A similarity between data and information is that both?
3
The computer hardware can be classified into
4
The outcome of a processed data in a computer is known as
5
Which of the following devices is not a micro computer?
6
Which of the following computing devices did not exist in the pre-computing age to the 19th century?
7
The computing devices invented by Charles Babbage are?
8
In a computer, the sets of instruction that direct it in performing a particular task is called?
9
The property of a disk that determines the amount of data it may contain is?
10
Which of the following items best describes the term hardcopy?
11
Which of the following is not an output device?
12
Which of the following signifies the correct association between a hardware component and its functions?
13
Fig 1above is a logic gate. Use it to answer the question below Fig 1 represents_________?
14
.
15
Which of the following software is best suitable for keeping records during national population census?
16
A major function of system software is_________?
17
An advantage of Graphical User Interface (GUI) over Disk Operating System (DOS) is that it allows the use of __________?
18
Which of the following methods is not suitable for securing files?
19
Which of the following programming languages needs no translator for it to run?
20
Fig.2 is a system development cycle. Use it to answer the question below The path labelled I is the __________?
21
Fig.2 is a system development cycle. Use it to answer the question below The path labelled II is the __________?
22
Fig.2 is a system development cycle. Use it to answer the question Above The path labelled III is the _________?
23
Fig.3 is a flowchart. Use it to answer the question below The part labelled I represents_________
24
Fig.3 is a flowchart. Use it to answer the question below The part labelled II represents______
25
Fig.3 is a flowchart above. Use it to answer the question below The part labeled III represents________
26
The acronym HTTP stands for________
27
In ring topology, the computer that is allowed to transmit data possesses the ________
28
The most cost-effective and secure way of transmitting confidential messages among the employees of an organization is the ___________
29
The application software which allows information available on the internet to be obtained is called _________
30
A modern and a telephone connection are provided. Other things needed to be able to connect a computer to the internet are _______
31
Which of the following is employed in the transfer of data between computers and a network?
32
Which of the following software can be used for graphic production?
33
In word processing, the icon in Fig.4 is used for __________
34
Which of the following items is not located on the MS Word menu bar?
35
Use Table 3 to answer the questions below A B C D E 1 BOOK SUPPLIED TO SENIOR HIGH SCHOOLS 2 MATHS ICT ENGLISH 3 SHS1 3450 4500 5678 4 SHS11 8765 6580 9000 5 SHS111 2456 4009 4400 In table 3, the content of cell C5________
36
Use Table 3 to answer the questions below A B C D E 1 BOOK SUPPLIED TO SENIOR HIGH SCHOOL 2 MATHS ICT ENGLISH 3 SHS1 3450 4500 5678 4 SHS11 8765 6580 9000 5 SHS111 2456 4009 4400 The number of cells that contain data in row 1 is_________
37
Use Table 3 to answer the questions below A B C D E 1 BOOK SUPPLIED TO SENIOR HIGH SCHOOLS 2 MATHS ICT ENGLISH 3 SHS1 3450 4500 5678 4 SHS11 8765 6580 9000 5 SHS111 2456 4009 4400 Which cells in table 3 contain numeric data with the least value?
38
In changing the storage location of a file, the command to use is_______
39
Which of the following statements is true about registers?
40
The Instruction fetched into the CPU is decoded by the___________
41
The process of restarting a computer is known as ________
42
Evaluate the BASIC statement: LET Z = 4*W^2 + 2*Y Given that W = 5 and Y = 10
43
Given that 26 \(_10\) = X \(_2\), X is _________
44
In hexadecimal number system, B, D, E represent_________
45
The conversion of 11001 \(_2\) to base 10 equals_______
46
The transaction file can also be described as _______
47
Which of the following statements is not true about a computer file?
48
An advantage of sequential access over serial access is that_______
49
The Use of electronic systems to send an unsolicited e-mail to someone's address is known as ______
50
Which of the following ideals is protected by copyright?
51
Quantitative data can exist in
52
Data created by the user is called
53
The sequence of operation of a computer is
54
Which of the following descriptions is not true about data?
55
Which of the following statements is true about super computers? They
56
The Slide Rule is accurate to
57
What factors will motivate a field engineer into choosing a notebook computer over a desktop computer ?
58
A collection of wires through which data are transmitted from one part of the computer to another is known as
59
The total possible combinations of the input variables for a logic gate containing three input variables is
60
What is the least number of 750 MB capacity CD-ROM discs needed to transfer 10 GB size file?
61
The logic gates represented in Figure 1 is called
62
Use the logic gate in Fig 2 to answer question 12. Which of the logic gates will give an output opposite to the input state?
63
Use the logic gate in Fig 2 to answer question 13. Which of the following statements is true about logic gates X and Y?
64
The logical equation for the logic circuit in Figure 3 is
65
The operation of a computer and peripherals attached to it is controlled by
66
COBOL was developed for
67
The operating system performs the following operations except
68
The fundamental purpose of the BIOS is
69
The IF... THEN statement in BASIC is called
70
The use of natural language and symbols to write instructions for the computer is called
71
Which of the following stages of the SDLC is post-operational stage?
