ICT exams ss 3 Second Term

Ss3 ICT Exams SS 3

Section A

1. The process by which a database is moved back to a consistent and usable state is called……….

(a) cash recovery (b) crash recovery (c) past recovery (d) undo recovery

2. The recovery algorithm that uses no-force and steal approach is ………….. (a) ARIAS (b) ARIES
(c) ARREARS (d) ARIS

3. ARIES works in ……………. Phases (a) 3 (b) 2 (c) 1 (d) 4

4. Which of these is not a crash recovery type ………… (a) ARIES (b) Media recovery (c) Check
pointing (d) UNDO

5. The architecture where multiple processors are attached to an interconnected network and access a common region of memory is called ………. (a) shared memory (b) shared disk system (c) share nothing(d) all of the above

  1. In ……….partitioning, tuples are sorted and ranges are chosen for the sort key values.(a) round robin (b) hash (c) range (d) table
  2. ………..Partitioning is suitable for efficiently evaluating queries that access the entire relation. (a) range (b) round robin (c) hash (d) query
  3. The following are examples of parallel database except. (a) implementation is highly expensive (b) speed (c) reliability (d) capacity
  4. A distributed database system is a system that permits ………. data storage across several sites. (a) physical (b) logical (c) vertical (d) horizontal
  5. Network traffic blocking is one of the problems related to the ………. model.. (a) parallel database (b) distributed database (c) client server (d) network
  6. This is a process of splitting a relation into smaller relation or fragments. (a) Replication (b) shared memory (c) fragmentation (d) implementation.
  7. One of the following is architecture of distributed database system. (a) table (b) fragment (c) replication (d) client server.
  8. …………are language that computers used to talk to each other over a network (a) Media (b) user (c) Protocol (d) server
  9. An example of the bus system is the ………… (a) Ethernet (b) intranet (c) ring (d) star
  10. ……….. is the term used to describe the physical arrangement of computer in networks. (a) Internet (b) Topology (c) Ethernet (d) hub
  11. The network configuration in which the terminals are connected in the same fashion as the branches of a tree is called ……… (a) Flat (b) relational (c) Hierarchical (d) network
  12. One of the disadvantages of hierarchical network is that it depends heavily on the hub and its failure affects the entire system. (a) entire system (b) part of the system (c) single system (d) partial system.
  13. One of the following is a communication medium. (a) coaxial cable (b) book (c) typewriter (c) windows (d) episode.
  14. This is a term used to refer to the process of accessing and viewing web pages on the internet is called (a)Browse:
  15. is a private network within an organization that resembles the internet. (a) internet (b) Intranet (c) WAN (d) server
  16. …………is a software program written with malicious intentions.
  17. Computer virus (b) infection (c) e-scan (d) Anti virus
  18. ………… deletes the information contained in the files.
  19. Fat virus (b) micro virus (c) Overwrite virus (d) Polymorphic virus
  20. ……… utilizes viruses or Trojans to gain access to your computer, to steal data, invade privacy or use computer for their evil purposes. (a) Hackers (b) files (c) human (d) detector.
  21. Examples of computer virus include the following except …………….. (a) disk killer (b) e-scan (c) tequila (d) cascade
  22. Virus warning sign include the following except ……………(a) Presence of tiny dots.(b) Incomplete saving of file. (c) e-scan (d) Slowing down of the response time
  23. ………… deletes the information contained in the files.
  24. Fat virus (b) micro virus (c) Overwrite virus (d) Polymorphic virus
  25. …………………. prevent access to certain section of the disk where important files are stored and the damage caused can result in information losses from individual files or entire directories (a) Polymorphic virus (b) micro virus (c) overwrite virus (d) Fat virus
  26. …………..is a program developed to destroy computer virus.
  27. Anti virus (b) malware (c) spyware (d) virus
  28. A good computer professional must possess ……….. writing skill. (a) logical

(b) technical (c) physical (d) little

  1. A ………….. is the one that writes a set of instructions to be executed by the computer. (a) software programmer (b) data analyst (c) computer operator (d) data entry clerk
  2. The ………………. a professional that install, manage and maintaining of ICT cabling/ transport network and architecture. (a) computer educator (b) enterprise system administrator (c) database administrator (d) programmer
  3. …………. He provides technical assistance to computer system users, resolve computer problems in person, through telephone or from remote locations. (a) Computer support specialist (b) database administrator (c) computer user (d) system analyst
  4. ITAN was founded in ……. to promote IT literacy and penetration in Nigeria and to promote interest of the members in the area of policy formulation and negotiations with

government on IT policy matters. (a) 1890 (b)1891(c) 1991 (d)1990

  1. ____ is a corporate entity charged with the control and supervision of computing profession in the country. (a) CPRCN (b) IMIS (c) NCS (d) NIG
  2. ____ is a nonprofit, non governmental organization, promoting the internet group.

(a) NIG(b) IMIS(c) CPN(d) ITAN

  1. ____ is a place where people interested in Computing Technology within Nigeria gather to share ideas and knowledge.(a) IMIS(b) NCS (c) ITAN (d) CPN

ICT JSS 3 SECOND TERM EXAMINATION

SECTION A

  1. State two functions each of four professionals bodies.
  2. State one difference between a computer professional and computer user.
  3. List five computer professionals and explain their primary functions.
  4. Define computer virus.
  5. State three ways in which virus can infect micro computer.
  6. State five sources of virus infect micro computer..
  7. State four benefits of Networking.
  8. Differentiate between intranet and extranet.
  9. State three methods data can be partitioned.
  10. What are the advantages and disadvantages of parallel database.
  11. Discuss the concept of ARIES in crash recovery
  12. Explain the difference between media recovery and check point.

Scratch Computer Programming in the classroom community 

Spread the word if you find this helpful! Click on any social media icon to share