Second Term Examination Information Technology and Data Processing for JSS 1 – SS 3 Term 2 Exam Questions







Scroll down for JSS 2 – SS 3 exam questions.




Instruction: Fill the gaps with the most suitable word from the options A – D.

1. A typical computer system hardware is made up of the _________.

[a] system unit & peripherals

[b] control unit & processing unit

[c] ROM & RAM


2. All these are types of ROM except _________.

[a] PROM

[b] DRAM



3. The task of performing arithmetic and logical operations is called _________.

[a] ALU

[b] output

[c] storage


4. Screen savers were developed as a means to _________.

[a] create fun

[b] beautify monitor

[c] avoid burn in


5. Arrow keys is also known as _________.

[a] function keys

[b] Numeric keys

[c] cursor control keys


6. _________ is the standard of conduct as it relates to computers

[a] Computer ethics

[b] Computer users

[c] Computer professional


7. Which of the following is a good computer lab ethics?

[a] Fighting other students.

[b] moving the computers about .

[c] Cleaning the computers with dust free Napkins .


8. Air conditioner can be installed in a computer room to keep the room cool .

[a] True

[b] False

[c] Maybe


9. A _________ helps you create new and attractive document easily and quickly.

[a] typewriter

[b] word processor

[c] Reports


10. The _________ button is used for making some text look bolder than the rest of the text.

[a] B

[b] U

[c] I


11. The following are examples of word processors except _________.

[a] word perfect

[b] microsoft word

[c] type writer


12. The unorganized facts and which can be converted into useful information is called _________.

[a] program

[b] Data

[c] information


13. A set of instructions to perform a given task is called a _________.

[a] Data

[b] Information

[c] Both


14. There are _________ stages of data processing

[a] 4

[b] 5

[c] 6


15. How raw information is manipulated in order to produce a result is called _________.

[a] processing

[b] data processing

[c] programming


16. _________ is an built – in computer memory containing data that can only be read and written to.

[a] Random access memory

[b] Read only memory

[c] Main memory


17. _________ is a place where the teaching and learning of computer takes place.


18. C. P. U means __________________.


19. Keys with numbers are called _________.


20. There are _________ section on the keyboard




THEORY — Attempt Four Questions in this Section. 


a. Define Keyboard.

b. Name the five sections of the keyboard and give examples of keys found in each section.

c. State the 4 types of keyboard.

d. Differentiate between RAM and ROM .



a. Define System Unit.

b. List three management ethnics of a computer room .

c. State four good conduct in a computer laboratory.

d. Mention 5 objects that can be found in the computer room.



a. What is word processing?

b. Give 5 examples of word processor.

c. List 5 advantages of a word processor.

d. Draw a Keyboard.



a. Define Data processing .

b. List 4 elements of data processing .

c. There are ________________ stages of data processing .

d. Write the full meaning of the following:



iii. VGA

iv. HDMI



a. Define Monitor.

b. Differentiate between ALU, CPU and Control unit.

c. How many types of monitor do we have ? Name them.

d. Draw the diagram of data processing steps .




Scroll down for JSS 3 – SS 3 exam questions.




Instruction: Fill the gaps with the most suitable word from the options A – D.

1. ICT is used for the following except _________.

[a] information management

[b] timing and control

[c] deleting

[d] communication


2. A program is _________.

[a] a set of solutions

[b] a definition of a problem

[c] a set of instructions

[d] games theory


3. The low level language is also called _________.

[a] high level language

[b] machine language

[c] local language

[d] natural language


4. The _________ is a program that translates program written in assembly language to machine language.

[a] compiler

[b] assembler

[c] interpreter

[d] coder


5. The process of removing errors in a program is called _________.

[a] translating

[b] programming

[c] debugging

[d] decoding


6. Which of the following is not a keyword?

[a] LET

[b] DATA

[c] COME

[d] GOTO


7. Which of the following is used to output result?

[a] READ


[c] GOTO

[d] all of the above.


8. A graphics package will do the following except _________.

[a] drawing

[b] painting

[c] printing

[d] arithmetic


9. The tools used for drawing are located in the _________.

[a] tool box

[b] status bar

[c] print box

[d] function bar


10. A telecommunication device that is used to send and receive audio and

signals across distance is known as _________.

[a] telephone

[b] internet

[c] television

[d] satellite


11. Which of the following does not transmit signals?

[a] radio

[b] calculator

[c] computer

[d] satellite


12. Which of the following is a disadvantage of ICT.

[a] effective human interaction

[b] job losses

[c] globalization

[d] access to information


13. A graphics program can be used to create a company logo

[a] True

[b] false

[c] maybe


14. Which of the following is a computer graphics package?


[b] corel draw



15. Which of the following is odd ?

[a] fax

[b] pager

[c] pencils

[d] GSM


16. Which of the following is a computer program?


[b] MS – paint

[c] DATA



17. Symbolic representation is also known as _________.


18. COBOL acronyms __________________.


19. A global system for mobile communication is called __________________.


20. is also known as __________________.




Answer Four Questions Only. 



a. Define I C T and Communication.

b. List 10 ICT gadgets.

c. State 5 uses of ICT.

d. Describe 2 advantages and 2 disadvantages.



a. What is Algorithm?

b. Draw five flowchart symbols and name them.

c. What is documentation?

d. List 5 examples of high level language.



a. Define programming language?

b. State 5 stages involved in writing a program.

c. List 5 versions ( examples ) of basic.

d. State 5 Key BASIC statements.



a. Define graphic package.

b. Mention any 6 graphics software packages that you know.

c.. List 5 features of graphic software.

d. List any 8 tools in a tool box.



a. Define the following:

i. Assembly Language

ii. Machine Language.


b. Write the full meaning of the following:



iii. GSM

iv. ICT


c. Write a simple BASIC program to add up 1 to 5

d. Differentiate between High level language and Low level language




Scroll down for SS 1 – SS 3 exam questions.




Instruction: Fill the gaps with the most suitable word from the options A – D.

1. Microsoft Excel can be used to draw all kinds of _________ and _________.

[a] lines and bubbles

[b] graphs and charts

[c] columns and rows

[d] graph book and graph sheets


2. A graph is also called _________.

[a] coordinates

[b] clustered

[c] chart

[d] axes


3. _________ is not a quality of a good computer professional.

[a] Being dull

[b] Being hardworking

[c] Being honest and trustworthy

[d] Posses the required training


4. A computer professional that writes and codes programs is called a _________.

[a] system analyst

[b] computer programmer

[c] mechanical engineer

[d] system administrator


5. ISPAN means _________.

[a] internet set of providers association of Nigeria

[b] internet set of programs of Nigeria

[c] internet service protocol and Nigeria

[d] internet service providers association of Nigeria


6. Uses of computer games include the following expect _________.

[a] for entertainment

[b] for gambling

[c] for building intelligence quotient

[d] none of the above


7. A gamer is _________.

[a] a regular player of computer games

[b] a stocker of computer games

[c] a vendor of computer games

[d] a fan of computer games


8. The TRUTH tables are drawn to represent _________.

[a] Logic circuits

[b] logic gates

[c] AND, OR & NOT


9. The diagram represent _________.

[a] NOT gate

[b] AND gate

[c] OR gate


10. If x = 1 and Y = 1, then z = ?

[a] 1

[b] 2

[c] 0


11. X and Y are called _________.

[a] logic gate

[b] inputs

[c] outputs

[d] truth table


12. The combination of OR gate followed by an inverter is called _________.

[a] NOT gate

[b] AND gate

[c] NOR gate


13. Under what situation can a virus attack a computer system.

[a] when the computer is not installed

[b] When there is power failure.

[c] When the computer is exposed to sunlight .

[d] When a suspected diskette is used on the system.


14. Other programs that attack the computer are as follow expect _________.

[a] worms

[b] Trojan horse

[c] Norton

[d] syware


15. _________ is an example of a computer antivirus.

[a] smart cop

[b] Alabama virus

[c] Logic bomb

[d] Mc Afee virus


16. A work sheet has _________.

[a] vertical rows and horizontal rows

[b] 17 rows & 340 columns.

[c] 65,536 rows and 256 coloumns

[d] 40,720 rows and 400 column.


17. The NOT gate has only _________.

[a] 1 input

[b] 2 input

[c] 3 inputs

[d] 4 inputs


Answer questions 18 – 20 with TRUE or FALSE

18. Computer games are installed on the computer _________.


19. A picture cannot be inserted into graphs _________ .


20. A computer virus can infect files and folders _________.




Answer three questions only.


a. Define graph.

b. List 4 uses of graph

c. State 5 types of graph

d. A graph is also called _________.



a. Define computer professional.

b. List four qualities of a good professional.

c. Mention 5 computer professional bodies with their full meaning.


d. Write briefly on the following:

i. Hacker

ii. Computer operator

iii. Programmer

iv. Graphic artist



a. What is computer virus?

b. List 5 examples of computer virus.

c. State 3 symptoms of computer virus.

d. Mention three computer anti – virus available for use.



a. What is computer game? And give 6 examples of computer games.

b. Discuss the types of computer games.

c. List 3 advantages and 2 disadvantages of computer games.

d. What are the uses of computer games?



a. Define Logic gate.

b. List types of seven logic gates


c. With the aid of diagram and truth table differentiate between

i. AND and OR gate

ii. NAND and NOR gate



a. Differentiate between Logic gates and Logic circuits

b. With the aid of diagram, List all types of Logic gates and name them.




Scroll down for SS 2 – 3 exam questions.




Instruction: Fill the gaps with the most suitable word from the options A – D.

1. _________ refers to the manipulation of digitised information by computers and other digital electronic equipment.

[a] information technology

[b] information science

[c] information processing


2. _________ can be presented in line graphs, histograms, bar charts, pie chart etc.

[a] information

[b] Data

[c] modeling


3. Which of the following is an advantage of using computer for information processing ?

[a] computer can store enormous amounts of data for future use

[b] initial investment cost can be high

[c] face – to – face interaction among staff may be reduced.


4. The process through which organizations make sense of new information that they have acquired and disseminated is called _________.

[a] collation

[b] interpretation of information

[c] continuum


5. The main advantage of collation is _________.

[a] To disorganize data and information

[b] To prepare payroll for workers

[c] To makes it fast and easy for a user to find an element in the list.


6. The following are simple process for analyzing information except _________.

[a] Skim and scan

[b] High reliability

[c] identify propaganda,bias


7. The means of _________ has changed according to living situations and advancements in technology.

[a] communication

[b] transmission

[c] organisation


8. _________ is the method of sending audio messages over a long distance to large audience using electromagnetic wave

[a] Telegraphy

[b] Radio

[c] Internet


9. The specialized wireless receiver/transmitter that is launched by a rocket and placed in orbit around the earth is called _________.

[a] Internet

[b] Metal gong

[c] satellite


10. _________ was used to pass important information in the days before the existence of the written word.

[a] story telling

[b] letter writing

[c] signs


11. _________ operating system allows multiple users to simultaneously use the system.

[a] single user

[b] real time

[c] multi user


12. In a _________ operating system interaction between the user and processor is limited or there is no interaction at all during the execution of work.

[a] real time

[b] batch processing

[c] Windows


13. _________ allows you to duplicate a section of text.

[a] delete text

[b] cut and paste

[c] copy


14. _________ contain menu of commands that allows a user insert features, edit documents, format documents.

[a] Menu bar

[b] title bar

[c] task bar


15. GUI means _________.


16. DOS acronyms _________.


17. _________ is a technology that allows light to travel along thin glass or plastic wires.


18. _________ and _________ are most commonly used means of communication.


19. _________ is used to transmit both visual and audio messages to large audience over a far distance.


20. A _________ display documents a user is currently working on, other documents that were opened by the user, start menu, system etc.