72
The expression 5 + 3*4/2 - 3^2 in QBASIC evaluate to
73
Use figure 4 to answer question 23 The basic problem with the flow chart is that it has
74
Use Figure 4 to answer question 24 What activity is the flowchart made to represent?
75
Use Figure 4 to answer question 25 If N in the flowchart is represented by 10, which of the following conditions is not true?
76
A computer system on the network that stores pages, takes request from clients as well as send out information is called a
77
The device is Figure 5 uses a transmission method called
78
In Figure 6 the signals from modem X to modem Y is
79
The "/exams"in the web address; https;//www.waec.org.ng/exams is called
80
Which of the following statements about URL is true? It is
81
The type of network represented in Figure 7 is called
82
In MS Excel, the cell that contains the pointer or cursor is called
83
The part of the graphic interface in Figure 8 labelled V is called
84
The figure 2 in the number 1101\(_2\) is indicated in MS Word using a feature called
85
The part of the MS Access interface labelled X in Figure 9 is called
86
Which of the following formulas will display the current seconds past the minute os the clock in MS Excel?
87
The part of the MS Word interface labelled II in Figure 10 is called
88
What type of relationship can you deduce from the statement a department has many employees?
89
The screen background where icons and windows are displayed is GUI is called
90
The windows shortcut key for closing an active application is
91
Changing the default settings or appearance of the Taskbar in windows by a user is known as
92
The part of the computer system shown in Figure 11 is used to
93
A single character in an EBCDIC encoding system can be represented using
94
Evaluate 10011\(_2\) - 1111\(_2\)
95
The binary number 0.1101 in decimal is
96
To prevent unforeseen data loss, a user must
97
The file access method shown in Figure 12 is called
98
Which of the following options is not a similarity between computer file and manual file ? Both can
99
A computer program that gathers information about a person or organization without their knowledge or consent is known known as
100
The following actions are the effects of virus infection in a system except
114
Charles Babbage was the first to?
115
Which of the following devices is not a micro computer?
116
The main difference between a laptop and a desktop is that, a laptop?
117
Abacus is used for?
118
The computer hardware is made up of system unit and?
119
The computer memory is, measured in?
120
If the output signal of any logic gate is fed into an inverter, the results is? .
121
The device through which the main components of the computer communicate with each other is called?
122
The hardware of a computer does not consist of?
123
Output devices in a computer are those devices that send?
124
Which of the following is not a mobile input device?
125
Figure 1 above is a logic gate. Use it to answer questions 12 to 14. Figure 1 represents?
126
X, Y and Z respectively, represents?
127
Use the Logic gate above to answer this question. When signals X= 0 and Y= 1, signal Z is?
128
The memory unit of the computer belongs to the?
129
Which of the following is not a function of the operating system?
130
An example of a specific purpose application package is the?
131
The operating system, translators and utility programs are examples of?
132
The first stage in program development is problem?
133
A pictorial representation of program flow is referred to as?
134
An example of a programming language that uses mnemonic codes is?
135
The use of satellite to transmit signal information to the earth is enabled with the use of?
136
.The line segment that describes the contents of the message when sending an e-mail is?
137
Which of the following networks covers the widest range?
138
The keyboard command used to copy text in Ms-Word document is?
139
The colour palette in CorelDraw allows the user to?
140
In order to get to the symbol dialog box in MS-Word click on the?
141
In a network, the workstation is usually.connected to the?
142
When browsing on the internet, a possible reason for. the message "page not found" is that?
143
Which of the following is not a network device?
144
Which of the following is a valid e-mail address?
145
In word processing, an efficient way to move the second paragraph and place it after the fourth paragraph is?
146
Which of the following items changes shape depending on the task being performed?
147
The computer keyboard key(s) that a user presses to move to the beginning of a current line of text is/are the?
148
Data loss in a computer cannot be prevented by the use of?
149
The shortcut command used in restarting a computer is?
150
The term bus' width in data transfer refers to the?
151
The part of the computer that holds the data and pro- grams for CPU processing is the?
152
A high level language can be converted to a machine language using?
153
Which of the following statements is true of encryption? It
154
Computer ethics are important because they?
155
Which of the following is the main advantage of intellectual property right?
156
Which of the following statements is true of free software? It
157
In hexadecimal number system, B, D and F represent which of the following decimal numbers?
158
The conversion of 11001\(_2\), to base ten equals?
159
9\(_{10}\) is equivalent to X\(_8\), where X is?
160
Use the MS-Excel table below to answer questions 48 to 50. A B C D 1 BOOKS SUPPLIED TO SENIOR HIGH SCHOOL 2 FORM MATHS ICT ENGLISH LANG 3 SHS I 2456 6580 5678 4 SHS II 3450 4009 4400 5 SHS III 8765 4500 9000 The content of cell D3 is?
161
Use the MS-Excel below to answer this question. A B C D 1 BOOKS SUPPLIED TO SENIOR HIGH SCHOOL 2 FORMS MATHS ICT ENGLISH LANGUAGE 3 SHSI 2456 6580 5678 4 SHSII 3450 4009 4400 5 SHSIII 8765 4500 9000 The number of cells that contain data in row 1 is?
162
The number of cells that contain numeric data in the table above is?
168
The first calculating device is the?
169
Which of the following represents features of a computer? I. It is constructed from electronics components. II. It has self regeneration capability. IlI. It has facility for storage of data and programs. IV. It has provision for input and output data.
170
Arrange in a hierarchical order by date, the following inventions: I. slide rule; Il. pascaline; IIl, analytical engine; v. difference engine.
171
Which of the following is true about raw data?
172
Which of the following was used by Joseph Marie Jacquad in inventing the Loom?
173
Which generation of computers used vaccum tubes in their circuitry?
174
The full meaning of the acronym ENIAC is?
175
The primary memory of the computer can be divided into?
176
A common communication pathway shared by hard- ware components in the computer is called?
177
Which of the following can be described as the brain of the computer hardware?
178
Which of the following is not a computer output device?
179
Data to be processed by the microprocessor is temporarily stored in the?
180
The smallest unit of information representation which is addressable on the computer memory is?
181
Software is referred to as the?
182
The software whose output is intended for the human user is called?
183
The parts of the taskbar include: I recycle bin Il start button lII system tray IV quick launch toolbar
184
The similarities between main memory and registers is that they are: I volatile Il under the direct control of the user ll protected by the system unit lIV for system use only?
185
A pictorial representation of the logic of a program is called?
186
A subroutine is called in a flowchart through the use of?
187
The symbol used to represent an execution flow in a flowchart is?
188
A suitable BASIC notation for the expression mc\(^2\) is?
189
Use the BASIC program below to answer questions 23 to 25 10 LET K = 2 20 LET L = 9 30 LET SUM = 0 40 FOR J = K TO STEP 2 50 SUM = SUM + J\(^2\) 60 PRINT "ANSWER =", SUM 70 NEXT J 80 END How many times will the statement lines 50 and 60 be repeated?
190
Which of the following best represents the sequence of output from the program?
191
Use the BASIC program below to answer this question 10 LET K = 2 20 LET L = 9 30 LET SUM = 0 40 FOR J = K TO STEP 2 50 SUM = SUM + J2 60 PRINT "ANSWER =", SUM 70 NEXT J 80 END The last output that will be displayed by the program is
192
Which of the following networks can be extended to cover continents?
193
Identify the browsers in the following list: I telnet II netscape navigator.ll opera IV mozilla firefox
194
Trap doors and bombs are typical examples of?
195
The first four steps required to open e-mail account include: I click on "Create my account" II go to home page of the service provider lll click "create new account" IV click on "mail"
196
The two main components of a radio communication system are?
197
Which of the following can a traveler who finds himself in a new environment rely on for direction to his final destination?
198
The default number of sheets of a workbook is?
199
The chart type that does not have the X and Y axis display is the?
200
When a worksheet is deleted from a workbook, it is?
201
A block of text that is marked by the tab key when the enter key is pressed can be referred to as?
202
Principal uses of word processing software packages include: I preparing deft articles for publication ll pre- paring reports for top management Ill preparing accounts IV preparing organizations' newsletter.
203
In a database, a primary key is a field which contains?
204
One megabyte is equivalent to?
205
Converting 4B7\(_16\) to binary?
206
The speed of data transfer in the computer can be determined in terms of ?
207
The initial screen that is displayed after a computer booting is referred to as?
208
Which of the following is not a biometric data?
209
The main advantage of intellectual property right is?
210
The word bit refers to?
211
The decimal number 1024 in hexadecimal equivalent is?
212
Which of the following is true of a digital logic gate? .
213
Which of the following is a temporary file that can be used only once and then discarded?
214
Sorting of records is sufficient and a necessary condition for creating?
215
The illegal copying and use of proprietary/copy righted software is called?
216
Symptoms of computer virus attack include: I improved processing speeds; Il drive light coming up without apparent reason; Ill unexplainable printer activity; IV the disappearance or strange files appearance on the screen
223
The "collection of the unorganized facts and figures" is called?
224
The census machine was invented by?
225
A graph plotter is most suited for use in a/an?
226
A set of programs, routines and procedures that are used to operate the computer hardware is called?
227
Which of the following can be used to write a high level program source code?
228
A computer that requests the services of another computer on a network is called a?
229
The available page orientation in Microsoft Word are?
230
The copyright law is used to protect?
231
Which of the following components is directly located inside the computer processor?
232
Napier's Bone was designed purposely for calculation of?
233
The hardware component that is responsible for fetching, decoding and execution of program instruction is?
234
Which of the following is found on the taskbar?
235
A high level language program translator which converts a source code to machine readable format and compile executes it one line at a time is?
236
Use the following QBASIC statement to answer questions 14 and 15. DIM DEPOSIT (1, 10) 14. The keyword DIM in the statement stands for?
237
The expression DEPOSIT (1, 10) stands for an array with?
238
In a star network, each node must?
239
Which of the following views is used to create data base objects in Microsoft Access?
240
A field chosen to uniquely identify every record in a database is?
241
Use the table below to answer questions 19 to 21 Character Decimal code ASCII CODE N 78 1001110 O 1 1001111 T 84 11 The cell labelled I in the table represents?
242
Us the table below to answer this question Character Decimal Code ASCII Code N 78 1001110 O 1 1001111 T 84 II The cell labeled ll in the table represents?
243
The ASCII code for the word NOT can be written as?
244
Which of the following is not a method of accessing file?
245
The advantages of a computer include that they? I. operate at high speeds; II. think for the user; Ill. are accurate; IV. are credible.
246
In MS Excel, comments used in cells are called?
247
Which of the following statements is not true about secondary storage media? They
248
Which of the file formats is supported in all windows operating systems?
249
Which of the following symbols is not a relational operator in BASIC programming language?
250
The following are features of web browsers except?
251
The act of translating data into a secret code is known as?
252
The absolute address of cell G5 in a spreadsheet application is represented by?
253
Soft boot is initiated by pressing?
254
Which of the following factors limits access to computerized file system? it
255
Which of the following is not a good ICT security policy?
256
INPUT OUTPUT P O R 0 0 1 0 1 0 1 0 0 1 1 0 The table above represents the Truth Table for?
257
Use the information below to answer questions 35 and 36 I-Mouse Il. -Keyboard III-Scanner IV. -Joystick. The input devices used to capture date of birth on an Online form are?
258
Use the information below to answer this question I. - Mouse II. - Keyboard III. - Scanner IV. - Joystick. The input devices used to capture finger print is?
259
To hibernate windows operating system means?
260
Which of the following statements can be used for looping in BASIC?
261
The flowchart ♦ symbol represents?
262
Which of the following tasks is accomplished by using bookmarks? To
263
Which of the following function keys can be used to run slide show in a PowerPoint presentation?
264
Use the MS Excel table below to answer questions 42 and43 The formula used to compute the TOTAL VALUE in cell D7 is? S/N A B C D 1 STOCK LIST OF TAYO OKEKE AS AT MAY 2014 2 QUOTED STOCK SHARE UNIT IN THOUSAND CURRENT UNIT(#) VALUE 3 TANZEL PLC 44 50 2,200.000 4 KAPTOL 125 80 #### 5 BANK KLM 75 140 #### 6 ARIX OIL 10 250 2,500.00 7 TOTAL VALUE
265
.
266
Which of the following statements is true for a circuit Switching communication system?
267
The first three steps to open an email account include: I. - Click on create my account; II. - Go to home page; llI - Click create new account.
268
Converting 4B7\(_{hexadecimal}\) to binary is?
269
The modifier keys on the computer keyboard comprises of?
270
Arrange in hierarchical order by date the following inventions: I. - Census machine; Il. - Abacus; lll. - Slide rule; IV.- Difference engine.
271
A student mistakenly pressed the F5 key on keyboard while browsing on the internet. This will lead to?
272
Opening an already existing sequential file in output (O) mode will lead to?
282
Data can be defined as?
283
Which of the following output devices was common among the computing devices of the 19th century?
284
The pre-computing age device which made use of beads and frames is?
285
The system unit houses the following components except?
286
The system unit houses the following components except?
287
During program execution in the central processing unit, the instruction is interpreted by the?
288
The most important system software in a computer system is the?
289
QBASIC keywords do not include?
290
An icon, a graphic or a text in a document or a webpage that connects to another file or object is called a?
291
The largest component in a spreadsheet is?
292
Warm boot in computing is the same as?
293
The basic computer operation involves the following except?
294
The file that contains historical record is called a?
295
Random file organisation is also known as?
296
Which of the following options is not a data type?
297
The major components of a computer system are?
298
The largest computer system in terms of processing power is A?
299
Figure 1 is a logic gate. Use it to answer the question below. The logic gate represented in Figure 1 is called
300
Identify the logic gate in figure 2
301
Which of the following programs is an application specific?
302
The following programs are general-purpose application software except?
303
The following are relational operators in QBASIC?
304
The three levels of programming language?
305
which of the following network cables offers highest data transmission?
306
The following components are network interconnecting devices EXCEPT?
307
Which of the following options is not an advantage of linear bus topology?
308
Which of the following components are data communication equipment? I. Scanner ll. Hub lIl. Modem
309
The speed of data transfer in the computer can be determined in terms of?
310
The process of restarting the computer system is known as?
311
The ASCII chart control characters using numeric codes ranging from?
312
A row in a database table is referred to as?
313
The conversion of readable data to unreadable codes in order to prevent unauthorised access is known as?
314
The algebraic equation for the AND gate with input variables A and B is?
315
The command line prompt of MS-DOS operating system is represented as?
316
The process of testing the logic of programs to ensure they give correct result is known as?
317
The MS-Windows shortcut keys to initiate warm booting is?
318
The number 28 in binary is?
319
Which of the following options is a biometric data?
320
A site engineer intends to acquire a computer system. What factors Will he consider if he must choose a notebook computer over a desktop computer?
321
Use the logic truth table in figure 3 to answer question X Y Z 0 0 1 0 1 1 1 0 1 1 1 0 Given that X and Y are input variables while Z is the output. The truth table in figure 3 represents?
322
A logic gate contains three input variables. The total possible combination of the input variables is?
323
The following are the guidelines for drawing flowcharts except that it?
324
Use the infomation belowto answer questions 42 and 43. As a computer professional, you have just been con- tracted by a school to help them solve the problem they are facing in computing students' results. The school currently runs a manual system. Time and accuracy of the result are the major concerns. What would you advise the school to do?
325
If you are given the contract, what would be your first step of action?
326
Which of the following charts does not display the X and Y axes?
327
The uses of spreadsheet packages include: 1. -Preparing organisation's logo; II. - Performing sensitivity analysis; III, - Preparing reports for senior manage- ment; IV. - Preparation of profit forecasts. Which of the following options is true?
328
The common features of formula and function in spread- sheet are: -Entry is preceded by = or + symbol I. - They have fixed formats - They operate with cell addresses - Their results are displayed. Which of the following options is/are true?
329
One megabyte is equivalent to?
330
Arrange the following spreadsheet window parts in a hierarchical order by size: I. worksheet II. cell III. workbook IV. Range
331
The statement in QBASIC that is used to add data at the end of existing sequential file is?
332
Which of the following computer files can be used for updating the master file?
341
The personnel who deals with the computer and its management is called?
342
The map of Nigeria is an example of ?
343
The hexadecimal number 13, expressed as a binary here is?
344
Which of the following statements are true about computer? I.Constructed from electronic components. II. It has self regeneration capability. III. It has facility for storage of data and programs. IV.It has provision tor input and output of data.
345
Computers are classified using the following criteria except?
346
The Slide Rule is accurate to?
347
Modern computers compared to earlier computers are?
348
An input device that converts an image into text is known as?
349
The type of printer which works on the same principle as a photocopier is?
350
The output of a NAND gate is 1 when?
351
A company known as CIBITO has the following memory modules in four of its computers as shown in Table 1 Use the information in Table 1 to answer questions 11 to 13. MEMORY MODULE MEMORY TYPE NUMBER OF PINS P SIMM 30 Q SIMM 72 R SO DIMM 72 S DIMM 168 Table 1 Which of the memory modules is appropriate for a notebook computer?
352
use the table above to answer this question The memory module with the smallest physical size is?
353
A company known as CIBITO has the following modules in four of its computers as shown in Table 1. Use the information in Table 1 to answer this question. Memory module memory type No of pins P SIMM 30 Q SIMM 72 R SODIMM 72 S DIMM 168 identify the memory module with the largest physical Size?
354
The scanner and the floppy disk are?
355
The set of instructions written by computer experts to solve specific task of the user is called?
356
A Collection of software that allows the computer to operate is called?
357
A suite of software that controls and manages the basic operation of a computer is?
358
The Windows PC and the Apple Macintosh are examples of two different?
359
Machine Language instructions are expressed in?
360
The following symbols are used in flowcharting except the?
361
Three major types of language translators are?
362
. Translate 2m\(^2\) + 3n- 9 as a BASIC arithmetic expression.
363
The term compiler in computer programming refers to a?
364
The IF...THEN statement in BASIC programming is?
365
Flexibility of a good program means?
366
Fibre Optic cable transmits signal in the fom of?
367
Data transfer can be initiated through the following media except?
368
The topology represented in figure 1 is?
369
To send a created MS PowerPoint document using email to a user, the document can be added as?
370
What type of network is represented in Figure 2?
371
The major advantage of free software is that it is?
372
In MS Excel, the cell that contains the pointer or cursor is called?
373
One major difference between paper spreadsheet and electronic spreadsheet is?
374
To hold row and column titles in places so that they do not scroll when the user scrolls a worksheet, click the?
375
In Microsoft PowerPoint, two kinds of sound effect files that can be added to a presentation are?
376
A cell with a red triangle in the top-right comer in a spreadsheet application signifies?
377
Spreadsheet packages can be used for? .
378
Which of the following is true when data maintained in MS Excel workbook is linked to a word document? The word document
379
Data that is copied from an application is stored in the?
380
After several 'save' and 'delete' operations, there remain many scattered areas of data too small to be used productively. This describes?
381
The disk operating system will label three hard drives as?
382
Which of the options labeled I to IV give two stages involved in booting? I. Power On self test II. Loading of Operating System IIl. Loading of email IV. Power On Safe Mode
383
A bit as used in computing in digital communication is?
384
Multiply 101\(_2\) by 11\(_2\)
385
In BCD encoding system, 25, will be represented as?
386
The following actions are sources of breaches in computing except?
387
Effects of file insecurity include the following except?
388
Which of the file organization methods can be accessed both randomly and sequentially?
389
A computer program that gathers information about a person or organization without their knowledge or consent is known as?
390
Password reset disk should be created?
399
Which of the following is not a step involved in data conversion?
400
The communication of knowledge, concepts and ideas is referred to as?
401
The equivalent of the decimal number 89 in base 4 is?
402
Choose the incorrect statement about microcomputers?
403
Under classification by data representation. computers can be?
404
Pascal's calculating machine was useful in?
405
Arrange the following inventions in chronological order. I. Slide Rule ll. Pascaline llI. Analytical Engine IV. Difference Engine
406
Handwritten letters, typeset documents or printout Characters can be read into the computer by?
