SSS Three Objective Exam Questions in Computer Studies

SSS Three Objective Questions in Computer Studies/ICT

SSS Three Objective Questions in Computer Studies/ICT

I have compiled 51 questions covering all SSS Three topics in computer studies. The Answers are at the bottom.

1. Which of these is not a type of network topology
A. Bus topology
B. High-breed topology
C. Mesh topology
D. Star topology
2. The main computer in a network that acts as the host and provides data and software to other terminals linked to it is called
A. Server
B. Client
C. Workstation
D. Network Interface Unit
3. A computer network usually spanning a large campus is called
A. PAN
B. LAN
C. MAN
D. WAN
4. As a network administrator, you were contacted to install a network at Command Secondary School. Which type of network would you recommend and install?
A. LAN
B. PAN
C. MAN
D. SAN
5. One of these network topologies uses "Token" technology
A. Ring topology
B. Mesh topology
C. Bus topology
D. Tree topology
6. Which of these network topologies has no traffic congestion
A. Star
B. Linear bus
C. Ring
D. Mesh
7. A circuit board installed in a computer so that the computer can connect to a network is called
A. Modem
B. Hub
C. Network Interface Card
D. Router
8. WWW was invented in 1989 by
A. Bill Gate
B. Steve Jobs
C. Timothy Berners-Lee
D. Elon Musk
9. A software for traversing information on the World Wide Web is called
A. VS Code
B. Web Browser
C. Website
D. Notepad
10. The acronym SMTP stands for
A. Small medium Text Protocol
B. Simple Mail Transfer Protocol
C. Sample Main Transfer Protocol
D. Small Mail Transfer Protocol
11. The introductory page of a website is called
A. Website
B. Web browser
C. HTML
D. Home page
12. The language a web browser can interpret is
A. JAVA
B. HTML
C. Dream Weaver
D. C++
13. One of these is a website development tool
A. VS code
B. MS Word
C. CorelDraw
D. Oracle
14. Which of these network cables transmits light rather than electric signals
A. Coaxial cable
B. STP Cable
C. UTP Cable
D. Fiber Optics Cable
15. All of these are network cables except
A. Telephone wire
B. Shielded Twisted Pair
C. RJ 45
D. Coaxial Cable
16. Which of these is the correct tag for underlining a word in HTML
A. < u >< /u >
B. Ctrl + U
C. < u >
D. < /u >
17. One of these connectors can be used to terminate telephone lines
A. RJ 11
B. RJ 45
C. RJ 25
D. RJ 14
18. The computer cable that links the system unit to the monitor is called
A. VDU
B. VGA
C. USB
D. Power cable
19. All of these are DBMS packages except
A. MS Oracle
B. SQL Server
C.Paradox
D. Rbase
20. A database key that can be used to create relationships between tables is called
A. Primary key
B. Secondary Key
C. Foreign Key
D. Master Key
21. A request for a particular collection of data in a database is called
A. File
B. Form
C. Report
D. Query
22. Which of these fields can serve as a primary key in a relational database
A. ID card number
B. Surname
C. First name
D. Religion
23. Which of these forms of database model permits multiple member records to be linked to multiple parents and vice versa
A. Flat file
B. Relational Model
C. Network model
D. Hierarchical model
24. One of these is a type of view in MS Access
A. Landscape view
B. Datasheet view
C. Portrait View
D. Report View
25. You have been tasked to provide a formatted printout of data on a specific subject in a database. Which of these database objects is most suitable?
A. Form
B. Report
C. Query
D. Table
26. One of these cannot be used to create and manipulate images on a computer
A. MS Access
B. AutoCAD
C. CorelDraw
D. Adobe Photoshop
27.All of these are features in the CorelDraw environment except
A. Docker
B. Drawing Window
C. Colour Palette
D. Formula bar
28. One of these is not a function of the pick tool in CorelDraw software
A. Skewing objects
B. Rotating objects
C. Selecting objects
D. Draw curves from lines
29. Which of these CorelDraw tools is used to select and copy a colour from an object
A. Colour palette
B. Eyedropper
C. Biezer tool
D. interactive fill
30. The shortcut to place an object at the centre of the drawing page in CorelDraw is
A. Ctrl + C
B. Ctrl + P
C. P
D. C
31. The ....... statement is used to create an array in BASIC programming language
A. FOR-NEXT
B. DIM
C. INT
D. WHILE-WEND
32. DIM INT(9) will create how many subscripted variables
A. 10
B. 9
C. 11
D. 8
33. Looping in BASIC programming Language can be achieved through the use of .......... statement
A. FOR-NEXT
B. DIM
C. WHILE-WEND
D. Both A and C
34. The last character in a string variable name is the ....... sign
A. dollar
B. percentage
C. asterisk
D. pound
35. CAFE is a symbol in .......... number system
A. Decimal
B. Hexadecimal
C. Octal
D. Binary
36. The product 410 and 610 in binary is
A. 11001
B. 00011
C. 10100
D. 11000
37. Convert 11111110111011012 to hex
A. DEEFhex
B. EEEFhex
C. FEEDhex
D. EDEFhex
38. If x2 + 10102 = 100002. find the value of x
A. 1102
B. 0112
C. 1012
D. 1002
39. Which of these is not a programming language
A. Visual BASIC
B. JAVA
C. HTML
D. C++
40. High-level languages that can be read and executed directly are called
A. Interpreted languages
B. Compiled languages
C. Assembly Language
D. Machine languages
41. The acronym COBOL stands for
A. Common Oriented Business Object Language
B. Common Business-Oriented Language
C. Common Object Language Oriented Language
D. Compiled Oriented Business Language
42. The advantages of High-Level Language do not include the following
A. Machine dependent
B. User friendly
C. Easier to maintain
D. Easier to write
43. A set of rules governing how programming languages are written is called
A. Semantics
B. Laws
C. Desk-checking
D. Syntax
44. Which of these is not a method of data representation
A. ASCII
B. CDS
C. BCD
D. UNICODE
45. Data representation that provides a unique number for every character, no matter the platform, program and language is
A. BITS
B. EBCDIC
C. ASCII
D. UNICODE
46. Which of these malware can replicate and travel unaided
A. Worms
B. Viruses
C. Trojan
D. Spammer
47. One of these is not a source of security breaches
A. care in giving out personal and vital information
B. Hackers, spammers and scammers
C. Poor network implementation
D. Lack of ICT policies
48. ....... are unsolicited and unwanted junk messages sent out in bulk to an indiscriminate recipient list
A. Spams
B. Phishing
C. Scammer
D. Hackers
49.Illegal copying and distribution or use of software is known as
A. Plagiarism
B. Piracy
C. Spamming
D. Hacking
50. ....... are destructive malware that looks like a genuine application
A. Virus
B. Worms
C. Smadav
D. Trojan horse
51. All of these are antivirus software except
A. Norton
B. Smadav
C. Code Red
D. Bitdefender

Comments

Post a Comment

Popular posts from this blog

90 Objective Examination Questions in Major Subjects

Complete Computer Studies/ICT Curriculum for JSS 1 to SSS 3

JSS One Objective Questions in Computer Studies/Information Technology