JSS 3 Objective Exam Questions in Computer studies
JSS Three Objective Questions
1. Individuals that have obtained sufficient education and training in the field of computer are called
A. Program Analyst
B. Computer Professionals
C. Computer commissioners
D. Computer Instructor
Click here to show Answer
B. Computer Professionals
2. All the following are careers in the field of computers except
A. Computer Engineer
B. Programmer
C. Network Administrator
D. Bank Manager
Click here to show Answer
D. Bank Manager
3. Who writes codes and instructions for the computer?
A. Computer Engineer
B. Programmer
C. Network Administrator
D. Bank Manager
Click here to show Answer
B. Programmer
4. NCS is a computer professional body. NCS stands for
A. Nigeria Computer Society
B. National Commission Society
C. Nigeria Commputer studies
D. Non-governmental Commision Society
Click here to show Answer
A. Nigeria Computer Society
5. Which of these is a quality of a good computer professional
A. Poor analytical skills
B. Automation
C. Poor technical writing skills
D. Troubleshooting capabilities
Click here to show Answer
D. Troubleshooting capabilities
6. A body that controls and regulates all communication operations in Nigeria
A. Nigeria Communication Commission
B. Nigeria Internet Group
C. Computer Association of Nigeria
D. Internet Service Provider Association of Nigeria
Click here to show Answer
A. Nigeria Communication Commission
7. All of these are means through which computer viruses can spread from one system to another Except
A. Internet download
B. Computer network
C. Infected memory devices
D. Blood transfusion
Click here to show Answer
D. Blood transfusion
8. A computer virus that alters its signature patterns whenever it replicates is called
A. Boot sector viruses
B. Polymorphic virus
C. Resident Virus
D. Non-resident virus
Click here to show Answer
B. Polymorphic virus
9. A program written to stop and curb the spread of the virus in a computer is called
A. Auto-virus
B. Anti-virus
C. I love you Virus
D. Stone
Click here to show Answer
B. Anti-virus
10. All of these are examples of computer viruses except
A. Smadav
B. Trojan horse
C. I love you virus
D. November 11
Click here to show Answer
A. Smadav
11. Which of these is not a virus warning sign
A. Speeds up computer response time
B. presence of tiny dots
C. Incomplete saving of files
D. The appearance of strange characters
Click here to show Answer
A. Speeds up computer response time
12. Which of this software is an anti-virus software
A. Norton
B. Creeper
C. Code records
D. Logic bomb Alabama
Click here to show Answer
A. Norton
13. Preventive measures against computer viruses do not include the following
A. Installing cracked software
B. Timely update of operating system
C. Timely update of anti-virus software
D. Exercise care when browsing the internet
Click here to show Answer
A. Installing cracked software
14. The largest computer network in the world is
A. LAN
B. WAN
C. PAN
D. Internet
Click here to show Answer
D. Internet
15. A computer network idea for schools offices and home is called
A. WAN
B. PAN
C. Internet
D. LAN
Click here to show Answer
D. LAN
16. The acronym MAN stands for
A. Man Area Network
B. Metropolitan Area Network
C. Master Area Network
D. Main Area Network
Click here to show Answer
B. Metropolitan Area Network
17. All of these are internet search engines except
A. Google
B. Yahoo
C. Facebook
D. Bing
Click here to show Answer
C. Facebook
18. Websites or software that enable a person to find a document and other media on the internet are called
A. Google
B. Internet Search Engines
C. Network Search
D. Search query
Click here to show Answer
B. Internet Search Engines
19. A word or group of words that are typed by the user in the search bar of the search engine is called
A. search query
B. Search engine result page
C. Likes
D. Comments
Click here to show Answer
A. search query
20. PAN stands for
A. Programmer Area Network
B. Personal Area Network
C. Personal Area Number
D. Programmer Area Number
Click here to show Answer
B. Personal Area Network
21. The gap between those who have effective access to digital and information technologies and those who have little or no access at all is called
A. New Economy divide
B. Old Economy divide
C. Digital divide
D. All of the above
Click here to show Answer
C. Digital divide
22. An economy that is centred on industrialization is called
A. New Economy
B. Old economy
C. Digital Split
D. Mechanical economy
Click here to show Answer
B. Old economy
23. One of these is a feature of the new economy
A. Requires a lot of labour
B. Time-consuming
C. It is knowledge-based
D. Mechanically driven
Click here to show Answer
C. It is knowledge-based
24. All of these are benefits of the new economy except
A. Creates new jobs
B. Attracts no investment
C. Greater competition
D. Businesses can start with small capital
Click here to show Answer
B. Attracts no investment
25. All the following are examples of DBMS packages except
A. MS Access
B. MS Word
C. Oracle
D. SQL server
Click here to show Answer
B. MS Word
26. A single piece of information about an object is called
A. Record
B. Primary key
C. Database
D. Field
Click here to show Answer
D. Field
27. Which of these can serve as a primary key
A. Name
B. Voter's Card number
C. Address
D. Age
Click here to show Answer
B. Voter's Card number
28. One of these is not a form of database
A. Hierarchical
B. Record
C. Relational
D. Network
Click here to show Answer
B. Record
29. ...... form of database permits the organization of data in the form of a tree
A. Hierarchical
B. Record
C. Relational
D. Network
Click here to show Answer
A. Hierarchical
30. Software designed to mainly perform mathematical, statistical and accounting calculations is called
A. Word processing software
B. DBMS
C. Spreadsheets software
D. Presentation software
Click here to show Answer
C. Spreadsheets software
31. All of these are uses of spreadsheet software except
A. Performing artistically related operated
B. Tax estimation
C. Budget planning
D. Preparation of payrol
Click here to show Answer
A. Performing artistically related operated
32. Which of these is a spreadsheet package
A. MS Paint
B. MS Excel
C. Ms Word
D. Ms Access
Click here to show Answer
B. MS Excel
33. The intersection between a row and a column is called
A. Formula
B. Label
C. Value
D. cell
Click here to show Answer
D. cell
34. ..... displays the cell reference of active cell
A. Name box
B. Formula bar
C. Row
D. Column
Click here to show Answer
A. Name box
35. The first string in the MS Excel formula is
A. *
B. =
C. +
D. /
Click here to show Answer
B. =
36. The formula to add Cell A3 to cell A13 in MS Excel is
A. = 3 + 13
B. SUM(A3:A13)
C. =SUM(A3:A13)
D. All of the above
Click here to show Answer
C. =SUM(A3:A13)
37. Numeric data that are entered into spreadsheet cells are called
A. Formula
B. Labels
C. Values
D. cells
Click here to show Answer
C. Values
38. A single page in a spreadsheet is called
A. workbook
B. worksheet
C. sheet
D. book
Click here to show Answer
B. worksheet
39. A cell that is currently selected for data entry is called
A. Function
B. Cell reference
C. Active cell
D. Anchor cell
Click here to show Answer
C. Active cell
40. Which of these is not a function in Excel
A. SUN
B. COUNT
C. MAX
D. MIN
Click here to show Answer
A. SUN
41. A computer's physical components that you can see and touch are called
A. Software
B. Hardware
C. Data
D. Information
Click here to show Answer
B. Hardware
42. The set of instructions that tells the computer what to do is called
A. Hardware
B. Software
C. Peripherals
D. Network
Click here to show Answer
B. Software
43. Which of these is an example of an input device?
A. Monitor
B. Printer
C. Keyboard
D. Speaker
Click here to show Answer
C. Keyboard
44. A device used to display output from a computer is a
A. Mouse
B. Scanner
C. Monitor
D. Microphone
Click here to show Answer
C. Monitor
45. The brain of the computer is the
A. CPU
B. RAM
C. Hard Drive
D. Motherboard
Click here to show Answer
A. CPU
46. RAM stands for
A. Read Access Memory
B. Random Array Memory
C. Random Access Memory
D. Read-only Memory
Click here to show Answer
C. Random Access Memory
47. Which of these is a secondary storage device?
A. RAM
B. ROM
C. Hard Disk Drive
D. Cache Memory
Click here to show Answer
C. Hard Disk Drive
48. The operating system is an example of
A. Application software
B. System software
C. Utility software
D. Freeware
Click here to show Answer
B. System software
49. MS Paint is a type of
A. Word processor
B. Spreadsheet
C. Graphics software
D. Database
Click here to show Answer
C. Graphics software
50. A computer network that covers a large geographical area is called a
A. LAN
B. MAN
C. WAN
D. PAN
Click here to show Answer
C. WAN
51. A device used to convert a hard copy into a soft copy is a
A. Printer
B. Scanner
C. Monitor
D. Plotter
Click here to show Answer
B. Scanner
52. Which of these is an example of a pointing device?
A. Keyboard
B. Mouse
C. Microphone
D. Speakers
Click here to show Answer
B. Mouse
53. The process of starting a computer is known as
A. Loading
B. Installing
C. Booting
D. Running
Click here to show Answer
C. Booting
54. Which of these is not an operating system?
A. Windows
B. Linux
C. Google Chrome
D. macOS
Click here to show Answer
C. Google Chrome
55. A software used to create, edit and format text documents is called a
A. Spreadsheet
B. Database
C. Word processor
D. Presentation software
Click here to show Answer
C. Word processor
56. Which of these is a popular web browser?
A. Microsoft Word
B. Adobe Photoshop
C. Mozilla Firefox
D. Microsoft Excel
Click here to show Answer
C. Mozilla Firefox
57. E-commerce refers to
A. Buying and selling goods on a phone
B. Exchanging emails
C. Buying and selling goods on the internet
D. Using an electronic calculator
Click here to show Answer
C. Buying and selling goods on the internet
58. The process of sending and receiving messages electronically is called
A. E-banking
B. E-mail
C. E-commerce
D. E-learning
Click here to show Answer
B. E-mail
59. A computer virus is a type of
A. Anti-virus software
B. Malicious software
C. Spreadsheet
D. Browser
Click here to show Answer
B. Malicious software
60. A firewall is a security system that protects a computer network from unauthorized access.
A. True
B. False
Click here to show Answer
A. True
61. An example of a flash memory storage device is a
A. Floppy disk
B. Hard disk drive
C. DVD
D. USB flash drive
Click here to show Answer
D. USB flash drive
62. Which of these is a magnetic storage device?
A. CD-ROM
B. Hard Disk Drive
C. Blu-ray Disc
D. SD Card
Click here to show Answer
B. Hard Disk Drive
63. The smallest unit of data in a computer is a
A. Byte
B. Bit
C. Kilobyte
D. Megabyte
Click here to show Answer
B. Bit
64. A collection of related data or information is called a
A. File
B. Folder
C. Document
D. Database
Click here to show Answer
A. File
65. The process of organizing files on a computer is called
A. Booting
B. File management
C. Formatting
D. Deleting
Click here to show Answer
B. File management
66. To save a file with a new name or in a new location, you use the
A. Save command
B. Save As command
C. New command
D. Open command
Click here to show Answer
B. Save As command
67. Which of these is a command used to undo the last action?
A. Ctrl + C
B. Ctrl + V
C. Ctrl + Z
D. Ctrl + X
Click here to show Answer
C. Ctrl + Z
68. To copy a selected text, you use the keyboard shortcut
A. Ctrl + X
B. Ctrl + V
C. Ctrl + C
D. Ctrl + P
Click here to show Answer
C. Ctrl + C
69. The main screen of a graphical user interface (GUI) is called the
A. Taskbar
B. Desktop
C. Start menu
D. Folder
Click here to show Answer
B. Desktop
70. A small picture or symbol that represents a file, folder, or program is an
A. Icon
B. Cursor
C. Menu
D. Window
Click here to show Answer
A. Icon
71. The software that manages a computer's memory, processes, and all its hardware and software is the
A. Application software
B. Operating system
C. Utility software
D. Driver
Click here to show Answer
B. Operating system
72. The command used to shut down a computer is typically found in the
A. Control Panel
B. My Computer
C. Start menu
D. Taskbar
Click here to show Answer
C. Start menu
73. Which of these is a feature of a modern operating system?
A. Single tasking
B. Command line interface
C. Multitasking
D. Limited memory usage
Click here to show Answer
C. Multitasking
74. An example of a text editor is
A. MS Word
B. Notepad
C. Google Sheets
