You’re welcome to our school exams series where we provide you with termly examination questions in different subjects. In today’s post, we will focus on Computer Studies exam questions. We will cover Computer Studies exam questions for SS2 second term with answers. This means that we’ll be providing you with answers to the questions at the end. Also, you will get a few success tips on how to pass Computer Studies examinations with flying colors. Remember to use the comments sections if you have questions, and don’t forget to join our Free Online Tutorial Classes on Facebook. (Like and Follow Page)
Table of Contents
Introduction to Computer Studies as a School Subject
Computer Studies is a subject that introduces students to the basic concepts, components, and applications of computers. It covers topics like computer hardware, software, data processing, and the use of the internet. The subject helps students develop essential skills in typing, word processing, spreadsheets, and basic programming.
By studying Computer Studies, students learn how computers work and how to use them effectively for learning, communication, and problem-solving. The subject also teaches proper computer ethics, safety precautions in computer labs, and how technology can be used responsibly.
Computer Studies prepares students for the modern world, where technology plays a major role in education, business, and everyday life.
The subject is offered by students in Primary school and Junior Secondary School under Basic Science and Technology.
Computer Studies Exam Questions for SS2 Second Term
Computer Studies Exam Questions for SS2 Second Term are divided into three sections:
- Section A
- Section B
The first section, namely, Section A is the objective test, and students are expected to attempt all questions in the section. Section B is the theory part and students are expected to answer four (4) out of six (6) questions.
Note that what you have below are SS2 Computer Studies Second Term Exam Past Questions made freely available to assist students in their revision for 2nd term examinations and also teachers in structuring standard examinations.
SECTION A: Objectives
Instruction: Answer all questions in this section by choosing from the options lettered A—D. Each question carries equal marks.
1. The space factor when determining the efficiency of an algorithm is measured by?
A. Counting the maximum memory needed by the algorithm
B. Counting the minimum memory needed by the algorithm
C. Counting the average memory needed by the algorithm
D. Counting the max disk space needed by the algorithm
2. Which of the following storage devices can store the maximum amount of data?
A. Floppy Disk
B. Hard Disk
C. Compact Disk
D. Magnetic Optic Disk
3. ___________is the process of understanding in details what a system should accomplish it and what is required to accomplish it.
A. System Design
B. System Analyst
C. System Analysis
D. SDLC
4. Algorithms are written in English and some few ________ notations.
A. Chemical B. Yoruba
C. French D. Mathematical
5. ___________is the person that uses analysis and design techniques to solve business problem using information.
A. Programmer
B. Data Entry Staff
C. System Analyst
D. Computer Engineer
6. The following are advantages of System Development Life Cycle EXCEPT one
A. Help in inefficient allocation of resources to systems development project
B. Promotes consistency among systems development project
C. Simple and easy to use
D. Easy to manage due to the rigidity of the model
7. Which one is not a characteristic of an algorithm?
A. The end symbol signifies the end of a program
B. They are written in sequence
C. They are written in English like statements
D. It should be unambiguous and consistent
8. The actual writing or coding of program in a particular programming language is known as_________
A. Debugging
B. Program Coding
C. Program Executing
D. Program Decoding
9. The following are characteristics of a good program EXCEPT one.
A. Accuracy B. Clarity
C. Compatible D. Readability
10. The quick sort algorithm exploits _________ design technique.
A. greedy
B. dynamic running
C. divide and conquer
D. back tracking
11. The following are characteristic of an interpreter EXCEPT one
A. Execution is fast
B. The resulting code is some sort of intermediate code
C. The resulting code is interpreted by another program
D. relatively little time is spent analyzing and processing the program
12. The type of memory that is based on capacitor technology and requires to be periodically refreshed is called
A. SRAM B. DRAM
C. ERAM D. EERAM
13. _________ is a list of instruction issued to the computer to perform a particular task.
A. Algorithm
B. Computer program
C. Hardware
D. Peripherals
14. Two main reasons for the efficiency of an algorithm are?
A. Processor and memory
B. Complexity and capacity
C. Time and space
D. Data and space
15. _________ is the diagrammatic representation of a step by step procedure of solving a particular problem.
