SSS Three Objective Exam Questions in Computer Studies

More OBJ Questions Essay Questions

1. Which of these is not a type of network topology?

A. Bus topology
B. High-breed topology
C. Mesh topology
D. Star topology

Click here to show answer
2. In a network, the main computer that provides services to others is called?

A. Client
B. Server
C. Switch
D. Workstation

Click here to show answer
3. A network that covers a city is called?

A. PAN
B. LAN
C. MAN
D. WAN

Click here to show answer
4. As a network administrator setting up a school's computers in one site, which network is best?

A. LAN
B. PAN
C. MAN
D. SAN

Click here to show answer
5. Which topology uses token passing technology?

A. Ring
B. Mesh
C. Bus
D. Tree

Click here to show answer
6. Which topology typically has no traffic congestion due to dedicated links?

A. Star
B. Bus
C. Ring
D. Mesh

Click here to show answer
7. The hardware that connects a computer to a network is the ____.

A. Modem
B. Hub
C. Network Interface Card
D. Router

Click here to show answer
8. The World Wide Web was proposed in 1989 by ____.

A. Bill Gates
B. Steve Jobs
C. Tim Berners‑Lee
D. Elon Musk

Click here to show answer
9. Software used to access pages on the World Wide Web is a ____.

A. Text editor
B. Web browser
C. Website
D. Hyperlink

Click here to show answer
10. SMTP stands for ____.

A. Small Medium Text Protocol
B. Simple Mail Transfer Protocol
C. Sample Main Transfer Protocol
D. Small Mail Transfer Protocol

Click here to show answer
11. The introductory page of a website is called the ____.

A. Website
B. Web browser
C. HTML
D. Home page

Click here to show answer
12. A language that web browsers can interpret is ____.

A. JAVA
B. HTML
C. Dreamweaver
D. C++

Click here to show answer
13. Which of these is a website development tool?

A. VS Code
B. MS Word
C. CorelDRAW
D. Oracle

Click here to show answer
14. Which cable transmits light rather than electrical signals?

A. Coaxial cable
B. STP cable
C. UTP cable
D. Fibre‑optic cable

Click here to show answer
15. Which of the following is NOT a network cable?

A. Telephone wire
B. Shielded twisted pair
C. RJ‑45
D. Coaxial cable

Click here to show answer
16. Which tag correctly underlines text in HTML?

A.
B. Ctrl+U
C.
D.

Click here to show answer
17. Which connector is commonly used for telephone lines?

A. RJ‑11
B. RJ‑45
C. RJ‑25
D. RJ‑14

Click here to show answer
18. The cable that links a system unit to a non‑HD monitor is a ____ cable.

A. VDU
B. VGA
C. USB
D. Power

Click here to show answer
19. Which is NOT a DBMS?

A. Oracle
B. SQL Server
C. Paradox
D. R‑Base

Click here to show answer
20. Which of the following is NOT a DBMS package?

A. MS Oracle
B. SQL Server
C. Paradox
D. RBase

Click here to show answer
21. A key used to create relationships between tables is the ____.

A. Primary key
B. Secondary key
C. Foreign key
D. Master key

Click here to show answer
22. A request for a specific set of data from a database is a ____.

A. File
B. Form
C. Report
D. Query

Click here to show answer
23. Which field is most suitable as a primary key?

A. ID card number
B. Surname
C. First name
D. Religion

Click here to show answer
24. Which database model allows many‑to‑many links?

A. Flat file
B. Relational model
C. Network model
D. Hierarchical model

Click here to show answer
25. Which of these is a common view in MS Access tables?

A. Landscape view
B. Datasheet view
C. Portrait view
D. Slide view

Click here to show answer
26. Which object is best for formatted printouts of data?

A. Form
B. Report
C. Query
D. Table

Click here to show answer
27. Which software cannot be used to create or edit images?

A. MS Access
B. AutoCAD
C. CorelDRAW
D. Adobe Photoshop

Click here to show answer
28. Which is NOT a typical feature of the CorelDRAW workspace?

A. Docker
B. Drawing window
C. Colour palette
D. Formula bar

Click here to show answer
29. Which action is NOT done with the Pick tool in CorelDRAW?

A. Skew objects
B. Rotate objects
C. Select objects
D. Draw curves from lines

Click here to show answer
30. Which tool samples and copies colour from an object in CorelDRAW?

A. Colour palette
B. Eyedropper
C. Bezier tool
D. Interactive fill

Click here to show answer
31. Shortcut to centre an object on the page in CorelDRAW is ____.

A. Ctrl+C
B. Ctrl+P
C. P
D. C

Click here to show answer
32. In BASIC, which statement reserves space for arrays?

