My Blog
Written by
in
The examination time has ended. Your answers have been saved and submitted automatically.
DIGITAL TECHNOLOGY FIRST TERM OBJ EXAM – SENIOR SECONDARY SCHOOL
Student Name
1 / 50
1. Which of the following drawing tools would create special effects for texts?
2 / 50
2. The exchange of information over a network follows a set of rules called
3 / 50
3. Information transmission medium from location P to location Q in space is called
4 / 50
4.
The diagram illustrates the relationship between two tables in a database.
The student ID in Tables II is referred to as
5 / 50
5. The rules for exchanging data on a network are known as
6 / 50
6.
In a relational database management system, files are organized as relations and
7 / 50
7. Which of the following is secondary storage device.
8 / 50
8. Data gathering involves the following means except
9 / 50
9. Safety measures to be observed when using the computer include all of the following except
10 / 50
10. One of the advantages of a parallel database is
11 / 50
11. Which of the following is not an application of computers?
12 / 50
12. Which of the following is not an ancient medium for transmitting information?
13 / 50
13. Facebook, Twitter and WhatsApp are examples of
14 / 50
14. Which of the following operations prevent file loss?
15 / 50
15. In graphic packages, the process of removing unwanted part of an image is known as
16 / 50
16. Which of the following is true about digital computers.
17 / 50
17. Routine checks operations on computers in order to ensure its continuous functioning is known as computer
18 / 50
18. Social networking does not promote.
19 / 50
19. the device that sends information to the CPU is the
20 / 50
20. Which of the following is not a characteristics of a personal computer
21 / 50
21. Which of the following is not a safety equipment in a computer laboratory?
22 / 50
22. An operating system will perform the following except
23 / 50
23. The gap between ownership, access, and benefits from computer and it’s application is termed digital____
24 / 50
24. One of the characteristic feature of the second generation computer is the presence of
25 / 50
25. The following are desturctive software except
26 / 50
26. The type of data which consist of text, number, audio, graphic and animation is called
27 / 50
27. A program developed to protect the computer from malicious software is referred to as
28 / 50
28. Which of the following is an alphebetical data?
29 / 50
29. Which of the following are parts of a computer processor?
30 / 50
30. Which of the following is not a procedure for information processing?
31 / 50
31. Which of the following is a negative impact of ICT in education?
32 / 50
32. An internet-based system that allows people different geographical locations to have in-personmeeting is known as
33 / 50
33. The feature in a database application that acts as an interface between the user and the database is called a?
34 / 50
34. Which of the following measures are used to secure data on-line? I. Password II. Encryption III. Personal Identification Number (PIN)
35 / 50
35. The television set deisplays information as
36 / 50
36. Planning and creating websites are stages in?
37 / 50
37. The type of data entered into a table in database follow a set of rules known as?
38 / 50
38. The MS Excel worksheet below shows the salary distribution for four staff of a company. The net salary is paid after deductions have been made.
Which of the following formulas would be used to obtain the value in cell E2?
39 / 50
39. Which generation of computers made use of intergrated circuit?
40 / 50
40. MS Access is an example of a
41 / 50
41. In word processing applications, the symbol B, I and U are commonly used buttons found on the
42 / 50
42. Acomputer pofessional who studies an existing system with a view to evolving a computer based system from it is
43 / 50
43. Magazines and brochures can be produced using a
44 / 50
44. Information analysis procedures includes the following except
45 / 50
45. In MS Powerpoint, the action of holding down the left mouse key and moving the mouse around the slide would
46 / 50
46. In relational model, a tuple is a?
47 / 50
47. Which of these measures would not secure data in database?
48 / 50
48. The moral principles that regulates the use of computers, its accessories and environment are called
49 / 50
49. Which of the following is not an advantage of file organization?
50 / 50
50. Which of these operations would not close MS word application?
Your score is
The average score is 33%
Restart quiz
Your email address will not be published. Required fields are marked *
Comment *
Name *
Email *
Website
Save my name, email, and website in this browser for the next time I comment.
Leave a Reply