schoolportalng logo

BECE COMPUTER STUDIES PAST QUESTIONS (JSS)

6,432 Views
0%
1002

BECE/JSCE (COMPUTER STUDIES)

BECE COMPUTER STUDIES PAST QUESTIONS (JSS) 1

BECE COMPUTER STUDIES PAST QUESTIONS

These are Computer Studies Past Questions. 40 questions will be picked at random from the question bank.

You have 30 minutes to answer all the questions.

You can use the NEXT button to move to the next question, use the PREV button to move to the previous question, the CLEAR button to clear any answer of your choice and you have the FINISH button to end the exam if you choose to.

Any question not answered before the end of the exam time, will be marked as wrong and the exam will end by itself. so try to attempt all questions on time.

Goodluck!

School Portal Nigeria

1 / 40

A diagrammatic representation of the logical steps in programming is ____________

2 / 40

A computer language is usually written by ___________

3 / 40

The computer game with academic challenges are referred to as ___________

4 / 40

Which of the following is NOT a computer professional?

5 / 40

How many tims are number keys repeated on a standard keyboard?

6 / 40

Anti-virus is an example of a/an

7 / 40

Which part of the CPU fetches instruction from main memory decodes it and executes it?

8 / 40

When a person dupes other persons, the crimes committed is known as __________

9 / 40

The most important software on the computer system is ___________

10 / 40

Raw facts and figures about any particular topic are known as ___________

11 / 40

A set of moral principles that regulates the use of computer is called ____________

12 / 40

Which of the following is not for online shopping?

13 / 40

The process of arranging data in a particular order is called

14 / 40

A byte is a collection of _________

15 / 40

A software useful for creating simple or complex drawing is _________

16 / 40

Sentence correction in passages is done by Microsoft Word through

17 / 40

On a spreadsheet, the active cell is indicated by a ____________

18 / 40

Trojan horse and spyware are examples of

19 / 40

In graphic, we adjust the shape of line ends to give them better appearance by using ________

20 / 40

In a graphical package, cropping an image implies

21 / 40

One of the following will select the entire cells in a spreadsheet

22 / 40

______________ is a language with which a programmer writes instruction for the computer

23 / 40

BASIC programming language was developed in _________

24 / 40

The full meaning of FORTRAN is ______

25 / 40

Which of the following is not a type of ROM?

26 / 40

A kind of mouse that uses a light beam to detect movement across the table is _____________

27 / 40

Which device is used as a standard party device in a graphical user environment?

28 / 40

___________ is a logic gate that gives an output of logic 1 only when all of its inputs are 1.

29 / 40

A nibble is made up of _________ bytes

30 / 40

Third generation computer uses _________

31 / 40

The following are methods of transmitting information over a long distance in olden days EXCEPT _________

32 / 40

What does it mean to double click the mouse?

33 / 40

Microsoft word is an example of __________

34 / 40

Publications such as newspaper, magazines, wood look, lithographic plate – publications

35 / 40

Device through which information is accepted into the computer system are called ________

36 / 40

Electronic mail is the sending of letters through ____________

37 / 40

The full meaning of COBOL is __________

38 / 40

Safari is a ________ application

39 / 40

The ability of the computer that makes it useful in all field ix referred to as ___________

40 / 40

Which of the following result describe an OR gate in logic circuit?

Your score is

0%

Please submit your rating and feedback. Thank you

Leave a Reply

Your email address will not be published. Required fields are marked *