A. FOR…NEXT
B. DIM
C. INT
D. WHILE…WEND

Click here to show answer
33. DIM A(9) creates how many elements (0‑based)?

A. 10
B. 9
C. 11
D. 8

Click here to show answer
34. Looping in BASIC can be achieved using ____.

A. FOR…NEXT
B. DIM
C. WHILE…WEND
D. Both A and C

Click here to show answer
35. In classic BASIC, a string variable typically ends with which symbol?

A. $
B. %
C. *
D. #

Click here to show answer
36. CAFE is a valid symbol in the ____ number system.

A. Decimal
B. Hexadecimal
C. Octal
D. Binary

Click here to show answer
37. 4₁₀ × 6₁₀ equals ____ in binary.

A. 11001
B. 00011
C. 10100
D. 11000

Click here to show answer
38. 1111111011101101₂ equals ____ in hexadecimal.

A. DEEF₁₆
B. EEEF₁₆
C. FEED₁₆
D. EDEF₁₆

Click here to show answer
39. If x₂ + 1010₂ = 10000₂, then x = ____.

A. 110₂
B. 011₂
C. 101₂
D. 100₂

Click here to show answer
40. Which of the following is NOT a programming language?

A. Visual Basic
B. Java
C. HTML
D. C++

Click here to show answer
41. High‑level languages executed line‑by‑line are called ____.

A. Interpreted languages
B. Compiled languages
C. Assembly languages
D. Machine languages

Click here to show answer
42. COBOL stands for ____.

A. Common Oriented Business Object Language
B. Common Business‑Oriented Language
C. Common Object Language Oriented Language
D. Compiled Oriented Business Language

Click here to show answer
43. Which is NOT an advantage of high‑level languages?

A. Machine‑dependent
B. User‑friendly
C. Easier to maintain
D. Easier to write

Click here to show answer
44. The rules that govern how statements are written in a language are called ____.

A. Semantics
B. Laws
C. Desk‑checking
D. Syntax

Click here to show answer
45. Which of these is NOT a method of data representation?

A. ASCII
B. CDS
C. BCD
D. Unicode

Click here to show answer
46. Which representation provides a unique number for each character across platforms?

A. Bits
B. EBCDIC
C. ASCII
D. Unicode

Click here to show answer
47. Which malware replicates and spreads without user action?

A. Worm
B. Virus
C. Trojan
D. Spyware

Click here to show answer
48. Which is NOT a source of security breach?

A. Care in sharing personal information
B. Hackers and spammers
C. Poor network implementation
D. Lack of ICT policies

Click here to show answer
49. Unsolicited bulk messages are called ____.

A. Spams
B. Phishing
C. Scams
D. Hackers

Click here to show answer
50. Illegal copying and distribution of software is called ____.

A. Plagiarism
B. Piracy
C. Spamming
D. Hacking

Click here to show answer
51. A malicious program that appears legitimate is a ____.

A. Virus
B. Worm
C. Trojan horse
D. Rootkit

Click here to show answer
52. Which of the following is NOT an antivirus software?

A. Norton
B. Smadav
C. Code Red
D. Bitdefender

Click here to show answer
53. Phishing primarily attempts to ____.

A. Steal credentials
B. Speed up networks
C. Repair disks
D. Encrypt backups

Click here to show answer
54. A strong password typically includes ____.

A. Only letters
B. Letters and numbers
C. Personal names
D. Keyboard patterns

Click here to show answer
55. Which protocol secures web traffic with encryption?

A. HTTP
B. FTP
C. HTTPS
D. TELNET

Click here to show answer
56. A privacy setting that hides your social profile from the public is an example of ____.

A. Data minimization
B. Access control
C. Backdoor
D. Overfitting

Click here to show answer
57. Which act is most associated with exam malpractice using ICT?

A. Using licensed software
B. Sharing past questions
C. Impersonation via devices
D. Backing up files

Click here to show answer
58. Backing up only files changed since the last full backup is a ____ backup.

A. Full
B. Differential
C. Incremental
D. Mirror

Click here to show answer
59. Which device forwards packets based on IP addresses?

A. Hub
B. Switch
C. Router
D. Repeater

Click here to show answer
60. A topology where all nodes connect to a central device is ____.

A. Bus
B. Star
C. Ring
D. Mesh

Click here to show answer
61. Which wireless standard commonly operates at 2.4 GHz and 5 GHz?

A. 802.3
B. 802.11
C. 802.15
D. 802.16

Click here to show answer
62. In spreadsheets, the intersection of a row and a column is a ____.

A. Cell
B. Range
C. Sheet
D. Workbook

Click here to show answer
63. In Excel, the formula to sum cells A1 through A10 is ____.

A. =SUM(A1:A10)
B. =ADD(A1-A10)
C. =TOTAL(A1;A10)
D. SUM[A1:A10]

Click here to show answer
64. Which chart best shows parts of a whole?

A. Line chart
B. Pie chart
C. Scatter chart
D. Column chart

Click here to show answer
65. To maintain original formatting when pasting into Word, use ____ paste option.

A. Keep Text Only
B. Merge Formatting
C. Keep Source Formatting
D. Picture

Click here to show answer
66. Which file format preserves document layout for printing?

A. TXT
B. DOCX
C. PDF
D. CSV

Click here to show answer
67. In presentation software, a set of coordinated fonts and colours is a ____.

A. Layout
B. Transition
C. Theme
D. Animation

Click here to show answer
68. The shortcut to start slideshow from the beginning in PowerPoint is ____.

A. F5
B. F7
C. Ctrl+S
D. Alt+Tab

Click here to show answer
69. In DTP, arranging elements to guide the reader’s eye is called ____.

A. Kerning
B. Leading
C. Alignment
D. Visual hierarchy

Click here to show answer
70. Spreadsheet absolute reference for cell A1 is ____.

A. A1
B. $A$1
C. A$1
D. $A1

Click here to show answer
71. In spreadsheets, data validated to allow only dates is an example of ____.

A. Conditional formatting
B. Data validation
C. Data sorting
D. Scenario

Click here to show answer
72. Which of these is NOT an operating system?

A. Windows
B. Linux
C. Android
D. Chrome

Click here to show answer
73. The program that loads the operating system into memory at startup is the ____.

A. Loader
B. Bootloader
C. Scheduler
D. Interpreter

Click here to show answer
74. Which interface allows users to type commands to interact with the OS?

A. GUI
B. CLI
C. API
D. UIX

Click here to show answer
75. The smallest addressable unit of data on disk is a ____.

A. Bit
B. Byte
C. Sector
D. Cluster

Click here to show answer
76. To safely remove a USB drive, you should first ____.

A. Format it
B. Eject it
C. Scan it
D. Rename it

Click here to show answer
77. A collection of files stored under one name is a ____.

A. Record
B. Folder
C. Field
D. Byte

Click here to show answer
78. The environment that allows multiple programs to run at once is ____.

A. Single‑tasking
B. Multi‑tasking
C. Batch processing
D. Spooling

Click here to show answer
79. Which utility checks a disk for bad sectors and file system errors?

A. Defragmenter
B. CHKDSK
C. Task Manager
D. Event Viewer

Click here to show answer
80. File extension .csv is best described as ____.

A. Binary image file
B. Comma‑separated values text
C. Encrypted spreadsheet
D. Executable script

Click here to show answer
81. Which permission allows a user to view and change a file?

A. Read
B. Write
C. Execute
D. Read/Write

Click here to show answer
82. The first phase of the Systems Development Life Cycle (SDLC) is ____.

A. Design
B. Testing
C. Problem identification/Feasibility study
D. Implementation

Click here to show answer
83. A diagram that uses symbols like start/end, process, and decision is a ____.

A. Use‑case diagram
B. ER diagram
C. Flowchart
D. Gantt chart

Click here to show answer
84. The symbol used for decision in a flowchart is a ____.

A. Rectangle
B. Parallelogram
C. Diamond
D. Circle

Click here to show answer
85. IoT stands for ____.

A. Internet of Tools
B. Internet of Things
C. Input/Output Technology
D. Internal Office Technology

Click here to show answer
86. AI that is trained for a specific task is called ____ AI.

A. General
B. Narrow
C. Super
D. Quantum

Click here to show answer
87. Cloud service that provides virtual machines and networks is ____.

A. SaaS
B. PaaS
C. IaaS
D. DBaaS

Click here to show answer
88. Buying and selling goods online is called ____.

A. E‑learning
B. E‑commerce
C. E‑banking
D. E‑waste

Click here to show answer
89. A small piece of data stored by a website on a user’s browser is a ____.

A. Cache
B. Cookie
C. Log
D. Patch

Click here to show answer
90. The legal right that protects software creators is ____.

A. Trademark
B. Copyright
C. Patent
D. License key

Click here to show answer
91. Which practice helps reduce digital divide in schools?

A. Blocking internet access
B. High device costs
C. Community ICT centres
D. Outdated curricula

Click here to show answer

Comments

Post a Comment

Popular posts from this blog

90 Objective Examination Questions in Major Subjects

Complete Computer Studies/ICT Curriculum for JSS 1 to SSS 3

JSS 3 Objective Questions and Answers in Computer studies