This document contains a computer science exam for JSS 2 students. It includes 20 multiple choice questions testing knowledge of topics like binary codes, computer components, programming languages, software types, and computer issues. The exam covers computer hardware, software, applications, and health and safety concerns related to computer use.
This document contains a computer science exam for JSS 2 students. It includes 20 multiple choice questions testing knowledge of topics like binary codes, computer components, programming languages, software types, and computer issues. The exam covers computer hardware, software, applications, and health and safety concerns related to computer use.
This document contains a computer science exam for JSS 2 students. It includes 20 multiple choice questions testing knowledge of topics like binary codes, computer components, programming languages, software types, and computer issues. The exam covers computer hardware, software, applications, and health and safety concerns related to computer use.
This document contains a computer science exam for JSS 2 students. It includes 20 multiple choice questions testing knowledge of topics like binary codes, computer components, programming languages, software types, and computer issues. The exam covers computer hardware, software, applications, and health and safety concerns related to computer use.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 3
At a glance
Powered by AI
The passage discusses computer science topics like binary numbers, computer hardware and software, programming languages, and computer viruses.
A computer program is a set of instructions that tells a computer how to perform a task. Some examples of programming languages mentioned are BASIC, C++, Pascal.
Computer viruses are programs that infect computers and spread without the user's knowledge or permission. Examples mentioned are Trojan horse, sleeper, and 'I love you' virus.
EMILIO PIAZZA a. Beginner’s All Symbolic a.
Slowing down of response
MEMORIAL COLLEGE Instruction Code time 48 OBI WALI ROAD RUMUIGBO b. Beginner’s All-purpose b. Presence of tiny dots PORT HARCOURT symbolic Instruction Code c. Incomplete file saving SECOND TERM EXAMINATION c. Believer’s All-purpose d. All of the above 2020/2021 ACADEMIC SESSION Symbolic Instruction 17. Which of the following is SUBJECT: COMPUTER SCIENCE Code not a language translator? CLASS: JSS 2 TIME: 2 HOURS d. Beginner’s All-purpose a. assembler SECTION A Synthetic Instruction Code b. compiler 9. The native language of the c. interpreter OBJECTIVE computer is d. terminator 1. Binary codes are used in a. Machine Language 18. The BASIC key word REM which of the following b. BASIC Language stands for programming language c. High Level Language a. remark a. Machine language d. PIDGIN language b. remain b. Assembly language 10. The following are sources of c. redo c. High level language virus Except? d. remember d. None of above a. Infected memory card 19. The last statement in BASIC b. E-mail attachment programs is 2. The term gigabyte refers to c. Internet Downloads a. INPUT a. 1024 bytes d. Secured File b. END b. 1024 kilobytes 11. One is not an example of a c. LET c. 1024 megabytes computer virus d. FINISH d. 1024 gigabyte a. Trojan horse 20. Programming language that b. Sleeper allows for a program to be written 3. A byte consists of c. I love You in forms that are readable to a. One bit d. None of the above human beings is called b. Four bits 12. Application software used a. Assembly language c. Eight bits for performing accounting and b. Machine language d. Sixteen bits statistical calculations is called? c. High level language a. Word processing d. all of the above 4. FORTRAN programming software 21. Utility programs are also language is more suitable for b. Graphic software known as a. Business Applications c. Spreadsheet software a. service program b. Marketing Applications d. Utility software b. operating system c. Scientific Applications 13. ______ Creates, updates and c. graphic program d. None of the above manages databases d. word processing software. a. System analyst 22. Which of the following 5. Operating system, utility b. Programmer programs can be used for word software and translators are types c. Database Admin. processing? of d. Network Admin a. Notepad a. Application 14. A program that changes high b. CorelDraw software level languages into machine c. MS Excel b. Hardware language is called d. Paint c. System software a. translator 23. A UPS is a device that can d. Translators b. BASIC be used to: c. java A. Store electricity 6. The following are examples d. Pascal B. store data for processing of application software C. protect the computer from EXCEPT? 