ICT JSS 3 SECOND TERM EXAMINATION

 

CLASS:  J S S3

SUBJECT: ICT

 

1.What is the full meaning of ICT?[a]Information and Communication Technology[b]Internal Communication Technology[c]Information Common Technology[d]1 and  2

  1. The software for clearing a virus attack is called [a]eraser[b]anti software[c]anti-virus[d]software
  2. There are……….types of booting [a]2 [b]4 [c]3[c]8
  3. Which of these is a type of network[a]SAN[b]PAN[c]KAN[d]LAN

5…..body sets professional standard and acts as the authoritative independent to the government[a]professional group[b]computer professional[c]computer professional bodies[d]none of the above

  1. ITAN stands for……………[A]Information Technology Association of Nigeria[b]Informational Association Adult of Nigeria[c]informal Technology Association of Nigeria[d]none of the above
  2. Any factor that cause damage to a computer or data is called [a]computer threat[b]computer problem[c]data threat[d]computer factor
  3. Which of the following is not an example of natural environment threat[a]flood[b]earthquake[c]fire[d]hurricane

9…………..are malicious programs that infect a computer system[a]virus[b]threat[c]programme[d]worm

10.Time bomb is also called…………[a]bomb time[b]logics bomb[c]space bomb[d]none of the above

  1. What is the full meaning of ICT?[a]Information and Communication Technology[b]Internal Communication Technology[c]Information Common Technology[d]1 and 2

12.The software for clearing a virus attack is called [a]eraser[b]anti software[c]anti-virus[d]software

13.There are……….types of booting [a]2 [b]4 [c]3[c]8

14.Which of these is a type of network[a]SAN[b]PAN[c]KAN[d]LAN

15…..body sets professional standard and acts as the authoritative independent to the government[a]professional group[b]computer professional[c]computer professional bodies[d]none of the above

16.ITAN stands for……………[A]Information Technology Association of Nigeria[b]Informational Association Adult of Nigeria[c]informal Technology Association of Nigeria[d]none of the above

17.Any factor that cause damage to a computer or data is called [a]computer threat[b]computer problem[c]data threat[d]computer factor

18.Which of the following is not an example of natural environment threat[a]flood[b]earthquake[c]fire[d]hurricane

19…………..are malicious programs that infect a computer system[a]virus[b]threat[c]programme[d]worm

20.Time bomb is also called…………[a]bomb time[b]logics bomb[c]space bomb[d]none of the above

THEORY

ANSWER THREE QUESTIONS OUT OF FOUR

1a.What are the components of ICT

  1. Define computer software and give two examples
  2. Explain the term;1.LAN 2.WAN

2a.Who are computer professionals

  1. Explain 1.Computer manager 2.Computer educator 3.Computer engineers
  2. List 5 qualities of a good professional computer operators

3a.What is computer operator?

  1. List 5 types of virus infection
  2. What is an antivirus
  3. Give 2 examples of an antivirus software

4a.What is a spreadsheet

  1. Give two examples of spreadsheet
  2. What is an internet forum

 

 

 

 

 

 

Tags: