1.
An electronic and programmable device that processes data into use information is called
computer.
peripheral.
processor.
technology.
2.
Which of the following media uses laser technology to write and read data?
Floppy disk
Hard disk
Optical disc
Pen drive
3.
Turning off the computer is also known as
booting.
installation.
programming.
shut down.
4.
The following are items located on the default task bar except
date.
clock.
recycle bin.
start menu button.
5.
Files are best kept in
icons.
folders.
programs.
applications.
6.
The end results of the information processing cycle that cannot be touched is referred to as
hard copy.
hardware.
soft copy.
software.
7.
A malicious software specially designed to cause computer system to be slow and malfunction is
an application.
a bacteria.
a germ.
a virus.
8.
The arrow keys on the computer keyboard are also referred to as
cursor keys.
function keys.
shift keys.
special purpose keys.
9.
The name given to each cell according to its column label and row number is called
active cell.
cell formula.
cell reference.
highlighted cell.
10.
Which of the following applications is an example of a Word processor?
Excel
Lotus 1-2-3
Notepad
Print artist
11.
The only software that runs without a user's instruction on a computer is the
application software.
operating system.
scanner program.
storage program.
12.
The Liquid Crystal Display monitor of a computer is also known as the
cathode ray tube.
display screen.
flat panel display.
television display.
13.
A pen-like device that is used to enter data by applying pressure on a screen is the
joystick.
mouse.
pointer.
stylus.
14.
One gigabyte of data approximates to
10 megabytes of data.
100 megabytes of data.
1,000 megabytes of data.
10,000 megabytes of data.
15.
Which of the following devices will turn off first when shutting down the computer?
Monitor
Stabilizer
System unit
Uninterruptible Power Supply
16.
The title bar of an opened application always displays the name of the application and the name of the
computer.
document.
software.
system.
17.
To remove unwanted shortcuts from the desktop which of the following options will be appropriate?
I. Click on the shortcut icon once and press the delete key on the keyboard
II. Drag the shortcut icon into the Recycle Bin.
III. Right-click on the shortcut icon and select delete from the pop-up menu.
I and II only.
I and III only.
II and III only.
I, II and III.
18.
The safety measure to prevent back ache when using the computer for a very long time is to
answer or receive calls when charging mobile phone.
avoid plugging ICT tools on damaged sockets.
position the body correctly.
use plastic chair always.
19.
The best measure that computer users should practice to reduce the changes of wrist and finger pains due to long term usage of the computer is to
adjust the lightening of the computer screen.
close the eyes and rest them for one minute.
spread fingers apart.
use adjustable chair always.
20.
Illegal copying of operating system, application software, music and videos is referred to as copyright
law.
issues.
protection.
infringement.
21.
To resave an edited document, use
Ctrl + C.
Ctrl + S.
Ctrl + V.
Ctrl + X.
22.
A collection of linked documents or pages stored on millions of computers and distributed across the world is called
browser.
hyperlink.
internet.
world wide web.
23.
The device used to transform digital signals to analogue signals and vice versa on a network is a
hub.
modem.
telephone.
digital box.
24.
Google is an example of a
browser.
search engine.
spam mail.
website.
25.
Mrs. Famiyeh wants to copy information onto a compact disc, clean the content and later copy the information again. Which of the following media would you advice her to use?
CD
CD-R
CD-R/W
CD-ROM
26.
To execute more than one program at the same time, the system software being used should be capable of
background theme.
background panel.
screen saver.
wallpaper.
27.
Which of the following statements best describes a computer operator? A person who
carries a computer from one location to the other to work.
obtains a degree in computer science and its related fields of study.
operates the device which inputs and outputs data from the computer.
writes computer programs for a specific purpose.
28.
A document which shows its entire text in upper case means that the user has achieved the
alt key.
caps lock key.
num lock key.
shift key + F3.
29.
Pressing and releasing the left mouse button twice in quick succession is termed
dragging.
double-clicking.
left-clicking.
right-clicking.
30.
Which of the following keys is used to create a new line in Word processing?
Ctrl key
Enter key
Esc key
Shift key
31.
The feature in Word processors that automatically moves the cursor to the beginning of the next line when the current typing line ends is called
auto text.
auto correct.
line flow.
word wrap.
32.
The red wavy line under a word in a Word processing document refers to word
not in the computer dictionary.
not recognized by the computer.
too long for the computer.
too short for the computer.
33.
The shortcut to some commands on the menu bar of a Word processing application program can be found on the
scroll bar.
status bar.
standard toolbar.
title bar.
34.
Which of the following document views would show the document as it would look when it is printed?
Normal view
Outline view
Print layout view
Web layout view
35.
The buttons for reload/refresh, back, top and forward can be found on the following applications except
Search engine.
Web browser.
Web site.
WhatsApp.
36.
The software that enable users access web pages on the internet is called
browser.
web site.
access engine.
search engine.
37.
In computing, the exchange of information is referred to as
communication.
conversation.
education.
entertainment.
38.
Which of the following functions is used to find the mean number
Average
Maximum
Minimum
Summation
39.
The content of a selected cell is shown in the
formula bar.
name box.
status bar.
title bar.
40.
An application that helps the user to change any number in a cell and immediately see the result of that change in another cell is a
Database.
Presentation.
Spreadsheet.
Word processor.
Study the text below carefully and use it to answer questions (a) to (g)
a)
Write down the application software that was used to create the above text.
b)
List two examples of the application software mentioned in (a) above.
c)
Give the name of the text area labelled A.
d)
Write down the name of the font styles applied to the following words in the text:
i)
potentially deadly
ii)
harmful organisms
iii)
Medical researchers
e)
Write down the type of alignment applied to the paragraphs labelled B, C and D in the text
f)
List the steps used in underlining the words in the text area labelled A which was typed with the caps lock key on.
g)
Write down the name given to the process of applying the various styles and paragraphs to the text.
a)
Using the table below, indicate where the following components can be seen on the computer system unit.
CD/DVD slot, CPU, Flopy disk slot, Memory, Motherboard, Power button, Power supply port, PS/2 port, VGA port.
BACK VIEW | FRONT VIEW | INSIDE VIEW |
b)
What is copyright?
Explain the following computer terms:
a)
Hardware
b)
Network
c)
Software
d)
Virus
a)
State the function of each of the following devices:
i)
floppy disk
ii)
keyboard
iii)
uninterruptible power supply
b)
Explain each of the following terms:
i)
Clicking
ii)
Dragging
State three uses of computers in each of the following areas:
a)
Education
b)
Everyday life