Every JSS3 student deserves a clear path to success, and that is exactly what this breakdown provides. Each question is arranged to match what you may face in your next test or examination. It gives you a complete picture of what examiners expect and how to approach every topic with confidence. Studying with this structure helps you master both objective and theory questions, which are essential for better grades and deeper understanding of your subject.
Build Confidence Through Practice
Past questions are more than revision tools; they are powerful guides that show how much you have improved. When you take time to review them, you learn to identify patterns in questions and understand where you need to focus more. Each time you attempt a question and get it right, your confidence grows stronger. With steady practice, you’ll find yourself solving new questions easily and recalling key facts during exams without stress.
Keep Moving Forward
Courage is what turns effort into achievement. Do not be discouraged by difficult topics or past mistakes, every challenge is a chance to grow. Use this breakdown as your study partner and search for more past questions to strengthen your preparation. The more you explore, the more equipped you become for success. Stay focused, stay bold, and remember that consistent learning today builds the confidence you will need tomorrow.
JSS3 Computer Studies Objective Questions and Answers
Section 1: Careers and Professional Bodies in ICT
- 
Individuals that have obtained sufficient education and training in the field of computer are called 
 A. Program Analyst
 B. Computer Professionals
 C. Computer Commissioners
 D. Computer Instructor
 Answer: B. Computer Professionals
 Explanation: Those who specialize in computer science and system management are called computer professionals. They handle programming, data systems, and network maintenance effectively.
- 
All the following are careers in the field of computers except 
 A. Computer Engineer
 B. Programmer
 C. Network Administrator
 D. Bank Manager
 Answer: D. Bank Manager
 Explanation: Although bank managers use computers in finance, they are not trained ICT professionals.
- 
Who writes codes and instructions for the computer? 
 A. Computer Engineer
 B. Programmer
 C. Network Administrator
 D. Bank Manager
 Answer: B. Programmer
 Explanation: A programmer writes and tests codes that guide how software runs. Therefore, they are essential to software development.
- 
NCS is a computer professional body. NCS stands for 
 A. Nigeria Computer Society
 B. National Commission Society
 C. Nigeria Computer Studies
 D. Non-governmental Commission Society
 Answer: A. Nigeria Computer Society
 Explanation: The Nigeria Computer Society (NCS) promotes the growth of information technology and regulates professional standards in the field.
- 
Which of these is a quality of a good computer professional? 
 A. Poor analytical skills
 B. Automation
 C. Poor technical writing skills
 D. Troubleshooting capabilities
 Answer: D. Troubleshooting capabilities
 Explanation: A good professional identifies and fixes problems quickly, ensuring systems run smoothly.
Section 2: Computer Viruses and Security
- 
A body that controls and regulates all communication operations in Nigeria 
 A. Nigeria Communication Commission
 B. Nigeria Internet Group
 C. Computer Association of Nigeria
 D. Internet Service Provider Association of Nigeria
 Answer: A. Nigeria Communication Commission
 Explanation: The NCC regulates communication services and ensures a safe ICT environment across Nigeria.
- 
All of these are means through which computer viruses can spread except 
 A. Internet download
 B. Computer network
 C. Infected memory devices
 D. Blood transfusion
 Answer: D. Blood transfusion
 Explanation: Viruses in computers are digital, not biological; therefore, they cannot spread through human activities.
- 
A computer virus that alters its signature patterns whenever it replicates is called 
 A. Boot sector virus
 B. Polymorphic virus
 C. Resident Virus
 D. Non-resident virus
 Answer: B. Polymorphic virus
 Explanation: This virus changes its signature each time it infects new files, making detection difficult.
- 
A program written to stop and curb the spread of the virus in a computer is called 
 A. Auto-virus
 B. Anti-virus
 C. I Love You Virus
 D. Stone
 Answer: B. Anti-virus
 Explanation: Antivirus software scans, removes, and prevents infections from harming your device.
- 
All of these are examples of computer viruses except 
 A. Smadav
 B. Trojan Horse
 C. I Love You Virus
 D. November 11
 Answer: A. Smadav
 Explanation: Smadav is antivirus software, while the others are malicious programs.
Section 3: Networking and the Internet
- 
Which of these is not a virus warning sign? 
 A. Speeds up computer response time
 B. Presence of tiny dots
 C. Incomplete saving of files
 D. Appearance of strange characters
 Answer: A. Speeds up computer response time
 Explanation: A virus normally slows performance instead of improving it.
- 
Which of this software is an antivirus software? 
 A. Norton
 B. Creeper
 C. Code records
 D. Logic bomb Alabama
 Answer: A. Norton
 Explanation: Norton is a reliable antivirus program used to protect computers against threats.
- 
Preventive measures against computer viruses do not include the following 
 A. Installing cracked software
 B. Timely update of operating system
 C. Timely update of antivirus software
 D. Exercise care when browsing the internet
 Answer: A. Installing cracked software
 Explanation: Cracked software often carries malware, which exposes systems to attacks.
- 
The largest computer network in the world is 
 A. LAN
 B. WAN
 C. PAN
 D. Internet
 Answer: D. Internet
 Explanation: The Internet connects networks across the globe, forming the largest communication system.
- 
A computer network ideal for schools, offices, and homes is called 
 A. WAN
 B. PAN
 C. Internet
 D. LAN
 Answer: D. LAN
 Explanation: A Local Area Network (LAN) connects devices in a small area, such as a classroom or office.
Section 4: Search Engines and Network Concepts
- 
The acronym MAN stands for 
 A. Man Area Network
 B. Metropolitan Area Network
 C. Master Area Network
 D. Main Area Network
 Answer: B. Metropolitan Area Network
 Explanation: MAN connects multiple LANs across a city for effective data sharing.
- 
All of these are internet search engines except 
 A. Google
 B. Yahoo
 C. Facebook
 D. Bing
 Answer: C. Facebook
 Explanation: Facebook is a social media platform, not a search engine.
- 
Websites or software that enable a person to find a document and other media on the internet are called 
 A. Google
 B. Internet Search Engines
 C. Network Search
 D. Search Query
 Answer: B. Internet Search Engines
 Explanation: Search engines help users locate relevant online information quickly.
- 
A word or group of words typed by the user in the search bar of the search engine is called 
 A. Search query
 B. Search engine result page
 C. Likes
 D. Comments
 Answer: A. Search query
 Explanation: The search query is what directs the search engine to display specific results.
- 
PAN stands for 
 A. Programmer Area Network
 B. Personal Area Network
 C. Personal Area Number
 D. Programmer Area Number
 Answer: B. Personal Area Network
 Explanation: PAN connects personal devices such as laptops, phones, or tablets for individual use.
Section 5: The Digital Economy and Database Management
21. The gap between those who have effective access to digital and information technologies and those who have little or no access at all is called:
A. New Economy divide
B. Old Economy divide
C. Digital divide
D. All of the above
Answer: C. Digital divide
Explanation: The digital divide describes the inequality between individuals or societies who have access to modern technologies and those who do not. This gap affects education, employment, and economic participation.
An economy that is centred on industrialization is called:
A. New Economy
B. Old Economy
C. Digital Split
D. Mechanical Economy
Answer: B. Old Economy
Explanation: The old economy is based mainly on manual labour, factories, and machinery, while the new economy relies on technology and knowledge-based systems.
Question 23
One of these is a feature of the new economy:
A. Requires a lot of labour
B. Time-consuming
C. It is knowledge-based
D. Mechanically driven
Answer: C. It is knowledge-based
Explanation: The new economy depends on information, creativity, and innovation rather than physical labour or industrial production.
Question 24
All of these are benefits of the new economy except:
A. Creates new jobs
B. Attracts no investment
C. Greater competition
D. Businesses can start with small capital
Answer: B. Attracts no investment
Explanation: The digital economy encourages massive local and foreign investments, particularly in technology, e-commerce, and software development.
Question 25
All the following are examples of DBMS packages except:
A. MS Access
B. MS Word
C. Oracle
D. SQL Server
Answer: B. MS Word
Explanation: MS Word is a word-processing software used for document creation. A Database Management System (DBMS) stores and manages large sets of data, such as MS Access or Oracle.
Section 6: Database Concepts and Structure
Question 26
A single piece of information about an object is called:
A. Record
B. Primary key
C. Database
D. Field
Answer: D. Field
Explanation: A field is one data item in a record—for example, a student’s name or date of birth in a database.
Question 27
Which of these can serve as a primary key:
A. Name
B. Voter’s Card number
C. Address
D. Age
Answer: B. Voter’s Card number
Explanation: A primary key uniquely identifies each record in a table. Since no two people share the same voter’s card number, it serves as a perfect unique identifier.
Question 28
One of these is not a form of database:
A. Hierarchical
B. Record
C. Relational
D. Network
Answer: B. Record
Explanation: A record is part of a database, not a type. Hierarchical, relational, and network databases describe how data is organized and linked.
Question 29
…… form of database permits the organization of data in the form of a tree:
A. Hierarchical
B. Record
C. Relational
D. Network
Answer: A. Hierarchical
Explanation: In hierarchical databases, data is arranged in parent-child relationships, forming a tree structure.
Question 30
Software designed to mainly perform mathematical, statistical, and accounting calculations is called:
A. Word processing software
B. DBMS
C. Spreadsheet software
D. Presentation software
Answer: C. Spreadsheet software
Explanation: Spreadsheet applications such as Microsoft Excel are used for performing calculations, data analysis, and financial planning.
Section 7: Spreadsheet Operations and Formulas
Question 31
All of these are uses of spreadsheet software except:
A. Performing artistically related operations
B. Tax estimation
C. Budget planning
D. Preparation of payroll
Answer: A. Performing artistically related operations
Explanation: Spreadsheets are not used for artistic design. Their primary function is numerical computation and data organization.
Question 32
Which of these is a spreadsheet package:
Answer: B. MS Excel
Explanation:
Among Microsoft Office applications, Excel stands out as the most widely used tool for handling numbers and data. It allows users to perform mathematical and statistical calculations with speed and accuracy. Moreover, Excel helps in organizing, analyzing, and visualizing data through formulas, charts, and tables. Because of its versatility, it has become essential for students, accountants, and business professionals alike.
Question 33
The intersection between a row and a column is called:
A. Formula
B. Label
C. Value
D. Cell
Answer: D. Cell
Explanation: A cell is the smallest unit in a spreadsheet where data, formulas, or text are entered.
Question 34
….. displays the cell reference of the active cell:
A. Name box
B. Formula bar
C. Row
D. Column
Answer: A. Name box
Explanation: The name box shows the current cell’s address (for example, A1 or B5) in an Excel sheet.
Question 35
The first string in the MS Excel formula is:
A. *
B. =
C. +
D. /
Answer: B. =
Explanation: Every formula in Excel must start with an equal sign, indicating that a computation is about to be performed.
Question 36
The formula to add Cell A3 to Cell A13 in MS Excel is:
A. = 3 + 13
B. SUM(A3:A13)
C. =SUM(A3:A13)
D. All of the above
Answer: C. =SUM(A3:A13)
Explanation: The correct Excel syntax uses the equal sign before the SUM function to calculate the total of a range.
Question 37
Numeric data that are entered into spreadsheet cells are called:
A. Formula
B. Labels
C. Values
D. Cells
Answer: C. Values
Explanation: Values are numbers used for calculations, while labels refer to text entries.
Question 38
A single page in a spreadsheet is called:
A. Workbook
B. Worksheet
C. Sheet
D. Book
Answer: B. Worksheet
Explanation: A worksheet is one page within a workbook, where data is entered and analyzed.
Question 39
A cell that is currently selected for data entry is called:
A. Function
B. Cell reference
C. Active cell
D. Anchor cell
Answer: C. Active cell
Explanation: The active cell is highlighted and ready to receive input in Excel.
Question 40
Which of these is not a function in Excel:
A. SUN
B. COUNT
C. MAX
D. MIN
Answer: A. SUN
Explanation: The correct spelling is SUM, not SUN. COUNT, MAX, and MIN are valid Excel functions used for data analysis.
Section 8: Input, Output, and Storage Devices
41. A computer’s physical components that you can see and touch are called
A. Software
B. Hardware
C. Data
D. Information
Answer: Hardware
Explanation: Hardware includes all the tangible parts of a computer system such as the monitor, CPU, keyboard, and mouse. They are the visible, touchable elements that make up the computer’s body.
42. The set of instructions that tells the computer what to do is called
A. Hardware
B. Software
C. Peripherals
D. Network
Answer: Software
Explanation: Software refers to programs and applications that direct a computer’s hardware on how to perform specific tasks. It is intangible but essential for every computer operation.
43. Which of these is an example of an input device?
A. Monitor
B. Printer
C. Keyboard
D. Speaker
Answer: Keyboard
Explanation: Input devices send information to the computer for processing. A keyboard allows users to enter text, numbers, and commands.
44. A device used to display output from a computer is a
A. Mouse
B. Scanner
C. Monitor
D. Microphone
Answer: Monitor
Explanation: The monitor shows the processed output, such as images, text, and videos, making it an essential output device for visual display.
45. The brain of the computer is the
A. CPU
B. RAM
C. Hard Drive
D. Motherboard
Answer: CPU
Explanation: The Central Processing Unit (CPU) executes all instructions, performs calculations, and manages operations — just as the human brain controls the body.
Section 9: Memory and Storage Systems
46. RAM stands for
A. Read Access Memory
B. Random Array Memory
C. Random Access Memory
D. Read-only Memory
Answer: Random Access Memory
Explanation: RAM is a temporary memory that holds data and instructions while the computer is running. It allows for quick data access and efficient multitasking.
47. Which of these is a secondary storage device?
A. RAM
B. ROM
C. Hard Disk Drive
D. Cache Memory
Answer: Hard Disk Drive
Explanation: Secondary storage devices like hard drives permanently store data, applications, and files for future use.
48. The operating system is an example of
A. Application software
B. System software
C. Utility software
D. Freeware
Answer: System software
Explanation: System software, such as Windows or macOS, manages computer hardware and provides an environment for other software to operate.
49. MS Paint is a type of
A. Word processor
B. Spreadsheet
C. Graphics software
D. Database
Answer: Graphics software
Explanation: MS Paint allows users to draw, paint, and edit images, making it a basic form of graphics design tool for beginners.
50. A computer network that covers a large geographical area is called a
A. LAN
B. MAN
C. WAN
D. PAN
Answer: WAN
Explanation: A Wide Area Network (WAN) connects computers across cities, countries, or continents, using long-distance communication lines.
Section 10: Communication and Networking
51. A device used to convert a hard copy into a soft copy is a
A. Printer
B. Scanner
C. Monitor
D. Plotter
Answer: Scanner
Explanation: Scanners read printed materials and convert them into digital files that can be stored or edited on a computer.
52. Which of these is an example of a pointing device?
A. Keyboard
B. Mouse
C. Microphone
D. Speakers
Answer: Mouse
Explanation: A mouse helps users control the pointer on the screen, select items, and interact with programs quickly.
53. The process of starting a computer is known as
A. Loading
B. Installing
C. Booting
D. Running
Answer: Booting
Explanation: Booting is the process through which a computer loads its operating system from storage into memory, preparing it for use.
54. Which of these is not an operating system?
A. Windows
B. Linux
C. Google Chrome
D. macOS
Answer: Google Chrome
Explanation: Google Chrome is a web browser used to access the internet, while the others are operating systems that run the entire computer.
55. A software used to create, edit and format text documents is called a
A. Spreadsheet
B. Database
C. Word processor
D. Presentation software
Answer: Word processor
Explanation: Word processors such as Microsoft Word are designed to handle text-based documents for reports, letters, and essays.
Section 11: Internet and Cybersecurity
56. Which of these is a popular web browser?
A. Microsoft Word
B. Adobe Photoshop
C. Mozilla Firefox
D. Microsoft Excel
Answer: Mozilla Firefox
Explanation: Mozilla Firefox is a widely used web browser that allows users to navigate and interact with websites.
57. E-commerce refers to
A. Buying and selling goods on a phone
B. Exchanging emails
C. Buying and selling goods on the internet
D. Using an electronic calculator
Answer: Buying and selling goods on the internet
Explanation: E-commerce involves using online platforms to buy, sell, and exchange products or services through secure electronic transactions.
58. The process of sending and receiving messages electronically is called
A. E-banking
B. E-mail
C. E-commerce
D. E-learning
Answer: E-mail
Explanation: Email allows individuals and organizations to communicate instantly through electronic mail systems across the internet.
59. A computer virus is a type of
A. Anti-virus software
B. Malicious software
C. Spreadsheet
D. Browser
Answer: Malicious software
Explanation: A computer virus is a harmful program that can corrupt files, slow down operations, or steal information from users.
60. A firewall is a security system that protects a computer network from unauthorized access.
A. True
B. False
Answer: True
Explanation: A firewall monitors and filters incoming and outgoing network traffic, blocking unauthorized access and preventing cyberattacks.
Section 12: Storage and File Management Systems
61. An example of a flash memory storage device is a
A. Floppy disk
B. Hard disk drive
C. DVD
D. USB flash drive
Answer: USB flash drive
Explanation: A USB flash drive is a portable storage device that uses flash memory to store and transfer data. It is faster and more reliable than older storage options like floppy disks.
62. Which of these is a magnetic storage device?
A. CD-ROM
B. Hard Disk Drive
C. Blu-ray Disc
D. SD Card
Answer: Hard Disk Drive
Explanation: Hard Disk Drives (HDDs) use magnetic storage to record and retrieve digital data through spinning platters and read/write heads.
63. The smallest unit of data in a computer is a
A. Byte
B. Bit
C. Kilobyte
D. Megabyte
Answer: Bit
Explanation: A bit, short for “binary digit,” represents the smallest unit of information in computing, having a value of either 0 or 1.
64. A collection of related data or information is called a
A. File
B. Folder
C. Document
D. Database
Answer: File
Explanation: A file stores related data that can be accessed or modified as a single unit, such as a document, image, or program.
65. The process of organizing files on a computer is called
A. Booting
B. File management
C. Formatting
D. Deleting
Answer: File management
Explanation: File management helps users organize, retrieve, and maintain files efficiently using folders, drives, and naming systems.
66. To save a file with a new name or in a new location, you use the
A. Save command
B. Save As command
C. New command
D. Open command
Answer: Save As command
Explanation: The “Save As” command allows users to rename a file or choose a different location without overwriting the original version.
67. Which of these is a command used to undo the last action?
A. Ctrl + C
B. Ctrl + V
C. Ctrl + Z
D. Ctrl + X
Answer: Ctrl + Z
Explanation: Pressing “Ctrl + Z” reverses the most recent action, helping users correct mistakes instantly.
68. To copy a selected text, you use the keyboard shortcut
A. Ctrl + X
B. Ctrl + V
C. Ctrl + C
D. Ctrl + P
Answer: Ctrl + C
Explanation: “Ctrl + C” is the standard command for copying text, images, or files to the clipboard for later use.
69. The main screen of a graphical user interface (GUI) is called the
A. Taskbar
B. Desktop
C. Start menu
D. Folder
Answer: Desktop
Explanation: The desktop is the main workspace in a graphical interface, where icons, files, and shortcuts are displayed for easy access.
70. A small picture or symbol that represents a file, folder, or program is an
A. Icon
B. Cursor
C. Menu
D. Window
Answer: Icon
Explanation: Icons serve as visual representations of applications or documents, helping users navigate their computers quickly.
Section 13: Operating Systems and Application Software
71. The software that manages a computer’s memory, processes, and all its hardware and software is the
A. Application software
B. Operating system
C. Utility software
D. Driver
Answer: Operating system
Explanation: The operating system controls all computer operations and ensures that hardware and software work together efficiently.
72. The command used to shut down a computer is typically found in the
A. Control Panel
B. My Computer
C. Start menu
D. Taskbar
Answer: Start menu
Explanation: The “Start” menu provides power options like restart, sleep, and shutdown, allowing users to safely turn off their computers.
73. Which of these is a feature of a modern operating system?
A. Single tasking
B. Command line interface
C. Multitasking
D. Limited memory usage
Answer: Multitasking
Explanation: Modern operating systems allow multiple applications to run simultaneously, improving efficiency and user experience.
74. An example of a text editor is
A. MS Word
B. Notepad
C. Google Sheets
D. PowerPoint
Answer: Notepad
Explanation: Notepad is a simple text editor used to create and edit plain text files, often used for coding and basic documentation.
75. What is the primary purpose of a spreadsheet application?
A. Creating presentations
B. Managing databases
C. Performing calculations
D. Sending emails
Answer: Performing calculations
Explanation: Spreadsheets such as Microsoft Excel handle numerical data, automate calculations, and generate reports efficiently.
76. The intersection of a row and a column in a spreadsheet is called a
A. Sheet
B. Cell
C. Table
D. Field
Answer: Cell
Explanation: A cell is the basic unit in a spreadsheet where data is entered. It is identified by a unique combination of its row and column.
77. A formula in Excel always begins with a(n)
A. Plus sign (+)
B. Equal sign (=)
C. Hash symbol (#)
D. Dollar sign ($)
Answer: Equal sign (=)
Explanation: Every formula in Excel starts with an equal sign, indicating that the entry is a calculation rather than plain text.
78. To apply an animation to a slide in PowerPoint, you would use the
A. Design tab
B. Transitions tab
C. Insert tab
D. Animations tab
Answer: Animations tab
Explanation: The Animations tab in PowerPoint allows users to add visual effects to text or objects, enhancing presentations’ appeal.
79. A software used for creating and presenting slides is called
A. Word processing software
B. Spreadsheet software
C. Presentation software
D. Graphics software
Answer: Presentation software
Explanation: Presentation software, such as Microsoft PowerPoint, helps users organize information into slides for visual communication.
80. The process of converting a digital file into a printed document is called
A. Scanning
B. Saving
C. Printing
D. Exporting
Answer: Printing
Explanation: Printing transfers digital content from a computer to paper, producing a physical copy for sharing or record-keeping.
Section 14: Internet, Network, and Cybersecurity Concepts
81. The World Wide Web is a system of
A. Interlinked web pages accessed via the internet
B. Personal computer files
C. Computer hardware components
D. Data storage devices
Answer: A. Interlinked web pages accessed via the internet
Explanation: The World Wide Web (WWW) is a collection of interlinked web pages accessible through the internet. It allows users to browse, search, and access information globally using web browsers such as Chrome or Firefox.
82. A unique address that identifies a specific website on the internet is called a
A. URL
B. HTTP
C. E-mail address
D. HTML
Answer: A. URL
Explanation: A URL, or Uniform Resource Locator, is the specific web address used to access a website. For instance, www.example.com is a URL that directs you to a specific web page.
83. The process of transferring a file from a remote computer to your computer is called
A. Uploading
B. Downloading
C. Browsing
D. Streaming
Answer: B. Downloading
Explanation: Downloading means transferring data from the internet or a remote computer to your local device. For example, saving a document or a song from a website is a downloading process.
84. A computer that stores files and data and makes them available to other computers on a network is called a
A. Client
B. Workstation
C. Server
D. Hub
Answer: C. Server
Explanation: A server is a central computer that stores, manages, and distributes files or data to other computers (clients) on a network. It is the backbone of internet operations.
85. Which of these is a way to protect your computer from unauthorized access?
A. Sharing all your files
B. Using a weak password
C. Installing an anti-virus software
D. Clicking on every link
Answer: C. Installing an anti-virus software
Explanation: Anti-virus software helps detect and block malicious programs, preventing unauthorized access to your computer. It ensures system security and data protection.
86. Unwanted emails that are usually advertisements are called
A. Spam
B. Phishing
C. Malware
D. Trojans
Answer: A. Spam
Explanation: Spam refers to unsolicited or irrelevant messages sent in bulk, mainly for advertisements. Such emails often clutter inboxes and may carry unsafe links or files.
87. The act of using a computer to access another person’s personal data or information without their permission is called
A. Blogging
B. Hacking
C. Surfing
D. Streaming
Answer: B. Hacking
Explanation: Hacking is the illegal process of gaining unauthorized access to another person’s computer or data. It is a serious cybercrime and violates digital privacy laws.
88. A set of rules that computers use to communicate over a network is called a
A. Protocol
B. Address
C. Browser
D. Search engine
Answer: A. Protocol
Explanation: A protocol is a standard set of rules that governs how data is transmitted across networks. Common examples include HTTP (for web browsing) and FTP (for file transfer).
89. The term used to describe a computer user who intentionally tries to break into computer systems is a
A. Programmer
B. Analyst
C. Hacker
D. Web developer
Answer: C. Hacker
Explanation: A hacker is a person who uses technical skills to gain unauthorized access to systems or networks. Some hackers exploit weaknesses for malicious purposes, while others (ethical hackers) help improve security.
90. The practice of using a computer to conduct financial transactions, like checking your account balance or transferring money, is known as
A. E-commerce
B. E-banking
C. E-learning
D. E-mail
Answer: B. E-banking
Explanation: E-banking (electronic banking) enables customers to perform financial transactions via the internet. It includes online fund transfers, bill payments, and account monitoring.
 
									 
					


