DIGITAL TECHNOLOGY FIRST TERM OBJ EXAM – SENIOR SECONDARY SCHOOL

/50

DIGITAL TECHNOLOGY FIRST TERM OBJ EXAM – SENIOR SECONDARY SCHOOL

BOTLAND COLLEGE ONLINE EXAMINATION PORTAL

INSTRUCTIONS

  1. You have 15 minutes to answer 50 questions.
  2. Each question carries equal marks.
  3. There is no negative marking, so attempt every question.
  4. Do not refresh, close, or reload the page while writing the exam.
  5. Once you click Start, the timer begins immediately.
  6. Click Finish when you are done to submit and view your score.
  7. Ensure you have a stable internet connection before starting.

Student Name

1 / 50

1. The gap between ownership, access, and benefits from computer and it’s application is termed digital____

2 / 50

2. Which of these operations would not close MS word application?

3 / 50

3. MS Access is an example of a

4 / 50

4. Maintaining the value nd content of data is part of data

5 / 50

5. A search engine is a?

6 / 50

6. Commonly accepted practices, rules or methods in computing are called

7 / 50

7. The type of data entered into a table in database follow a set of rules known as?

8 / 50

8.

The prevention of data from corruption and unauthorized access is a function of data

9 / 50

9. A program designed to detect and prevent malicious programs from a computer system is

10 / 50

10. Computers store data as

11 / 50

11. Magazines and brochures can be produced using a

12 / 50

12. Which of the following are the basic components of a computer network? I. A minimum of two computers II. Printers III. Network interface card.

13 / 50

13. Which of the following is not a characteristics of a personal computer

14 / 50

14. A program developed to protect the computer from malicious software is referred to as

15 / 50

15. A field in a database table is also known as

16 / 50

16. The exchange of information over a network follows a set of rules called

17 / 50

17. The assembling of data according to a predetermined order is known as

18 / 50

18. Which of the following is not a feature of the drawing tool bar?

19 / 50

19. Which of the following is not used for online shopping?

20 / 50

20. Which of the following measures are used to secure data on-line? I. Password II. Encryption III. Personal Identification Number (PIN)

21 / 50

21. A Microsoft Office application suites include all the following except

22 / 50

22. Which of the following is safety measure in the computer laboratory?

23 / 50

23. The MS Excel worksheet below shows the salary distribution for four staff in a company. The net salary is paid after deductions have been made.

Which of the following cells contain numeric data?

S/N A B C D E
1 IDENTIFICATION NUMBER BASIC SALARY (N) TOTAL ALLOWANCE (N) TOTAL DEDUCTION (N) NET SALARY (N)
2 LP/p/1202 22000 29000 7000 44000
3 L/P/1250 26000 35000 9000 52000
4 L/P/3205 15000 21000 6000 30000
5 L/P/3215 33000 41000 8000 66000

24 / 50

24. In hexadecimal system, D is equivalent to

25 / 50

25. The advantages of electronic data processing includes the following except

26 / 50

26. Which of the following is not an effect of computer virus?

27 / 50

27. What file organization would require that all the five (5) records be read before the 6th record is written?

28 / 50

28. Social networking does not promote.

29 / 50

29. While typing a MS word document, Akin inserted footer in the document in order to

30 / 50

30. Companies that provide internet access are referred to as

31 / 50

31. The rules for exchanging data on a network are known as

32 / 50

32. Which of the following is not an application of computers?

33 / 50

33. The study of the effect of interaction between the computer and human users is referred to as computer

34 / 50

34. In Database Management System (DBMS), linking entities is used to represent?

35 / 50

35. In MS Powerpoint, the action of holding down the left mouse key and moving the mouse around the slide would

36 / 50

36. Routine checks operations on computers in order to ensure its continuous functioning is known as computer

37 / 50

37. Convert 47 base 8 to its binary equivalent.

38 / 50

38. The records of students in a school are kept in order of their arrival. What files access method would be used to access a student’s record if the latest record would first be retrieved?

39 / 50

39. The moral principles that regulates the use of computers, its accessories and environment are called

40 / 50

40.

In a relational database management system, files are organized as relations and

41 / 50

41. Which of the following persons invented the punch card machine?

42 / 50

42. Facebook, Twitter and WhatsApp are examples of

43 / 50

43. In word processing applications, the symbol B, I and U are commonly used buttons found on the

44 / 50

44. Computer virus cannot be transmitted by

45 / 50

45.

The diagram illustrates the relationship between two tables in a database.

The student ID in Tables II is referred to as

46 / 50

46. One of the advantages of a parallel database is

47 / 50

47. the device that sends information to the CPU is the

48 / 50

48. Which of the following is secondary storage device.

49 / 50

49. The MS Excel worksheet below shows the salary distribution for four staff  of a company. The net salary is paid after deductions have been made.

S/N A B C D E
1 IDENTIFICATION NUMBER BASIC SALARY (N) TOTAL ALLOWANCE (N) TOTAL DEDUCTION (N) NET SALARY (N)
2 LP/p/1202 22000 29000 7000 44000
3 L/P/1250 26000 35000 9000 52000
4 L/P/3205 15000 21000 6000 30000
5 L/P/3215 33000 41000 8000 66000

Which of the following formulas would be used to obtain the value in cell E2?

50 / 50

50. Which of these packages could be used by a Computer teacher to design a website for a school

Your score is

The average score is 33%

0%

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *