INFORMATION AND COMMUNICATION TECHNOLOGY JS 3

0 of 47 lessons complete (0%)

REVISION EXERCISES

Multiple Choice Questions

You don’t have access to this lesson

Please register or sign in to access the course content.

Read each question carefully and choose the correct option from letter A – E

  1. ………………… is a field that identifies each record in a table.
    (a) Primary key
    (b) Foreign key
    (c) Field
    (d) Database
  2. …………… is an alphabetical reference list of subjects, names and so on, of a record in a table.
    (a) Index
    (b) Data
    (c) Report
    (d) Relation
  3. The following are factors responsible for the digital divide phenomenon except ……………
    (a) low income
    (b) type of government
    (c) low educational attainment
    (d) none of the above
  4. Economic development being steady and linear is one of the features of ………………
    (a) the new economy
    (b) the old economy
    (c) database
    (d) ICT
  5. …………………… are especially affected negatively by digital divide
    (a) Developing countries
    (b) Developed countries
    (c) Asian continent
    (d) None of the above
  6. The first known computer virus was developed in the year ………..
    (a) 1991
    (b) 1971
    (c) 1981
    (d) 2001
  7. In the ……………… productivity is characterised by services such as e-commerce and technology such as computers.
    (a) new economy
    (b) 21st century
    (c) old economy
    (d) 19th century
  8. ………………. consists of all the data about a person or thing. It is also called a row.
    (a) Table
    (b) Field
    (c) Record
    (d) Entity
  9. ………… is a division of a database which contains a particular type of data, such as a serial number, name, phone number, address, etc.
    (a) File
    (b) Field
    (c) Query
    (d) Primary key
  10. ……………… languages is a group of languages used to define and access database.
    (a) Programming
    (b) Computer
    (c) Database
    (d) All of the above
  11. …………………… is a type of data language that updates or removes data from a database.
    (a) Structures query language
    (b) Quantum query language
    (c) Xquery language
    (d) Machine language
  12. ………………. have become the most important tools in locating research information
    (a) Data
    (b) Software
    (c) Program
    (d) Search engines
  13. Ms-Excel, Lotus 1-2-3, Quatro and Pro are examples of ……………
    (a) graphics packages
    (b) database packages
    (c) spreadsheet packages
    (d) word processing packages
  14. Users interact with sheets primarily through the ……………
    (a) workbook
    (b) pages
    (c) cells
    (d) rows
  15. ……………… deals with arithmetic, logical, financial, statistical and so many other operations and therefore makes use of formulas and functions.
    (a) Oracle
    (b) Microsoft excel
    (c) Microsoft access
    (d) Microsoft word
  16. ………………… is called the computer resource manager because it provides a systematic way of managing and organising the computer’s resources.
    (a) Application software
    (b) C.P.U.
    (c) Utility software
    (d) Operating system
  17. A program written in ……………. language needs to be translated with the compiler and interpreter for the computer to understand.
    (a) machine
    (b) low level
    (c) high level
    (d) assembly
  18. ……………… refers to the responsible ways of using the computer to prevent loss of data and ensure its durability.
    (a) Computer programming
    (b) Computer ethics
    (c) Operating system
    (d) Internet
  19. …………… refers to information generated from a table or query.
    (a) Report
    (b) Data
    (c) Index
    (d) Field
  20. ……… has to do with using the computer and the internet to commit cybercrimes.
    (a) Virus
    (b) Piracy
    (c) Fraud
    (d) Professionalism
  21. ……………… is the computer’s native language that is difficult to read and understand by humans.
    (a) High level language
    (b) Low level language
    (c) Machine language
    (d) Assembly language
  22. A ………… contains pieces of information arranged in a way that they can be easily accessed by the user and it’s made up of rows and columns.
    (a) field
    (b) table
    (c) record
    (d) file
  23. …….. antivirus can be updated on the internet.
    (a) Some
    (b) All
    (c) Few
    (d) No
  24. …………… refers primarily to the business or economic system involving mega companies which thrived and expanded rapidly before the onset of the information technology age.
    (a) Old economy
    (b) New economy
    (c) Middle age economy
    (d) All of the above
  25. ……………………… is a programming language that was designed to query and transform structured and unstructured data in XML form to other formats.
    (a) Structures query language
    (b) Quantum query language
    (c) Xquery language
    (d) Assembly language
  26. ……………… are application software that can be used to create and manipulate images on a computer.
    (a) Spreadsheet packages
    (b) Graphics packages
    (c) Operating system
    (d) Presentation packages
  27. ……………… is a program that enables the computer user to carry out calculation-related tasks.
    (a) Graphics package
    (b) Word processing package
    (c) Presentation package
    (d) Spreadsheet package
  28. ………… is a spreadsheet package that is made up of cells which are arranged into columns and rows.