407
which of the following logic operations would select a record when at least one condition is satisfied?
408
In Figure 1, the value of Z when X = 1 and Y=0 is?
409
In Figure 1, the value of Z when X = 1 and Y=0 is?
410
A data bus that is capable of transferring 8 bytes of data at once can be rated as?
411
Which of the following memory types are nonvolatile? I. PROM II. SRAM II. EEPROM IV. DRAM
412
A company known as CIBITO has the following memory modules in four of its computers as shown in Table 1. Which memory module will be appropriate for graphic design? Table 1 Memory Module Memory Type Number of Pins P SIMM 30 Q SIMM 72 R SO DIMM 72 S DIMM 168
413
One attribute of the Read Only Memory is that it?
414
The operation of a computer and peripherals attached to it is controlled by?
415
Antivirus software is an example of?
416
Which of the following devices will not require the use of system software to operate?
417
Which of the following application packages is most suitable for database management?
418
Files that contain machine language instructions are called?
419
The following are types of errors in programming except?
420
The stages of software development do not include?
421
Express P(1 + \(\frac{R}{100}\))\(^N\) as a BASIC programming notation.
422
An algorithm can be described as?
423
The major difference between low level programming language and high level programming language Is that?
424
What will the following BASIC statement produce? PRINT "Afrikom Computer School" A .
425
A rectangular image consisting of black lines and white spaces representing data which can be optically read is called?
426
A rectangular image consisting of black lines and white spaces representing data which can be optically read is called?
427
The following are types of data network except?
428
The minimum number of computers that can constitute a network is?
429
If a computer user wants to access the national database from a remote location, the user will require a?
430
Which type of network topology is represented in Figure 2 above?
431
In networking, bandwidth means?
432
A pre-designed document coordinating fonts, a layout and a background is also known as?
433
The following are functions of database management system except?
434
To make the entire slides in a presentation to have the same "look" in MS PowerPoint, a user should?
435
In MS Excel, the average of 10 numbers give B1, B2,...,B10 is?
436
To centre worksheet titles across a range of cells MS Excel, the user must?
437
In graphics, a subscript text refers to a text that is positioned?
438
In database application, the field length determines the?
439
Removing a program on a computer properly requires?
440
A feature on the computer desktop that indicates the current active applications is called?
441
In a Windows operation involving dragging and dropping an item on the desktop, the item will be?
442
Digital signals can be represented by: I. Binary Codes Il.0 and 1 III. High and Low Which of the following options is correct?
443
A single hexadecimal digit is represented by?
444
The decimal fraction 0.9375 converts to binary?
445
The EBCDIC coding system was developed on?
446
Which of the following is not a criterion files?
447
Which of the following options best shows the arrangement of file structure? I File ll. Field III. Character IV, Record
448
Which of the following statements best describes sequential file organization?
449
Viruses, worms and trojan horses are all?
450
In order to avoid damages caused by security breaches, the user must?
456
One-millionth of a second is also referred to as
457
Examples of quantitative data type are?
458
One difference between data and information is that ?
459
The following options are examples of information except?
460
Modem computers Compared to earlier computers are ?
461
What type of computer would be most suitable for a student who lives in a remote village without constant electricity
462
EDSAC was produced using a concept known as
463
The process of running more than one program concurrently is known as
464
How many binary digits are contained in 10MB of a memory stick?
465
A student would require the following devices to online application form except?
466
use the diagram above to answer questions below The logic gate in the diagram above is called a
467
The logic equation for the logic gate in the figure above is?
468
The part labelled X in the figure above is called?
469
The logic equation for the logic-circuit in the diagram above is?
470
The program that is loaded into a special area on a microprocessor or ROM on a one-time basis and becomes part of the hardware is called?
471
Thy following programs are general purpose application software except
472
One similarity between be spoke software and application packages is that they are?
473
The process of testing the logic of algorithm to ensure they give correct result is known as ?
474
The following instructions are guidelines for drawing flowcharts except that?
475
Key skills of a system analyst include the following except
476
The result of the expression 2 * 6 + 2/4 * 2 * 4^2
477
Use the QBASIC program below to answer question below 10 REM Program to calculate product of numbers 20 CLS 30 INPUT A 40 INPUT B 50 LET PRODUCT=A*B 60 PRINT PRODUCT 70 END The number 10, 20,30, 40, 50, 60 and 70 as stated in the program indicate
478
he QBASIC statement LETX=Y-3 means
479
The part labelled Y in the compiler interface in the diagram represents
480
The virtual communication platform where many people keep in contact with family and friends is known as
481
The protocol used for email transmission is known as ?
482
The signals from Ato modem X in the diagram above are
483
what type of network is represented in the diagram above?
484
In the URL https://waec.org.ng, the domain name is?
485
The type of transmission in the part labelled q in the diagram above is called
486
The number of entries in the diagram above is
487
The maximum length of a text field in MS Access is?
488
One function of operating system is ?
489
The shortcut key for the open dialog box in MS Word is ?
490
The part of the Corel Draw window labelled II in the diagram above is called?
491
Which of the following operations will not run a slide show in MS PowerPoint?
492
What will be the result of writing the formula=year[now[][ + 3 in a worksheet,of a spread sheet,if the current calendar is 14 august ,1960?
493
If A is in cell A1 and B is in Cell B1 of a worksheet in a spreadsheet application,write a formula to calculate x= \(\frac{A^2 = B{^1/2}}{100}\)
494
The pictorial representation of an object or application in the computer is called?
495
Deleted items in the computers are temporarily stored in the?
496
The keyboard key combination ALT + F4 in microsoft windows will
497
Select two stages of booting from the following list: i. Power on Self Test; ii. Loading of Operating System; iii. Loading of e-mails; iv. Start in safe mode. iv. Save all active files
498
In number system ,base 16 is called ?
499
Add 127\(_{16}\) to 50A\(_{16}\)
500
The octal fraction 0.65 converts to binary as
501
Sequential files are?
502
The file access method illustrated in the diagram above is called?
503
Serial files are
504
Duplicating copyrighted electronic or digital content without the authors approval is considered?
505
Ethical practice requires a computer user to
514
The number of entries in the figure above is?
515
An advantage of bus topology over star topology is that
516
The transmission method that allows data transmission to multiple computers on a network without addressing all the computers is called
517
The main distinguishing feature of fifth generation computers is
518
Machine language instruction codes are expressed in
519
A wait state of zero in hardware means the
520
The following are effects of file insecurities except
521
The commands used for adding comments in QBASIC programming is
522
Which of the following IP addresses can be used to access a locally running website on a user's computer?
523
The BCD equivalent of 135 is
524
A good algorithm must be
525
The central processing unit consists of
526
The technology used for first generation computers was
527
The LET statement in QBASIC
528
The first attempt at using the punch card principle to do mathematical calculations led to the invention of
529
The radix of hexadecimal number system is
530
A file organization in which the records are stored in the order in which they occur is called
531
The process of converting data into information is known as data
532
A BIOS configuration program that allows a windows user to configure attributes such as password, time and date is called
533
The software responsible for allocating and managing system resources is called
534
Which of the following commands can be used to switch between open window?
535
During the booting process in Windows, the Master Boot Record is loaded by the
536
The set of instructions used to solve specific user tasks is called
537
Personalized form of letters which can be sent to many people can be achieved using
538
An input device that converts an image into a text is known as
539
Which of the following QBASIC arithmetic operations is the last in order of precedence?
540
The command used to seek for assistance in Microsoft disk operating system is
541
Which of the following is an example of information?
542
The usage of the keys CTRL + W in Ms Word
543
The speed of data transfer can be affected by the following factors except
544
Which of the following data is alpha-numeric?
545
The unit of the computer system that directs and supervises other units is called the
546
An opening on the motherboard of a system unit where expansion cards can be inserted is known as
547
Headers and footers are used in Microsoft Word documents to
548
If today's date is 02/02/2008, what will be the result of typing "=today() - 1" in a cell of a spreadsheet?
549
The act of translating data into a secret code is known as
550
The https in the web address, https://waec.org.ng, is called a
551
The process of transferring a file from a server to a computer is called
552
The following are functions of database management system except
553
Input devices are computer devices that can
554
Viruses, worms and Trojan horses are regarded as
555
Which of the following actions is not an animation in Microsoft PowerPoint?
556
The database model that uses tables with columns and rows is called
557
Datatypes in QBASIC programming language include the following except
558
A program that converts source code instructions in high-level programming language to object codes line by line is known as
559
Stored instructions and data in digital computer consist of
560
The process of making copies of files which can be used to restore the original copy in the event of data loss is called file
564
An automatic system is one that
565
Which of the following features of information is not important for meaningful decision?
566
The microprocessor that controls a washing machine is known as
567
Which of the following statements is true about data?
568
Instructions were written to the first generation computers using
569
Addition and subtraction of numbers in Abacus are done using
570
In using the slide rule, multiplication that goes off the scale can be corrected by the following approaches except
571
The computer's short-term memory is the
572
Which of the following logic devices is considered as equivalent gate?
573
Use the devices in Figures 1 and 2 to answer the questions given that the input variables X and Y have values of 0011 and 0101 respectively as shown in Table 1. X Y 0 0 1 1 0 1 0 1 Compute the value of the output Z in Figure 1 using the values of X and Y given.
574
Use the devices in Figures 1 and 2 to answer the questions given that the input variables X and Y have values of 0011 and 0101 respectively as shown in Table 1. X Y 0 0 1 1 0 1 0 1 If the input variable X in Figure 1 is passed through the device in Figure 2 before going into the logic gate in Figure 1, what will be the value of the output Z?
575
If the input variable Y in Figure 1 is passed through the device in Figure 2 before going into the logic gate in Figure 1, compute the resulting value of the output at Z. X Y 0 0 1 1 0 1 0 1
576
Using the given values of X and Y for the device in Figure 1, what will be the value of the output Z if it is passed through the device in Figure 2? X Y 0 0 1 1 0 1 0 1
577
The part labeled Q in Figure 3 is called
578
MS Access is an example of
579
Which of the following statements explains the function of device drivers? They
580
One usefulness of utility software in the computer is
581
Which of the following statements about operating system is false? It
582
Debugging in program development is the process of
583
Figure 4 is a flowchart symbol. Use it to answer questions this question. Identify the flowchart symbol in Figure 4.
584
Figure 4 is a flowchart symbol. Use it to answer questions this question. The flowchart symbol in Figure 4 is used to
585
Which of the following operations will be executed last in a program?
586
A The equation x =p + qr +s) can be expressed in Q BASIC programming
587
Which of the following statements is true about the rules of flowcharting?
588
In computer programming, it is advised to translate source code into intermediate code to
589
A graphic or text in a document or web page that links to another file or object is referred to
590
Instant messages can be sent with little or no tine lag using
591
Which of the following statements is true about preventing phishing?
592
Which of the following statements is true about star topologies?
593
An internet user secures his social media account by regularly changing passwords. Which of the following passwords produces the best security?
594
Which of the following statements is true about intranet?
595
The art of checking for errors in a Word document before publishing is referred to as
596
Columns in MS Access are referred to as
597
Which of the following application packages is suitable for making budgets?
598
What happens when a user clicks on the icon in Figure 5 on the Microsoft Excel menu bar?
599
30. New comment can be added to a cell in MS Excel by using the procedure
600
What is the function of the CorelDraw Toolbox object shown in Figure 6? It IS used to
601
Which of the following statements about index is true? It is a data structure
602
A collection of computer wires used to identify memory location in a computer is
603
Read Only Memory (ROM) contains
604
What happens when the Shift key is pressed down while deleting a file from the computer? The file is
605
Which of the following statements about warm booting is true? The computer
606
The ASCII character set represents alphabetical and control characters using numeric code ranging from
607
Which of the following hard disk drive memory capacities can store the largest size of data?
608
The equivalent of the letter A in the standard ASCII is
609
One example of a file containing reference data which is usually altered is
610
Figure 7 represents a procedure to
611
A user observed that a certain file in a removable storage device changed to a shortcut icon. This implies that
612
Set of characters used to authenticate a computer user is called
613
Which of the following statements about firewall is correct?
619
The first calculator was built by ?
620
A similarity between data and information is that both
621
The computer hardware can be classified into
622
The outcome of processed data in a computer is known as
623
Which of the following devices is not a microcomputer?
624
Which of the following computing devices did not exist in the pre-computing age to the 19th century?
625
The computing devices invented by Charles Babbage are
626
In a computer, the set of instructions that directs it in performing a particular task is called
627
The property of a disk that determines the amount of data it may contain is
628
Which of the following items best describes the term hard copy?
629
Which of the following is not an output device?
630
Which of the following signifies the correct association between a hardware component and its function?
631
Fig 1 is a logic gate; use it to answer these questions. Fig 1 represents?
632
In Fig. 1, X, Y, and Z represent
633
Which of the following software is best suited for keeping records during the national population census?
634
A major function of system software is
635
An advantage of the Graphical User Interface (GUI) over the Disk Operating System (DOS) is that it allows the use of
636
Which of the following methods is not suitable for securing files?
637
Which of the following programming languages needs no translator for it to run?
638
Which of the following programming languages needs no translator for it to run?
639
Fig. 2 is a System Development Cycle. Use it to answer this question The path labeled II is the
640
The path labeled III is the
641
Fig 3 is a flow chart. Use it to answer this question The part labelled I represents?
642
The part labeled II represents?
643
The Part labeled III represents?
644
The acronym HTTP stands for
645
In ring topology, the computer that is allowed to transmit data possesses the .
646
The most cost-effective and secure way of transmitting confidential messages among the employees of an organization is the
647
The application software that allows information available on the internet to be obtained is called
648
A modem and a telephone connection are provided. Other things needed to be able to connect a computer to the internet are
649
Which of the following is employed in the transfer of data between computers and a network?
650
Which of the following software can be used for graphic production?
651
In word processing, the icon in Fig. 4 is used for
652
Which of the following items is not located on the MS Word menu bar?
653
Use the table above to answer this question. In Table 3, the content of cell 5 is?
654
The number of cells in row 1 in the image above is?
655
Use Table 3 to answer this question. Which of the cells in Table 3 contains numeric data with the least value?
656
In changing the storage location of a file, the command to use is
657
Which of the following statements is true about registers?
658
The instruction fetched into the CPU is decoded by the
659
The process of restarting a computer is known as
660
Evaluate the BASIC statement LET Z = 4*W2 + 2*y given that W = 5 and Y = 10.
661
Given that 2610 = (X)2, X is
662
A = 10, B = 11, C = 12, D =13, E = 14, F = 15 B, D, F = 11, 13, 15, respectively. In the hexadecimal number system, B, D, F represent
663
The conversion of 110012 to base 10 equals
664
The transaction file can also be described as
665
Which of the following statements is not true about a computer file?
666
An advantage of sequential access over serial access is that
667
The use of electronic systems to send an unsolicited e-mail to someone's address is known as
668
Which of the following ideals is protected by copyright?