0% found this document useful (0 votes)
52 views

Suzz tenderly -SS-3-MOCK-EXAMINATION-computer-2020

Suzz

Uploaded by

alexito4real
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Suzz tenderly -SS-3-MOCK-EXAMINATION-computer-2020

Suzz

Uploaded by

alexito4real
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

SUZZ TENDERLY SENIOR SECONDARY SCHOOL ANGLE 90 PHASE 1 GWAGWALADA ABUJA SS 3 MOCK

EXAMINATION FOR 2024/2025 ACADEMIC SESSION


SUBJECT: COMPUTER STUDIES. TIME ALLOWED 2HOURS 30MINUTES
INSTRUCTION: This paper is made up of two sections A and B. Answer all questions in section A
SECTION A (1hour)
1.
2. Data can be defined as a. Control programs
a. Raw facts b. Language translator
b. Mixed facts c. Operating system
c. Facts on prints d. Utility programs
d. Processed facts 8. QBASIC keyboards do not include
3. Which of the following output a. FIND
devices was common among the b. LET
computing devices of the 19th c. REM
century? d. STOP
a. Monitor 9. An icon, a graphic or a text in a
b. Potter document or a webpage that
c. Printer connects to another file or object is
d. Speaker called a
4. The pre-computing age device which a. Hyperlink
made use of beads and frames is b. Domain name
a. Abacus c. Web browser
b. Napier’s bone d. Web server
c. Leibnitz multiplier 10. The largest component in a
d. Burrough’s counting device. spreadsheet is
5. The system unit houses the a. Cell
following components except b. Range
a. Plotter c. Workbook
b. Motherboard d. Worksheet
c. Floppy disk 11. Warm boot in computing is the
d. Central processing unit same as
6. During program execution in the a. Debugging
central processing unit, the b. Handshake
instruction is interpreted by the c. Hard boot
a. Arithmetic logic d. Soft boot
b. Control unit 12. The basic computer operation
c. Memory unit involves the following except
d. Registers unit a. Access
7. The most important system b. Input
software in a computer system is the c. Output
d. Process b. NAND gate
13. The file that contains historical c. NOR gate
record is called a d. OR gate
a. Data file 19. Identify the logic gate in figure 2
b. Master file
c. Reference file
d. Transaction
14. Random file organization is also
known as a. AND gate
a. Direct file organization b. NAND gate
b. Indexed file organization c. NOR gate
c. Serial file organization d. OR gate
d. Sequential file organization 20. Which of the following programs is
15. Which of the following options is not an application specific?
a datatype? a. CorelDraw
a. Alphabetic b. Editor
b. Alphanumeric data c. MS Access
c. Numeric data d. MS word
d. Valid data 21. The following programs are general
16. The major components of a purpose application software except
computer system are a. CorelDraw
a. Firmware and humanware b. Editor
b. Hardware and firmware c. MS Access
c. Hardware and software d. MS word
d. Software and firmware 22. The following are relational
17. The largest computer system in operators in QBASIC programming
terms of processing power is except
a. Laptop computer a. <
b. Mainframe computer b. >
c. Mini computer c. ≠
d. Super computer d. =
Figure 1 is a logic gate. Use it to answer 23. The three levels of programming
question 17 languages are
a. Assembly language, low level
language and high level
b. Java, C language and pascal
c. Machine language, low level
18. The logic gate represented in figure language and high level
1 is called language
a. AND gate
d. Machine language, machine a. Metropolitan Area Network
code` and assembly language b. Personal Area Network
24. The following components are c. Wide Area Network
d. Wireless Area Network
network interconnecting devices
30. Trap doors and bombs are typical
except
examples of
a. Hub a. adware.
b. Modem b. computer worms.
c. Router c. firewall.
d. Webcam d. trojan horses
25. Which of the following network 31. In a database, a primary key is a field
which contains
cables offers the highest data
a. text only.
transmission speed? b. unique entries.
a. Coaxial c. duplicate values.
b. Fibre optic d. numeric value only.
c. Telephone line 32. Converting 4B716 to binary is
d. Twisted pair a. 0100 1010 01112.
26. Which of the following options is not b. 0100 1011 01112.
c. 0100 1000 01112.
an advantage of linear bus
d. 0100 1100 01112.
topology? 33. The decimal number 1024 in
a. It requires less cable length hexadecimal equivalent is
b. It ensures easy broadcasting a. 2416.
c. Additional nodes can be b. 40016.
connected easily c. 3E816.
d. Terminators are required at d. 8BB16.
34. In a network, the workstation is
both ends of the cable
usually connected to the
27. The ASCII character set represents a. Hub
alphabetical and control characters b. Modem
using numeric codes ranging from c. Router
a. 0 to 124 d. Switch
b. 0 to 125 35. Which of the following statement is
c. 0 to 127 true of encryption?
a. It provides complete privacy
d. 0 to 128
b. It provides security of varying
28. A row in a database table is referred reliability
to as c. It makes messages unreadable
a. Attribute by the recipient
b. Data item d. It permits an individual to have
c. Field access to another person’s
message
d. Record
36. Which of the following methods is
29. Which of the following networks can
not suitable for securing files?
be extended to cover continents?
a. Use of back up
b. Use of antivirus b. Internet relay
c. Saving documents without a c. Internet service
password d. Domain name
d. Proper labeling of storage 43. We can improve computer security
devices by the use of
37. In ring topology, the computer that a. account number
is allowed to transmit data b. ID number
possesses the c. Password
a. Packet d. User names
b. Data access 44. The register is a special high
c. Method speed__________ area within the
d. token CPU
38. The most cost effective and secure
a. input
way of transmitting confidential
b. processing
messages among the employees of
an organization is c. output
a. electronic notice boards d. storage
b. teleconferencing 45. Registers are located in the
c. e-mail __________
d. social networks a. hard disk
39. A modem and a telephone
b. CPU
connection are provided. Other
things needed to be able to connect c. mother board
a computer to the internet are: d. monitor
a. ISP account and utility software 46. Current instruction
b. browser and ISP account register________ instructions
c. ISP account and network currently being executed.
d. browser and printer a. allows
40. Which of the following is employed
b. control
in transfer of data between
computers and a network? c. retrieve
a. Fiber optics d. store
b. Male connector e. contains
c. Female connector 47. Main memory holds instructions
d. USB Port while registers hold
41. Evaluate the BASIC statement LET current_________
Z=4*W^2+2*Y given that W=5 and
a. data
Y=10
a. 50 b. information
b. 80 c. program
c. 100 d. software
d. 120 48. Every program, song and document
42. Every computer system connected is stored as a ______ in the
to the internet must have a unique computer
___________address
a. folder
a. Internet protocol
b. filed 54. Computer files operations do not
c. record include___________
d. data a. create
49. Computer files can be classified by b. view
all the following criteria except c. update
_____________ d. access
a. area of storage e. open
b. nature of content 55. Data loss and overwriting are effects
c. organization method of file____
d. storage medium a. security
e. method of file organization b. insecurity
50. Master files are files of fairly c. corruption
________ nature d. damage
a. permanent e. secreting
b. useful 56. Similarities between main memory
c. temporary and registers are that they are:
d. changing
I. volatile;
e. adequate II. under the direct control of the
51. Which of these classes of file has the user;
shortest life span III. Protected by the system unit;
a. reference file IV. for system use only
b. transaction file a. I, II and IV only
c. master file b. I, III and IV only
c. II, III and IV only
d. current file
d. I, II, III and IV
e. outdated file e. I AND III
52. Files that are stored in the order in
which they have arisen are called 57. If the output of any logic gate is fed
____ into an inverter, the result is
a. random file
a. NOT gate
b. sequential file
b. NOR gate
c. indexed file c. The inverse of the output signal
d. serial file d. The same as the output signal
e. linear file e. Different signals
53. One of the following is not a type of
file organization 58. CPU fetches the instruction from
a. serial memory according to the value of
b. random a. status register
c. indexed b. instruction register
d. linear c. program status word
e. sequential d. program counter
e. clock
59. A memory buffer used to
accommodate a speed differential is
called
a. stack pointer
b. cache
c. accumulator
d. disk buffer
e. reference file
60. Which one of the following is the
address generated by CPU?
a. physical address
b. absolute address
c. logical address
d. computer address
e. spiritual address
61. The logical unit of transfer between
the backing storage and main
memory in file organization is called
a. block
b. bucket
c. hash
d. partial
e. memory
SECTION B

