Are you preparing for the upcoming 2025 WAEC or NECO Computer Studies examination? This section presents the most commonly asked SS3 Computer Studies objective questions and answers, carefully compiled from verified WAEC and NECO past questions.
As an educational reporter and Computer Studies teacher, I’ve structured these questions to help students understand key topics such as network topology, servers, and data communication, not just memorize them.
Below are the WAEC and NECO-standard questions with answers and brief explanations. They will guide you toward mastering the networking section of Computer Studies, one of the most tested areas in senior
Note that what you have below are SS3 Computer Science First Term Exam Past Questions made available to assist students in their revision for 1st term examinations and also teachers in structuring standard examinations. secondary exams.
1. Which of these is not a type of network topology?
A. Bus topology
B. High-breed topology
C. Mesh topology
D. Star topology
Answer: B. High-breed topology
Explanation:
The common types of network topology include bus, star, ring, tree, and mesh. Although there is a hybrid topology, the term “High-breed topology” is incorrect and not recognized in networking. Therefore, the right answer is B.
2. The main computer in a network that acts as the host and provides data and software to other terminals linked to it is called
A. Server
B. Client
C. Workstation
D. Network Interface Unit
Answer: A. Server
Explanation:
A server is the central computer that manages network resources and provides services such as data, files, and applications to connected computers known as clients.
3. A computer network usually spanning a large campus is called
A. PAN
B. LAN
C. MAN
D. WAN
Answer: C. MAN
Explanation:
A Metropolitan Area Network (MAN) covers a larger geographical area than a LAN, such as a university, military base, or a big campus. It is often used to connect multiple LANs within a city or region.
4. As a network administrator, you were contacted to install a network at Command Secondary School. Which type of network would you recommend and install?
A. LAN
B. PAN
C. MAN
D. SAN
Answer: A. LAN
Explanation:
A Local Area Network (LAN) is best suited for schools, offices, and organizations within a limited area. It allows students and teachers to share files, printers, and other network resources efficiently.
5. One of these network topologies uses “Token” technology
A. Star topology
B. Mesh topology
C. Bus topology
D. Tree topology
Answer: C. Bus topology
Explanation:
The bus topology uses a single central cable to transmit data, and communication is controlled using token passing technology to prevent data collision and ensure orderly communication among devices.
6. Which topology typically has no traffic congestion due to dedicated links?
A. Star
B. Bus
C. Ring
D. Mesh
Answer: D. Mesh
Explanation:
In a mesh topology, every device is directly connected to every other device through dedicated links. This setup allows multiple paths for data transmission, eliminating congestion and ensuring efficient communication even if one link fails.
7. The hardware that connects a computer to a network is the _____.
A. Modem
B. Hub
C. Network Interface Card
D. Router
Answer: C. Network Interface Card
Explanation:
A Network Interface Card (NIC) is a hardware component installed in a computer to enable network connectivity. It allows the system to send and receive data through wired or wireless network connections.
8. The World Wide Web was proposed in 1989 by _____.
A. Bill Gates
B. Steve Jobs
C. Tim Berners-Lee
D. Elon Musk
Answer: C. Tim Berners-Lee
Explanation:
The World Wide Web (WWW) was invented by Sir Tim Berners-Lee in 1989 while working at CERN. His creation made it possible to access and share information across the internet using hyperlinks and browsers.
9. Software used to access pages on the World Wide Web is a _____.
A. Text editor
B. Web browser
C. Website
D. Hyperlink
Answer: B. Web browser
Explanation:
A web browser is an application (like Google Chrome, Mozilla Firefox, or Microsoft Edge) that retrieves, interprets, and displays web pages. It acts as the gateway between users and the World Wide Web.
10. SMTP stands for _____.
A. Small Medium Text Protocol
B. Simple Mail Transfer Protocol
C. Sample Main Transfer Protocol
D. Small Mail Transfer Protocol
Answer: B. Simple Mail Transfer Protocol
Explanation:
SMTP stands for Simple Mail Transfer Protocol. It is the standard communication protocol used for sending emails over the internet. It works alongside POP and IMAP, which are used for receiving emails.
11. The introductory page of a website is called the _____.
A. Website
B. Web browser
C. HTML
D. Home page
Answer: D. Home page
Explanation:
The home page is the first or main page of a website that opens when you visit its address. It usually contains links to other sections of the site and acts as the site’s entry point.
12. A language that web browsers can interpret is _____.
A. JAVA
B. HTML
C. Dreamweaver
D. C++
Answer: B. HTML
Explanation:
HTML (HyperText Markup Language) is the basic language that web browsers understand and render into web pages. It defines the structure and content of websites.
13. Which of these is a website development tool?
A. VS Code
B. MS Word
C. CorelDRAW
D. Oracle
Answer: A. VS Code
Explanation:
Visual Studio Code (VS Code) is a modern code editor widely used for web development. It supports HTML, CSS, and JavaScript, making it ideal for creating and editing websites.
14. Which cable transmits light rather than electrical signals?
A. Coaxial cable
B. STP cable
C. UTP cable
D. Fibre-optic cable
Answer: D. Fibre-optic cable
Explanation:
Fibre-optic cables use light pulses instead of electricity to transmit data. This makes them faster, more reliable, and less prone to interference than traditional copper cables.
15. Which of the following is NOT a network cable?
A. Telephone wire
B. Shielded twisted pair
C. RJ-45
D. Coaxial cable
Answer: C. RJ-45
Explanation:
RJ-45 is not a cable but a connector used to terminate Ethernet cables. The other options—telephone wire, STP, and coaxial, are all actual cable types used in networking.
16. Which tag correctly underlines text in HTML?
A. <u>
B. Ctrl + U
C. <ul>
D. <under>
Answer: A. <u>
Explanation:
In HTML, the <u> tag is used to underline text. Example: <u>This text is underlined.</u>
Keyboard shortcuts like Ctrl + U only apply in word processors, not in HTML.
17. Which connector is commonly used for telephone lines?
A. RJ-11
B. RJ-45
C. RJ-25
D. RJ-14
Answer: A. RJ-11
Explanation:
RJ-11 connectors are standard for telephone lines. They are smaller than RJ-45 connectors, which are used for Ethernet network cables.
18. The cable that links a system unit to a non-HD monitor is a ____ cable.
A. VDU
B. VGA
C. USB
D. Power
Answer: B. VGA
Explanation:
A VGA (Video Graphics Array) cable connects a computer’s system unit to older or non-HD monitors. It transmits analog video signals, unlike HDMI, which transmits digital signals.
19. Which is NOT a DBMS?
A. Oracle
B. SQL Server
C. Paradox
D. R-Base
Answer: D. R-Base
Explanation:
R-Base is an older database system rarely used today, but it is technically a DBMS. However, in modern WAEC/NECO contexts, it’s often listed as outdated. The correct non-DBMS would actually be any non-database software, but given the options, D is typically marked correct.
(If you wish to match WAEC past answers, mark D.)
20. Which of the following is NOT a DBMS package?
A. MS Oracle
B. SQL Server
C. Paradox
D. RBase
Answer: A. MS Oracle
Explanation:
There’s no package called “MS Oracle”. It mixes Microsoft and Oracle names. The correct software is simply Oracle Database. Hence, A is not a valid DBMS package.
21. A key used to create relationships between tables is the _____.
A. Primary key
B. Secondary key
C. Foreign key
D. Master key
Answer: C. Foreign key
Explanation:
A foreign key links records between two tables in a relational database. It references the primary key of another table to establish a relationship.
22. A request for a specific set of data from a database is a _____.
A. File
B. Form
C. Report
D. Query
Answer: D. Query
Explanation:
A query is a database operation used to search, retrieve, or manipulate data. For instance, asking a database to show all students in SS3 is a query.
23. Which field is most suitable as a primary key?
A. ID card number
B. Surname
C. First name
D. Religion
Answer: A. ID card number
Explanation:
A primary key must be unique for each record. Since ID card numbers are unique identifiers, they are most suitable for use as a primary key.
24. Which database model allows many-to-many links?
A. Flat file
B. Relational model
C. Network model
D. Hierarchical model
Answer: C. Network model
Explanation:
The network database model allows records to have multiple parent and child relationships, supporting many-to-many connections, unlike the hierarchical model, which is one-to-many.
25. Which of these is a common view in MS Access tables?
A. Landscape view
B. Datasheet view
C. Portrait view
D. Slide view
Answer: B. Datasheet view
Explanation:
In Microsoft Access, the Datasheet view displays data in rows and columns, similar to a spreadsheet. It’s the most common view used to enter and edit table data.
26. Which object is best for formatted printouts of data?
A. Form
B. Report
C. Query
D. Table
Explanation:
Reports in database applications like MS Access are used to create well-formatted printouts of data for presentation or documentation. Forms are used for data entry, while queries retrieve data.
27. Which software cannot be used to create or edit images?
A. MS Access
B. AutoCAD
C. CorelDRAW
D. Adobe Photoshop
Explanation:
MS Access is a database management system used to store and organize data. It cannot handle graphics or image editing like CorelDRAW or Photoshop.
28. Which is NOT a typical feature of the CorelDRAW workspace?
A. Docker
B. Drawing window
C. Colour palette
D. Formula bar
Explanation:
The Formula Bar is a component of MS Excel, not CorelDRAW. CorelDRAW’s workspace includes tools like Dockers, Drawing Window, and Colour Palette for design tasks.
29. Which action is NOT done with the Pick tool in CorelDRAW?
A. Skew objects
B. Rotate objects
C. Select objects
D. Draw curves from lines
Explanation:
The Pick Tool is used for selecting, moving, resizing, and rotating objects, not drawing. Drawing curves is done with the Bezier or Shape tools.
30. Which tool samples and copies colour from an object in CorelDRAW?
A. Colour palette
B. Eyedropper
C. Bezier tool
D. Interactive fill
Explanation:
The Eyedropper Tool allows designers to pick (sample) and copy colors from one object to another for uniform design.
31. Shortcut to centre an object on the page in CorelDRAW is ____.
A. Ctrl+C
B. Ctrl+P
C. P
D. C
Explanation:
Pressing P instantly centers the selected object on the page — a quick alignment feature in CorelDRAW.
32. In BASIC, which statement reserves space for arrays?
A. FOR…NEXT
B. DIM
C. INT
D. WHILE…WEND
Explanation:
The DIM (Dimension) statement in BASIC programming is used to declare and allocate space for arrays.
33. DIM A(9) creates how many elements (0-based)?
A. 10
B. 9
C. 11
D. 8
Explanation:
Arrays in BASIC are zero-indexed. So, A(9) starts from A(0) to A(9) — giving a total of 10 elements.
34. Looping in BASIC can be achieved using ____.
A. FOR…NEXT
B. DIM
C. WHILE…WEND
D. Both A and C
Explanation:
Both FOR…NEXT and WHILE…WEND structures are used to create loops in BASIC programming.
35. In classic BASIC, a string variable typically ends with which symbol?
A. $
B. %
**C. ***
D. #
Explanation:
In BASIC programming, variables that store strings must end with a dollar sign ($), e.g., NAME$.
36. CAFE is a valid symbol in the ____ number system.
A. Decimal
B. Hexadecimal
C. Octal
D. Binary
Explanation:
The Hexadecimal system (base 16) uses digits 0–9 and letters A–F. Hence, “CAFE” is a valid hexadecimal number.
37. 4₁₀ × 6₁₀ equals ____ in binary.
A. 11001
B. 00011
C. 10100
D. 11000
Explanation:
.
24 in binary = 11000₂.
38. 1111111011101101₂ equals ____ in hexadecimal.
A. DEEF₁₆
B. EEEF₁₆
C. FEED₁₆ 
D. EDEF₁₆
Explanation:
When converted, 1111111011101101₂ = FEED₁₆, a commonly used hexadecimal representation.
39. If x₂ + 1010₂ = 10000₂, then x = ____.
A. 110₂
B. 011₂
C. 101₂
D. 100₂
Explanation:
.
Therefore, x = 100₂ (which is 4 in decimal).
40. Which of the following is NOT a programming language?
A. Visual Basic
B. Java
C. HTML 
D. C++
Explanation:
HTML (HyperText Markup Language) is a markup language, not a programming language. It is used for structuring web pages, not for logical computation.
41. High-level languages executed line-by-line are called ____
A. Interpreted languages
B. Compiled languages
C. Assembly languages
D. Machine languages
Answer: A. Interpreted languages
Explanation: Interpreted languages execute program statements one line at a time. This allows easier debugging and real-time testing. Examples include Python and BASIC.
42. COBOL stands for ____
A. Common Oriented Business Object Language
B. Common Business-Oriented Language
C. Complied Object Language Oriented Language
D. Compiled Oriented Business Language
Answer: B. Common Business-Oriented Language
Explanation: COBOL is a high-level programming language developed in the 1960s for business and administrative systems. It focuses on data processing and record handling.
43. Which is NOT an advantage of high-level languages?
A. Machine-dependent
B. User-friendly
C. Easier to maintain
D. Easier to write
Answer: A. Machine-dependent
Explanation: High-level languages are designed to be machine-independent, meaning they can run on different types of computers with minimal modification.
44. The rules that govern how statements are written in a language are called ____
A. Semantics
B. Laws
C. Desk-checking
D. Syntax
Answer: D. Syntax
Explanation: Syntax defines how statements and commands are structured in programming languages. It is similar to grammar in human communication.
45. Which of these is NOT a method of data representation?
A. ASCII
B. CDS
C. BCD
D. Unicode
Answer: B. CDS
Explanation: CDS is not a valid data representation format. ASCII, BCD, and Unicode are standard encoding systems used to represent text and symbols digitally.
46. Which representation provides a unique number for each character across platforms?
A. Bits
B. EBCDIC
C. ASCII
D. Unicode
Answer: D. Unicode
Explanation: Unicode assigns a unique numeric code to every character across all major languages and symbols, ensuring compatibility in global computing systems.
47. Which malware replicates and spreads without user action?
A. Worm
B. Virus
C. Trojan
D. Spyware
Answer: A. Worm
Explanation: Worms are self-replicating malware programs that spread automatically across computer networks without requiring any user interaction.
48. Which is NOT a source of security breach?
A. Care in sharing personal information
B. Hackers and spammers
C. Poor network implementation
D. Lack of ICT policies
Answer: A. Care in sharing personal information
Explanation: Being cautious with personal data prevents breaches. Security threats arise from carelessness, poor configuration, and weak ICT policies.
49. Unsolicited bulk messages are called ____
A. Spams
B. Phishing
C. Scams
D. Hackers
Answer: A. Spams
Explanation: Spam refers to unwanted bulk messages, often sent via email or SMS. They are usually promotional or fraudulent in nature.
50. Illegal copying and distribution of software is called ____
A. Plagiarism
B. Piracy
C. Spamming
D. Hacking
Answer: B. Piracy
Explanation: Software piracy involves unauthorized copying, distribution, or use of licensed software, violating copyright laws and intellectual property rights.
51. A malicious program that appears legitimate is a ____
A. Virus
B. Worm
C. Trojan horse
D. Rootkit
Answer: C. Trojan horse
Explanation:
A Trojan horse is a malicious software that disguises itself as a useful or harmless program. Once activated, it performs hidden tasks such as stealing data or damaging the system.
52. Which of the following is NOT an antivirus software?
A. Norton
B. Smadav
C. Code Red
D. Bitdefender
Answer: C. Code Red
Explanation:
Code Red is a computer worm, not antivirus software. Norton, Smadav, and Bitdefender are antivirus programs designed to detect and remove malicious software.
53. Phishing primarily attempts to ____
A. Steal credentials
B. Speed up networks
C. Repair disks
D. Encrypt backups
Answer: A. Steal credentials
Explanation:
Phishing involves sending fake messages or links to trick users into giving up sensitive information such as passwords or banking details.
54. A strong password typically includes ____
A. Only letters
B. Letters and numbers
C. Personal names
D. Keyboard patterns
Answer: B. Letters and numbers
Explanation:
A strong password contains a combination of letters, numbers, and symbols. It should avoid personal details or predictable patterns to reduce the risk of hacking.
55. Which protocol secures web traffic with encryption?
A. HTTP
B. FTP
C. HTTPS
D. TELNET
Answer: C. HTTPS
Explanation:
HTTPS (Hypertext Transfer Protocol Secure) ensures secure communication between a web browser and a website by encrypting transmitted data.
56. A privacy setting that hides your social profile from the public is an example of ____
A. Data minimization
B. Access control
C. Backdoor
D. Overfitting
Answer: B. Access control
Explanation:
Access control regulates who can view or interact with data. Restricting access to your social media profile helps protect privacy and prevent misuse.
57. Which act is most associated with exam malpractice using ICT?
A. Using licensed software
B. Sharing past questions
C. Impersonation via devices
D. Backing up files
Answer: C. Impersonation via devices
Explanation:
Impersonation using devices, such as using a smartphone or another person’s login details during an online exam, is an ICT-related examination malpractice.
58. Backing up only files changed since the last full backup is a ____ backup.
A. Full
B. Differential
C. Incremental
D. Mirror
Answer: C. Incremental
Explanation:
An incremental backup saves only the files that have changed since the last backup, reducing storage usage and backup time.
59. Which device forwards packets based on IP addresses?
A. Hub
B. Switch
C. Router
D. Repeater
Answer: C. Router
Explanation:
A router connects multiple networks and directs data packets based on their IP addresses, ensuring information reaches its correct destination.
60. A topology where all nodes connect to a central device is ____
A. Bus
B. Star
C. Ring
D. Mesh
Answer: B. Star
Explanation:
In a star topology, all computers or devices connect to a central hub or switch, reducing collision risks and making troubleshooting easier.
61. Which wireless standard commonly operates at 2.4 GHz and 5 GHz?
A. 802.3
B. 802.11
C. 802.15
D. 802.16
Answer: B. 802.11
Explanation:
IEEE 802.11 defines wireless networking standards used in Wi-Fi communication, typically operating at 2.4 GHz and 5 GHz frequency bands.
62. In spreadsheets, the intersection of a row and a column is a ____
A. Cell
B. Range
C. Sheet
D. Workbook
Answer: A. Cell
Explanation:
A cell is the point where a row and a column meet in a spreadsheet. It is where data, formulas, or labels are entered.
63. In Excel, the formula to sum cells A1 through A10 is ____
A. =SUM(A1:A10)
B. =ADD(A1-A10)
C. =TOTAL(A1;A10)
D. SUM[A1:A10]
Answer: A. =SUM(A1:A10)
Explanation:
The SUM function in Excel adds up values in a specified range of cells, such as from A1 to A10.
64. Which chart best shows parts of a whole?
A. Line chart
B. Pie chart
C. Scatter chart
D. Column chart
Answer: B. Pie chart
Explanation:
A pie chart visually represents how each part contributes to the whole, making it ideal for displaying percentage data.
65. To maintain original formatting when pasting into Word, use ____ paste option.
A. Keep Text Only
B. Merge Formatting
C. Keep Source Formatting
D. Picture
Answer: C. Keep Source Formatting
Explanation:
The “Keep Source Formatting” option preserves the original style and layout of copied content when pasted into Microsoft Word.
66. Which file format preserves document layout for printing?
A. TXT
B. DOCX
C. PDF
D. CSV
Answer: C. PDF
Explanation:
PDF (Portable Document Format) ensures that a document’s layout, fonts, and design remain unchanged when viewed or printed on any device.
67. In presentation software, a set of coordinated fonts and colours is a ____
A. Layout
B. Transition
C. Theme
D. Animation
Answer: C. Theme
Explanation:
A theme defines a consistent visual design using coordinated colours, fonts, and effects throughout a presentation.
68. The shortcut to start slideshow from the beginning in PowerPoint is ____
A. F5
B. F7
C. Ctrl+S
D. Alt+Tab
Answer: A. F5
Explanation:
Pressing F5 in Microsoft PowerPoint starts the slideshow from the first slide, a quick method often used during presentations.
69. In DTP, arranging elements to guide the reader’s eye is called ____
A. Kerning
B. Leading
C. Alignment
D. Visual hierarchy
Answer: D. Visual hierarchy
Explanation:
Visual hierarchy refers to arranging text and images in order of importance to guide the reader’s attention across a design layout.
70. Spreadsheet absolute reference for cell A1 is ____
A. A1
B. $A$1
C. A$1
D. $A1
Answer: B. $A$1
Explanation:
In Excel, using dollar signs ($A$1) locks both the column and row, making the reference absolute and unchanged when formulas are copied.
71. In spreadsheets, data validated to allow only dates is an example of ____
A. Conditional formatting
B. Data validation
C. Data sorting
D. Scenario
Answer: B. Data validation
Explanation: Data validation in spreadsheet software like Excel or Google Sheets is used to restrict the type of data entered into a cell. When set to “Date,” it ensures only valid date entries are accepted, preventing input errors.
72. Which of these is NOT an operating system?
A. Windows
B. Linux
C. Android
D. Chrome
Answer: D. Chrome
Explanation: Chrome is a web browser developed by Google, not an operating system. Operating systems manage hardware and software resources, while browsers like Chrome simply access the internet.
73. The program that loads the operating system into memory at startup is the ____
A. Loader
B. Bootloader
C. Scheduler
D. Interpreter
Answer: B. Bootloader
Explanation: The bootloader is the initial program that runs when a computer starts. It loads the main operating system (like Windows or Linux) from storage into memory for execution.
74. Which interface allows users to type commands to interact with the OS?
A. GUI
B. CLI
C. API
D. UIX
Answer: B. CLI
Explanation: The Command Line Interface (CLI) lets users communicate with the computer using typed text commands, unlike the Graphical User Interface (GUI) which uses icons and windows.
75. The smallest addressable unit of data on disk is a ____
A. Bit
B. Byte
C. Sector
D. Cluster
Answer: C. Sector
Explanation: A sector is the smallest physical storage unit on a disk. Files are stored in sectors, and several sectors can form a cluster, depending on the file system.
76. To safely remove a USB drive, you should first ____
A. Format it
B. Eject it
C. Scan it
D. Rename it
Answer: B. Eject it
Explanation: Ejecting a USB drive ensures all read/write operations are complete before removal, preventing data corruption or loss.
77. A collection of files stored under one name is a ____
A. Record
B. Folder
C. Field
D. Byte
Answer: B. Folder
Explanation: A folder (or directory) organizes multiple files under a single name or path, making data storage and retrieval easier.
78. The environment that allows multiple programs to run at once is ____
A. Single-tasking
B. Multi-tasking
C. Batch processing
D. Spooling
Answer: B. Multi-tasking
Explanation: Multitasking allows a computer to run more than one application at a time by sharing CPU time among tasks.
79. Which utility checks a disk for bad sectors and file system errors?
A. Defragmenter
B. CHKDSK
C. Task Manager
D. Event Viewer
Answer: B. CHKDSK
Explanation: CHKDSK (Check Disk) scans storage drives for file system errors and bad sectors, repairing them to maintain data integrity.
80. File extension .csv is best described as ____
A. Binary image file
B. Comma-separated values text
C. Encrypted spreadsheet
D. Executable script
Answer: B. Comma-separated values text
Explanation: CSV files store tabular data in plain text where each line represents a row, and commas separate the columns.
81. Which permission allows a user to view and change a file?
A. Read
B. Write
C. Execute
D. Read/Write
Answer: D. Read/Write
Explanation: The read/write permission grants both the ability to view and modify a file’s contents, commonly used in shared systems.
82. The first phase of the Systems Development Life Cycle (SDLC) is ____
A. Design
B. Testing
C. Problem identification/Feasibility study
D. Implementation
Answer: C. Problem identification/Feasibility study
Explanation: The SDLC begins with identifying the problem or requirement and conducting a feasibility study to determine if the proposed system is practical and cost-effective.
83. A diagram that uses symbols like start/end, process, and decision is a ____
A. Use-case diagram
B. ER diagram
C. Flowchart
D. Gantt chart
Answer: C. Flowchart
Explanation: A flowchart visually represents the flow of a process using shapes such as rectangles for processes and diamonds for decisions.
84. The symbol used for decision in a flowchart is a ____
A. Rectangle
B. Parallelogram
C. Diamond
D. Circle
Answer: C. Diamond
Explanation: The diamond symbol in a flowchart denotes a decision point where a process branches based on yes/no or true/false conditions.
85. IoT stands for ____
A. Internet of Tools
B. Internet of Things
C. Input/Output Technology
D. Internal Office Technology
Answer: B. Internet of Things
Explanation: IoT refers to interconnected devices that communicate and share data through the internet, such as smart home systems and wearable gadgets.
86. AI that is trained for a specific task is called ____ AI.
A. General
B. Narrow
C. Super
D. Quantum
Answer: B. Narrow
Explanation: Narrow AI is designed to perform a particular task—like speech recognition or image classification—unlike general AI, which would handle multiple tasks like a human.
87. Cloud service that provides virtual machines and networks is ____
A. SaaS
B. PaaS
C. IaaS
D. DBaaS
Answer: C. IaaS
Explanation: Infrastructure as a Service (IaaS) provides core computing resources like virtual servers, storage, and networking over the internet.
88. Buying and selling goods online is called ____
A. E-learning
B. E-commerce
C. E-banking
D. E-waste
Answer: B. E-commerce
Explanation: E-commerce refers to electronic commercial transactions, such as buying products from online platforms like Jumia or Amazon.
89. A small piece of data stored by a website on a user’s browser is a ____
A. Cache
B. Cookie
C. Log
D. Patch
Answer: B. Cookie
Explanation: Cookies store user preferences or session data, enabling websites to remember login information and personalize browsing experiences.
90. The legal right that protects software creators is ____
A. Trademark
B. Copyright
C. Patent
D. License key
Answer: B. Copyright
Explanation: Copyright law protects original works, including software, from unauthorized copying or distribution.
91. Which practice helps reduce digital divide in schools?
A. Blocking internet access
B. High device costs
C. Community ICT centres
D. Outdated curricula
Answer: C. Community ICT centres
Explanation: Establishing community ICT centres provides equal access to technology and internet facilities, helping students from low-income backgrounds bridge the digital divide.
 
									 
					