A. Algorithm B. Program
C. Flowchart D. sequential solution
16. The logic gate that will have “1” as its output when one of its inputs is “1” is
A. AND gate
B. OR gate
C. NOT gate
D. XOR gate
17. One of the popular mass storage devices is CD-ROM. What does CD ROM stand for?
A. Compactable Read Only Memory
B. Compact Data Read-Only Memory
C. compatible Disk Read Only Memory
D. Compact Disk Read Only Memory
18. The flowchart symbol represents _____________
A. Pre-define B. Decision
C. Input D. Processing
19. A collection of wires through which data is transmitted from one part of a computer to another is known as _______
A. Address
B. Bus
C. Register
20. The _______ signifies the end of a program.
A. flow lines B. squares
C. circles D. end symbol
21. __________ is a collection of related fields
A. Data B. Field
C. Record D. file
22. One of the following is not true about registers
A. they are temporary storage areas for instruction or data
B. they are not part of the memory
C. they work under the direction of the control unit
D. they are the slowest memory.
23. The smallest unit of information stored in computer file is called ________
A. Files B. Data item
C. Record D. Indexed
24. Which of these storage media has the lowest capacity?
A. CD-ROM B. Flash drive
C. Floppy disk D. Registers
25. A file with reasonable amount of permanency is known as__________ file.
A. Reference files
B. Master file
C. Transaction file
D. serial file
26. ________ refers to the unforeseen loss of data or information.
A. Backup B. Data loss
C. Overwriting D. Antivirus
27. _________ is the step by step procedure of solving a particular problem
A. Flowchart B. Algorithm
C. Sequence D. Waterfall
28. An occurrence of data loss can be called ___________
A. Data Loss Event
B. Data Loss Occurrence
C. Data Loss Show
D. Data Loss occasion
29. The following are limitations of computerized file system EXCEPT one.
A. Vulnerable to virus attacks
B. Incompatible data file
C. Cheap to set it up
D. Data are often duplicated
30. What is the use of ABS(X) in basic programming?
A. Finds the square root of a positive number
B. Displays the absolute value of a given number
C. Find the integer of a real number
D. Finds the tangent of an angle
31. The following are examples of a word processor EXCEPT one.
A. Corel Draw
B. Microsoft Word
C. Word Perfect
D. Perfect Writer
32. Which of the following is a read-only memory storage device?
A. Floppy Disk
B. CD-ROM
C. Hard Disk
D. None of the above
33. _______ is the use of computer software to create, edit, view, store, retrieve and print text document.
A. Word Processor
B. Word Communication
C. Word Processing
D. Word Application
34. The following are types of display effect of a Font Style EXCEPT one
A. Italics
B. Underline
C. Times New Roman
D. Bold
35. What is the use of LOG(X) in basic programming?
A. Find the tangent of an angle
B. Finds the integer of a real number
C. Using natural logarithms
D. Find the logistics of a number
36. The oldest and classical method of SDLC is called_________
A. Waterfall Mean
B. Waterfall Model
C. Waterfall Median
D. Waterfall Mode
37. Which of the following stores the operating system files permanently
A. Frisk Drives
B. Hard Disk
C. RAM
D. Cache
38. One of the following is NOT an information system component part.
A. People
B. Communication Network
C. IT room
D. Data/ Information
39. What is the use of EXP(X) in basic programming?
A. Finds the exponential of a value
B. Finds the natural logarithm
C. Finds the integer of a real number
D. Finds the cube root of a number
40. The following are the Water fall Development cycle stage EXCEPT______
A. Investigation Stage
B. System analysis Stage
C. System manufacturing Stage
D. System design Stage
41. The main functional parts of the central processing unit are
A. ALU and CU
B. BUS and ALU
C. CMOS and BUS
D. RAM and ROM
42. The following are classical types of information system EXCEPT one.
A. Transaction Processing System
B. Development Processing System
C. Management information System
D. Executive information system
43. What is the use of “TAN” in basic programming?
A. Finds the sine of an angle
B. Using natural algorithms
C. Finds the tangent of an angle
D. Finds the exponential of an angle
44. _______ is the process of making copies of files, so that the additional copies may be used to restore the original after data loss event.
A. Manipulating
B. Data Loss Event
C. Backup
D. Duplication
45. Which is a common BASIC function?
A. END B. CLS
C. PRINT D. RND()
46. ________feature create a text with spacing before and after.
A. Indent and Spacing
B. Superscript
C. Change Case
D. Double strike through
47. What is the use of SIN(X) in basic programming?
A. Finds the tangent of an angle
B. Finds the cosine of angle
C. Finds the integer of a real number
D. Finds the sine of an angle
48. _________ is the step by step procedure of solving a particular problem.
