JSS 3 Objective Exam Questions in Computer studies

JSS Three Objective Questions   
1. Individuals that have obtained sufficient education and training in the field of computer are called
A. Program Analyst
B. Computer Professionals 
C. Computer commissioners
D. Computer Instructor
     Click here to show Answer  
2. All the following are careers in the field of computers except
A. Computer Engineer
B. Programmer
C. Network Administrator
D. Bank Manager 
     Click here to show Answer  
3. Who writes codes and instructions for the computer?
A. Computer Engineer
B. Programmer 
C. Network Administrator
D. Bank Manager
     Click here to show Answer  
4. NCS is a computer professional body. NCS stands for
A. Nigeria Computer Society 
B. National Commission Society
C. Nigeria Commputer studies
D. Non-governmental Commision Society
     Click here to show Answer  
5. Which of these is a quality of a good computer professional
A. Poor analytical skills
B. Automation  
C. Poor technical writing skills
D. Troubleshooting capabilities 
     Click here to show Answer  
6. A body that controls and regulates all communication operations in Nigeria
A. Nigeria Communication Commission 
B. Nigeria Internet Group
C. Computer Association of Nigeria
D. Internet Service Provider Association of Nigeria 
     Click here to show Answer  
7. All of these are means through which computer viruses can spread from one system to another Except
A. Internet download
B. Computer network
C. Infected memory devices
D. Blood transfusion 
     Click here to show Answer  
8. A computer virus that alters its signature patterns whenever it replicates is called
A. Boot sector viruses
B. Polymorphic virus 
C. Resident Virus
D. Non-resident virus
     Click here to show Answer  
9. A program written to stop and curb the spread of the virus in a computer is called
A. Auto-virus
B. Anti-virus 
C. I love you Virus
D. Stone
     Click here to show Answer  
10. All of these are examples of computer viruses except
A. Smadav 
B. Trojan horse
C. I love you virus
D. November 11
     Click here to show Answer  
11. Which of these is not a virus warning sign
A. Speeds up computer response time 
B. presence of tiny dots
C. Incomplete saving of files
D. The appearance of strange characters
     Click here to show Answer  
12. Which of this software is an anti-virus software
A. Norton 
B. Creeper
C. Code records
D. Logic bomb Alabama
     Click here to show Answer  
13. Preventive measures against computer viruses do not include the following
A. Installing cracked software 
B. Timely update of operating system
C. Timely update of anti-virus software
D. Exercise care when browsing the internet
     Click here to show Answer  
14. The largest computer network in the world is 
A. LAN
B. WAN
C. PAN
D. Internet 
     Click here to show Answer  
15. A computer network idea for schools offices and home is called
A. WAN
B. PAN
C. Internet
D. LAN 
     Click here to show Answer  
16. The acronym MAN stands for
A. Man Area Network
B. Metropolitan Area Network 
C. Master Area Network
D. Main Area Network
     Click here to show Answer  
17. All of these are internet search engines except
A. Google
B. Yahoo
C. Facebook 
D. Bing
     Click here to show Answer  
18. Websites or software that enable a person to find a document and other media on the internet are called
A. Google
B. Internet Search Engines 
C. Network Search
D. Search query
     Click here to show Answer  
19. A word or group of words that are typed by the user in the search bar of the search engine is called
A. search query 
B. Search engine result page
C. Likes
D. Comments
     Click here to show Answer  
20. PAN stands for
A. Programmer Area Network
B. Personal Area Network 
C. Personal Area Number
D. Programmer Area Number
     Click here to show Answer  
21. The gap between those who have effective access to digital and information technologies and those who have little or no access at all is called
A. New Economy divide
B. Old Economy divide
C. Digital divide 
D. All of the above
     Click here to show Answer  
22. An economy that is centred on industrialization is called 
A. New Economy
B. Old economy 
C. Digital Split
D. Mechanical economy
     Click here to show Answer  
23. One of these is a feature of the new economy
A. Requires a lot of labour
B. Time-consuming
C. It is knowledge-based 
D. Mechanically driven
     Click here to show Answer  
24. All of these are benefits of the new economy except
A. Creates new jobs
B. Attracts no investment 
C. Greater competition
D. Businesses can start with small capital
     Click here to show Answer  
25. All the following are examples of DBMS packages except
A. MS Access
B. MS Word 
C. Oracle
D. SQL server
     Click here to show Answer  
26. A single piece of information about an object is called
A. Record
B. Primary key
C. Database
D. Field 
     Click here to show Answer  
27. Which of these can serve as a primary key
A. Name
B. Voter's Card number 
C. Address
D. Age
     Click here to show Answer  
28. One of these is not a form of database
A. Hierarchical
B. Record 
C. Relational
