ICT JSS 3 SECOND TERM EXAMINATION
CLASS: J S S3
SUBJECT: ICT
1.What is the full meaning of ICT?[a]Information and Communication Technology[b]Internal Communication Technology[c]Information Common Technology[d]1 and 2
- The software for clearing a virus attack is called [a]eraser[b]anti software[c]anti-virus[d]software
- There are……….types of booting [a]2 [b]4 [c]3[c]8
- Which of these is a type of network[a]SAN[b]PAN[c]KAN[d]LAN
5…..body sets professional standard and acts as the authoritative independent to the government[a]professional group[b]computer professional[c]computer professional bodies[d]none of the above
- ITAN stands for……………[A]Information Technology Association of Nigeria[b]Informational Association Adult of Nigeria[c]informal Technology Association of Nigeria[d]none of the above
- Any factor that cause damage to a computer or data is called [a]computer threat[b]computer problem[c]data threat[d]computer factor
- Which of the following is not an example of natural environment threat[a]flood[b]earthquake[c]fire[d]hurricane
9…………..are malicious programs that infect a computer system[a]virus[b]threat[c]programme[d]worm
10.Time bomb is also called…………[a]bomb time[b]logics bomb[c]space bomb[d]none of the above
- What is the full meaning of ICT?[a]Information and Communication Technology[b]Internal Communication Technology[c]Information Common Technology[d]1 and 2
12.The software for clearing a virus attack is called [a]eraser[b]anti software[c]anti-virus[d]software
13.There are……….types of booting [a]2 [b]4 [c]3[c]8
14.Which of these is a type of network[a]SAN[b]PAN[c]KAN[d]LAN
15…..body sets professional standard and acts as the authoritative independent to the government[a]professional group[b]computer professional[c]computer professional bodies[d]none of the above
16.ITAN stands for……………[A]Information Technology Association of Nigeria[b]Informational Association Adult of Nigeria[c]informal Technology Association of Nigeria[d]none of the above
17.Any factor that cause damage to a computer or data is called [a]computer threat[b]computer problem[c]data threat[d]computer factor
18.Which of the following is not an example of natural environment threat[a]flood[b]earthquake[c]fire[d]hurricane
19…………..are malicious programs that infect a computer system[a]virus[b]threat[c]programme[d]worm
20.Time bomb is also called…………[a]bomb time[b]logics bomb[c]space bomb[d]none of the above
THEORY
ANSWER THREE QUESTIONS OUT OF FOUR
1a.What are the components of ICT
- Define computer software and give two examples
- Explain the term;1.LAN 2.WAN
2a.Who are computer professionals
- Explain 1.Computer manager 2.Computer educator 3.Computer engineers
- List 5 qualities of a good professional computer operators
3a.What is computer operator?
- List 5 types of virus infection
- What is an antivirus
- Give 2 examples of an antivirus software
4a.What is a spreadsheet
- Give two examples of spreadsheet
- What is an internet forum