This is my first term examination for JSS3. It comprises of two parts, each part having 60 obj questions. This is intended to prepare them extensively for their upcoming BECE Examination. Which comprises of the things they have learnt from JS1 to JS3
This is my first term examination for SS3 D.P. It is well detailed as it covers every part of the scheme. It contains three parts namely; Objective, Theory, Test of Practical a normal standard WAEC Examination.
This is my first term examination for JSS3. It comprises of two parts, each part having 60 obj questions. This is intended to prepare them extensively for their upcoming BECE Examination. Which comprises of the things they have learnt from JS1 to JS3
This is my first term examination for SS3 D.P. It is well detailed as it covers every part of the scheme. It contains three parts namely; Objective, Theory, Test of Practical a normal standard WAEC Examination.
This is the second Continuous Assessment Test for J1 first term. It arranged in a format to make it easy for students to use. four student to one print out then you can cut it off. The measurements are accurate if you want to use exactly my questions to set for your students.
The objective of this presentation is to enable primary users to maintain software and hardware parts of a computer. Further guides can be found from my face book page www.facebook.com/fita.ayalew or through my email address www.mengistuayalew@yahoo.com or by following on twitter @fita2004.
Here it is some of brief history of operating system and also it shows how there came revolution in the industry of technology regarding operating system
This is my first term Examination questions for Junior Secondary School One popularly known as JSS1. Each questions are detailed as it covers the whole scheme for the first term.
This is the second Continuous Assessment Test for J1 first term. It arranged in a format to make it easy for students to use. four student to one print out then you can cut it off. The measurements are accurate if you want to use exactly my questions to set for your students.
The objective of this presentation is to enable primary users to maintain software and hardware parts of a computer. Further guides can be found from my face book page www.facebook.com/fita.ayalew or through my email address www.mengistuayalew@yahoo.com or by following on twitter @fita2004.
Here it is some of brief history of operating system and also it shows how there came revolution in the industry of technology regarding operating system
This is my first term Examination questions for Junior Secondary School One popularly known as JSS1. Each questions are detailed as it covers the whole scheme for the first term.
Quiz of computer and operating system.. this test experiences the student ability to solve the questions efficiently in terms of software engineering and advanced topics like operating system, introduction to computer system, computer networks , computer organization and architecture
This questions are to prepare them for computer Studies BECE for both Neco and Junior Waec. The more you prepare with these questions the more they get ready for the actual Examination.
Engineering and non-engineering trades, Employability skill MCQ questions for...Thesuccesspath
Online Learning APP & WEB Portal
Visit website- www.thesuccesspath.in
subscribe Youtube channel-
https://www.youtube.com/channel/UCXvEd-dp2rh1un83wCfYJpA
Google Play store- https://play.google.com/store/apps/details?id=com.gravitinfosystem.successpathapp
Employability Skills can be defined as the transferable skills needed by an individual to make them ‘employable’. Along with
good technical understanding and subject knowledge, employers often outline a set of skills that they want from an employee.
These skills are what they believe will equip the employee to carry out their role to the best of their ability.
Employability depends on your knowledge, skills, and attitudes, how you use those assets, and how you present them to employers.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
1. If you want to know more about
technology just come to worlds
technology arena on youtube (
https://youtube.com/@worldstechnology
arena178 on this link
STUDENT NAME:
COURSE:
COURSE CODE
YEAR OF STUDY:
SEMISTER:
INFORMATION TECHNOLOGY
CIT 101
1
1
AKATWIJUKA OSCAR
2. SECTION A
1. The term 1Gigabyte refers to.
A. 1024 Patabytes
B. 1024 Megabytes
C. 1024 Kilobytes
D. None of the above
2. In computer terminology which of the following best describes a Device Driver?
A. Software that allows the user to control the operating system.
B. Hardware that allows interaction between peripheral devices and Operating system.
C. Hardware that allows the user to control an operating system.
D. Software that allows interaction between peripheral Devices and Operating System.
3. The following option consists of only computer input devices.
A. Keyboard, mouse, Joystick, printer
B. Mouse, Monitor, Joystick, Keyboard
C. Joystick, Keyboard, Digitizer, Monitor
D. Joystick, Keyboard, Mouse, Digitizer
4. “A computer is free from monotony, tiredness, and lack of concentration” which of the following
relates to the above statement.
A. Accuracy
B. Diligence
C. Reliability
D. Versatility
5. The following computers were invented in First Generation except.
E. UNIVAC,
F. IBM-701
G. TDC-316
H. IBM-650
6. Non Volatile Memory is referred to as .
B
D
D
B
G
C
3. A. RAM
B. Cache Memory
C. ROM
D. Video Memory
7. The following are characteristics of impact printers except.
A. They are noisy
B. There is physical contact with the paper to produce an image
C. Useful for bulk printing due to low cost
D. These printers print a complete page at a time
8. A part of the computer that reads information from a disk is called ___________.
A. Operating System
B. Motherboard
C.Hard Drive
D. Disk Drive
9. The main characteristic of fourth generation was.
A. VLSI
B. Transistor
C. Vacuum tubes
D. Integrated circuit
10.Ctrl + Shift + Esc are keyboard shortcut keys used to.
A. Restart the computer
B. Ctrl + Shift + Esc
C. Open Task Manager.
D. Switch keyboard layout.
11.The following type of memory module has 30 pins on the bottom of circuit board.
A. SIMM
B. DIMM
C. SIPP
D. DIP
12.South Bridge on Motherboard inter connects the following motherboard components (select all).
A. RAM
B. ROM
C. PCI Buss
C
C
A
C
A
C
4. D. AGP
13.Which of the following is referred to as a web protocol?
A. FTP
B. HTTP
C. IP
D. TCP
14.Convert 1011101two to Decimal.
A. 64ten
B. 80ten
C. 88ten
D. 93ten
15.A time-sharing operating system is also known as.
A. Batch processing OS
B. Distributed OS
C. Multitasking OS
D. Real-OS
16.Which of the following device cannot be shared in Network?
A. Printer
B. Hard Disk
C. CD drive
D. Mouse
17. Which one of the following is not a computer language?
A. BASIC
B. C
C. Fast
D. FORTRAN
18.The spine of a computer is called.
A. RAM
B. BIOS
C. Motherboard
C
D
C
D
C
B
5. D. CPU
19.Which of the following statements are true about computer virus (select all that apply).
A. Viruses have the ability to replicate themselves and infect computers
B. Strange graphics are displayed on your computer monitor when viruses are present
C. Putting a password on a computer prevents viruses from entering the system
D. A Macros is a type of virus commonly found Microsoft programs
20.The following are optical storage Devices Except.
A. Flash Disk
B. Compact Disk
C. Digital versatile disk
D. Blue Ray
21. Convert 223ten to Octal Base.
A. 330eight
B. 230eight
C. 230eight
D. 337eight
22. Chose the odd man out.
A. Firefox
B. Internet explore
C. Safari
D. Google
23. Traffic-control computer is an example of.
A. General purpose computer
B. Analog Computer
C. Special purpose computer
D. Hybrid computer
24. Which of these is a free operating system?
A. Windows 7
B. Windows XP
C. Mac OSX
A,B,D
A
D
D
A
D
6. D. Ubuntu
25. Data processing cycle takes on the following steps.
A. Input, processing, storage, output
B. Input, storage, processing, output
C. Input, output, processing, storage
D. Input, processing, output, storage
26. When you see no icons on the desktop, how can you open programs such as Microsoft
Word?.
A. Right-click to reveal all icons.
B. Restart the computer.
C. It is not possible to open the program if no icons are on the desktop.
D. Click the start button and select program from the menu.
27. Which of the following is an example of an e-mail address?
A. Www.google.com
B. Jeandoe.gmail.com
C. Bob Smith@gmail.com
D. Johndoe@cincinnatilibrary.org
28. "Desktop" is a computer term that refers to?
A. Something that is for the computer programmer only.
B. The part of your work area where the computer monitor sits.
C. The initial screen showing icons for folders, applications and files.
D. D.The desk that your computer is stationed on.
29. A Program which detects all necessary computer components during boot sequence is.
A. Bootstrap
B. POST
C. Loader
D. BIOS
30. Which key on the keyboard is used to capitalize letters?
A. Windows
B. Ctrl
C. Shift
A
D
D
C
D
C
7. D. Tab
31.Which of the following is not a pointing device?
A. Keyboard
B. Mouse
C. Joystick
D. Light pen
32.The background of the desktop is called...
A. Background
B. Screen saver
C. Wallpaper
D. None of these
33.Which of the following interfaces will you encounter when installing Networks?
A. NIC
B. AGP
C. PCI
D. SCSI
34.Speed of the processor is measured in .
A. Mbps
B. Hertz
C. MHz
D. Bytes
35.Operations in CPU Like Greater than, Less than, Not, less or Equal happens in
A. Memory Unit
B. Arithmetic Unit
C. Logic Unit
D. Control Unit
36.The Second ERA of computers is concerned with
Phones
A
C
B
B
C
8. 37.The type of backup that only copies data that has been changed or created since the.
previous back up is called.
A. Full backup
B. Deferential backup
C. Incremental backup
D. Total backup
38.A Network of Networks is reffered to as.
A. Intranet
B. WWW
C. Internet
D. Extranet
39.Write the word COMPUTER in Full.
40.The Father of all computers is.
A. John Von Nueman
B. Charles Babbage
C. John Barden
D. Jack Kilby
Common Operating Machine Particularly Used for Technical Education and Research
C
C
B
9. SECTION B: 30 Marks
Attempt All Questions
Write answers in spaces provided
1a. Study the table below and State whether Volatile or Non Volatile. (05 Marks)
Memory Volatile Non-Volatile
RAM ✓
CMOS ✓
ROM ✓
Punched Card ✓
Magnetic Tape ✓
1b. Identify five examples of adapter cards found in a system unit. (05 marks)
2(a).Give Examples of software under the following categories. (06 Marks)
i. System Utility
Examples
ii. Operating System
Examples
iii. Programming Languages
Examples
1.delete utility
2 diagnostic utility
1.linux
2. mac OS
1. FORTRAN
2. BASIC
1) Video cards
2) Multimedia cards
3) I/O cards
4) Communication cards
5) Network cards
10. 2(b) List two advantages of Smartphone over a Laptop. (2Marks)
2(C) List 2 major Components of a computer System. (2Marks)
3(a) Write true or false against each statement from a to e in the table below (05 Marks)
NO STATEMET TRUE / FALSE
a) Image Viewer Utility Displays Contents of graphics when you
double click on it
True
b) Uninstaller Removes a word document file from False
c) Disk defragmenter compiles technical information about
hardware or software
False
d) Disk Scanner detects and corrects problems on the hard disk true
e) Antivirus utilities protect the physical access to the computer False
3(b) (a) Give the file extension, of any two of the following file types. (02 marks)
File type File extension
Executable file
Motion pictures
Ms Excel
(b) Give two examples of file attributes. (02 marks)
(c) State one function of a file in a computer system (01 mark)
1. It is a convenient way to keep others informed,
2 it is potable
.exe
.amv
.xls
1. Read only
2. Archive
To store organized data
1. software
2. hard ware
11. Section C: 30 marks
➢ Attempt any one question
➢ Use ms word to present your answers but for the case of QN3 you can answer
using your ball point and scan the answer sheet or u can use ms-word file
Qn1 (a)
With the help of pictures describe step by step how to perform a full backup of the computer.
Qn1 (b)
With the help of pictures describe step by step how to perform backup restore of the
computer.
Qn2
i. Differentiate between a virus and an anti-virus.
ii. Briefly explain six types of viruses.
iii. Explain six ways how viruses can be spread.
iv. List 5 antivirus software’s you know.
Qn3
A. Convert the following numbers to base ten.
i) 101112 ii) 101112 iii) 1000002
B. Convert the following numbers to base two.
i) 24510 ii) 11210 iii) 10210
2. Convert the following numbers to Decimal base.
i) 2348 ii) 1348 iii) 11128
C. Convert the following numbers to Hexadecimal.
i) 11111112 ii) 101111112 iii) 11100100002
D. Convert the following numbers to Binary Base.
12. i) A1816 ii) ABD16 iii) 891016
answers
qn 2
I. a virus is a malicious software that’s causes unusual effects on a
computer while antivirus is a kind of software used to prevent, scan, detect
and delete viruses from a computer
II. The following are some of the types of computer viruses
File-infecting Virus
A virus that attached itself to an executable program. It is also called a parasitic virus which
typically infects files with .exe or .com extensions. Some file infectors can overwrite host
files and others can damage your hard drive’s formatting.
Macro Virus
This type of virus is commonly found in programs such as Microsoft Word or Excel. These
viruses are usually stored as part of a document and can spread when the files are
transmitted to other computers, often through email attachments.
Browser Hijacker
This virus targets and alters your browser setting. It is often called a browser redirect virus
because it redirects your browser to other malicious websites that you don’t have any
intention of visiting. This virus can pose other threats such as changing the default home
page of your browser.
Web Scripting Virus
A very sneaky virus that targets popular websites. What this virus does is overwrite code
on a website and insert links that can install malicious software on your device. Web
scripting viruses can steal your cookies and use the information to post on your behalf on
the infected website.
Boot Sector Virus
These viruses are once common back when computers are booted from floppy disks.
Today, these viruses are found distributed in forms of physical media such as external
hard drives or USB. If the computer is infected with a boot sector virus, it automatically
loads into the memory enabling control of your computer.
Polymorphic Virus
This virus has the capability to evade anti-virus programs since it can change codes every
time an infected file is performed.
13. .
III
The following are some of the ways how computer viruses are
spread
-Downloads Free Software
When you are downloading a free software from internet and if the software or files are
infected with a virus then there has a chance that your computer also becomes infected
with the virus
-Download Suspicious E-mail Attachments
If you receive a suspicious email with an attachment file from unknown source, the
attachment file may contain virus or malicious script. In that case, if you download and
open the attachment file then virus will execute and infect to your computer.
-Click on Phishing Emails
Sometimes you will receive promotional emails (Phishing Email) in your inbox from
unknown source. These mails may include attachments or URL that contain viruses or
malicious files. If you click on that URL or opening the email attachment, then your
computer will be infected with the virus or malware to access your computer system.
-Use External Devices
A virus can enter your computer system by inserting external devices such as USB
devices, Mobile, external hard disk. For example, when you connected your mobile
devices to your computer and if the mobile has a virus then your computer could infect with
malware or virus.
-Click on Online Advertisements
If you click on Ads, then it can infect your computer by virus because the Ads may contain
malicious code. Cyber attackers insert malicious codes into ads and place the ads on
trusted websites in order to gain reputation.
-Click on Malicious File
Malicious software is dangerous to your computer. If you click on malicious executable file,
then the malware will spread on your computer. The most common form of malicious
software is viruses, worms, trojan horses, spyware, adware or rootkits.
IV The following are some the computer antivirus software
✓ Kaspersky
✓ Panda