D. Network
     Click here to show Answer  
29. ...... form of database permits the organization of data in the form of a tree
A. Hierarchical 
B. Record
C. Relational
D. Network
     Click here to show Answer  
30. Software designed to mainly perform mathematical, statistical and accounting calculations is called
A. Word processing software
B. DBMS
C. Spreadsheets software 
D. Presentation software
     Click here to show Answer  
31. All of these are uses of spreadsheet software except
A. Performing artistically related operated 
B. Tax estimation
C. Budget planning
D. Preparation of payrol
     Click here to show Answer  
32. Which of these is a spreadsheet package
A. MS Paint
B. MS Excel 
C. Ms Word
D. Ms Access
     Click here to show Answer  
33. The intersection between a row and a column is called
A. Formula
B. Label
C. Value
D. cell 
     Click here to show Answer  
34. ..... displays the cell reference of active cell
A. Name box 
B. Formula bar
C. Row
D. Column
     Click here to show Answer  
35. The first string in the MS Excel formula is
A. *
B. = 
C. +
D. /
     Click here to show Answer  
36. The formula to add Cell A3 to cell A13 in MS Excel is
A. = 3 + 13
B. SUM(A3:A13)
C. =SUM(A3:A13) 
D. All of the above
     Click here to show Answer  
37. Numeric data that are entered into spreadsheet cells  are called
A. Formula
B. Labels 
C. Values 
D. cells
     Click here to show Answer  
38. A single page in a spreadsheet is called
A. workbook
B. worksheet 
C. sheet
D. book
     Click here to show Answer  
39. A cell that is currently selected for data entry is called
A. Function
B. Cell reference
C. Active cell 
D. Anchor cell
     Click here to show Answer  
40. Which of these is not a function in Excel
A. SUN 
B. COUNT
C. MAX
D. MIN
     Click here to show Answer  
41. A computer's physical components that you can see and touch are called
A. Software
B. Hardware
C. Data
D. Information
     Click here to show Answer  
42. The set of instructions that tells the computer what to do is called
A. Hardware
B. Software
C. Peripherals
D. Network
     Click here to show Answer  
43. Which of these is an example of an input device?
A. Monitor
B. Printer
C. Keyboard
D. Speaker
     Click here to show Answer  
44. A device used to display output from a computer is a
A. Mouse
B. Scanner
C. Monitor
D. Microphone
     Click here to show Answer  
45. The brain of the computer is the
A. CPU
B. RAM
C. Hard Drive
D. Motherboard
     Click here to show Answer  
46. RAM stands for
A. Read Access Memory
B. Random Array Memory
C. Random Access Memory
D. Read-only Memory
     Click here to show Answer  
47. Which of these is a secondary storage device?
A. RAM
B. ROM
C. Hard Disk Drive
D. Cache Memory
     Click here to show Answer  
48. The operating system is an example of
A. Application software
B. System software
C. Utility software
D. Freeware
     Click here to show Answer  
49. MS Paint is a type of
A. Word processor
B. Spreadsheet
C. Graphics software
D. Database
     Click here to show Answer  
50. A computer network that covers a large geographical area is called a
A. LAN
B. MAN
C. WAN
D. PAN
     Click here to show Answer  
51. A device used to convert a hard copy into a soft copy is a
A. Printer
B. Scanner
C. Monitor
D. Plotter
     Click here to show Answer  
52. Which of these is an example of a pointing device?
A. Keyboard
B. Mouse
C. Microphone
D. Speakers
     Click here to show Answer  
53. The process of starting a computer is known as
A. Loading
B. Installing
C. Booting
D. Running
     Click here to show Answer  
54. Which of these is not an operating system?
A. Windows
B. Linux
C. Google Chrome
D. macOS
     Click here to show Answer  
55. A software used to create, edit and format text documents is called a
A. Spreadsheet
B. Database
C. Word processor
D. Presentation software
     Click here to show Answer  
56. Which of these is a popular web browser?
A. Microsoft Word
B. Adobe Photoshop
C. Mozilla Firefox
D. Microsoft Excel
     Click here to show Answer  
57. E-commerce refers to
A. Buying and selling goods on a phone
B. Exchanging emails
C. Buying and selling goods on the internet
D. Using an electronic calculator
     Click here to show Answer  
58. The process of sending and receiving messages electronically is called
A. E-banking
B. E-mail
C. E-commerce
D. E-learning
     Click here to show Answer  
59. A computer virus is a type of
A. Anti-virus software
B. Malicious software
C. Spreadsheet
D. Browser
     Click here to show Answer  
60. A firewall is a security system that protects a computer network from unauthorized access.
A. True
B. False
     Click here to show Answer  
61. An example of a flash memory storage device is a
A. Floppy disk
B. Hard disk drive
C. DVD
D. USB flash drive
     Click here to show Answer  
62. Which of these is a magnetic storage device?
A. CD-ROM
B. Hard Disk Drive
C. Blu-ray Disc
D. SD Card
     Click here to show Answer  
63. The smallest unit of data in a computer is a
A. Byte
B. Bit
C. Kilobyte
D. Megabyte
     Click here to show Answer  
64. A collection of related data or information is called a
A. File
B. Folder
C. Document
D. Database
     Click here to show Answer  
65. The process of organizing files on a computer is called
A. Booting
B. File management
C. Formatting
D. Deleting
     Click here to show Answer  
66. To save a file with a new name or in a new location, you use the
A. Save command
B. Save As command
C. New command
D. Open command
     Click here to show Answer  
67. Which of these is a command used to undo the last action?
A. Ctrl + C
B. Ctrl + V
C. Ctrl + Z
D. Ctrl + X
     Click here to show Answer  
68. To copy a selected text, you use the keyboard shortcut
A. Ctrl + X
B. Ctrl + V
C. Ctrl + C
D. Ctrl + P
     Click here to show Answer  
69. The main screen of a graphical user interface (GUI) is called the
A. Taskbar
B. Desktop
C. Start menu
D. Folder
     Click here to show Answer  
70. A small picture or symbol that represents a file, folder, or program is an
A. Icon
B. Cursor
C. Menu
D. Window
     Click here to show Answer  
71. The software that manages a computer's memory, processes, and all its hardware and software is the
A. Application software
B. Operating system
C. Utility software
D. Driver
     Click here to show Answer  
72. The command used to shut down a computer is typically found in the
A. Control Panel
B. My Computer
C. Start menu
D. Taskbar
     Click here to show Answer  
73. Which of these is a feature of a modern operating system?
A. Single tasking
B. Command line interface
C. Multitasking
D. Limited memory usage
     Click here to show Answer  
74. An example of a text editor is
A. MS Word
B. Notepad
C. Google Sheets
D. PowerPoint
     Click here to show Answer  
75. What is the primary purpose of a spreadsheet application?
A. Creating presentations
B. Managing databases
C. Performing calculations
D. Sending emails
     Click here to show Answer  
76. The intersection of a row and a column in a spreadsheet is called a
A. Sheet
B. Cell
C. Table
D. Field
     Click here to show Answer  
77. A formula in Excel always begins with a(n)
A. Plus sign (+)
B. Equal sign (=)
C. Hash symbol (#)
D. Dollar sign ($)
     Click here to show Answer  
78. To apply an animation to a slide in PowerPoint, you would use the
A. Design tab
B. Transitions tab
C. Insert tab
D. Animations tab
     Click here to show Answer  
79. A software used for creating and presenting slides is called
A. Word processing software
B. Spreadsheet software
C. Presentation software
D. Graphics software
     Click here to show Answer  
80. The process of converting a digital file into a printed document is called
A. Scanning
B. Saving
C. Printing
D. Exporting
     Click here to show Answer  
81. The World Wide Web is a system of
A. Interlinked web pages accessed via the internet
B. Personal computer files
C. Computer hardware components
D. Data storage devices
     Click here to show Answer  
82. A unique address that identifies a specific website on the internet is called a
A. URL
B. HTTP
C. E-mail address
D. HTML
     Click here to show Answer  
83. The process of transferring a file from a remote computer to your computer is called
A. Uploading
B. Downloading
C. Browsing
D. Streaming
     Click here to show Answer  
84. A computer that stores files and data and makes them available to other computers on a network is called a
A. Client
B. Workstation
C. Server
D. Hub
     Click here to show Answer  
85. Which of these is a way to protect your computer from unauthorized access?
A. Sharing all your files
B. Using a weak password
C. Installing an anti-virus software
D. Clicking on every link
     Click here to show Answer  
86. Unwanted emails that are usually advertisements are called
A. Spam
B. Phishing
C. Malware
D. Trojans
     Click here to show Answer  
87. The act of using a computer to access another person's personal data or information without their permission is called
A. Blogging
B. Hacking
C. Surfing
D. Streaming
     Click here to show Answer  
88. A set of rules that computers use to communicate over a network is called a
A. Protocol
B. Address
C. Browser
D. Search engine
     Click here to show Answer  
89. The term used to describe a computer user who intentionally tries to break into computer systems is a
A. Programmer
B. Analyst
C. Hacker
D. Web developer
     Click here to show Answer  
90. The practice of using a computer to conduct financial transactions, like checking your account balance or transferring money, is known as
A. E-commerce
B. E-banking
C. E-learning
D. E-mail
     Click here to show Answer  

Comments

  1. Wow🀩 what a nice learning kudos to you allπŸ‘πŸ‘

    ReplyDelete
  2. Nice πŸ‘πŸ™‚ work.I love it

    ReplyDelete
  3. Good πŸ‘πŸ˜ŠπŸ‘πŸ™‚πŸ‘πŸ˜ŠπŸ’•πŸ‘πŸ™‚πŸ˜ŠπŸ’•

    ReplyDelete
  4. Great job
    πŸ’œ

    ReplyDelete
  5. this is an awesome work sir, more grace to your work and strength.

    ReplyDelete
  6. well selected questions.lovely

    ReplyDelete

Post a Comment

Popular posts from this blog

90 Objective Examination Questions in Major Subjects

Complete Computer Studies/ICT Curriculum for JSS 1 to SSS 3

JSS 3 Objective Questions and Answers in Computer studies