DIGITAL TECHNOLOGY FIRST TERM OBJ EXAM – SENIOR SECONDARY SCHOOL

/50

DIGITAL TECHNOLOGY FIRST TERM OBJ EXAM – SENIOR SECONDARY SCHOOL

BOTLAND COLLEGE ONLINE EXAMINATION PORTAL

INSTRUCTIONS

  1. You have 15 minutes to answer 50 questions.
  2. Each question carries equal marks.
  3. There is no negative marking, so attempt every question.
  4. Do not refresh, close, or reload the page while writing the exam.
  5. Once you click Start, the timer begins immediately.
  6. Click Finish when you are done to submit and view your score.
  7. Ensure you have a stable internet connection before starting.

Student Name

1 / 50

1. Routine checks operations on computers in order to ensure its continuous functioning is known as computer

2 / 50

2. Which of the following is not an advantage of file organization?

3 / 50

3. Which of these measures would not secure data in database?

4 / 50

4. Information transmission by television is classified as

5 / 50

5. Which of the following is not a type of wireless transmission

6 / 50

6. A program designed to detect and prevent malicious programs from a computer system is

7 / 50

7. Which of the following is an alphebetical data?

8 / 50

8. A data element that uniquely identifies one record from the other in a table is the

9 / 50

9. In word processing applications, the symbol B, I and U are commonly used buttons found on the

10 / 50

10.

The diagram illustrates the relationship between two tables in a database.

The student ID in Tables II is referred to as

11 / 50

11. A server is a computer that provides services to other computers called

12 / 50

12. An internet-based system that allows people different geographical locations to have in-personmeeting is known as

13 / 50

13. A field in a database table is also known as

14 / 50

14. the device that sends information to the CPU is the

15 / 50

15. The feature in a database application that acts as an interface between the user and the database is called a?

16 / 50

16. Social networking does not promote.

17 / 50

17. Planning and creating websites are stages in?

18 / 50

18. The records of students in a school are kept in order of their arrival. What files access method would be used to access a student’s record if the latest record would first be retrieved?

19 / 50

19.

The prevention of data from corruption and unauthorized access is a function of data

20 / 50

20. Convert 47 base 8 to its binary equivalent.

21 / 50

21. A program developed to protect the computer from malicious software is referred to as

22 / 50

22. MS Access is an example of a

23 / 50

23. Which of the following is not a procedure for information processing?

24 / 50

24. In graphic packages, the process of removing unwanted part of an image is known as

25 / 50

25. A technician can protect itself from electronic discharge by using

26 / 50

26. Which of the following are the basic components of a computer network? I. A minimum of two computers II. Printers III. Network interface card.

27 / 50

27. Which of the following is not used for online shopping?

28 / 50

28. Facebook, Twitter and WhatsApp are examples of

29 / 50

29. Computer virus cannot be transmitted by

30 / 50

30. Which of the following is not a feature of the drawing tool bar?

31 / 50

31. Two computers, X and Y are such that the processor in X has a word size of 32 bits while that of Y is 16bits. Which of the following statement is true?

32 / 50

32. The feature in a browser which enables users to open the latest copy of a webpage is

33 / 50

33.

In a relational database management system, files are organized as relations and

34 / 50

34. Which of the following is not an application of computers?

35 / 50

35. What file organization would require that all the five (5) records be read before the 6th record is written?

36 / 50

36. Which of the following is not a characteristics of a personal computer

37 / 50

37. The perfomance of the computer can be enhanced by

38 / 50

38. Which of the following drawing tools would create special effects for texts?

39 / 50

39. Acomputer pofessional who studies an existing system with a view to evolving a computer based system from it is

40 / 50

40. Which of the following persons invented the punch card machine?

41 / 50

41. One of the characteristic feature of the second generation computer is the presence of

42 / 50

42. Commonly accepted practices, rules or methods in computing are called

43 / 50

43. Which of the following is not an effect of computer virus?

44 / 50

44. Data gathering involves the following means except

45 / 50

45. Which of the following is true about digital computers.

46 / 50

46. The exchange of information over a network follows a set of rules called

47 / 50

47. Which of the following operations prevent file loss?

48 / 50

48. In spreadsheets, data would not be accepted into a cell by pressing the.

49 / 50

49. The operation of checking input data against specified criteria is referred to as.

50 / 50

50. Information analysis procedures includes the following except

Your score is

The average score is 33%

0%

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *