0% found this document useful (0 votes)
13 views9 pages

Ss3 Computer Ex

The document consists of a series of multiple-choice questions related to web development, networking, and database management. It covers topics such as the types of network cables, network topologies, programming languages, and security breaches. Each question includes options with the correct answers provided.

Uploaded by

jimshegzy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views9 pages

Ss3 Computer Ex

The document consists of a series of multiple-choice questions related to web development, networking, and database management. It covers topics such as the types of network cables, network topologies, programming languages, and security breaches. Each question includes options with the correct answers provided.

Uploaded by

jimshegzy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

The introductory page of a website is called

A. Website

B. Web browser

C. HTML

D. Home page Click here to show answer

12. The language a web browser can interpret is

A. JAVA

B. HTML

C. Dream Weaver

D. C++ Click here to show answer

B. HTML

13. One of these is a website development tool

A. VS Code

B. MS Word

C. CorelDraw

D. Oracle Click here to show answer

A. VS Code

14. Which of these network cables transmits light rather than electric signals

A. Coaxial cable

B. STP Cable

C. UTP Cable

D. Fiber Optics Cable Click here to show answer

D. Fiber Optics Cable

15. All of these are network cables except


A. Telephone wire

B. Shielded Twisted Pair

C. RJ 45

D. Coaxial Cable

Which of these is not a type of network topology

A. Bus topology

B. High-breed topology

C. Mesh topology

D. Star topology Click here to show answer

2. The main computer in a network that acts as the host and provides data and software to other
terminals linked to it is called

A. Server

B. Client

C. Workstation

D. Network Interface Unit Click here to show answer

A. Server

3. A computer network usually spanning a large campus is called

A. PAN

B. LAN

C. MAN

D. WAN Click here to show answer

4. As a network administrator, you were contacted to install a network at Command Secondary School.
Which type of network would you recommend and install?
A. LAN

B. PAN

C. MAN

D. SAN Click here to show answer

A. LAN

5. One of these network topologies uses "Token" technology

A. Ring topology

B. Mesh topology

C. Bus topology

D. Tree topology Click here to show answer

A. Ring topology

6. Which of these network topologies has no traffic congestion

A. Star

B. Linear bus

C. Ring

D. Mesh Click here to show answer

D. Mesh

7. A circuit board installed in a computer so that the computer can connect to a network is called

A. Modem

B. Hub

C. Network Interface Card

D. Router Click here to show answer

C. Network Interface Card

8. WWW was invented in 1989 by

A. Bill Gate
B. Steve Jobs

C. Timothy Berners-Lee

D. Elon Musk Click here to show answer

9. A software for traversing information on the World Wide Web is called

A. VS Code

B. Web Browser

C. Website

D. Notepad Click here to show answer

B. Web Browser

10. The acronym SMTP stands for

A. Small medium Text Protocol

B. Simple Mail Transfer Protocol

C. Sample Main Transfer Protocol

D. Small Mail Transfer Protocol Click here to show answer

11. The introductory page of a website is called

A. Website

B. Web browser

C. HTML

D. Home page Click here to show answer

12. The language a web browser can interpret is


A. JAVA

B. HTML

C. Dream Weaver

D. C++ Click here to show answer

B. HTML

13. One of these is a website development tool

A. VS Code

B. MS Word

C. CorelDraw

D. Oracle Click here to show answer

A. VS Code

14. Which of these network cables transmits light rather than electric signals

A. Coaxial cable

B. STP Cable

C. UTP Cable

D. Fiber Optics Cable Click here to show answer

D. Fiber Optics Cable

15. All of these are network cables except

A. Telephone wire

B. Shielded Twisted Pair

C. RJ 45

D. Coaxial Cable Click here to show answer

C. RJ 45
18. The computer cable that links the system unit to the monitor is called

A. VDU

B. VGA

C. USB

D. Power cable Click here to show answer

19. All of these are DBMS packages except

A. MS Oracle

B. SQL Server

C.Paradox

D. Rbase Click here to show answer

20. A database key that can be used to create relationships between tables is called

A. Primary key

B. Secondary Key

C. Foreign Key

D. Master Key Click here to show answer

21. A request for a particular collection of data in a database is called

A. File

B. Form

C. Report

D. Query Click here to show answer


22. Which of these fields can serve as a primary key in a relational database

A. ID card number

B. Surname

C. First name

D. Religion Click here to show answer

23. Which of these forms of database model permits multiple member records to be linked to multiple
parents and vice versa

A. Flat file

B. Relational Model

C. Network model

D. Hierarchical model Click here to show answer

37. Convert 11111110111011012 to hex

A. DEEFhex

B. EEEFhex

C. FEEDhex

D. EDEFhex Click here to show answer

39. Which of these is not a programming language

A. Visual BASIC
B. JAVA

C. HTML

D. C++ Click here to show answer

40. High-level languages that can be read and executed directly are called

A. Interpreted languages

B. Compiled languages

C. Assembly Language

D. Machine languages Click here to show answer

41. The acronym COBOL stands for

A. Common Oriented Business Object Language

B. Common Business-Oriented Language

C. Common Object Language Oriented Language

D. Compiled Oriented Business Language Click here to show answer

42. The advantages of High-Level Language do not include the following

A. Machine dependent

B. User friendly

C. Easier to maintain

D. Easier to write Click here to show answer

47. One of these is not a source of security breaches


A. Care in giving out personal and vital information

B. Hackers, spammers and scammers

C. Poor network implementation

D. Lack of ICT policies Click here to show answer

48. ....... are unsolicited and unwanted junk messages sent out in bulk to an indiscriminate recipient list

A. Spams

B. Phishing

C. Scammer

D. Hackers Click here to show answer

49. Illegal copying and distribution or use of software is known as

A. Plagiarism

B. Piracy

C. Spamming

D. Hacking Click here to show answer

You might also like