1. (a) (i) What is a network cable?


(ii) State three types of cables used in networking
(b) Write the acronym VSAT in full
(c)(i) Distinguish between an email address and a website address
(ii) List examples of each
(iii) email address
(iv) website address

2. A. State one difference between the following


i. Web server and web browser
ii. Hub and switch
B. Briefly explain any five of the following terms
i. Intranet
ii. Worm
iii. URL
iv. Download
v. Firewall
vi. Baud
vii. Cache
viii. Authentication

3.
i. Define network topology
ii. Identify any four network topology
iii. Mention 4 network cables
iv. List 2 types of connector

1. a. List four examples of secondary storage


media
b. State two differences between magnetic
storage and optical disk storage device
c. Explain these categories of software
I. firmware
II. proprietary software
2. a Define the term computer system
b. List the major components of the computer system and give one example each
c. Construct truth table for 2-input OR gate.
3. Given that X=11011011 and Y=11101101
i. Construct the truth table for X.Y=Z
ii. Draw the logic gate of X.Y=Z
iii. State the value of Z
4. (a) An electronic book is made up of 500 pages and there are 16 lines of 24,000 bits on
each page. Compute the space it will occupy on a computer in megabytes
(b) Give an example of auxiliary storage
(c) In the table below:
(i) List the two main types of computer software
(ii) Give two examples under each in 4(c)(i)
Main Type Example

I. A

B.

II. A.

B.

5.
a. Mention two types of memory
b. Give two examples of secondary storage
c. Convert 1.44 MB to byte
d. State two difference between floppy disk and compact disk

You might also like