ICT Past Questions Computer Studies

1. A website main page is called ____________
(a) Search Page (b) Home page (c) Browser Page (d) Bookmark
Â

2. ________________ controls the way in which the computer system function and provides a means by which users can interact with the computer.
(a) Application Software (b)Internet (c) Operating system (d) Control Unit
Â

3. Choose the web browser among the following:
(a) Bit torrent (b)Skype (c) Netscape Navigator (d)MSN messenger
Â
4. Choose the Search Engine among the following:
(a) Microsoft (b) Bing (c) Twitter (d)Hotmail
Â
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement, specially called___________
(a) simulation (b) animation (c) robotics (d) computer forensics
Â
6. Computer software includes ____________
(a) packaged programs (b) application programs (c) operating system programs (d) All of the above
Â
Â
7. Junk e-mail is also called ___________
(a) spoof (b) spam (c) faulty (d) cookie
Â
8. What are the two parts of an email-address?
(a) Username and street name (b) User domain and Homepage (c) Username and Domain name (d) Username and Domain page
Â
9. A repair for a known software bug, usually available at no charge on the internet, is called_____
(a) version (b) patch (c) tutorial (d)rectifier.
Â
10. A _____ is the term used when a search engine returns a Web page that matches the search criteria.
(a) hit (b)view (c) link (d) domain
[8/8, 8:40 PM] +234 806 129 0287: 1. A website main page is called ____________
(a) Search Page (b) Home page (c) Browser Page (d) Bookmark
Â
2. ________________ controls the way in which the computer system function and provides a means by which users can interact with the computer.
(a) Application Software (b)Internet (c) Operating system (d) Control Unit
Â
3. Choose the web browser among the following:
(a) Bit torrent (b)Skype (c) Netscape Navigator (d)MSN messenger
Â
4. Choose the Search Engine among the following:

(a) Microsoft (b) Bing (c) Twitter (d)Hotmail
Â
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement, specially called___________
(a) simulation (b) animation (c) robotics (d) computer forensics
Â

6. Computer software includes ____________
(a) packaged programs (b) application programs (c) operating system programs (d) All of the above
Â
Â
7. Junk e-mail is also called ___________

(a) spoof (b) spam (c) faulty (d) cookie
Â
8. What are the two parts of an email-address?
(a) Username and street name (b) User domain and Homepage (c) Username and Domain name (d) Username and Domain page
Â
9. A repair for a known software bug, usually available at no charge on the internet, is called_____
(a) version (b) patch (c) tutorial (d)rectifier.
Â
10. A _____ is the term used when a search engine returns a Web page that matches the search criteria.
(a) hit (b)view (c) link (d) domain
[8/8, 8:41 PM] +234 806 129 0287: 11. What is the storage area for e-mail messages called?
(a) A folder (b) A mail box (c) A directory (d) The hard disk
Â
12. The process of transferring files from a computer on the internet to your computer is called____
(a) Downloading (b) Installing (c) File Transfer Protocol (d) Uploading.
Â
13. ________ is the protocol used for browsing website.
(a) TCP (b)HTTP (c) FTP (d) POP
Â
14. What is the commonly used unit for measuring the speed of data transmission?

(a) Bits per second (b) Megahertz (c) Characters per second
(d) Nano seconds
Â
15. Verification of a login name and password is known as ___________
(a) Configuration (b)Accessibility (c) Authentication (d) Logging-in

Â
16. A set of numbers that identify your computer on a network is called ___________
(a) Internet protocol file (b) Internet protocol address (c) Internet transfer protocol
(d) Internet protocol location
Â

Â
17. Which of the following is not a requirement of internet?
(a) Operating system (b) DOS (c)Web browser (d) Modem
Â
18. What is the name of the software that allows us to browse through web pages?
(a) Yahoo Messenger (b) E-mail (c) Browser (d) Mail Client

Â
19. What does HTTP stand for?
(a) Hypertext Transfer Procedure (b) High Technology Transfer Procedure
(c Hypertext Transfer Protocol (d) High Technology Transfer Protocol

Â
20. Which of the following is a correct format of an e-mail address?
(a) [email protected] (b)info@website@sales (c) info.website.sales
(d)info@websites/sales
[8/8, 8:43 PM] +234 806 129 0287: 21) Which can be the input and output devices both?

Scanner
Touch screen monitor
Speaker
Digitizer
Â

22) Which is not a valid type of printer?
Dot matrix
Daisy wheel
OCR
Inkjet

Â
23) Impact and Non Impact are related to?
Scanners
Printers
Keyboards

Monitors
Â
24) What is the full form of MROM?
Masked Read Only Memory
Main Read Only Memory

Magnetic Read Only Memory
None of these
Â
25) What is the full form of PCB?
Printed Circuit Board

Processing Central Board
Peripherals Combined Board
None of these
Â
26) Which is the smallest memory measurement unit in given options?

Byte
Micro Byte
Kilo Byte
Nibble
Â

27) One Nibble has?
2 Bits
4 Bits
8 Bits
16 Bits

Â
28) In computer memory measurement units, PT stands for?
Perabyte
Pexabyte
Petabyte
None of these
Â
29) One GB (Gega Byte) contains — bytes?
1073741824
1048576
83886808
8192
Â
30) 1024 Bytes equivalent to?
213

212
211
210
[8/8, 8:46 PM] +234 803 517 1188: 1) The name for the way that computers manipulate data into information is called?
programming
processing
storing
organizing
Â
2) Computers gather data, which means that they allow users to data?

present
input
output
store
Â

3) After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered?
data
output
input
the process

Â
4) Computers use the __________ language to process data?
processing
kilobyte
binary
representational
Â
5) Computers process data into information by working exclusively with?
multimedia
words
characters
numbers
Â
6) In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of?
eight bytes
eight kilobytes
eight characters
eight bits
Â
7) The term bit is short for?
megabyte
binary language
binary digit
binary number
Â
8) A string of eight 0s and 1s is called a?
megabyte
byte
kilobyte
gigabyte
Â
9) A is approximately one billion bytes?
kilobyte
bit
gigabyte

megabyte
Â
10) A _____approximately a billion bytes?
gigabyte
kilobyte
megabyte
terabyte
[8/8, 9:32 PM] +234 803 517 1188: 1) The name for the way that computers manipulate data into information is called?
programming
processing
storing
organizing
Â
2) Computers gather data, which means that they allow users to data?
present
input
output
store
Â
3) After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered?
data
output
input
the process
Â

4) Computers use the __________ language to process data?
processing
kilobyte
binary
representational
Â
5) Computers process data into information by working exclusively with?
multimedia
words
characters
numbers
Â
6) In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of?
eight bytes
eight kilobytes
eight characters
eight bits
Â
7) The term bit is short for?
megabyte

binary language
binary digit
binary number
Â
8) A string of eight 0s and 1s is called a?
megabyte
byte
kilobyte
gigabyte
Â
9) A is approximately one billion bytes?
kilobyte
bit
gigabyte
megabyte
Â
10) A _____approximately a billion bytes?
gigabyte
kilobyte
megabyte
terabyte
[8/8, 9:33 PM] +234 803 517 1188: 11) is any part of the computer that you can physically touch?
Hardware
A device
A peripheral
An application
Â
12) The components that process data are located in the?
input devices
output devices
system unit
storage component
Â
13) All of the following are examples of storage devices EXCEPT?
hard disk drives
printers
floppy disk drives
CD drives
Â
14) The ______ is also called the brains of the computer, is responsible for processing data?
motherboard
memory
RAM
central processing unit (CPU)
Â
15) The CPU and memory are located on the?
expansion board
motherboard
storage device
output device
Â
16) _________is a set of computer programs used on a computer to help perform tasks?
An instruction
Software
Memory
A processor
Â
17) System software is the set of programs that enables your computers hardware devices and ________software to work together?
management
processing
utility
application
Â
18) The PC (personal computer) and the Apple Macintosh are examples of two different?
platforms
applications
programs
storage devices
Â
18) The PC (personal computer) and the Apple Macintosh are examples of two different?
platforms
applications
programs
storage devices
Â
20) ________are specially designed computers that perform complex calculations extremely rapidly?
Servers
Supercomputers
Laptops
Mainframes
Â
Â
21. The difference between people with access to computers and the Internet and those without this access is known as the?
digital divide
Internet divide
Web divide
broadband divide
Â
22) A byte can hold one_______of data?
bit
binary digit
character
kilobyte
Â
23) _________controls the way in which the computer system functions and provides a means by which users can interact with the computer?
The platform
The operating system
Application software
The motherboard
Â
24) ________are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat?
Servers
Embedded computers
Robotic computers
Mainframes
Â
25) The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called?
instructions
the operating system
application software
the system unit
Â
26) The metal or plastic case that holds all the physical parts of the computer is the?
system unit
CPU
mainframe
platform
Â
27) ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat?
Servers
Embedded computers
Robotic computers
Mainframes
Â
28) Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation?
Mac
PC
None
All of the above
Â
29) The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input or output devices?
Application software
System software
Operating System
None
Â
30) ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet?
System
Application
Coded
Computer
[8/8, 9:33 PM] +234 803 517 1188: 31) ____________are the fastest and most expensive computers?
Workstation
Laptop
None
Super Computer
Â
32) Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________?
Questions
Instructions
Answers
Processes
Â
33) A computer gathers data, processes it, outputs the data or information, and ____________ the data or information?
Sends
Stores
None
Prints
Â
34) ____________ are computers that excel at executing many different computer programs at the same time?
Super
Mini
Micro
Mainframes
Â
35) ____________is the application of computer systems and techniques to gather legal evidence?
Computer process
Computer forensics
Computer facilitator
None
Â
36) ____________ is the science that attempts to create machines that will emulate the human thought process?
None
Artificial Intellligence(AI)
Transistor
Vaccum tube.
Â
37) Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system?
Microsoft Word
Microsoft access
Microsoft Windows
Microsoft operating system
Â
38) ____________ are computers that support hundreds or thousands of users simultaneously?
Mini
Mainframes
Micro
Super
Â
39) ____________ is the term given to the act of stealing someone`s identity and ruining their credit rating?
Authentication
Identity theft
Scanning
Forensic
Â
40) Surgeons are using ____________ to guide robots to perform delicate surgery?
Scanner
Computers
Solar
Monitor
Â
