1. The device that converts computer output into displayed images is the ....
A. hard disk
B. monitor
C. printer
D. processor
A. hard disk
B. monitor
C. printer
D. processor
2. The least number of input devices that a computer system can have is ....
A. 1
B. 2
C. 3
D. 4
A. 1
B. 2
C. 3
D. 4
3. Which of the following devices has the largest storage capacity?
A. Compact disk
B. Floppy disk
C. Digital versatile
D. Hard disk
A. Compact disk
B. Floppy disk
C. Digital versatile
D. Hard disk
4. The device used to ensure a constant flow of power supply to a computer system is the ....
A. stabilizer.
B. step-down transformer.
C. step-up transformer.
D. UPS.
A. stabilizer.
B. step-down transformer.
C. step-up transformer.
D. UPS.
5. The total number of command buttons on the title bar of an opened word processing window is ....
A. 2
B. 3
C. 5
D. 6
A. 2
B. 3
C. 5
D. 6
6. Processed or transformed facts which are meaningful to the user is called ....
A. Data
B. information
C. input
D. output
A. Data
B. information
C. input
D. output
7. The following are possible health hazards of prolonged use of the computer system except
A. back and neck pains.
B. eye strain.
C. tuberculosis.
D. wrist pains.
A. back and neck pains.
B. eye strain.
C. tuberculosis.
D. wrist pains.
8. Which key on the keyboard is used to erase characters from right to left in word processing application?
A. Backspace.
B. Delete.
C. Insert.
D. Pause.
A. Backspace.
B. Delete.
C. Insert.
D. Pause.
9. The key on the QWERTY keyboard used to produce alphabetic upper case letter is ....
A. caps lock.
B. home.
C. num lock.
D. tab.
A. caps lock.
B. home.
C. num lock.
D. tab.
10. Given sizes and designs of letters, numbers and symbols that are displayed in a word processing document are referred to as ....
A. align.
B. bullet.
C. font.
D. indent.
A. align.
B. bullet.
C. font.
D. indent.
11. Which of the following is a tool on the drawing toolbar of a word processing program?
A. Align
B. Bold
C. View
D. Oval
A. Align
B. Bold
C. View
D. Oval
12. When an image is copied, it first goes to the
A. clip art
B. clipboard
C. my document
D. recycle bin
A. clip art
B. clipboard
C. my document
D. recycle bin
13. To press the letter J, which finger is appropriate to use on a QWERTY keyboard?
A. Left index finger
B. Left middle finger
C. Right index finger
D. Right middle finger
A. Left index finger
B. Left middle finger
C. Right index finger
D. Right middle finger
14. The internet is a
A. global network of computer.
B. government agency that links computers.
C. software for designing programs.
D. special network of computers in an office.
A. global network of computer.
B. government agency that links computers.
C. software for designing programs.
D. special network of computers in an office.
15. The computer equivalence of a sheet of paper divided into rows and columns in the office suite is called ....
A. database.
B. electronic sheet.
C. spreadsheet.
D. word processor.
A. database.
B. electronic sheet.
C. spreadsheet.
D. word processor.
16. The temporary working memory of a computer system is the ....
A. arithmetic logic unit
B. flash memory
C. random access memory
D. read only memory
A. arithmetic logic unit
B. flash memory
C. random access memory
D. read only memory
17. The software responsible for the management of the basic operations of the computer is the
A. application program.
B. device driver.
C. operating system.
D. utility program.
A. application program.
B. device driver.
C. operating system.
D. utility program.
18. On the desktop, the part which displays opened applications and other icons is referred to as ....
A. scroll bar
B. taskbar
C. title bar
D. toolbar
A. scroll bar
B. taskbar
C. title bar
D. toolbar
19. The act of pressing a computer mouse button twice quickly without moving the mouse is termed ....
A. double-clicking
B. right-clicking
C. single-clicking
D. normal clicking
A. double-clicking
B. right-clicking
C. single-clicking
D. normal clicking
20. The following are good practices in the computing environment except ....
A. copyrighting of software.
B. designing of cards.
C. networking of computer.
D. pirating of software.
A. copyrighting of software.
B. designing of cards.
C. networking of computer.
D. pirating of software.
21. Which of the following softwares can be used to enhance teaching and learning through the use of pictures, video and sound?
A. Multimedia software.
B. Network software.
C. Programming software.
D. Utility software.
A. Multimedia software.
B. Network software.
C. Programming software.
D. Utility software.
22. The total number of keys on a standard QWERTY keyboard is
A. 96
B. 104
C. 108
D. 116
A. 96
B. 104
C. 108
D. 116
23. Which of the following is a valid folder name?
A. Black/stars
B. Black stars
C. Black: stars
D. Black*
A. Black/stars
B. Black stars
C. Black: stars
D. Black*
24. A program on the computer which enables users to type letters to friends is the ....
A. browser
B. spreadsheet
C. utility
D. word processing
A. browser
B. spreadsheet
C. utility
D. word processing
25. The command that enables the user to save a previously saved document under a new name is ....
A. new
B. save
C. rename
D. save as
A. new
B. save
C. rename
D. save as
26. The standard toolbar contains buttons that
A. close and resize windows.
B. control page margins and tabs.
C. perform the most tasks.
D. help users to navigate through the document.
A. close and resize windows.
B. control page margins and tabs.
C. perform the most tasks.
D. help users to navigate through the document.
27. To see-exactly how the pages of a current document will appear when printed, the command given is the ....
A. page setup command
B. print command
C. print preview command
D. view command
A. page setup command
B. print command
C. print preview command
D. view command
28. A tool for locating information on the internet is the ....
A. database engine.
B. internet browser.
C. search engine.
D. web browser.
A. database engine.
B. internet browser.
C. search engine.
D. web browser.
29. An entity in a file system which contains a group of files is called a ....
A. cabinet.
B. container.
C. document.
D. folder.
A. cabinet.
B. container.
C. document.
D. folder.
30. The creation of a copy of data on a computer system for safe keeping externally is referred to as ....
A. data backup.
B. data entry.
C. data filtering.
D. data restoration.
A. data backup.
B. data entry.
C. data filtering.
D. data restoration.
31. The letter that normally represents the floppy disk in an operating system is
A. A
B. C
C. D
D. E
A. A
B. C
C. D
D. E
32. Recycle bin or trash bin contains deleted files and folders from the ....
A. floppy disc.
B. flash disk.
C. hard disk.
D. zip.
A. floppy disc.
B. flash disk.
C. hard disk.
D. zip.
33. Keys on a computer keyboard which are used to move the cursor in a specified direction are called ....
A. arrow keys.
B. function keys.
C. shift keys.
D. special purpose keys.
A. arrow keys.
B. function keys.
C. shift keys.
D. special purpose keys.
34. To underline a selected text in a word processing program, the keys used are
A. Ctrl + U.
B. Shift + U.
C. Alt + U.
D. Del + U.
A. Ctrl + U.
B. Shift + U.
C. Alt + U.
D. Del + U.
35. Double-clicking on a word in a word processing program selects the ....
A. document.
B. paragraph.
C. sentence.
D. word.
A. document.
B. paragraph.
C. sentence.
D. word.
36. All to the following are reasons for using ICT in education except ....
A. Forcing students to learn at others’ pace.
B. increasing learner motivation and engagement.
C. facilitating the acquisition of basic skills in subject areas.
D. enhancing teaching through the use of presentation software.
A. Forcing students to learn at others’ pace.
B. increasing learner motivation and engagement.
C. facilitating the acquisition of basic skills in subject areas.
D. enhancing teaching through the use of presentation software.
37. In word processing program, lines, block, arrows and flow charts are found on which of the following toolbars?
A. Drawing
B. Formatting
C. Picture
D. Standard
A. Drawing
B. Formatting
C. Picture
D. Standard
38. Which program icon on the desktop leads to the disk drives?
A. Internet explorer.
B. My computer.
C. My Document.
D. My network places.
A. Internet explorer.
B. My computer.
C. My Document.
D. My network places.
39. Which of the following terms refers to unsolicited e-mails in the form of advertising or chain letters?
A. Compose
B. Inbox
C. Spam
D. Trash
A. Compose
B. Inbox
C. Spam
D. Trash
40. Computer virus is capable of ....
A. Enhancing the content of a file.
B. maintaining the computer system.
C. making the work of the computer easy.
D. slowing down the computer system performance.
A. Enhancing the content of a file.
B. maintaining the computer system.
C. making the work of the computer easy.
D. slowing down the computer system performance.
0 Comments