D. PowerPoint
Click here to show Answer
B. Notepad
75. What is the primary purpose of a spreadsheet application?
A. Creating presentations
B. Managing databases
C. Performing calculations
D. Sending emails
Click here to show Answer
C. Performing calculations
76. The intersection of a row and a column in a spreadsheet is called a
A. Sheet
B. Cell
C. Table
D. Field
Click here to show Answer
B. Cell
77. A formula in Excel always begins with a(n)
A. Plus sign (+)
B. Equal sign (=)
C. Hash symbol (#)
D. Dollar sign ($)
Click here to show Answer
B. Equal sign (=)
78. To apply an animation to a slide in PowerPoint, you would use the
A. Design tab
B. Transitions tab
C. Insert tab
D. Animations tab
Click here to show Answer
D. Animations tab
79. A software used for creating and presenting slides is called
A. Word processing software
B. Spreadsheet software
C. Presentation software
D. Graphics software
Click here to show Answer
C. Presentation software
80. The process of converting a digital file into a printed document is called
A. Scanning
B. Saving
C. Printing
D. Exporting
Click here to show Answer
C. Printing
81. The World Wide Web is a system of
A. Interlinked web pages accessed via the internet
B. Personal computer files
C. Computer hardware components
D. Data storage devices
Click here to show Answer
A. Interlinked web pages accessed via the internet
82. A unique address that identifies a specific website on the internet is called a
A. URL
B. HTTP
C. E-mail address
D. HTML
Click here to show Answer
A. URL
83. The process of transferring a file from a remote computer to your computer is called
A. Uploading
B. Downloading
C. Browsing
D. Streaming
Click here to show Answer
B. Downloading
84. A computer that stores files and data and makes them available to other computers on a network is called a
A. Client
B. Workstation
C. Server
D. Hub
Click here to show Answer
C. Server
85. Which of these is a way to protect your computer from unauthorized access?
A. Sharing all your files
B. Using a weak password
C. Installing an anti-virus software
D. Clicking on every link
Click here to show Answer
C. Installing an anti-virus software
86. Unwanted emails that are usually advertisements are called
A. Spam
B. Phishing
C. Malware
D. Trojans
Click here to show Answer
A. Spam
87. The act of using a computer to access another person's personal data or information without their permission is called
A. Blogging
B. Hacking
C. Surfing
D. Streaming
Click here to show Answer
B. Hacking
88. A set of rules that computers use to communicate over a network is called a
A. Protocol
B. Address
C. Browser
D. Search engine
Click here to show Answer
A. Protocol
89. The term used to describe a computer user who intentionally tries to break into computer systems is a
A. Programmer
B. Analyst
C. Hacker
D. Web developer
Click here to show Answer
C. Hacker
90. The practice of using a computer to conduct financial transactions, like checking your account balance or transferring money, is known as
A. E-commerce
B. E-banking
C. E-learning
D. E-mail
Click here to show Answer
B. E-banking
Wowπ€© what a nice learning kudos to you allππ
ReplyDeleteNice ππ work.I love it
ReplyDeletei really enjoyed my self here thanks
DeleteThanks JoyOrji
DeleteGood πππππππππππ
ReplyDeleteGreat job
ReplyDeleteπ
this is an awesome work sir, more grace to your work and strength.
ReplyDeletewell selected questions.lovely
ReplyDeleteThanks for your kind words
DeleteThank you
ReplyDelete