Answer Four questions only.


a. Define lnformation Transmission.

b. There are _______ method of information transmission ? Name them.

c. Mention 5 examples each of the above answer.


d. Briefly explain the following:

i. Satellite

ii. Wireless

iii. Fiber optic communication



a. Define the art of information processing.

b. List the procedures for information processing.

c. Write the simple process for analyzing information.

d. State 3 advantages and 2 disadvantages of using computers for information processing.



a. What is operating system?

b. Give examples of operating system.

c. State four functions of an operating system.

d. Mention types of operating system .



a. Define word processing.

b. Write four examples of word processor.

c. Mention four examples of Ms – office.

d. List 5 non electronic means of communication.



a. Explain the following:

i. Analysis of information

ii. Collation

iii. Organisation of information


b. Differentiate between Multi tasking and Multi user operating system.

c. List and explain 5 features of standard word processors .

d. Differentiate between Fax machine, Telephone / mobile phone and telegraph.




Scroll down for SS 3 exam questions.




Instruction: Fill the gaps with the most suitable word from the options A – D.

1. A _________ is a collection of data, usually stored disk

[a] Entity

[b] organisation

[c] file


2. The following criteria must be considered when choosing a file organisation except _________.

[a] fast access to single record or collection of related records.

[b] deleting of files records.

[c] storage efficiency.


3. _________ file organisation,records and organized in sequence by which they were added.

[a] Relative

[b] sequence

[c] indexed


4. The file organization that contains reference numbers, like employee numbers, that identify a record in relation to other records is called _________.

[a] distributed

[b] relative

[c] indexed


5. _________ refer to the process of moving from one place to another on the internet.

[a] cyber space

[b] browse

[c] chat room


6. The process of retrieving information from the internet onto a personal computer is called _________.

[a] download

[b] electronic mail

[c] upload


7. The _________ is a collection of web pages, just like a book with multiple pages.

[a] opera

[b] browser

[c] website


8. The internet can be used as a tool to carry out transactions with banks irrespective of user’s location.

[a] True

[b] False

[c] Maybe


9. Which of the following is an example of computer virus?

[a] Trojan

[b] Spam

[c] Cyber crime


10. _________ is an example of presentation package.

[a] Microsoft word

[b] Ms power point

[c] Gallery


11. _________ allows users to create websites and blogs and customize them with their own text, photos and movies.

[a] google maps

[b] web plus

[c] Web


12. Which of following is not a features of presentation packages?

[a] effective topography

[b] creating graphics

[c] creation of slides


13. A webpage is a text file containing _________ formatting tags and links to graphic files and other web pages through a web server.

[a] website

[b] HTML

[c] microsoft frontpage


14. Which of the following is an example of graphic packages?

[a] Adobe photoshop

[b] colour pallete

[c] macromedia flash


15. The _________ is use for placing Artistic text and paragraph text.

[a] zoom tool

[b] interactive tool

[c] text tool.


16. A browser is also called _________.


17. _________ is a place where a number of personal computers

connected to the internet are made available for use by customers.


18. HTTP stands for _________.


19. The _________ allows for the quick application of a colored fill or outline color.


20. _________ is a private computer network within an organization.



Answer Four questions only.


a. Explain the meaning of the term graphics.

b. Mention 4 example of graphics package.

c. State the common features of graphics package.

d. List step to clean DVD drive lens.



a. Define the term Web Design.

b. List examples of web design packages.

c. Mention three components of web packages.


d. Explain the following:

i. Microsoft Frontpage.

ii. Adobe Dreamweaver.



a. What is file organisation?

b. Mention and explain types of file organisation.

c. What are the factors to consider when choosing a file organisation method?



a. Explain the term presentation package.

b. List examples of presentation package.

c. State and explain the main features of presentation package.

d. What is internet security?



a. Define internet.

b. List six internet browsers .

c. State three benefits and three abuses of internet.

d. Explain the following TERMS.

i. Cyber space ii. Electronic MAIL.

iii. Protocol iv. Internet service provider.






Instruction: Fill the gaps with the most suitable word from the options A – D.