A. Problem B. sequence
C. algorithm D. symbol
49. What is the use of INT(X) in basic programming?
A. Finds the integer of a real number
B. Finds the square root of a value
C. Finds the cosine of an angle
D. Finds the tangent of an angle
50. A/An _________ compares the magnitudes of two binary quantities to determine which one has the greater magnitude
A. comparator B. AND gate
C. OR gate D. NOT gate
51. The most crucial phase in the development of a system is;
A. Problem definition
B. System design
C. System analysis
D. Investigative study
52. The first stage in program development is;
A. Problem definition
B. System design
C. System analysis
D. Investigative study
53. Evaluate SQR(16) + FIX(10.67) * SGN(-100)
A. -26.67 B. -14
C. -6 D. -10026.67
54. What does BCC stand for?
A. Backup carbon copy
B. Blind carbon copy
C. Bind carbon copy
D. Block carbon copy
Use the information below to answer questions 55 and 56
admin@suresuccess.ng.
55. The address above is a/an
A. Website address
B. Email address
C. Homepage address
D. Facebook address
56. The part before the @ symbol is called
A. Username B. Domain name
C. admin D. Gmail
57. A component of an Internet browser that is used to input and show the address of a website is called
A. Home page
B. Address bar
C. Status bar
D. Title bar
58. ________ is the set of rules by which Web pages are transferred across the internet?
A. HTML B. WWW
C. HTTP D. URL
59. Which of the following is an internet browser
A. CorelDraw B. MS Word
C. Excel D. Google Chrome
60. The transfer of files from a web server to a web client is called
A. Uploading B. Downloading
C. Chatting D. Browsing
SECTION B: Essay
INSTRUCTION – Answer only four (4) questions in this section.
1. Write the function of the following BASIC keywords
(a) LET (b) INPUT (c) PRINT (d) REM (e) RUN
2. Define algorithm and flowchart
i. Draw a flow chart to calculate the area of a triangle with base, b and height, h.
ii. Define a program
3. List the steps involved in program development
i. Describe the first stage in system development cycle
ii. Explain at least five (5) systems Analyst problem solving Approach
4. Explain the following;
I. System
II. Information System
III. Subsystem
5. Write out the steps to carry out the following;
(i) Change Case (ii) Subscript (iii) Superscript List and explain the three methods for files security
6. List and explain the different method of accessing files.
i. List and explain types of file organization method.
ii. State two differences between register and main memory.
Answers to Computer Studies Exam Questions for SS2 Second Term
Answers to Section A (Objective Test)
The following table gives the correct answers to the objective section of Computer Studies exam questions for SS2 second term. If you are using a mobile device, hold the table and scroll to the right or left for a complete view.
Q.No | Ans | Q.No | Ans | Q.No | Ans |
---|---|---|---|---|---|
1 | A | 2 | B | 3 | C |
4 | D | 5 | C | 6 | A |
7 | A | 8 | B | 9 | C |
10 | C | 11 | A | 12 | B |
13 | B | 14 | C | 15 | C |
16 | B | 17 | D | 18 | C |
19 | B | 20 | D | 21 | C |
22 | D | 23 | B | 24 | C |
25 | B | 26 | B | 27 | B |
28 | A | 29 | C | 30 | B |
31 | A | 32 | B | 33 | C |
34 | C | 35 | C | 36 | B |
37 | B | 38 | C | 39 | A |
40 | C | 41 | A | 42 | B |
43 | C | 44 | C | 45 | C |
46 | A | 47 | D | 48 | C |
49 | A | 50 | A | 51 | C |
52 | A | 53 | B | 54 | B |
55 | B | 56 | A | 57 | B |
58 | C | 59 | D | 60 | B |
So here you have the answers to the objective section of Computer Studies Exam Questions for SS2 second term. Use the comments section to let me know if you have any questions you would want me to clarify or discuss further.
Answers to Section B (Theory)
1. Function of the following BASIC keywords:
(a) LET: Used to assign a value to a variable.
Example: LET A = 5 assigns the value 5 to A.
(b) INPUT: Prompts the user to enter a value and stores it in a variable.
Example: INPUT A asks the user to enter a value for A.
(c) PRINT: Displays output to the screen.
Example: PRINT A will display the value of A.
(d) REM: Used for adding comments in the program; it does not affect the execution.
Example: REM This is a comment.
(e) RUN: Executes the program.
Example: RUN runs the written code.
2. Define algorithm and flowchart:
- Algorithm: A step-by-step procedure for solving a problem or performing a task.
- Flowchart: A graphical representation of the sequence of steps in an algorithm.
i. Flowchart to calculate the area of a triangle:
Start
|
Input base (b), height (h)
|
Area = (b * h) / 2
|
Output Area
|
End
- Program Definition: A program is a set of instructions written in a programming language to perform a specific task.
3. Steps involved in program development:
- Problem Definition
- Design Algorithm/Flowchart
- Write Code (Coding)
- Test and Debug
- Documentation
- Maintenance
i. First stage in System Development Cycle:
The first stage is Planning/Feasibility Study, where the project requirements are gathered, and the feasibility of the project is determined in terms of cost, time, and resources.
ii. Systems Analyst Problem-Solving Approach:
- Define the problem: Understand the problem in detail.
- Gather information: Collect data relevant to the problem.
- Analyze the data: Identify issues and break down the problem.
- Design solutions: Create alternative solutions to address the problem.
- Evaluate the solution: Choose the best solution and plan implementation.
4. Explain the following:
I. System: A system is a set of interrelated components working together towards a common goal or purpose.
II. Information System: An information system is a system designed to collect, process, store, and distribute information to support decision-making and operations.
III. Subsystem: A subsystem is a smaller, self-contained system that forms part of a larger system.
5. Steps for the following:
(i) Change Case:
- Select text.
- Use the “Change Case” option (in word processors), or use keyboard shortcuts (e.g., Shift + F3 in MS Word).
(ii) Subscript:
- Select the text.
- Apply subscript formatting (e.g., Ctrl + = in MS Word).
(iii) Superscript:
- Select the text.
- Apply superscript formatting (e.g., Ctrl + Shift + = in MS Word).
Three Methods for File Security:
- Password Protection: Secures files by requiring a password to access them.
- Encryption: Converts files into unreadable formats to prevent unauthorized access.
- Backup: Regularly backing up files to prevent data loss.
6. Methods of Accessing Files:
- Sequential Access: Files are accessed in a linear fashion, one record after another.
- Direct Access: Files can be accessed randomly, without following a sequence.
- Indexed Access: Uses an index to locate files quickly.
i. Types of File Organization Method:
- Sequential Organization: Data is stored in sequence, and records are processed in the same order they were entered.
- Indexed Organization: Data is organized with an index that allows faster searching.
- Hashed Organization: Uses a hashing function to store and retrieve data quickly.
ii. Two Differences between Register and Main Memory:
- Speed: Registers are faster than main memory.
- Size: Registers are smaller in size compared to main memory.
Read Also: Computer Studies Exam Questions for SS1 Second Term
How to Pass Computer Studies Exam Questions for SS2 Second Term
Passing your Computer Studies exam questions for SS2 second term requires a combination of preparation, understanding, and strategy. Here are actionable tips to help you excel:
1. Understand Key Concepts
- Focus on understanding core topics like algorithms, flowcharts, programming languages (like BASIC), and system development life cycle (SDLC).
- Be clear on how to solve problems using algorithms and flowcharts. Practice writing algorithms for common problems (e.g., calculating areas, sorting numbers).
2. Revise Key Terms and Definitions
- Make sure you know definitions of common terms, such as information systems, subsystems, types of memory, storage devices, etc.
- Prepare for definitions of important terms like input, output, programming concepts, and computer components.
3. Practice Using Examples
- Work on practical examples like coding in BASIC, drawing flowcharts, and understanding simple programs. Practice using LET, INPUT, PRINT, and other BASIC commands.
4. Learn and Memorize File Systems and Storage Devices
- Understand the different types of storage devices (floppy disk, hard disk, CD-ROM) and their capacities.
- Be familiar with file organization methods (sequential, indexed, direct access).
5. Understand System Development Life Cycle (SDLC)
- Know the stages of SDLC: Planning, Analysis, Design, Implementation, Testing, and Maintenance. Be prepared to discuss each stage and its importance.
6. Be Able to Explain System Analyst Roles
- Review the roles and problem-solving techniques used by system analysts (gathering information, designing solutions, evaluating options).
7. Stay Calm During the Exam
- Read each question carefully and answer based on the concepts you’ve studied.
- For essay questions, focus on giving clear, concise answers while explaining your points logically.
8. Practice Past Questions
- Go through past exam papers to understand the format and types of questions. This will help you become familiar with the exam pattern.
Best wishes.
Still Got a Question? Drop Your Question Right HERE 👇👇 and click on Search. Get an Immediate Response...
Get in touch with us
Join our FREE 2025 JAMB, WAEC, NECO and BECE Tutorial Classes on Facebook. (Like and Follow Page)
This is for both Science and Art Students
If this post was helpful to you, please help us to reach others by sharing with the buttons below!