More OBJ Questions
Essay Questions
1. Which of these is not a type of network topology?
A. Bus topology B. High-breed topology C. Mesh topology D. Star topology
Click here to show answer
B. High-breed topology
2. In a network, the main computer that provides services to others is called?
A. Client B. Server C. Switch D. Workstation
Click here to show answer
B. Server
3. A network that covers a city is called?
A. PAN B. LAN C. MAN D. WAN
Click here to show answer
C. MAN
4. As a network administrator setting up a school's computers in one site, which network is best?
A. LAN B. PAN C. MAN D. SAN
Click here to show answer
A. LAN
5. Which topology uses token passing technology?
A. Ring B. Mesh C. Bus D. Tree
Click here to show answer
A. Ring
6. Which topology typically has no traffic congestion due to dedicated links?
A. Star B. Bus C. Ring D. Mesh
Click here to show answer
D. Mesh
7. The hardware that connects a computer to a network is the ____.
A. Modem B. Hub C. Network Interface Card D. Router
Click here to show answer
C. Network Interface Card
8. The World Wide Web was proposed in 1989 by ____.
A. Bill Gates B. Steve Jobs C. Tim Berners‑Lee D. Elon Musk
Click here to show answer
C. Tim Berners‑Lee
9. Software used to access pages on the World Wide Web is a ____.
A. Text editor B. Web browser C. Website D. Hyperlink
Click here to show answer
B. Web browser
10. SMTP stands for ____.
A. Small Medium Text Protocol B. Simple Mail Transfer Protocol C. Sample Main Transfer Protocol D. Small Mail Transfer Protocol
Click here to show answer
B. Simple Mail Transfer Protocol
11. The introductory page of a website is called the ____.
A. Website B. Web browser C. HTML D. Home page
Click here to show answer
D. Home page
12. A language that web browsers can interpret is ____.
A. JAVA B. HTML C. Dreamweaver D. C++
Click here to show answer
B. HTML
13. Which of these is a website development tool?
A. VS Code B. MS Word C. CorelDRAW D. Oracle
Click here to show answer
A. VS Code
14. Which cable transmits light rather than electrical signals?
A. Coaxial cable B. STP cable C. UTP cable D. Fibre‑optic cable
Click here to show answer
D. Fibre‑optic cable
15. Which of the following is NOT a network cable?
A. Telephone wire B. Shielded twisted pair C. RJ‑45 D. Coaxial cable
Click here to show answer
C. RJ‑45
16. Which tag correctly underlines text in HTML?
A. …
B. Ctrl+U
C.
D.
Click here to show answer
A. …
17. Which connector is commonly used for telephone lines?
A. RJ‑11 B. RJ‑45 C. RJ‑25 D. RJ‑14
Click here to show answer
A. RJ‑11
18. The cable that links a system unit to a non‑HD monitor is a ____ cable.
A. VDU B. VGA C. USB D. Power
Click here to show answer
B. VGA
19. Which is NOT a DBMS?
A. Oracle B. SQL Server C. Paradox D. R‑Base
Click here to show answer
A. Oracle
20. Which of the following is NOT a DBMS package?
A. MS Oracle B. SQL Server C. Paradox D. RBase
Click here to show answer
A. MS Oracle
21. A key used to create relationships between tables is the ____.
A. Primary key B. Secondary key C. Foreign key D. Master key
Click here to show answer
C. Foreign key
22. A request for a specific set of data from a database is a ____.
A. File B. Form C. Report D. Query
Click here to show answer
D. Query
23. Which field is most suitable as a primary key?
A. ID card number B. Surname C. First name D. Religion
Click here to show answer
A. ID card number
24. Which database model allows many‑to‑many links?
A. Flat file B. Relational model C. Network model D. Hierarchical model
Click here to show answer
C. Network model
25. Which of these is a common view in MS Access tables?
A. Landscape view B. Datasheet view C. Portrait view D. Slide view
Click here to show answer
B. Datasheet view
26. Which object is best for formatted printouts of data?
A. Form B. Report C. Query D. Table
Click here to show answer
B. Report
27. Which software cannot be used to create or edit images?
A. MS Access B. AutoCAD C. CorelDRAW D. Adobe Photoshop
Click here to show answer
A. MS Access
28. Which is NOT a typical feature of the CorelDRAW workspace?
A. Docker B. Drawing window C. Colour palette D. Formula bar
Click here to show answer
D. Formula bar
29. Which action is NOT done with the Pick tool in CorelDRAW?
A. Skew objects B. Rotate objects C. Select objects D. Draw curves from lines
Click here to show answer
D. Draw curves from lines
30. Which tool samples and copies colour from an object in CorelDRAW?
A. Colour palette B. Eyedropper C. Bezier tool D. Interactive fill
Click here to show answer
B. Eyedropper
31. Shortcut to centre an object on the page in CorelDRAW is ____.
A. Ctrl+C B. Ctrl+P C. P D. C
Click here to show answer
C. P
32. In BASIC, which statement reserves space for arrays?
A. FOR…NEXT B. DIM C. INT D. WHILE…WEND
Click here to show answer
B. DIM
33. DIM A(9) creates how many elements (0‑based)?
A. 10 B. 9 C. 11 D. 8
Click here to show answer
A. 10
34. Looping in BASIC can be achieved using ____.
A. FOR…NEXT B. DIM C. WHILE…WEND D. Both A and C
Click here to show answer
D. Both A and C
35. In classic BASIC, a string variable typically ends with which symbol?
A. $ B. % C. * D. #
Click here to show answer
A. $
36. CAFE is a valid symbol in the ____ number system.
A. Decimal B. Hexadecimal C. Octal D. Binary
Click here to show answer
B. Hexadecimal
37. 4₁₀ × 6₁₀ equals ____ in binary.
