My Blog
Written by
in
The examination time has ended. Your answers have been saved and submitted automatically.
DIGITAL TECHNOLOGY FIRST TERM OBJ EXAM – SENIOR SECONDARY SCHOOL
Student Name
1 / 50
1. Routine checks operations on computers in order to ensure its continuous functioning is known as computer
2 / 50
2. Which of the following is not an advantage of file organization?
3 / 50
3. Which of these measures would not secure data in database?
4 / 50
4. Information transmission by television is classified as
5 / 50
5. Which of the following is not a type of wireless transmission
6 / 50
6. A program designed to detect and prevent malicious programs from a computer system is
7 / 50
7. Which of the following is an alphebetical data?
8 / 50
8. A data element that uniquely identifies one record from the other in a table is the
9 / 50
9. In word processing applications, the symbol B, I and U are commonly used buttons found on the
10 / 50
10.
The diagram illustrates the relationship between two tables in a database.
The student ID in Tables II is referred to as
11 / 50
11. A server is a computer that provides services to other computers called
12 / 50
12. An internet-based system that allows people different geographical locations to have in-personmeeting is known as
13 / 50
13. A field in a database table is also known as
14 / 50
14. the device that sends information to the CPU is the
15 / 50
15. The feature in a database application that acts as an interface between the user and the database is called a?
16 / 50
16. Social networking does not promote.
17 / 50
17. Planning and creating websites are stages in?
18 / 50
18. The records of students in a school are kept in order of their arrival. What files access method would be used to access a student’s record if the latest record would first be retrieved?
19 / 50
19.
The prevention of data from corruption and unauthorized access is a function of data
20 / 50
20. Convert 47 base 8 to its binary equivalent.
21 / 50
21. A program developed to protect the computer from malicious software is referred to as
22 / 50
22. MS Access is an example of a
23 / 50
23. Which of the following is not a procedure for information processing?
24 / 50
24. In graphic packages, the process of removing unwanted part of an image is known as
25 / 50
25. A technician can protect itself from electronic discharge by using
26 / 50
26. Which of the following are the basic components of a computer network? I. A minimum of two computers II. Printers III. Network interface card.
27 / 50
27. Which of the following is not used for online shopping?
28 / 50
28. Facebook, Twitter and WhatsApp are examples of
29 / 50
29. Computer virus cannot be transmitted by
30 / 50
30. Which of the following is not a feature of the drawing tool bar?
31 / 50
31. Two computers, X and Y are such that the processor in X has a word size of 32 bits while that of Y is 16bits. Which of the following statement is true?
32 / 50
32. The feature in a browser which enables users to open the latest copy of a webpage is
33 / 50
33.
In a relational database management system, files are organized as relations and
34 / 50
34. Which of the following is not an application of computers?
35 / 50
35. What file organization would require that all the five (5) records be read before the 6th record is written?
36 / 50
36. Which of the following is not a characteristics of a personal computer
37 / 50
37. The perfomance of the computer can be enhanced by
38 / 50
38. Which of the following drawing tools would create special effects for texts?
39 / 50
39. Acomputer pofessional who studies an existing system with a view to evolving a computer based system from it is
40 / 50
40. Which of the following persons invented the punch card machine?
41 / 50
41. One of the characteristic feature of the second generation computer is the presence of
42 / 50
42. Commonly accepted practices, rules or methods in computing are called
43 / 50
43. Which of the following is not an effect of computer virus?
44 / 50
44. Data gathering involves the following means except
45 / 50
45. Which of the following is true about digital computers.
46 / 50
46. The exchange of information over a network follows a set of rules called
47 / 50
47. Which of the following operations prevent file loss?
48 / 50
48. In spreadsheets, data would not be accepted into a cell by pressing the.
49 / 50
49. The operation of checking input data against specified criteria is referred to as.
50 / 50
50. Information analysis procedures includes the following except
Your score is
The average score is 33%
Restart quiz
Your email address will not be published. Required fields are marked *
Comment *
Name *
Email *
Website
Save my name, email, and website in this browser for the next time I comment.
Leave a Reply