PES SS 2 ICT 2nd Term Exam (Obj) 2025/2026
  • 1. What is the full meaning of email?
A) Electrical mail
B) Electricity mounted
C) Electronic mail
D) Electric machine
  • 2. What is the internet?
A) It is a company that employ only smart people
B) A big market where everyone has a voice
C) A network of networks connecting users worldwide
D) It is a network provider in Nigeria
  • 3. What is an algorithm?
A) It is a machine used to power computers
B) It is a musical instrument
C) It is a technique used to enhance internet speed
D) It is a step by step procedure or set of rules to be followed in calculations or other problem solving operations.
  • 4. Characteristics of a good algorithm include _____________
A) Punctuality
B) Practice
C) Precision.
D) Patience
  • 5. Another characteristic of a good algorithm is _____________
A) Finishing
B) Finiteness
C) Factual
D) Feeling real
  • 6. What is a flowchart?
A) It is a chat from strangers
B) It is any chat you did not initiate
C) It is graphical representation of an algorithm.
D) It is a private chat
  • 7. Standard flowchart symbols include ________________
A) Triangle
B) Square
C) Terminal (oval)
D) Star
  • 8. Another flowchart symbol is _________
A) Input /output
B) A circle
C) Length and width
D) Short and tall
  • 9. One importance of algorithms and flowcharts is _____________
A) Timing
B) Delegating
C) Planning
D) Viewing
  • 10. Another importance of algorithms and flowcharts is ________________
A) Producing
B) Directing
C) Communication
D) Restricting
  • 11. Importance of algorithms and flowcharts include ___________
A) Debugging
B) Signaling
C) Assertiveness
D) Accuracy
  • 12. What is the purpose of control structure?
A) To determine how the programme works
B) To control the flow of a program's execution, making decisions or repeating actions.
C) To control the activities of others.
D) To be a guide
  • 13. What are loops used for?
A) Used to repeat information
B) Used just once
C) Used to repeat a certain type of music
D) To repeat a block of code multiple times without you having to write it out over and over again.
  • 14. When is "for loop" used?
A) It is used according to one's feelings
B) It is used once a day
C) It is used when you know exactly how many times you want to repeat
D) It is used once a month
  • 15. In Programming, what is a function?
A) It is the method of doing things
B) A function is a named block of code designed to perform a specific task.
C) It is how a task is carried out
D) It is a standard
  • 16. What is big data?
A) It means a very big internet data plan
B) It means various data combined into one
C) It means an unlimited data plan
D) It refers to extremely large and complex datasets that are too heavy for traditional software.
  • 17. Why is Analytics used in big data?
A) It is used to keep the data secured
B) It is used to keep everything detailed
C) It examines the data size
D) It is used in the process of examining data to find hidden patterns, treads and miggets of useful information.
  • 18. Define social media.
A) Platforms for users to create, share, and interact with content.
B) It is an online market
C) It is an online party
D) It is a place where one meets strangers
  • 19. Examples of social media are _______
A) Whatsapp and Facebook
B) Google mail
C) Google chrome
D) Google docs
  • 20. Which of the following are correct uses of the internet ________
A) Communication, information sharing, online transactions and education.
B) Hacking
C) Scamming
D) Exploitation
  • 21. Advantages of the internet are _______
A) It makes one healthier
B) It makes you smarter overnight
C) Guaranteed instant wealth
D) Access to vast information, global connectivity, online services, remote work opportunities, and e-commerce.
  • 22. Disadvantages of the internet are ________
A) Weight loss
B) Blindness
C) Poor thinking habit
D) Cybercrime, misinformation, privacy concerns, addiction, and social isolation.
  • 23. What is cyber bullying?
A) It means pretending to be someone else
B) It means telling lies
C) It means making people happy
D) Harassment or intimidation via digital means, like social media or messaging apps.
  • 24. What is scamming?
A) Asking friends for financial support
B) Lying to family members
C) Fraudulent schemes to deceive people, often online, for financial gain.
D) Asking a stranger for financial help
  • 25. What should happen to scammers?
A) They should be pardoned and given a second chance
B) Scammers should face legal consequences, including prosecution and penalties, to deter fraud and protect victims.
C) They should be forgiven
D) They should be prayed for
  • 26. What does ICT stand for?
A) International Committee of Teachers
B) International Children's Team
C) Information and Communication Technology
D) Information and Chat Techniques
  • 27. What device is used for internet connectivity?
A) Router
B) Search engine
C) Bluetooth
D) Browser
  • 28. What is the main purpose of a firewall?
A) It is an emergency service
B) To put out fires
C) To block unauthorized network access
D) To prevent fires in a building
  • 29. What does URL stand for?
A) Ultra rapid loading
B) Universal remote link
C) User response locator
D) Uniform Resouce Locator
  • 30. What does wi-fi stand for?
A) Wireless Fidelity
B) Wireless facilities
C) Wired facilities
D) Wireless format
Created with That Quiz — a math test site for students of all grade levels.