15. All the following are heat a. Graphic software examples of high-level languages D. blow of dust from within the b. LINUX EXCEPT computer c. Spreadsheet software. a. translator d. Word processing software b. BASIC c. C++ 7. A number system that uses d. Pascal 24. The importance of shutting only two digits, 0 and 1 is called down computer properly after use a. Decimal number system is to b. Hexadecimal A. let it cool down c. Octal 16. _______ is a virus warning B. avoid damage memory files d. Binary number system sign of the computer 8. The acronym for BASIC is C. make sure it is not stolen D. protect it from virus 25. UPS stands for: D. Homepages 43. the term digital divide A. Under power supply 34. All the following are ICT B. Uninterruptable power gadgets EXCEPT? came into use the in the supply a. Pressing iron year ______ C. Uninterruptible petrol b. Facsimile machine supply c. ATM a. 1990's D. Use power sometimes d. Telex b. 1980's 26. The importance of 35. Which of these ICT gadgets maintaining adequate and proper can permit two or more users to c. 1999's ventilation is to conduct conversion when they d. 2000's A. avoid damage caused by are too far apart to be heard 44. convert 11 base ten to heat directly: B. prevent damage caused by a. Facsimile machine binary (base 2) water b. ATM C. prevent dust from damaging c. Telex a. 1101 the computer d. Telephone b. 1011 D. avoid loss of data 36. _____ is a place which c. 1110 27. Some health-related provides internet access to the d. 1001 challenges while sitting at a public, usually for a fee. computer include the following a. Browsing house 45. a gap between people except? b. Cyber Cafe who have access to the use A. Neck pain c. Home Cafe of information technology B. Backache d. None of the above C. Eye strain 37. What does HTML gadgets and those who do D. Stomach ache represent? not have is 28. All the following are a. Hyper Text Markup features of graphic packages Language a. computer illness except b. High Text movie language b. digital divide A. tooth brush c. Have the major language B. color Palette d. All of the above c. retrieval C. menu bar [email protected] d. old economy D. tool bar 38. The address above is a/an 29. The following are examples a. Website address 46. printer is a/an of Graphic packages EXCEPT? b. Email address ___device. A. CorelDraw c. Homepage address B. Photoshop d. Facebook address a. output C. Harvard Graphics 39. The domain name of the b. input D. MS-Word. address above is 30. The other name for Fill color a. @ c. processing tool is b. Effizydonjoe d. storage A. Paint bucket tool c. gmail.com 47. How many bits make up a B. pick color tool d. [email protected] byte? C. eraser tool 40.virus can enter into your a. 2 D. text tool 31. The computers are based on computer system b. 8 which type of number system c. 16 through using _____ A. Binary d. 4 a. infected diskette B. Octal 48. Computer software are C. Decimals b. keyboard grouped into _______ D. Hexadecimals c. logic bomb a. 4 d. normal diskette b. 8 32. a mail that is electronically transmitted by your computer. 42. the longest key in a c. 2 A. Post office mail keyboard is ____ d. 6 B. Private mail 49. OS stands for C. E-mail a. enter key a. object standard D. G-mail b. space bar key b. operating system 33. A Website is a collection of c. ESC key c. option system ___________ A. World Wide Web pages or d. shift keys d. oriented subjects files 50. Number system can be B. E-mails described as C. Internet protocol Measuring Answer ANY FOUR (4) questions Counting from this section Representing 1. Define ICT Gadgets. Display b. List five (5) importance of ICT 51. The system of counting in in our society tens is called? Octal system 2. Who is a computer professional? Binary system b. List 5 computer professionals and Decimal system their duties Hexadecimal system 3. What is a computer Program? 52. The decimal system has a b. List five (5) Programming base of Language 16 8 4. What is Computer virus? 2 b. List 3 types of computer viruses 10 5. What is a search engine? 53. which number system does the computer use? b. List 5 search engines with their Octal web addresses. Decimal Binary Hexadecimal 54. Binary number is a number system with base 2 8 16 10 55. The binary digit which is the electronic component which the computer deals with are 1 and 4 1 and 2 0 and 1 2 and 3 56. convert 1210 to binary 1011112 11002 11012 11102 57. 2410 to base 2 110002 110112 10112 101002 58.