A. 11001 B. 00011 C. 10100 D. 11000
Click here to show answer
D. 11000
38. 1111111011101101₂ equals ____ in hexadecimal.
A. DEEF₁₆ B. EEEF₁₆ C. FEED₁₆ D. EDEF₁₆
Click here to show answer
C. FEED₁₆
39. If x₂ + 1010₂ = 10000₂, then x = ____.
A. 110₂ B. 011₂ C. 101₂ D. 100₂
Click here to show answer
A. 110₂
40. Which of the following is NOT a programming language?
A. Visual Basic B. Java C. HTML D. C++
Click here to show answer
C. HTML
41. High‑level languages executed line‑by‑line are called ____.
A. Interpreted languages B. Compiled languages C. Assembly languages D. Machine languages
Click here to show answer
A. Interpreted languages
42. COBOL stands for ____.
A. Common Oriented Business Object Language B. Common Business‑Oriented Language C. Common Object Language Oriented Language D. Compiled Oriented Business Language
Click here to show answer
B. Common Business‑Oriented Language
43. Which is NOT an advantage of high‑level languages?
A. Machine‑dependent B. User‑friendly C. Easier to maintain D. Easier to write
Click here to show answer
A. Machine‑dependent
44. The rules that govern how statements are written in a language are called ____.
A. Semantics B. Laws C. Desk‑checking D. Syntax
Click here to show answer
D. Syntax
45. Which of these is NOT a method of data representation?
A. ASCII B. CDS C. BCD D. Unicode
Click here to show answer
B. CDS
46. Which representation provides a unique number for each character across platforms?
A. Bits B. EBCDIC C. ASCII D. Unicode
Click here to show answer
D. Unicode
47. Which malware replicates and spreads without user action?
A. Worm B. Virus C. Trojan D. Spyware
Click here to show answer
A. Worm
48. Which is NOT a source of security breach?
A. Care in sharing personal information B. Hackers and spammers C. Poor network implementation D. Lack of ICT policies
Click here to show answer
A. Care in sharing personal information
49. Unsolicited bulk messages are called ____.
A. Spams B. Phishing C. Scams D. Hackers
Click here to show answer
A. Spams
50. Illegal copying and distribution of software is called ____.
A. Plagiarism B. Piracy C. Spamming D. Hacking
Click here to show answer
B. Piracy
51. A malicious program that appears legitimate is a ____.
A. Virus B. Worm C. Trojan horse D. Rootkit
Click here to show answer
C. Trojan horse
52. Which of the following is NOT an antivirus software?
A. Norton B. Smadav C. Code Red D. Bitdefender
Click here to show answer
C. Code Red
53. Phishing primarily attempts to ____.
A. Steal credentials B. Speed up networks C. Repair disks D. Encrypt backups
Click here to show answer
A. Steal credentials
54. A strong password typically includes ____.
A. Only letters B. Letters and numbers C. Personal names D. Keyboard patterns
Click here to show answer
B. Letters and numbers
55. Which protocol secures web traffic with encryption?
A. HTTP B. FTP C. HTTPS D. TELNET
Click here to show answer
C. HTTPS
56. A privacy setting that hides your social profile from the public is an example of ____.
A. Data minimization B. Access control C. Backdoor D. Overfitting
Click here to show answer
B. Access control
57. Which act is most associated with exam malpractice using ICT?
A. Using licensed software B. Sharing past questions C. Impersonation via devices D. Backing up files
Click here to show answer
C. Impersonation via devices
58. Backing up only files changed since the last full backup is a ____ backup.
A. Full B. Differential C. Incremental D. Mirror
Click here to show answer
C. Incremental
59. Which device forwards packets based on IP addresses?
A. Hub B. Switch C. Router D. Repeater
Click here to show answer
C. Router
60. A topology where all nodes connect to a central device is ____.
A. Bus B. Star C. Ring D. Mesh
Click here to show answer
B. Star
61. Which wireless standard commonly operates at 2.4 GHz and 5 GHz?
A. 802.3 B. 802.11 C. 802.15 D. 802.16
Click here to show answer
B. 802.11
62. In spreadsheets, the intersection of a row and a column is a ____.
A. Cell B. Range C. Sheet D. Workbook
Click here to show answer
A. Cell
63. In Excel, the formula to sum cells A1 through A10 is ____.
A. =SUM(A1:A10) B. =ADD(A1-A10) C. =TOTAL(A1;A10) D. SUM[A1:A10]
Click here to show answer
A. =SUM(A1:A10)
64. Which chart best shows parts of a whole?
A. Line chart B. Pie chart C. Scatter chart D. Column chart
Click here to show answer
B. Pie chart
65. To maintain original formatting when pasting into Word, use ____ paste option.
