INFORMATION AND COMMUNICATION TECHNOLOGY JS 3

0 of 47 lessons complete (0%)

REVISION EXERCISES

Subjective Questions

You don’t have access to this lesson

Please register or sign in to access the course content.

Fill in the gaps below with the appropriate answers

  1. …………………………. protects computer systems from illegal intrusions, viruses, data theft, fraud, or other forms of tampering.
  2. Trojan horse, sleeper and logic bomb are examples of ……………
  3. A ………………………….. is a group of people who come together for professional and other mutual benefits and are governed by a constitution.
  4. Internet is an acronym for ………………………………………………..
  5. …………………….. designs and writes programs that interface with a computer’s low level operating system, such as device drivers and utilities.
  6. A web search engine is another name for …………………….. engine
  7. ……………………. virus is also called cavity virus
  8. …………… can be disguised as attachments of funny images, greeting cards, or audio and video files.
  9. ………………………. are the individuals that have obtained sufficient education and training in the field of computers and earn their livelihood from their chosen profession.
  10. Avast, ……………….. and ……………… are some examples of antivirus
  11. One of the advantages of using search engines is …………………………
  12. ………………………………. provides professional services for IT bodies in Nigeria.
  13. ………….. virus infects program files that use macros (commands) such as word processors.
  14. …………… virus fill up empty spaces between the codes and hence does not cause any damage to the file.
  15. …………………. is a software system that is designed to carry out web search
  16. One of the qualities of a good computer professional is ……………………………………………………………………………..
  17. …………………………… creates the music, voice, and sound effects for multimedia or computer games.
  18. The full meaning of COAN is ……………………………………………
  19. …………………… is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
  20. ……………………. is also called non-resident virus, when executed scans the disks for targets, infects them, and then exit.
  21. ………….. is the default search engine in Microsoft’s web browser.
  22. ………………………. designs the menus, icons, and other features that people will use to interact with a computer program or operating system.
  23. The three major forces that drive the new economy are …………………, ……………… and ………………
  24. …………………… is the result of the transition from a manufacturing-based economy to a service-based economy.
  25. ……………………… is one of the causes of digital divide.
  26. …………………………… is one of the limitations of the old economy.
  27. The old economy is constrained by ……………………
  28. The headings of the columns are known as column letters while the headings of the rows are known as ……………………………
  29. ……………… database model was invented in 1969.
  30. ………………… are especially affected negatively by digital divide in many ways.
  31. ……………… language moves nearest to the programmer and away from the machine’s orientation.
  32. The two types of database are ……………… and ………………
  33. …………… is a systematic collection of data that is organised in a specific way.
  34. Hierarchical database model was the first database model to be created and was created in …………
  35. Users interact with sheets primarily through the ………
  36. ………………… is a program that enables the computer user to carry out calculation-related tasks.
  37. ………………… is a collection of rows and columns where you store and manipulate data.
  38. A computer worm is different from a computer virus because it ………………………………………
  39. A computer memory is said to be “volatile” if the information stored in it is ………… when there is power failure.
  40. The keyboard button that erases characters to the right is ……… key
  41. Information stored in RAM is ………………
  42. The term e-commerce is described as ……………… through the internet.
  43. SMS is an acronym for ………………………………………………
  44. ……………… deals with arithmetic, logical, financial, statistical and so many other operations and therefore makes use of formulas and functions.
  45. The rectangular box on the worksheet is known as ………………………
error: Content is protected !!
Select your currency
NGN Nigerian naira
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare