EXAM

SS1
SECTION A: OBJECTIVES
1. Which of the following is not an early counting.?
A Fingers and Toes B. Stone C. Radio D.Cowries
2 .In using fingers and toes, you can only count up to …….
A.  20   B.  40   C.  50 D. 100
3.The term .... means any basic or raw fact which may be input to some processing system. 
A. Data B. Internet C. Modem D. Proces
4 ....... is the end–result of a system processing of data,
A. Information B . Data C. Facts D. Processor
5. ...... is an operation on computer data which involves the entering, sorting, updating and retrieving of information using computer. A. data processing B. Computer Editting C. Video download D. Formation
6.……….is a basic fact that needs to undergo processing.
A. information  B. data  C. output  D.  input
7. The methodology of converting data into information is
A. data and information B. data processing C. decision making D. none of the above
8.The major reason for data processing is A. decision making B. conflict promotion
C. information generation D. data manipulation
9. In data processing, input activity involves   A.  collection  B.  verification
C.  retrieving  D.  all of the above.
10. One of these is not data property
A. presentation  B.  collection  C.  misuse  D.  accuracy
11. ……. was the first calculating device. A. Napier’s Bones  B. Punched card  C.  Abacus  D. Slide rule
12.How many generations of computers do we have?  A.  4   B.  5   C.  6 D. 9
13.Fifth generation made use of …… A. Artificial intelligence  B. Vacuum tubes.  C. SSI D. CID
14.The ancient man began counting by using ……A.  fingers   B.  slide rule   C.  abacus D. none
15. The following are examples of early counting methods except ……A.  calculator  B.   pebbles   C.  grains D. none
16.In using fingers and toes, you can only count up to …….A.  20   B.  40   C.  50 D. 100
17. The following can be used for counting in the ancient times except…..A.  fingers B.  computer   C.  stones D. none
18. The stages of development of the computer machine are known as……..A.  computer age   B.   computer history   C.   computer generation   D. all
19.The following are disadvantages of ICT except    A.  fraud  B. virus  C.  faster communication D. none
20.ICT has turned the whole world into a ……A.  global village  B.  galaxy  C.  universe D. none
21, The production of goods with or without human intervention using computer  is known as …….A.  automation    B.  AI   C.  expert system D. vacuum tube
22. E-commerce stands for ……..A.  electric commerce  B.  electronic commerce  C. electrical commerce. D. none
23. ATM means …….  A.  Automatic Teller Machine   B.  Automated Teller Machine  C.  Auto Teller Machine D. None
24.…..are raw facts which have not undergone processing.
A.  Information  B. Data   C.  Record D. None
25. One of the characteristics of good information has to do with the correctness of information.  A. reliability  B.  availability    C.  accuracy D. none
26. ……..refers to the information that has been processed.
A.   Data  B.  Information  C. Database D. None
27. There are ………  types of data.  A.   2   B.   3   C.  4 D. 8
28. The process of surfing the NET to get information for further research is …….
A.  primary source   B.  on-line   C.  secondary source D. None
29. Stones were introduced for counting because of the limitations of counting with A. fingers       and toes. B. sticks C. bones D. drones
30. Scanner can be used as an ... device. A. Input B. output C. A and B. D. None 

SECTION B: THEORY: 
Instruction: Pick any three(3) of the four (4) questions 
1 a) What is data?
b)What is information?
c) What is digitalization of data?
2. a) Mention types of computer according to sizes.
 b) List the generations of computer
c) Mention any THREE early counting devices.
3a).Mention the THREE components of hardware of the computer system.
b) List any TWO disadvantages of early counting devices.
c) What are the three components of the system unit (CPU)?
4a)What are the components of the computer system?
b) List four examples of input devices.
c) List four examples of output devices

SS2
SECTION A: OBJECTIVES 
1.An .... system is a collection of programs that control the application software that users run.
A. Application system B. Operating C. Single D. Multi
2. An ..... system is a group of computer programs that coordinates all the activities among computer hardware devices. A. Application system B. Operating C. Single D. Multi
3. Booting the computer system is done by ... A. Application system B. Operating C. Single D. Multi
4. ..... is the acquisition, recording, organization, retrieval, display and dissemination of information. A.Data processing B.Information processing. C.Loop processing D.Word process
5. ..... is the assembly of written information into a standard order.
A. Collation B . Sitting C . Sorting D. Processing
6. ..... processing could also be referred to as the manipulation of digitalized information by computers and other digital electronic equipment, known collectively as Information technology. A. Information B. Data C. Compliance D. Retrieval
7. An information .... works to translate and format the digital information for printed form.
A. processor B. Deprocessor C. Compressor D. Fragmentor 
8.A , is a graphical representation of data, in which "the data is represented by symbols, such as bars. A. Chart B. Pie C. Table D. Pictogram
9. A mobile phone is a .... handheld device that allows users to make calls and send text messages, among other features. A.wireless. B. wired C. wacky D .wonder
10.  GSM means A. Global System for Mobile Communications B. Global Satellite for Mobile Communications C. Global  SIM for Mobile D. General Mobile System
11. A .... converts sound into electronic signals suitable for transmission via cables or other transmission media over long distances, and replays such signals simultaneously in audible form to its user. A. Telephone B. Loudspeaker C. Microphone D. Projector 
12. The essential elements of a telephone are a microphone (transmitter) to speak into and an earphone (...) which reproduces the voice in a distant location. A. receiver B. Decoder C. Translator D. Interpreter
13. ... is unauthorized use of school computer hardware or software.
A. Hacking B. Coding C. Phishing D. Spamming
14. Application ... usually require an operating system to function.A. programs B. hardware C. Softwork D. Harwork
15 .Types of operating systems include A Single- and multi-tasking B. Polytasking C Unitasking D. Time-fast
16. For hardware functions such as input and output and memory allocation, the operating system acts as an .... between programs and the computer hardware A. intermediary B receiver B . sender C. locator D. decoder
17. Anti-virus software is your computer's best defense against ... A. malware B. software C. hardware D. marlian
18.When your computer is not in use, consider shutting it down or disconnecting it from the... A. Internet B. Apartment C. Attachment D. inlet
19. Which of the following is not a malware? A. viruses, B. Trojan horses C. spyware. Facebook
20. Facebook app is an example of ..... A . System software B. application system C. application software d. operating System
21. Latest Windows Operating system is an example of .. A. Multitasking OS B. Unit Os C. Apple Os D. Linux OS
22. Another word for OS Is .... A. kernel B. Calmel C. Culex D. Storex
23.Do not access the Internet without first enabling an updated ..., especially when using DSL or a cable modem A. Firewall. B. Dancewall C. Defencewall D. Virus
24. A distributed operating system manages a group of distinct computers and makes them appear to be a single A. computer B. lotus c. Unix D. byte
25.Information theory, the receiver is modeled so as to include the A.decoder B encoder D. teacher d, coder
26. A communication ... is an artificial satellite that relays and amplifies radio telecommu-nications signals via a transponder A. satellite B. dish C. antenna D. wired
27.Wireless communication uses ... waves to carry signals A. electromagnetic b. mechanical C. transport D sound 
28, Antenna in commutation can be used as a.. A. sender B. receiver C. decoder D. A and B
29. Ms Excel is an example of ..... A. spreadsheet B. Bedsheet C. Mathsheet D. bit
30. Corel draw is an example of .... software
A. Graphic B application C . A and B D. none
SECTION B: THEORY
Instruction:Answer 3 questions in all.
1. a) Define input devices 
b) List five (5) examples of input devices 
c) Give 4 examples of an operating system 
2 a) Define output devices
b) Give 4 examples of output devices
c) Give 8 examples of application software
3a) What is Malware?
b) List two examples of malware
c) How can you ensure a safe computer?
4a) Write short on the 3 components of SYSTEM unit (CPU).
b) State one difference between an application software and an operating system 
c) State one difference between MMS and SMS.


SS3
SECTION A: OBJECTIVES
1. Which of the following is not an early counting.?
A Fingers and Toes B. Stone C. Radio D.Cowries
2 .In using fingers and toes, you can only count up to …….
A.  20   B.  40   C.  50 D. 100
3.The term .... means any basic or raw fact which may be input to some processing system. 
A. Data B. Internet C. Modem D. Proces
4 ....... is the end–result of a system processing of data,
A. Information B . Data C. Facts D. Processor
5. ...... is an operation on computer data which involves the entering, sorting, updating and retrieving of information using computer. A. data processing B. Computer Editting C. Video download D. Formation
6.The process by which a database is moved back to a consistent and usable state is called………. (a) cash recovery (b) crash recovery (c) past recovery (d) undo recovery
7. The methodology of converting data into information is
A. data and information B. data processing C. decision making D. none of the above
8.The major reason for data processing is A. decision making B. conflict promotion
C. information generation D. data manipulation
9.... maintenance of programs inside the computer system such as virus, a spyware removal, back up software and a registry removal, cleaner. A  SOFTWARE MAINTENANCE B. HARDWARE MAINTENANCE C. INPUT MAINTENANCE D. DISK CLEANING 
10. One of these is not data property
A. presentation  B.  collection  C.  misuse  D.  accuracy
11. ……. was the first calculating device. A. Napier’s Bones  B. Punched card  C.  Abacus  D. Slide rule
12.How many generations of computers do we have?  A.  4   B.  5   C.  6 D. 9
13.Fifth generation made use of …… A. Artificial intelligence  B. Vacuum tubes.  C. SSI D. CID
14.The ancient man began counting by using ……A.  fingers   B.  slide rule   C.  abacus D. none
15. The following are examples of early counting methods except ……A.  calculator  B.   pebbles   C.  grains D. none
16.In using fingers and toes, you can only count up to …….A.  20   B.  40   C.  50 D. 100
17. The following can be used for counting in the ancient times except…..A.  fingers B.  computer   C.  stones D. none
18 Maintenance is necessary on computer to avoid ………. 
a) hardware failure b) stealing c) invasion d) crime
19. Excess heat accelerates the deterioration of the delicate ……… in the system. a) vacuum b) transistors c) circuits d) particles
20. Dust and dirt are the most common cause of ……… a) leakage b) overheating c) breakage d) spooling.
21……….. is used to remove dust, dirt and hair from the keyboard. a) Vacuum cleaner b) Brush c) Old rag d) Paper towels
22. The following are disadvantages of ICT except    A.  fraud  B. virus  C.  faster communication D. none
23.ICT has turned the whole world into a ……A.  global village  B.  galaxy  C.  universe D. none
24, The production of goods with or without human intervention using computer  is known as …….A.  automation    B.  AI   C.  expert system D. vacuum tube
25. E-commerce stands for ……..A.  electric commerce  B.  electronic commerce  C. electrical commerce. D. none
26. ATM means …….  A.  Automatic Teller Machine   B.  Automated Teller Machine  C.  Auto Teller Machine D. None
27…..are raw facts which have not undergone processing.
A.  Information  B. Data   C.  Record D. None
25. One of the characteristics of good information has to do with the correctness of information.  A. reliability  B.  availability    C.  accuracy D. none
26. ……..refers to the information that has been processed.
A.   Data  B.  Information  C. Database D. None
27. Patches and update are regularly released by software companies to tackle security problems found in …………. a) programs b) hardware c) people ware d) peripheral
28. Do not use your ... to blow the dust off the components because your breath contains moisture and the components are not built to be rust- proof. A. breath B Vacuum cleaner C. Dresser D. Mouth 
29. Stones were introduced for counting because of the limitations of counting with A. fingers and toes. B. sticks C. bones D. drones
30. Scanner can be used as an ... device. A. Input B. output C. A and B. D. None
SECTION B: THEORY
Answer only 3 questions 
1. a) Wha is software maintenance 
b)List types of software maintenance
c) Write short note on one of 1b)
2. a)List two benfits of software maintenance
b) What is Data security ?
3a) Define output devices
b) Give 4 examples of output devices
c) Give 8 examples of application software
4a) What is Malware?
b) List two examples of malware
c) How can you ensure a safe computer?
5a) Write short on the 3 components of SYSTEM unit (CPU).
b) State one difference between an application software and an operating system