an internet browser?


A. Chrome B. Notepad C. Paint D. Calculator

4. What does WWW stand for?


A. World Web Wide B. World Wide Web C. Web World Wide D. Web Wide World

5. A group of people that share messages using a common platform on the internet is called
a:
A. Web Host B. Internet Provider C. News Group D. File Transfer

6. Which of these activities is part of file sharing?


A. Washing files B. Transferring files over a network C. Deleting all files D. Renaming
folder

7. A computer ethic teaches users to:


A. Hack computers B. Use the internet responsibly C. Ignore privacy laws D. Destroy data

8. One way to maintain safety while using the computer is:


A. Sit too close to the monitor B. Ignore lab rules C. Use anti-glare screens D. Block all
USB ports

9. Which of the following is NOT a benefit of the internet?


A. Education B. Cyber bullying C. Communication D. Research

10. What is the correct sitting posture while using a computer?


A. Lying on the desk B. Standing and typing C. Sitting upright with feet flat D. Sitting on
the floor

11. A software used to browse the internet is called:


A. Paint B. Internet Browser C. Windows Media Player D. CorelDraw
12. The environment where you access internet services is called:
A. Command prompt B. Internet Environment C. BIOS D. System Unit

13. Which of these is an unethical behavior in computer usage?


A. Sending spam messages B. Citing sources C. Respecting privacy D. Backing up files

14. One importance of computer ethics is to:


A. Encourage hacking B. Prevent responsible behavior C. Promote safe and fair use D.
Erase data regularly

15. Internet access is useful in:


A. Watching movies only B. Sending letters by post C. Research and education D. Playing
outdoor games

16. Which of the following is a rule in a computer lab?


A. Eat and drink while working B. Handle devices carelessly C. Avoid running in the lab D.
Kick systems to restart

17. Which of these is used to reduce eye strain?


A. Increasing screen brightness B. Anti-glare screen C. Playing loud music D. Looking
away from the monitor

18. News groups are mainly used for:


A. Watching TV B. Downloading music C. Sharing messages D. Formatting hard disks

19. Which of the following is an example of file sharing?


A. Saving documents B. Sending a video through email C. Installing software D. Scanning
a document

20. Which of the following is correct about computer safety?


A. Sitting too long without breaks B. Using damaged wires C. Regular maintenance D.
Allowing dust buildup

Theory Questions (Answer 3 questions only)


1. Define internet browser and give two examples.

2. Explain three benefits and two abuses of the internet.

3. What is file sharing? List and explain two methods of file sharing.

4. Describe any three safety measures to observe in a computer laboratory.

5. What are computer ethics? State and explain any three examples of ethical behavior when
using ICT.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy