# Lesson Notes By Weeks and Term - Senior Secondary School 2

REVIEW OF SECOND TERM

SUBJECT: I.C.T

CLASS:  SS 2

DATE:

TERM: 3rd TERM

WEEK 1

TOPIC: REVIEW OF SECOND TERM

USING EVALUATION QUESTIONS OF 2nd TERM

OBJECTIVE

1.      ……………… converts your program into a form that can be executed directly by the computer (a) Software        (b) Interpreter        (c) Hardware
1. _________ is the step by step procedure of solving a particular problem. (a) Problem     b. sequence    c. algorithm     d. symbol
1. _________ is the diagrammatic representation of a step by step procedure of solving a particular problem. (a) Algorithm    b. Program    c. Flowchart     d. sequential solution
1. The following are characteristic of a flowchart EXCEPT one (a) Flowcharts are read and drawn from bottom to top    b. Flowcharts end symbol signifies the end of a program    c. Flow line are used to connect the flowchart symbols          (D) Different flowchart symbols are used for different operation.
1.  The flowchart symbol represents _____________ (a) Pre-define    b. Decision    c. Input        d. Processing
1. The following are characteristic of an algorithm EXCEPT one
2. They are written in sequence b. An algorithm should be effective c. It must be ambiguous and inconsistent        d. They are written in English like statement
3. The actual writing or coding of program in a particular programming language is known as_________ (a) Debugging     b. Program Coding    c. Program Executing        d. Program Decoding
4. The following are characteristics of a good program EXCEPT one. (a) Accuracy    b. Clarity    c. Compatible        d. Readability
5. The following are characteristic of an interpreter EXCEPT one (a) Execution is fast b. The resulting code is some sort of intermediate code c. The resulting code is interpreted by another program     d. relatively little time is spent analyzing and processing the program
6. .............. is a list of instruction issued to the computer to perform a particular task. (a) Algorithm    b. Computer program    c. Hardware    d. Peripherals
7. One of the following is NOT a precaution be taken when writing a program. (a) No step should be skipped    b. The order of execution must be followed sequentially    c. Do not rush        d. The use of a step by step approach should not be followed
8. One of the following is NOT an objective of SDLC
• To minimize the productivity of the system staff
• To ensure that high quality system is delivered
• To maximize the productivity of the system staff
• To provide strong control over the system development

14. __________is the person that uses analysis and design techniques to solve business problem using Information technology (a) Programmer    b. Data Entry Staff    c. System Analyst    d. Computer Engineer

15. The following are skills of a system Analyst EXCEPT one

• Information Technology knowledge and programming expertise
• Solving the problem using figures
• People Management knowledge and skill

15. __________is the process of understanding in details what a system should accomplish it and what

is required to accomplish it. (a) System Design    b. System Analyst    c. System Analysis    d. SDLC

16. The following are advantages of System Development Life Cycle EXCEPT one

• Help in inefficient allocation of resources to systems development project
• Promotes consistency among systems development project
• Simple and easy  to use
• Easy to manage due to the rigidity of the model

17. _______ is a collection of interrelated components that function together to form a whole and  achieve an outcome.  (a) Subsystem    b. System    c. Life cycle    d. Development

18. The following are the Water fall Development cycle stage EXCEPT______ (a) Investigation Stage    b. System analysis Stage    c. System manufacturing Stage (d) System design Stage

19. The oldest and classical method of SDLC is called_________     a. Waterfall Mean    (b) Waterfall Model c. Waterfall Median d. Waterfall Model

20. One of the following is NOT an information system component part.  a. People    (b) Communication Network c. IT room d. Data/ Information

21. One of the following is NOT an input Device. (a) Digital Camera     b. Monitor    c. Mouse    d. Keyboard

22. The following are examples of a word processor EXCEPT one.  (a) Corel Draw b. Microsoft Word c. Word Perfect    d. Perfect Writer

1. _______ is the use of computer software to create, edit, view, store, retrieve and print text document. (a) Word Processor    b.  Word Communication     c. Word Processing    d. Word Application
2. The following are types of display effect of a Font Style EXCEPT one (a) Italics        b. Underline        c. Times New Roman        d. Bold
3. ________feature create a text with spacing before and after. (a) Indent and Spacing    b. Superscript        c. Change Case        d. Double strikethrough
4. The following are examples of Indent and spacing EXCEPT one (a) Alignment    b. Indentation    c. Tabs        d. Ribbon
1. ________ refers to the unforeseen loss of data or information. (a) Backup    b. Data loss    c. Overwriting    d. Antivirus
1. _______ is the process of making copies of files, so that the additional copies may be used to restore the original after data loss event. (a) Manipulating b. Data Loss Event    c. Backup    d. Duplication
1. An occurrence of data loss can be called ________________ (a) Data Loss Event        b. Data Loss Occurrence        c. Data Loss Show   d. Data Loss occasion
1. The following are limitations of computerized file system EXCEPT one.  (a) Vulnerable to virus attacks    b.  Incompatible data file    c.  Cheap to set it up    d. Data are often duplicated
1. The following are advantages of computer files over manual files EXCEPT one (a) Slow and inefficient in processing of information b.  Accurate information and faster                                 decision making   c. Takes less space d. More timely information can be produced

1.      One of the following are NOT a computer file classification (a) Reference file    b. Random file     c. Master file        d. Transaction file
2. __________ is a collection of related fields (a) Data    b. Field    c. Record    d. file
3. The smallest unit of information stored in computer file is called ________ (a) Files    b. Data item    c. Record    d. Indexed
4. The following are types of file organization method EXCEPT _________ (a) Serial    b. Sequential    c. Transaction    d. Indexed
5. A file with reasonable amount of permanency is known as__________ file. (a) Reference files    b. Master file    c. Transaction file    d. serial file
6. A collection of wires through which data is transmitted from one part of a computer to another is known as     (a) Address        B. Bus        C. Register
7. Computer data processing is grouped into the following EXCEPT one. (a) Conversion    B.  Manipulation     C. Register
8. The following are types of register EXCEPT ___________ (a) CMR    B.  CIR    C.  MDR
9.  ___________ register acts like a buffer and holds data that is transferred from the memory to the processor. (a) MDR    B. CIR         C.  CP

THEORY

(Answer 1 & 2 and any other 2 questions)

1a.     Define the following;                                 1mark each

1. Register
2. Bus

1b.     Define the following terms;                             1mark each

1. Computer files
2. Record
3. Field
4. Data Item

1c.      Define the following;                                 2marks each

1. System Development Life Cycle
2. System Analysis
3. System Design
4. System Analyst

2a.      Explain the following;                                 1mark each

1.  System
2.  Information System
3.  Subsystem

2b.      Define the following;

1. Program
2. Algorithm
3. Flowchart

2c    I. Construct a Truth Table of two (2) variable, using XOR logic gate.            2marks

1. Draw and complete the XOR comparator shown above, stating its output.         4marks

3a.    List and explain types of register                            5marks

1. State five limitation of computerize file system                     3marks
2. Draw a flow chart to calculate the area of a triangle with base, b and height, h.     4marks
3. State THREE (3) the objectives of SDLC                        3marks

4a     Draw a sample of file structure                                3marks

1. List and explain the three methods for files security                 3marks
2. State the criteria for classifying computer files.                     3marks
3. Write an algorithm that will compute the average of three numbers a, b, c.     3marks

1. List and explain FOUR (4) characteristic of a program                 5marks
2. List FIVE (5) stages in the Waterfall System Development cycle.             3marks
3. State three advantages of computer files over manual files.             4marks
4. State three characteristics of an algorithm.                     3marks

1. Explain five (5) systems Analyst problem solving Approach             4marks.
2. Write a BASIC program to calculate the Area of a Triangle             3marks
3. List FIVE (5) steps involved in program development                 4marks
4. List FIVE (5) disadvantages of System Development Life Cycle