    (a) Word
    (b) Excel
    (c) Table
    (d) Database
  29. …………… languages allow for modification, removal and manipulation of data.
    (a) Database
    (b) Machine
    (c) Assembly
    (d) Basic
  30. There are ……… columns in a worksheet
    (a) 18,364
    (b) 18,634
    (c) 16,834
    (d) 16,384
  31. There is only one …………… on a worksheet.
    (a) cell
    (b) cell pointer
    (c) table
    (d) column
  32. Clicking on any cell (in Excel) displays the content of that cell on the ………………
    (a) screen
    (b) title bar
    (c) menu bar
    (d) formula bar
  33. A worksheet consists of ………… rows.
    (a) 1,048,576
    (b) 16,348
    (c) 17,179,869,184
    (d) 1,040,567
  34. ………… is derived by combining the column letter with the row number.
    (a) Cell pointer
    (b) Cell content
    (c) Cell name
    (d) Table
  35. ………………….. determines an organization’s needs and designs programs to meet them.
    (a) System analyst
    (b) System consultant
    (c) Software engineer
    (d) Database analyst
    (e) Database administrator.
  36. ………………. is a popular a search engine known for protecting the privacy of users.
    (a) DuckDuckGo
    (b) Yahoo
    (c) Excite
    (d) Wolfram Alpha
    (e) Google
  37. ……………… creates or maintains a web site
    (a) Webmaster
    (b) Multimedia developer
    (c) Network administrator
    (d) Special effects developer
    (e) System administrator.
  38. ………… is a type of virus that deletes all the files that it infects.
    (a) Overwrite virus
    (b) Macro virus
    (c) Space filler virus
    (d) Resident virus
    (e) Sleeper virus.
  39. ………………… takes overall responsibility for the operation and planning for a local or wide-area network.
    (a) System administrator
    (b) Network administrator
    (c) Multimedia developer
    (d) Software engineer
    (e) Database analyst
  40. Ask.com was founded in ……….
    (a) 1983
    (b) 1996
    (c) 2000
    (d) 1991
    (e) 2009
  41. ………………. gives technical advice and guidance to customers pre or post installation of their computer systems.
    (a) Technical writer
    (b) Database analyst
    (c) IT sales professional
    (d) Technical support representative
    (e) System programmer
  42. The following are examples of computer virus EXCEPT ………
    (a) stone
    (b) sleeper
    (c) infected file
    (d) resident virus
    (e) code red
  43. The first known computer virus was developed by ……………….
    (a) Bill Gate
    (b) Herman Hollerith
    (c) Robert Thomas
    (d) Mark Zuckerberg
    (e) Eric Xu
  44. Which of the following is a computer professional body?
    (a) NGO
    (b) ICPC
    (c) NIG
    (d) NCT
    (e) IMF
  45. ………. is Microsoft’s answer to Google and it was launched in 2009.
    (a) Yahoo
    (b) Baidu
    (c) Bing
    (d) AOL
    (e) Lycos
  46. is the most used search in China and was founded in Jan, 2000 by Chinese Entrepreneur, Eric Xu.
    (a) Ask.com
    (b) Yandex
    (c) Bing
    (d) Baidu
    (e) Excite
  47. The following are advantages of using search engine EXCEPT ……………….
    (a) Time saving
    (b) Relevance
    (c) Comprehensive
    (d) It is costly
    (e) Free access
  48. scan the entire web and keep comprehensive data on every page they catalogue.
    (a) Computer
    (b) Software
    (c) Data
    (d) Search engines
    (e) Internet
  49. ………………. have become the most important tools in locating research information
    (a) Data
    (b) Hardware
    (c) Program
    (d) Search engines
    (e) Software
  50. is a computational knowledge search engine which does not give list of documents or web pages as search results.
    (a) Yandex
    (b) Excite
    (c) Lycos
    (d) Wolfram Alpha
    (e) AOL
  51. ……………. has a good reputation in search engine industry, its key areas served are email, web hosting, social networking, and entertainment websites.
    (a) AOL
    (b) Google
    (c) Yahoo
    (d) Yandex
    (e) Lycos
  52. …………………. designs and creates programs used to collect, maintain, and analyse data needed by business, government or other institutions.
    (a) System consultant
    (b) System administrator
    (c) Software engineer
    (d) Webmaster
    (e) Database analyst
  53. ……………… is someone that specialized in writing or developing software or programs.
    (a) Multimedia developer
    (b) System administrator
    (c) Database administrator
    (d) System analyst
    (e) Programmer
  54. …………… are programs written by software developers to stop or curb the spread of virus in a system.
    (a) Software
    (b) Ms office
    (c) Antivirus
    (d) Virus defender
    (e) Avast
  55. ………….. software is a type of utility software used for scanning and removing viruses your computer.
    (a) Microsoft
    (b) Windows
    (c) Antivirus
    (d) Operating system
    (e) Corel
  56. The career opportunities for computer science graduates can be classified into ……… categories.
    (a) 2
    (b) 4
    (c) 8
    (d) 5
    (e) 6
  57. ………… was launched in 1997, and it’s the most used search engine in Russia.
    (a) Wolfram Alpha
    (b) Excite
    (c) Yandex
    (d) Google
    (e) Lycos
  58. …………….. installs itself as part of the operating system when executed, after which it remains in the RAM from the time the computer is booted up to when it is shut down.
    (a) Macro virus
    (b) Christmas virus