1. An electronic device that can accept data,process data and give information as output is called _________.

[a] input

[b] processor

[c] output

[d] computer


2. The person regarded as the modern father of computer is _________.

[a] Blaise pascal

[b] samule morland

[c] Charles babbage

[d] Joseph jacquard


3. Which of the following is not a source of data collection?

[a] observation

[b] interview

[c] questionnaire

[d] classification


4. A field in a database table is also known as _________.

[a] index

[b] relation

[c] attribute

[d] key


5. The type of data entered into a table in database follow a set of rules known as _________.

[a] protocols

[b] regulators

[c] algorithms

[d] constraints


6. Social networking does not promote _________.

[a] personal publicity

[b] business expansion

[c] e – commerce

[d] e – payment


7. Which of the following is not a computer professional bodies in Nigeria?

[a] Nigeria computer society (NCS)

[b] Nigeria internet group ( NIG )

[c] Nigeria Labour computer ( NLC )

[d] IT industry association of Nig (ITAN)


8. A program developed to protect the computer from malicious software is referred to as _________.

[a] trojan

[b] driver

[c] anti virus

[d] spyware


9. In a relational database management system, files are organized as relations and _________.

[a] tuple

[b] modules

[c] tables

[d] protocols


10. Which of the following is an alphabetic data?

[a] Bed

[b] Ax44jj

[c] AB + CD

[d] %


11. Which of the following is not used for online shopping _________.

[a] Master card

[b] Credit card

[c] Verve card

[d] Sim card


12. In Database management system (DBMS), Linking entities is used to represent?

[a] attributes

[b] objects

[c] relationships

[d] relations


13. An operating system will perform the following except _________.

[a] files and folders management

[b] storage locations

[c] User profile creation

[d] protection from surge


14. Which of the following is not an ancient medium for transmitting information?

[a] fire lighting

[b] beating of drums

[c] telephone

[d] whistling


15. Which of the following are parts of a computer processor?

[a] CPU and main memory

[b] Control unit and ALU

[c] Operating system and application

[d] main memory and storage


16. Safety measures to be observed when using the computer include all of the following except _________.

[a] Use of antiglare protector

[b] Sitting posture

[c] maintaining a dust free environment

[d] dropping liquids in the computer room.


17. Which of the following is used to retrieve specific information from database tables?

[a] lndex

[b] query

[c] report

[d] table


18. Magazines and brochures can be produced using a _________.

[a] data processing software

[b] graphics software

[c] presentation software

[d] web authoring software


19. The following are advantages of networking except _________.

[a] spamming

[b] sharing of resources

[c] communication

[d] back up


20. Extracting information in Database Management System ( DBMS ) involves _________.

[a] sorting

[b] querying

[c] editing

[d] cross referencing


21. The following are advantages of a database management except _________.

[a] restriction of unauthorized access to data

[b] compromise of data integrity

[c] provision of multiple interfaces to different classes of users

[d] provision of backup and recovery.


22. Which of the following is not considered when classifying computers _________.

[a] size

[b] type

[c] location

[d] purpose


23. The socket into which computer peripherals are plugged is known as _________.

[a] hardware

[b] port

[c] wall socket

[d] mother board


24. Computer system is applicable in the school system for the following except _________.

[a] employment of artisans

[b] typing of question papers

[c] recording of attendance and marks

[d] preparation of scores sheet


25. ldentify an operating system from the following software

[a] writer

[b] MS one note

[c] MS Access

[d] Linux


26. While typing a series of letters were highlighted and the keyboard combination “Ctrl + B“ was executed. The highlighted letters would be _________.

[a] underlined

[b] italicized

[c] deleted

[d] bold


27. Microprocessors was used as the main electronic component of the _________.

[a] 1st generation

[b] 3rd generation

[c] 2nd generation

[d] 4th generation


28. The ICT application which helps to resolve road congestion at junctions is _________.

[a] automatic teller machine

[b] automatic traffic marshal

[c] street light

[d] traffic light


29. _________ allows users to create websites and blogs and customize them with their own text, photos and movies.

[a] google maps

[b] web plus

[c] iWeb

[d] webpage


30. Which of the following is true about digital computers?

[a] they consist of magnetic core memory

[b] they are mainly used for scientific purposes

[c] they represent numbers through a string of binary digits .

[d] they recognize data as a continuous measurement of physical quantity.


31. Companies that provide internet access are referred to as _________.

[a] fixed network operators

[b] network service providers

[c] internet service providers

[d] internet network operators


32. Which of the following is a secondary storage device?

[a] RAM

[b] bubble memory

[c] floopy disk



33. The advantages of electronic data processing including the following except _________.

[a] automatic processing

[b] hacking

[c] fast and reliable processing

[d] storage capacity


34. The exchange of information over a network follows a set of rules called _________.

[a] transmissions rules

[b] transfer rules

[c] channels

[d] protocols


35. A search engine is a _________.

[a] program that searches engines

[b] hardware component of a computer

[c] computer engine that searches a database

[d] tool that searches the web


36. The _________ is a collection of web pages, just like a book with multiple pages.

[a] opera

[b] browser

[c] website

[d] protocol


37. In graphic packages, the process of removing unwanted part of an image is known as _________.

[a] shaping

[b] resizing

[c] editing

[d] cropping


38. Routine checks operations on computers in order to ensure its continued functioning is known as computer _________.

[a] services

[b] repairs

[c] maintenance

[d] installation


39. You have opened your account on Gmail with Rocky as user name, your mail address would be _________.

[a] [email protected]

[b] [email protected]

[c] [email protected]



40. Relationships between tables in a relational model are created by _________.

[a] foreign keys

[b] determinants

[c] composite key

[d] candidate keys


41. The process in which a relation is broken into smaller relations called _________.

[a] fragmentation

[b] replication

[c] database

[d] middle ware


42. Which generation of computers made use of integrated circuits?

[a] Fourth

[b] Third

[c] Second

[d] First


43. The process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event is called _________.

[a] control access

[b] back ups

[c] security files

[c] application security


44. Computer virus cannot be transmitted by _________.

[a] downloading files

[b] E – mail attachment

[c] Pen drives

[d] typing of keyboard


45. The moral principles that regulate the use of computers , its accessories and environment are called _________.

[a] ethics

[b] conduct

[c] attiude

[d] appreciation


46. A computer professional who studies an existing system with the a view to evolving a computer – based system from it is _________.

[a] system analyst

[b] system administrator

[c] computer programmer

[d] computer engineer


47. Data processed into its useful form is referred to as _________.

[a] unique data

[b] raw data

[c] knowledge

[d] information


48. A _________ is a collection of data, usually stored disk.

[a] Entity

[b] organisation

[c] file

[d] cable


49. In word processing applications, the symbols B, I and U are commonly used button found on the _________.

[a] standard toolbar

[b] menu bar

[c] formatting toolbar

[d] drawing toolbar


50. _________ is the use of software, hardware, and procedural methods to protect applications from external threats .

[a] data security

[b] application security

[c] data management

[d] applications files



Attempt any five questions in this section. 


a. What is a Computer?

b. Define computer software and hardware; Give examples.

c. Name 8 places where computer can be used.

d. What are the benefits of a computer?



a. Differentiate Data security and database security.

b. State the importance of data security.

c. List 5 roles of a data base administrators.

d. Define Encryption.



a. Who is a computer professional?

b. List 4 computer professional and explain their duties.

c. State 4 qualities of computer professional.

d. Mention 5 professional bodies.



a. Define the following:

i. Database

ii. Database management.


b. State 5 examples of DBMS

c. List 3 uses of database management system.

d. What is microsoft access?



a. Define the term computer virus.

b. List 5 examples of computer virus.

c. State 4 sources through which a computer can be infected with a virus .

d. Mention 4 ways we can prevent computer from virus.



a. Define Networking.

b. Discuss 3 types of network .

c. What is the difference between internet and intranet?

d. List 5 resources shared on the network .



a. Explain Crash recovery.

b. Differentiate between media recovery and check pointing .

c. List steps to clean DVD drive lens .

d. State the concepts of ARIES in crash recovery.



a. Define internet.

b. List 6 internet browsers

c. State 3 benefits and three abuses of internet.


d. Explain the following terms:

i. Cyber space

ii. Electronic mail

iii. Protocol

iv. Internet service provider



Ezoicreport this ad