100% found this document useful (3 votes)
2K views

SS 3 MOCK EXAMINATION Computer 2020

This document contains a mock examination with questions covering various topics related to computing fundamentals, such as data types, hardware components, software, networking, databases, programming, and security. The questions are multiple choice with one correct answer out of four options given for each question. The exam covers topics from computing history to modern concepts.

Uploaded by

Fagbohunka Eric
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
2K views

SS 3 MOCK EXAMINATION Computer 2020

This document contains a mock examination with questions covering various topics related to computing fundamentals, such as data types, hardware components, software, networking, databases, programming, and security. The questions are multiple choice with one correct answer out of four options given for each question. The exam covers topics from computing history to modern concepts.

Uploaded by

Fagbohunka Eric
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

SS 3 MOCK EXAMINATION

SECTION A
1. Data can be defined as 7. QBASIC keyboards do not include
a. Raw facts a. FIND
b. Mixed facts b. LET
c. Facts on prints c. REM
d. Processed facts d. STOP
2. Which of the following output 8. An icon, a graphic or a text in a
devices was common among the document or a webpage that
computing devices of the 19th connects to another file or object is
century? called a
a. Monitor a. Hyperlink
b. Potter b. Domain name
c. Printer c. Web browser
d. Speaker d. Web server
3. The pre-computing age device which 9. The largest component in a
made use of beads and frames is spreadsheet is
a. Abacus a. Cell
b. Napier’s bone b. Range
c. Leibnitz multiplier c. Workbook
d. Burrough’s counting device. d. Worksheet
4. The system unit houses the 10. Warm boot in computing is the
following components except same as
a. Plotter a. Debugging
b. Motherboard b. Handshake
c. Floppy disk c. Hard boot
d. Central processing unit d. Soft boot
5. During program execution in the 11. The basic computer operation
central processing unit, the involves the following except
instruction is interpreted by the a. Access
a. Arithmetic logic b. Input
b. Control unit c. Output
c. Memory unit d. Process
d. Registers unit 12. The file that contains historical
6. The most important system record is called a
software in a computer system is the a. Data file
a. Control programs b. Master file
b. Language translator c. Reference file
c. Operating system d. Transaction
d. Utility programs
13. Random file organization is also
known as a. AND gate
a. Direct file organization b. NAND gate
b. Indexed file organization c. NOR gate
c. Serial file organization d. OR gate
d. Sequential file organization 19. Which of the following programs is
14. Which of the following options is not an application specific?
a datatype? a. CorelDraw
a. Alphabetic b. Editor
b. Alphanumeric data c. MS Access
c. Numeric data d. MS word
d. Valid data 20. The following programs are general
15. The major components of a purpose application software except
computer system are a. CorelDraw
a. Firmware and humanware b. Editor
b. Hardware and firmware c. MS Access
c. Hardware and software d. MS word
d. Software and firmware 21. The following are relational
16. The largest computer system in operators in QBASIC programming
terms of processing power is except
a. Laptop computer a. <
b. Mainframe computer b. >
c. Mini computer c. ≠
d. Super computer d. =
22. The three levels of programming
Figure 1 is a logic gate. Use it to answer
languages are
question 17
a. Assembly language, low level
language and high level
b. Java, C language and pascal
c. Machine language, low level
17. The logic gate represented in figure language and high level
1 is called language
a. AND gate d. Machine language, machine
b. NAND gate code` and assembly language
c. NOR gate 23. The following components are
d. OR gate network interconnecting devices
18. Identify the logic gate in figure 2 except
a. Hub
b. Modem
c. Router
d. Webcam d. trojan horses
24. Which of the following network 30. In a database, a primary key is a field
cables offers the highest data which contains
a. text only.
transmission speed?
b. unique entries.
a. Coaxial
c. duplicate values.
b. Fibre optic d. numeric value only.
c. Telephone line 31. Converting 4B716 to binary is
d. Twisted pair a. 0100 1010 01112.
25. Which of the following options is not b. 0100 1011 01112.
an advantage of linear bus c. 0100 1000 01112.
d. 0100 1100 01112.
topology?
32. The decimal number 1024 in
a. It requires less cable length hexadecimal equivalent is
b. It ensures easy broadcasting a. 2416.
c. Additional nodes can be b. 40016.
connected easily c. 3E816.
d. Terminators are required at d. 8BB16.
both ends of the cable 33. In a network, the workstation is
usually connected to the
26. The ASCII character set represents
a. Hub
alphabetical and control characters b. Modem
using numeric codes ranging from c. Router
a. 0 to 124 d. Switch
b. 0 to 125 34. Which of the following statement is
c. 0 to 127 true of encryption?
d. 0 to 128 a. It provides complete privacy
b. It provides security of varying
27. A row in a database table is referred
reliability
to as c. It makes messages unreadable
a. Attribute by the recipient
b. Data item d. It permits an individual to have
c. Field access to another person’s
d. Record message
28. Which of the following networks can 35. Which of the following methods is
be extended to cover continents? not suitable for securing files?
a. Metropolitan Area Network a. Use of back up
b. Personal Area Network b. Use of antivirus
c. Wide Area Network c. Saving documents without a
d. Wireless Area Network password
29. Trap doors and bombs are typical d. Proper labeling of storage
examples of devices
a. adware. 36. In ring topology, the computer that
b. computer worms. is allowed to transmit data
c. firewall. possesses the
a. Packet
b. Data access 43. The register is a special high
c. Method speed__________ area within the
d. token CPU
37. The most cost effective and secure
a. input
way of transmitting confidential
b. processing
messages among the employees of
an organization is c. output
a. electronic notice boards d. storage
b. teleconferencing 44. Registers are located in the
c. e-mail __________
d. social networks a. hard disk
38. A modem and a telephone
b. CPU
connection are provided. Other
things needed to be able to connect c. mother board
a computer to the internet are: d. monitor
a. ISP account and utility software 45. Current instruction
b. browser and ISP account register________ instructions
c. ISP account and network currently being executed.
d. browser and printer a. allows
39. Which of the following is employed
b. control
in transfer of data between
computers and a network? c. retrieve
a. Fiber optics d. store
b. Male connector e. contains
c. Female connector 46. Main memory holds instructions
d. USB Port while registers hold
40. Evaluate the BASIC statement LET current_________
Z=4*W^2+2*Y given that W=5 and
a. data
Y=10
a. 50 b. information
b. 80 c. program
c. 100 d. software
d. 120 47. Every program, song and document
41. Every computer system connected is stored as a ______ in the
to the internet must have a unique computer
___________address
a. folder
a. Internet protocol
b. Internet relay b. filed
c. Internet service c. record
d. Domain name d. data
42. We can improve computer security 48. Computer files can be classified by
by the use of all the following criteria except
a. account number
_____________
b. ID number
a. area of storage
c. Password
d. User names b. nature of content
c. organization method 54. Data loss and overwriting are effects
d. storage medium of file____
e. method of file organization a. security
49. Master files are files of fairly b. insecurity
________ nature c. corruption
a. permanent d. damage
b. useful e. secreting
c. temporary 55. Similarities between main memory
d. changing and registers are that they are:
e. adequate
I. volatile;
50. Which of these classes of file has the II. under the direct control of the
shortest life span user;
a. reference file III. Protected by the system unit;
b. transaction file IV. for system use only
c. master file a. I, II and IV only
d. current file b. I, III and IV only
c. II, III and IV only
e. outdated file
d. I, II, III and IV
51. Files that are stored in the order in e. I AND III
which they have arisen are called
____ 56. If the output of any logic gate is fed
a. random file into an inverter, the result is
b. sequential file
a. NOT gate
c. indexed file
b. NOR gate
d. serial file c. The inverse of the output signal
e. linear file d. The same as the output signal
52. One of the following is not a type of e. Different signals
file organization
a. serial 57. CPU fetches the instruction from
b. random memory according to the value of
c. indexed a. status register
d. linear b. instruction register
e. sequential c. program status word
53. Computer files operations do not d. program counter
include___________ e. clock
a. create 58. A memory buffer used to
accommodate a speed differential is
b. view
called
c. update a. stack pointer
d. access b. cache
e. open c. accumulator
d. disk buffer
e. reference file
59. Which one of the following is the
address generated by CPU?
a. physical address
b. absolute address
c. logical address
d. computer address
e. spiritual address
60. The logical unit of transfer between
the backing storage and main
memory in file organization is called
a. block
b. bucket
c. hash
d. partial
e. memory

SECTION B
1. (a) (i) What is a network cable?
(ii) State three types of cables used in networking
(b) Write the acronym VSAT in full
(c)(i) Distinguish between an email address and a website address
(ii) List examples of each
(iii) email address
(iv) website address

2. A. State one difference between the following


i. Web server and web browser
ii. Hub and switch
B. Briefly explain any five of the following terms
i. Intranet
ii. Worm
iii. URL
iv. Download
v. Firewall
vi. Baud
vii. Cache
viii. Authentication

3.
i. Define network topology
ii. Identify any four network topology
iii. Mention 4 network cables
iv. List 2 types of connector

1. a. List four examples of secondary storage


media
b. State two differences between magnetic
storage and optical disk storage device
c. Explain these categories of software
I. firmware
II. proprietary software
2. a Define the term computer system
b. List the major components of the computer system and give one example each
c. Construct truth table for 2-input OR gate.
3. Given that X=11011011 and Y=11101101
i. Construct the truth table for X.Y=Z
ii. Draw the logic gate of X.Y=Z
iii. State the value of Z
4. (a) An electronic book is made up of 500 pages and there are 16 lines of 24,000 bits on
each page. Compute the space it will occupy on a computer in megabytes
(b) Give an example of auxiliary storage
(c) In the table below:
(i) List the two main types of computer software
(ii) Give two examples under each in 4(c)(i)
Main Type Example

I. A

B.

II. A.

B.

5.
a. Mention two types of memory
b. Give two examples of secondary storage
c. Convert 1.44 MB to byte
d. State two difference between floppy disk and compact disk

You might also like