A. Keep Text Only B. Merge Formatting C. Keep Source Formatting D. Picture
Click here to show answer
C. Keep Source Formatting
66. Which file format preserves document layout for printing?
A. TXT B. DOCX C. PDF D. CSV
Click here to show answer
C. PDF
67. In presentation software, a set of coordinated fonts and colours is a ____.
A. Layout B. Transition C. Theme D. Animation
Click here to show answer
C. Theme
68. The shortcut to start slideshow from the beginning in PowerPoint is ____.
A. F5 B. F7 C. Ctrl+S D. Alt+Tab
Click here to show answer
A. F5
69. In DTP, arranging elements to guide the reader’s eye is called ____.
A. Kerning B. Leading C. Alignment D. Visual hierarchy
Click here to show answer
D. Visual hierarchy
70. Spreadsheet absolute reference for cell A1 is ____.
A. A1 B. $A$1 C. A$1 D. $A1
Click here to show answer
B. $A$1
71. In spreadsheets, data validated to allow only dates is an example of ____.
A. Conditional formatting B. Data validation C. Data sorting D. Scenario
Click here to show answer
B. Data validation
72. Which of these is NOT an operating system?
A. Windows B. Linux C. Android D. Chrome
Click here to show answer
D. Chrome
73. The program that loads the operating system into memory at startup is the ____.
A. Loader B. Bootloader C. Scheduler D. Interpreter
Click here to show answer
B. Bootloader
74. Which interface allows users to type commands to interact with the OS?
A. GUI B. CLI C. API D. UIX
Click here to show answer
B. CLI
75. The smallest addressable unit of data on disk is a ____.
A. Bit B. Byte C. Sector D. Cluster
Click here to show answer
C. Sector
76. To safely remove a USB drive, you should first ____.
A. Format it B. Eject it C. Scan it D. Rename it
Click here to show answer
B. Eject it
77. A collection of files stored under one name is a ____.
A. Record B. Folder C. Field D. Byte
Click here to show answer
B. Folder
78. The environment that allows multiple programs to run at once is ____.
A. Single‑tasking B. Multi‑tasking C. Batch processing D. Spooling
Click here to show answer
B. Multi‑tasking
79. Which utility checks a disk for bad sectors and file system errors?
A. Defragmenter B. CHKDSK C. Task Manager D. Event Viewer
Click here to show answer
B. CHKDSK
80. File extension .csv is best described as ____.
A. Binary image file B. Comma‑separated values text C. Encrypted spreadsheet D. Executable script
Click here to show answer
B. Comma‑separated values text
81. Which permission allows a user to view and change a file?
A. Read B. Write C. Execute D. Read/Write
Click here to show answer
D. Read/Write
82. The first phase of the Systems Development Life Cycle (SDLC) is ____.
A. Design B. Testing C. Problem identification/Feasibility study D. Implementation
Click here to show answer
C. Problem identification/Feasibility study
83. A diagram that uses symbols like start/end, process, and decision is a ____.
A. Use‑case diagram B. ER diagram C. Flowchart D. Gantt chart
Click here to show answer
C. Flowchart
84. The symbol used for decision in a flowchart is a ____.
A. Rectangle B. Parallelogram C. Diamond D. Circle
Click here to show answer
C. Diamond
85. IoT stands for ____.
A. Internet of Tools B. Internet of Things C. Input/Output Technology D. Internal Office Technology
Click here to show answer
B. Internet of Things
86. AI that is trained for a specific task is called ____ AI.
A. General B. Narrow C. Super D. Quantum
Click here to show answer
B. Narrow
87. Cloud service that provides virtual machines and networks is ____.
A. SaaS B. PaaS C. IaaS D. DBaaS
Click here to show answer
C. IaaS
88. Buying and selling goods online is called ____.
A. E‑learning B. E‑commerce C. E‑banking D. E‑waste
Click here to show answer
B. E‑commerce
89. A small piece of data stored by a website on a user’s browser is a ____.
A. Cache B. Cookie C. Log D. Patch
Click here to show answer
B. Cookie
90. The legal right that protects software creators is ____.
A. Trademark B. Copyright C. Patent D. License key
Click here to show answer
B. Copyright
91. Which practice helps reduce digital divide in schools?
A. Blocking internet access B. High device costs C. Community ICT centres D. Outdated curricula
Click here to show answer
C. Community ICT centres
Provide answers
ReplyDeleteAnswers provided
DeleteAnswers
ReplyDeleteTHANK YOU FOR THIS GREAT WORK. PLEASE CAN I ANY COMPUTER WAEC PAST QUESTION PAPER?
ReplyDeleteI love this questions
ReplyDeleteThanks for the questions
ReplyDeleteYou're welcome
Delete