    (c) Resident virus
    (d) Non-resident virus
    (e) Overwrite virus
  59. …………………… designs and develops applications for appliances and entertainment products such as PDA, mobile phone, mp3 player
    (a) System analyst
    (b) Embedded systems application programmer
    (c) Database administrator
    (d) Internet application programmer
    (e) System administrator
  60. …………… is the body that controls the development of locally manufactured computer system in Nigeria.
    (a) NCC
    (b) ITIAN
    (c) NGO
    (d) Computer scientists
    (e) Computer schools
  61. ……………………. takes overall responsibility for the usage, accuracy, efficiency, security, maintenance of an organisation’s database systems.
    (a) System analyst
    (b) Database administrator
    (c) System consultant
    (d) System programmer
    (e) Computer engineer
  62. …………………. works under contract to install or configure hardware or software, write or customize programs, or otherwise help solve information processing problems for an organization.
    (a) System analyst
    (b) System consultant
    (c) Webmaster
    (d) Web designer
    (e) Computer engineer
  63. …………….. is a computer virus that fill up empty spaces between the codes but does not cause any damage to the file.
    (a) Resident virus
    (b) Non-resident virus
    (c) Macro virus
    (d) Space filler virus
    (e) Christmas virus
  64. …………… is an online service portal that provides internet services like email, search engine, news instant messaging and weather updates.
    (a) Bing
    (b) LexisNexis
    (c) Ask.com
    (d) Excite
    (e) Chacha.com
  65. …………… is a software which automatically plays, displays, or downloads advertisements to a computer usually without user’s knowledge.
    (a) Adware
    (b) Computer worm
    (c) Computer virus
    (d) Operating system
    (e) Application software
  66. Some search engines, such as ……………. specialize in legal or other specialized, scholarly information; these sites charge a fee to use their services.
    (a) Google
    (b) Yahoo
    (c) Yandex
    (d) LexisNexis
    (e) Mama.com
  67. …………… is a type of virus that infects the master boot record (hard drive and flash drive).
    (a) Resident virus
    (b) Non-resident virus
    (c) Hard drive virus
    (d) Boot sector virus
    (e) RAM virus
  68. ……………… are the individuals that have obtained sufficient education and training in the field of computers and earn their livelihood from their chosen profession.
    (a) Medical doctors
    (b) Bankers
    (c) Computer professional
    (d) Computer operators
    (e) Students
  69. …………… is someone that specialized in writing or developing software or programs.
    (a) Programmer
    (b) Network administrator
    (c) Computer instructor
    (d) Architect
    (e) Computer operator
  70. ………………… are malicious programs that replicate and spread independently without user action and harm the computer. They spread through network and internet to computers that are connected to the internet.
    (a) Computer worms
    (b) Adware
    (c) Computer virus
    (d) Hackers
    (e) None of the above.
  71. ……………… is someone that specialized in the control and management of computer business.
    (a) Computer operator
    (b) Computer scientist
    (c) Computer instructor
    (d) System analyst
    (e) Computer manager
  72. ………………… develops programs to imitate the thinking and reasoning processes of the human brain; for example, recognize voices and objects, speak in a humanlike voice.
    (a) Webmaster
    (b) Artificial intelligence researcher
    (c) Programmer
    (d) Internet advertising designer
    (e) Computer engineer
  73. ………………… is a program intentionally written by some software developer to cause damage to the computer, programs and files in which it found itself.
    (a) Application software
    (b) System software
    (c) Operating system
    (d) Computer virus
    (e) All of the above
  74. The following are examples of spreadsheet packages except ………………
    (a) Lotus 1-2-3
    (b) Microsoft Excel
    (c) STATVIEW
    (d) Microsoft word
    (e) Easy Calc
  75. Computer virus can spread through the following ways except ………………
    (a) Infected storage devices
    (b) E-mail attachments
    (c) Internet downloads
    (d) Computer network
    (e) None of the above
  76. ……………… is a program that finds Web sites and Web pages.
    (a) Computer network
    (b) Operating system
    (c) Internet
    (d) Search engine
    (e) Computer software
  77. The following are database terminologies except ……………
    (a) data
    (b) index
    (c) worksheet
    (d) record
    (e) field
  78. ………………… is a program that enables the computer user to carry out calculation-related tasks.
    (a) Database
    (b) Spreadsheet package
    (c) Graphics package
    (d) Publication package
    (e) All of the above
  79. The following are spreadsheet terminologies except ……………
    (a) data
    (b) cell pointer
    (c) row
    (d) footer
    (e) function
  80. …………… is a pictorial representation or a diagram that represents data or values in an organized manner.
    (a) Graph
    (b) Column
    (c) Worksheet
    (d) Row
    (e) Cell pointer
error: Content is protected !!
Select your currency
NGN Nigerian naira
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare