Nyansapɔ wisdom knot — symbol of wisdom, ingenuity, and patience

Computer Studies1998

WASSCE · 598 questions · Answers included

598 questions

1

The first calculator was built by?

2

A similarity between data and information is that both?

3

The computer hardware can be classified into

4

The outcome of a processed data in a computer is known as

5

Which of the following devices is not a micro computer?

6

Which of the following computing devices did not exist in the pre-computing age to the 19th century?

7

The computing devices invented by Charles Babbage are?

8

In a computer, the sets of instruction that direct it in performing a particular task is called?

9

The property of a disk that determines the amount of data it may contain is?

10

Which of the following items best describes the term hardcopy?

11

Which of the following is not an output device?

12

Which of the following signifies the correct association between a hardware component and its functions?

13

Fig 1above is a logic gate. Use it to answer the question below Fig 1 represents_________?

14

.

15

Which of the following software is best suitable for keeping records during national population census?

16

A major function of system software is_________?

17

An advantage of Graphical User Interface (GUI) over Disk Operating System (DOS) is that it allows the use of __________?

18

Which of the following methods is not suitable for securing files?

19

Which of the following programming languages needs no translator for it to run?

20

Fig.2 is a system development cycle. Use it to answer the question below The path labelled I is the __________?

21

Fig.2 is a system development cycle. Use it to answer the question below The path labelled II is the __________?

22

Fig.2 is a system development cycle. Use it to answer the question Above The path labelled III is the _________?

23

Fig.3 is a flowchart. Use it to answer the question below The part labelled I represents_________

24

Fig.3 is a flowchart. Use it to answer the question below The part labelled II represents______

25

Fig.3 is a flowchart above. Use it to answer the question below The part labeled III represents________

26

The acronym HTTP stands for________

27

In ring topology, the computer that is allowed to transmit data possesses the ________

28

The most cost-effective and secure way of transmitting confidential messages among the employees of an organization is the ___________

29

The application software which allows information available on the internet to be obtained is called _________

30

A modern and a telephone connection are provided. Other things needed to be able to connect a computer to the internet are _______

31

Which of the following is employed in the transfer of data between computers and a network?

32

Which of the following software can be used for graphic production?

33

In word processing, the icon in Fig.4 is used for __________

34

Which of the following items is not located on the MS Word menu bar?

35

Use Table 3 to answer the questions below A B C D E 1 BOOK SUPPLIED TO SENIOR HIGH SCHOOLS 2 MATHS ICT ENGLISH 3 SHS1 3450 4500 5678 4 SHS11 8765 6580 9000 5 SHS111 2456 4009 4400 In table 3, the content of cell C5________

36

Use Table 3 to answer the questions below A B C D E 1 BOOK SUPPLIED TO SENIOR HIGH SCHOOL 2 MATHS ICT ENGLISH 3 SHS1 3450 4500 5678 4 SHS11 8765 6580 9000 5 SHS111 2456 4009 4400 The number of cells that contain data in row 1 is_________

37

Use Table 3 to answer the questions below A B C D E 1 BOOK SUPPLIED TO SENIOR HIGH SCHOOLS 2 MATHS ICT ENGLISH 3 SHS1 3450 4500 5678 4 SHS11 8765 6580 9000 5 SHS111 2456 4009 4400 Which cells in table 3 contain numeric data with the least value?

38

In changing the storage location of a file, the command to use is_______

39

Which of the following statements is true about registers?

40

The Instruction fetched into the CPU is decoded by the___________

41

The process of restarting a computer is known as ________

42

Evaluate the BASIC statement: LET Z = 4*W^2  + 2*Y Given that W = 5 and Y = 10

43

Given that 26 \(_10\) = X \(_2\), X is _________

44

In hexadecimal number system, B, D, E represent_________

45

The conversion of 11001 \(_2\) to base 10 equals_______

46

The transaction file can also be described as _______

47

Which of the following statements is not true about a computer file?

48

An advantage of sequential access over serial access is that_______

49

The Use of electronic systems to send an unsolicited e-mail to someone's address is known as ______

50

Which of the following ideals is protected by copyright?

51

Quantitative data can exist in

52

Data created by the user is called

53

The sequence of operation of a computer is

54

Which of the following descriptions is not true about data?

55

Which of the following statements is true about super computers? They

56

The Slide Rule is accurate to

57

What factors will motivate a field engineer into choosing a notebook computer over a desktop computer ?

58

A collection of wires through which data are transmitted from one part of the computer to another is known as

59

The total possible combinations of the input variables for a logic gate containing three input variables is

60

What is the least number of 750 MB capacity CD-ROM discs needed to transfer 10 GB size file?

61

The logic gates represented in Figure 1 is called

62

Use the logic gate in Fig 2 to answer question 12. Which of the logic gates will give an output opposite to the input state?

63

Use the logic gate in Fig 2 to answer question 13. Which of the following statements is true about logic gates X and Y?

64

The logical equation for the logic circuit in Figure 3 is

65

The operation of a computer and peripherals attached to it is controlled by

66

COBOL was developed for

67

The operating system performs the following operations except

68

The fundamental purpose of the BIOS is

69

The IF... THEN statement in BASIC is called

70

The use of natural language and symbols to write instructions for the computer is called

71

Which of the following stages of the SDLC is post-operational stage?

72

The expression 5 + 3*4/2 - 3^2 in QBASIC evaluate to

73

Use figure 4 to answer question 23 The basic problem with the flow chart is that it has

74

Use Figure 4 to answer question 24 What activity is the flowchart made to represent?

75

Use Figure 4 to answer question 25 If N in the flowchart is represented by 10, which of the following conditions is not true?

76

A computer system on the network that stores pages, takes request from clients as well as send out information is called a

77

The device is Figure 5 uses a transmission method called

78

In Figure 6 the signals from modem X to modem Y is

79

The "/exams"in the web address; https;//www.waec.org.ng/exams is called

80

Which of the following statements about URL is true? It is

81

The type of network represented in Figure 7 is called

82

In MS Excel, the cell that contains the pointer or cursor is called

83

The part of the graphic interface in Figure 8 labelled V is called

84

The figure 2 in the number 1101\(_2\) is indicated in MS Word using a feature called

85

The part of the MS Access interface labelled X in Figure 9 is called

86

Which of the following formulas will display the current seconds past the minute os the clock in MS Excel?

87

The part of the MS Word interface labelled II in Figure 10 is called

88

What type of relationship can you deduce from the statement a department has many employees?

89

The screen background where icons and windows are displayed is GUI is called

90

The windows shortcut key for closing an active application is

91

Changing the default settings or appearance of the Taskbar in windows by a user is known as

92

The part of the computer system shown in Figure 11 is used to

93

A single character in an EBCDIC encoding system can be represented using

94

Evaluate 10011\(_2\) - 1111\(_2\)

95

The binary number 0.1101 in decimal is

96

To prevent unforeseen data loss, a user must

97

The file access method shown in Figure 12 is called

98

Which of the following options is not a similarity between computer file and manual file ? Both can

99

A computer program that gathers information about a person or organization without their knowledge or consent  is known known as

100

The following actions are the effects of virus infection in a system except

114

Charles Babbage was the first to?

115

Which of the following devices is not a micro computer?

116

The main difference between a laptop and a desktop is that, a laptop?

117

Abacus is used for?

118

The computer hardware is made up of system unit and?

119

The computer memory is, measured in?

120

If the output signal of any logic gate is fed into an inverter, the results is?    .

121

The device through which the main components of the computer communicate with each other is called?

122

The hardware of a computer does not consist of?

123

Output devices in a computer are those devices that send?

124

Which of the following is not a mobile input device?

125

Figure 1 above is a logic gate. Use it to answer questions 12 to 14. Figure 1 represents?

126

X, Y and Z respectively, represents?

127

Use the Logic gate above to answer this question. When signals X= 0 and Y= 1, signal Z is?

128

The memory unit of the computer belongs to the?

129

Which of the following is not a function of the operating system?

130

An example of a specific purpose application package is the?

131

The operating system, translators and utility programs are examples of?

132

The first stage in program development is problem?

133

A pictorial representation of program flow is referred to as?

134

An example of a programming language that uses mnemonic codes is?

135

The use of satellite to transmit signal information to the earth is enabled with the use of?

136

.The line segment that describes the contents of the message when sending an e-mail is?

137

Which of the following networks covers the widest range?

138

The keyboard command used to copy text in Ms-Word document is?

139

The colour palette in CorelDraw allows the user to?

140

In order to get to the symbol dialog box in MS-Word click on the?

141

In a network, the workstation is usually.connected to the?

142

When browsing on the internet, a possible reason for. the message "page not found" is that?

143

Which of the following is not a network device?

144

Which of the following is a valid e-mail address?

145

In word processing, an efficient way to move the second paragraph and place it after the fourth paragraph is?

146

Which of the following items changes shape depending on the task being performed?

147

The computer keyboard key(s) that a user presses to move to the beginning of a current line of text is/are the?

148

Data loss in a computer cannot be prevented by the use of?

149

The shortcut command used in restarting a computer is?

150

The term bus' width in data transfer refers to the?

151

The part of the computer that holds the data and pro- grams for CPU processing is the?

152

A high level language can be converted to a machine language using?

153

Which of the following statements is true of encryption? It

154

Computer ethics are important because they?

155

Which of the following is the main advantage of intellectual property right?

156

Which of the following statements is true of free software? It

157

In hexadecimal number system, B, D and F represent which of the following decimal numbers?

158

The conversion of 11001\(_2\), to base ten equals?

159

9\(_{10}\) is equivalent to X\(_8\), where X is?

160

Use the MS-Excel table below to answer questions 48 to 50. A B C D 1 BOOKS SUPPLIED TO SENIOR HIGH SCHOOL 2 FORM MATHS ICT ENGLISH LANG 3 SHS I 2456 6580 5678 4 SHS II 3450 4009 4400 5 SHS III 8765 4500 9000 The content of cell D3 is?

161

Use the MS-Excel below to answer this question. A B C D 1 BOOKS SUPPLIED TO SENIOR HIGH SCHOOL 2 FORMS MATHS ICT ENGLISH LANGUAGE 3 SHSI 2456 6580 5678 4 SHSII 3450 4009 4400 5 SHSIII 8765 4500 9000 The number of cells that contain data in row 1 is?

162

The number of cells that contain numeric data in the table above is?

168

The first calculating device is the?

169

Which of the following represents features of a computer? I. It is constructed from electronics components. II. It has self regeneration capability. IlI. It has facility for storage of data and programs. IV. It has provision for input and output data.

170

Arrange in a hierarchical order by date, the following inventions: I. slide rule; Il. pascaline; IIl, analytical engine; v. difference engine.

171

Which of the following is true about raw data?

172

Which of the following was used by Joseph Marie Jacquad in inventing the Loom?

173

Which generation of computers used vaccum tubes in their circuitry?

174

The full meaning of the acronym ENIAC is?

175

The primary memory of the computer can be divided into?

176

A common communication pathway shared by hard- ware components in the computer is called?

177

Which of the following can be described as the brain of the computer hardware?

178

Which of the following is not a computer output device?

179

Data to be processed by the microprocessor is temporarily stored in the?

180

The smallest unit of information representation which is addressable on the computer memory is?

181

Software is referred to as the?

182

The software whose output is intended for the human user is called?

183

The parts of the taskbar include: I recycle bin Il start button lII system tray IV quick launch toolbar

184

The similarities between main memory and registers is that they are: I volatile Il under the direct control of the user ll protected by the system unit lIV for system use only?

185

A pictorial representation of the logic of a program is called?

186

A subroutine is called in a flowchart through the use of?

187

The symbol used to represent an execution flow in a flowchart is?

188

A suitable BASIC notation for the expression mc\(^2\) is?

189

Use the BASIC program below to answer questions 23 to 25 10 LET K = 2 20 LET L = 9 30 LET SUM = 0 40 FOR J = K TO STEP 2 50 SUM = SUM + J\(^2\) 60 PRINT "ANSWER =", SUM 70 NEXT J 80 END How many times will the statement lines 50 and 60 be repeated?

190

Which of the following best represents the sequence of output from the program?

191

Use the BASIC program below to answer this question 10     LET K = 2 20     LET L = 9 30     LET SUM = 0 40     FOR J = K TO STEP 2 50     SUM = SUM + J2 60     PRINT "ANSWER =", SUM 70     NEXT J 80     END The last output that will be displayed by the program is

192

Which of the following networks can be extended to cover continents?

193

Identify the browsers in the following list: I telnet II netscape navigator.ll opera IV mozilla firefox

194

Trap doors and bombs are typical examples of?

195

The first four steps required to open e-mail account include: I click on "Create my account" II go to home page of the service provider lll click "create new account" IV click on "mail"

196

The two main components of a radio communication system are?

197

Which of the following can a traveler who finds himself in a new environment rely on for direction to his final destination?

198

The default number of sheets of a workbook is?

199

The chart type that does not have the X and Y axis display is the?

200

When a worksheet is deleted from a workbook, it is?

201

A block of text that is marked by the tab key when the enter key is pressed can be referred to as?

202

Principal uses of word processing software packages include: I preparing deft articles for publication ll pre- paring reports for top management Ill preparing accounts IV preparing organizations' newsletter.

203

In a database, a primary key is a field which contains?

204

One megabyte is equivalent to?

205

Converting 4B7\(_16\) to binary?

206

The speed of data transfer in the computer can be determined in terms of ?

207

The initial screen that is displayed after a computer booting is referred to as?

208

Which of the following is not a biometric data?

209

The main advantage of intellectual property right is?

210

The word bit refers to?

211

The decimal number 1024 in hexadecimal equivalent is?

212

Which of the following is true of a digital logic gate? .

213

Which of the following is a temporary file that can be used only once and then discarded?

214

Sorting of records is sufficient and a necessary condition for creating?

215

The illegal copying and use of proprietary/copy righted software is called?

216

Symptoms of computer virus attack include: I improved processing speeds; Il drive light coming up without apparent reason; Ill unexplainable printer activity; IV the disappearance or strange files appearance on the screen

223

The "collection of the unorganized facts and figures" is called?

224

The census machine was invented by?

225

A graph plotter is most suited for use in a/an?

226

A set of programs, routines and procedures that are used to operate the computer hardware is called?

227

Which of the following can be used to write a high level program source code?

228

A computer that requests the services of another computer on a network is called a?

229

The available page orientation in Microsoft Word are?

230

The copyright law is used to protect?

231

Which of the following components is directly located inside the computer processor?

232

Napier's Bone was designed purposely for calculation of?

233

The hardware component that is responsible for fetching, decoding and execution of program instruction is?

234

Which of the following is found on the taskbar?

235

A high level language program translator which converts a source code to machine readable format and compile executes it one line at a time is?

236

Use the following QBASIC statement to answer questions 14 and 15. DIM DEPOSIT (1, 10) 14. The keyword DIM in the statement stands for?

237

The expression DEPOSIT (1, 10) stands for an array with?

238

In a star network, each node must?

239

Which of the following views is used to create data base objects in Microsoft Access?

240

A field chosen to uniquely identify every record in a database is?

241

Use the table below to answer questions 19 to 21 Character Decimal code ASCII CODE N 78 1001110 O 1 1001111 T 84 11 The cell labelled I in the table represents?

242

Us the table below to answer this question Character Decimal Code ASCII Code N 78 1001110 O 1 1001111 T 84 II The cell labeled ll in the table represents?

243

The ASCII code for the word NOT can be written as?

244

Which of the following is not a method of accessing file?

245

The advantages of a computer include that they? I. operate at high speeds; II. think for the user; Ill. are accurate; IV. are credible.

246

In MS Excel, comments used in cells are called?

247

Which of the following statements is not true about secondary storage media? They

248

Which of the file formats is supported in all windows operating systems?

249

Which of the following symbols is not a relational operator in BASIC programming language?

250

The following are features of web browsers except?

251

The act of translating data into a secret code is known as?

252

The absolute address of cell G5 in a spreadsheet application is represented by?

253

Soft boot is initiated by pressing?

254

Which of the following factors limits access to computerized file system? it

255

Which of the following is not a good ICT security policy?

256

INPUT OUTPUT P O R 0 0 1 0 1 0 1 0 0 1 1 0 The table above represents the Truth Table for?

257

Use the information below to answer questions 35 and 36 I-Mouse Il. -Keyboard III-Scanner IV. -Joystick. The input devices used to capture date of birth on an Online form are?

258

Use the information below to answer this question I. - Mouse II. - Keyboard III. - Scanner IV. - Joystick. The input devices used to capture finger print is?

259

To hibernate windows operating system means?

260

Which of the following statements can be used for looping in BASIC?

261

The flowchart ♦ symbol represents?

262

Which of the following tasks is accomplished by using bookmarks? To

263

Which of the following function keys can be used to run slide show in a PowerPoint presentation?

264

Use the MS Excel table below to answer questions 42 and43 The formula used to compute the TOTAL VALUE in cell D7 is? S/N A B C D 1 STOCK LIST OF TAYO OKEKE AS AT MAY 2014 2 QUOTED STOCK SHARE UNIT IN THOUSAND CURRENT UNIT(#) VALUE 3 TANZEL PLC 44 50 2,200.000 4 KAPTOL 125 80 #### 5 BANK KLM 75 140 #### 6 ARIX OIL 10 250 2,500.00 7 TOTAL VALUE

265

.

266

Which of the following statements is true for a circuit Switching communication system?

267

The first three steps to open an email account include: I. - Click on create my account; II. - Go to home page; llI - Click create new account.

268

Converting 4B7\(_{hexadecimal}\) to binary is?

269

The modifier keys on the computer keyboard comprises of?

270

Arrange in hierarchical order by date the following inventions: I. - Census machine; Il. - Abacus; lll. - Slide rule; IV.- Difference engine.

271

A student mistakenly pressed the F5 key on keyboard while browsing on the internet. This will lead to?

272

Opening an already existing sequential file in output (O) mode will lead to?

282

Data can be defined as?

283

Which of the following output devices was common among the computing devices of the 19th century?

284

The pre-computing age device which made use of beads and frames is?

285

The system unit houses the following components except?

286

The system unit houses the following components except?

287

During program execution in the central processing unit, the instruction is interpreted by the?

288

The most important system software in a computer system is the?

289

QBASIC keywords do not include?

290

An icon, a graphic or a text in a document or a webpage that connects to another file or object is called a?

291

The largest component in a spreadsheet is?

292

Warm boot in computing is the same as?

293

The basic computer operation involves the following except?

294

The file that contains historical record is called a?

295

Random file organisation is also known as?

296

Which of the following options is not a data type?

297

The major components of a computer system are?

298

The largest computer system in terms of processing power is A?

299

Figure 1 is a logic gate. Use it to answer the question below. The logic gate represented in Figure 1 is called

300

Identify the logic gate in figure 2

301

Which of the following programs is an application specific?

302

The following programs are general-purpose application software except?

303

The following are relational operators in QBASIC?

304

The three levels of programming language?

305

which of the following network cables offers highest data transmission?

306

The following components are network interconnecting devices EXCEPT?

307

Which of the following options is not an advantage of  linear bus topology?

308

Which of the following components are data communication equipment? I. Scanner ll. Hub lIl. Modem

309

The speed of data transfer in the computer can be determined in terms of?

310

The process of restarting the computer system is known as?

311

The ASCII chart control characters using numeric codes ranging from?

312

A row in a database table is referred to as?

313

The conversion of readable data to unreadable codes in order to prevent unauthorised access is known as?

314

The algebraic equation for the AND gate with input variables A and B is?

315

The command line prompt of MS-DOS operating system is represented as?

316

The process of testing the logic of programs to ensure they give correct result is known as?

317

The MS-Windows shortcut keys to initiate warm booting is?

318

The number 28 in binary is?

319

Which of the following options is a biometric data?

320

A  site engineer intends to acquire a computer system. What factors Will he consider if he must choose a notebook computer over a desktop computer?

321

Use the logic truth table in figure 3 to answer question X Y Z 0 0 1 0 1 1 1 0 1 1 1 0 Given that X and Y are input variables while Z is the output. The truth table in figure 3 represents?

322

A logic gate contains three input variables. The total possible combination of the input variables is?

323

The following are the guidelines for drawing flowcharts except that it?

324

Use the infomation belowto answer questions 42 and 43. As a computer professional, you have just been con- tracted by a school to help them solve the problem they are facing in computing students' results. The school currently runs a manual system. Time and accuracy of the result are the major concerns. What would you advise the school to do?

325

If you are given the contract, what would be your first step of action?

326

Which of the following charts does not display the X and Y axes?

327

The uses of spreadsheet packages include: 1. -Preparing organisation's logo;   II. - Performing sensitivity analysis; III, - Preparing reports for senior manage- ment; IV. - Preparation of profit forecasts. Which of the following options is true?

328

The common features of formula and function in spread- sheet are: -Entry is preceded by = or + symbol I. - They have fixed formats - They operate with cell addresses - Their results are displayed. Which of the following options is/are true?

329

One megabyte is equivalent to?

330

Arrange the following spreadsheet window parts in a hierarchical order by size: I. worksheet II. cell III. workbook IV. Range

331

The statement in QBASIC that is used to add data at the end of existing sequential file is?

332

Which of the following computer files can be used for updating the master file?

341

The personnel who deals with the computer and its management is called?

342

The map of Nigeria is an example of ?

343

The hexadecimal number 13, expressed as a binary here is?

344

Which of the following statements are true about computer? I.Constructed from electronic components. II. It has self regeneration capability. III. It has facility for storage of data and programs.       IV.It has provision tor input and output of data.

345

Computers are classified using the following criteria except?

346

The Slide Rule is accurate to?

347

Modern computers compared to earlier computers are?

348

An input device that converts an image into text is known as?

349

The type of printer which works on the same principle as a photocopier is?

350

The output of a NAND gate is 1 when?

351

A company known as CIBITO has the following memory modules in four of its computers as shown in Table 1 Use the information in Table 1 to answer questions 11 to 13. MEMORY MODULE MEMORY TYPE NUMBER OF PINS P SIMM 30 Q SIMM 72 R SO DIMM 72 S DIMM 168 Table 1 Which of the memory modules is appropriate for a notebook computer?

352

use the table above to answer this question The memory module with the smallest physical size is?

353

A company known as CIBITO has the following modules in four of its computers as shown in Table 1. Use the information in Table 1 to answer this question. Memory module memory type No of pins P SIMM 30 Q SIMM 72 R SODIMM 72 S DIMM 168 identify the memory module with the largest physical Size?

354

The scanner and the floppy disk are?

355

The set of instructions written by computer experts to solve specific task of the user is called?

356

A Collection of software that allows the computer to operate is called?

357

A suite of software that controls and manages the basic operation of a computer is?

358

The Windows PC and the Apple Macintosh are examples of two different?

359

Machine Language instructions are expressed in?

360

The following symbols are used in flowcharting except the?

361

Three major types of language translators are?

362

. Translate 2m\(^2\) + 3n- 9 as a BASIC arithmetic expression.

363

The term compiler in computer programming refers to a?

364

The IF...THEN statement in BASIC programming is?

365

Flexibility of a good program means?

366

Fibre Optic cable transmits signal in the fom of?

367

Data transfer can be initiated through the following media except?

368

The topology represented in figure 1 is?

369

To send a created MS PowerPoint document using email to a user, the document can be added as?

370

What type of network is represented in Figure 2?

371

The major advantage of free software is that it is?

372

In MS Excel, the cell that contains the pointer or cursor is called?

373

One major difference between paper spreadsheet and electronic spreadsheet is?

374

To hold row and column titles in places so that they do not scroll when the user scrolls a worksheet, click the?

375

In Microsoft PowerPoint, two kinds of sound effect files that can be added to a presentation are?

376

A cell with a red triangle in the top-right comer in a spreadsheet application signifies?

377

Spreadsheet packages can be used for?      .

378

Which of the following is true when data maintained in MS Excel workbook is linked to a word document? The word document

379

Data that is copied from an application is stored in the?

380

After several 'save' and 'delete' operations, there remain many scattered areas of data too small to be used productively. This describes?

381

The disk operating system will label three hard drives as?

382

Which of the options labeled I to IV give two stages involved in booting? I. Power On self test II. Loading of Operating System IIl. Loading of email IV. Power On Safe Mode

383

A bit as used in computing in digital communication is?

384

Multiply 101\(_2\) by 11\(_2\)

385

In BCD encoding system, 25, will be represented as?

386

The following actions are sources of breaches in computing except?

387

Effects of file insecurity include the following except?

388

Which of the file organization methods can be accessed both randomly and sequentially?

389

A computer program that gathers information about a person or organization without their knowledge or consent is known as?

390

Password reset disk should be created?

399

Which of the following is not a step involved in data conversion?

400

The communication of knowledge, concepts and ideas is referred to as?

401

The equivalent of the decimal number 89 in base 4 is?

402

Choose the incorrect statement about microcomputers?

403

Under classification by data representation. computers can be?

404

Pascal's calculating machine was useful in?

405

Arrange the following inventions in chronological order. I. Slide Rule ll. Pascaline llI. Analytical Engine IV. Difference Engine

406

Handwritten letters, typeset documents or printout Characters can be read into the computer by?

407

which of the following logic operations would select a record when at least one condition is satisfied?

408

In Figure 1, the value of Z when X = 1 and Y=0 is?

409

In Figure 1, the value of Z when X = 1 and Y=0 is?

410

A data bus that is capable of transferring 8 bytes of data at once can be rated as?

411

Which of the following memory types are nonvolatile? I. PROM II. SRAM II. EEPROM IV. DRAM

412

A company known as CIBITO has the following memory modules in four of its computers as shown in Table 1. Which memory module will be appropriate for graphic design? Table 1 Memory Module Memory Type Number of Pins P SIMM 30 Q SIMM 72 R SO DIMM 72 S DIMM 168

413

One attribute of the Read Only Memory is that it?

414

The operation of a computer and peripherals attached to it is controlled by?

415

Antivirus software is an example of?

416

Which of the following devices will not require the use of system software to operate?

417

Which of the following application packages is most suitable for database management?

418

Files that contain machine language instructions are called?

419

The following are types of errors in programming except?

420

The stages of software development do not include?

421

Express P(1 + \(\frac{R}{100}\))\(^N\) as a BASIC programming notation.

422

An algorithm can be described as?

423

The major difference between low level programming language and high level programming language Is that?

424

What will the following BASIC statement produce? PRINT "Afrikom Computer School" A .

425

A rectangular image consisting of black lines and white spaces representing data which can be optically read is called?

426

A rectangular image consisting of black lines and white spaces representing data which can be optically read is called?

427

The following are types of data network except?

428

The minimum number of computers that can constitute a network is?

429

If a computer user wants to access the national database from a remote location, the user will require a?

430

Which type of network topology is represented in Figure 2 above?

431

In networking, bandwidth means?

432

A pre-designed document coordinating fonts, a layout and a background is also known as?

433

The following are functions of database management system except?

434

To make the entire slides in a presentation to have the same "look" in MS PowerPoint, a user  should?

435

In MS Excel, the average of 10 numbers give B1, B2,...,B10 is?

436

To centre worksheet titles across a range of cells MS Excel, the user must?

437

In graphics, a subscript text refers to a text that is positioned?

438

In database application, the field length determines the?

439

Removing a program on a computer properly requires?

440

A feature on the computer desktop that indicates the current active applications is called?

441

In a Windows operation involving dragging and dropping an item on the desktop, the item will be?

442

Digital signals can be represented by: I. Binary Codes Il.0 and 1 III. High and Low Which of the following options is correct?

443

A single hexadecimal digit is represented by?

444

The decimal fraction 0.9375 converts to binary?

445

The EBCDIC coding system was developed on?

446

Which of the following is not a criterion files?

447

Which of the following options best shows the arrangement of file structure? I File ll. Field III. Character IV, Record

448

Which of the following statements best describes sequential file organization?

449

Viruses, worms and trojan horses are all?

450

In order to avoid damages caused by security breaches, the user must?

456

One-millionth of a second is also referred to as

457

Examples of quantitative data type are?

458

One difference between data and information is that ?

459

The following options are examples of information except?

460

Modem computers Compared to earlier computers are ?

461

What type of computer would be most suitable for a student who lives in a remote village without constant electricity

462

EDSAC was produced using a concept known as

463

The process of running more than one program concurrently is known as

464

How many binary digits are contained in 10MB of a memory stick?

465

A student would require the following devices to online application form except?

466

use the diagram above to answer questions below The logic gate in the diagram above is called a

467

The logic equation for the logic gate in the figure above is?

468

The part labelled X in the figure above is called?

469

The logic equation for the logic-circuit in the diagram above is?

470

The program that is loaded into a special area on a microprocessor or ROM on a one-time basis and becomes part of the hardware is called?

471

Thy following programs are general purpose application software except

472

One similarity between be spoke software and application packages is that they are?

473

The process of testing the logic of algorithm to ensure they give correct result is known as ?

474

The following instructions are guidelines for drawing flowcharts except that?

475

Key skills of a system analyst include the following except

476

The result of the expression 2 * 6 + 2/4 * 2 * 4^2

477

Use the QBASIC program below to answer question below 10 REM Program to calculate product of numbers 20 CLS 30 INPUT A 40 INPUT B 50 LET PRODUCT=A*B 60 PRINT PRODUCT 70 END The number 10, 20,30, 40, 50, 60 and 70 as stated in the program indicate

478

he QBASIC statement LETX=Y-3 means

479

The part labelled Y in the compiler interface in the diagram represents

480

The virtual communication platform where many people keep in contact with family and friends is known as

481

The protocol used for email transmission is known as ?

482

The signals from Ato modem X in the diagram above are

483

what type of network is represented in the diagram above?

484

In the URL https://waec.org.ng, the domain name is?

485

The type of transmission in the part labelled q in the diagram above is called

486

The number of entries in the diagram above is

487

The maximum length of a text field in MS Access is?

488

One function of operating system is ?

489

The shortcut key for the open dialog box in MS Word is ?

490

The part of the Corel Draw window labelled II in the diagram above is called?

491

Which of the following operations will not run a slide show in MS PowerPoint?

492

What will be the result of writing the formula=year[now[][  + 3 in a worksheet,of a spread sheet,if the current calendar is 14 august ,1960?

493

If A is in cell A1 and B is in Cell B1 of a worksheet in a spreadsheet application,write a formula to calculate x= \(\frac{A^2 = B{^1/2}}{100}\)

494

The pictorial representation of an object or application in the computer is called?

495

Deleted items in the computers are temporarily stored in the?

496

The keyboard key combination ALT + F4 in microsoft windows will

497

Select two stages of booting from the following list: i. Power on Self Test; ii.  Loading of Operating System; iii.  Loading of e-mails; iv.  Start in safe mode. iv. Save all active files

498

In number system ,base 16 is called ?

499

Add 127\(_{16}\) to  50A\(_{16}\)

500

The octal fraction 0.65 converts to binary as

501

Sequential files are?

502

The file access method illustrated in the diagram above is called?

503

Serial files are

504

Duplicating copyrighted electronic or digital content without the authors approval is considered?

505

Ethical practice requires a computer user to

514

The number of entries in the figure above is?

515

An advantage of bus topology over star topology is that

516

The transmission method that allows data transmission to multiple computers on a network without addressing all the computers is called

517

The main distinguishing feature of fifth generation computers is

518

Machine language instruction codes are expressed in

519

A wait state of zero in hardware means the

520

The following are effects of file insecurities except

521

The commands used for adding comments in QBASIC programming is

522

Which of the following IP addresses can be used to access a locally running website on a user's computer?

523

The BCD equivalent of 135 is

524

A good algorithm must be

525

The central processing unit consists of

526

The technology used for first generation computers was

527

The LET statement in QBASIC

528

The first attempt at using the punch card principle to do mathematical calculations led to the invention of

529

The radix of hexadecimal number system is

530

A file organization in which the records are stored in the order in which they occur is called

531

The process of converting data into information is known as data

532

A BIOS configuration program that allows a windows user to configure attributes such as password, time and date is called

533

The software responsible for allocating and managing system resources is called

534

Which of the following commands can be used to switch between open window?

535

During the booting process in Windows, the Master Boot Record is loaded by the

536

The set of instructions used to solve specific user tasks is called

537

Personalized form of letters which can be sent to many people can be achieved using

538

An input device that converts an image into a text is known as

539

Which of the following QBASIC arithmetic operations is the last in order of precedence?

540

The command used to seek for assistance in Microsoft disk operating system is

541

Which of the following is an example of information?

542

The usage of the keys CTRL + W in Ms Word

543

The speed of data transfer can be affected by the following factors except

544

Which of the following data is alpha-numeric?

545

The unit of the computer system that directs and supervises other units is called the

546

An opening on the motherboard of a system unit where expansion cards can be inserted is known as

547

Headers and footers are used in Microsoft Word documents to

548

If today's date is 02/02/2008, what will be the result of typing "=today() - 1" in a cell of a spreadsheet?

549

The act of translating data into a secret code is known as

550

The https in the web address, https://waec.org.ng, is called a

551

The process of transferring a file from a server to a computer is called

552

The following are functions of database management system except

553

Input devices are computer devices that can

554

Viruses, worms and Trojan horses are regarded as

555

Which of the following actions is not an animation in Microsoft PowerPoint?

556

The database model that uses tables with columns and rows is called

557

Datatypes in QBASIC programming language include the following except

558

A program that converts source code instructions in high-level programming language to object codes line by line is known as

559

Stored instructions and data in digital computer consist of

560

The process of making copies of files which can be used to restore the original copy in the event of data loss is called file

564

An automatic system is one that

565

Which of the following features of information is not important for meaningful decision?

566

The microprocessor that controls a washing machine is known as

567

Which of the following statements is true about data?

568

Instructions were written to the first generation computers using

569

Addition and subtraction of numbers in Abacus are done using

570

In using the slide rule, multiplication that goes off the scale can be corrected by the following approaches except

571

The computer's short-term memory is the

572

Which of the following logic devices is considered as equivalent gate?

573

Use the devices in Figures 1 and 2 to answer the questions given that the input variables X and Y have values of 0011 and 0101 respectively as shown in Table 1. X Y 0 0 1 1 0 1 0 1 Compute the value of the output Z in Figure 1 using the values of X and Y given.

574

Use the devices in Figures 1 and 2 to answer the questions given that the input variables X and Y have values of 0011 and 0101 respectively as shown in Table 1. X Y 0 0 1 1 0 1 0 1 If the input variable X in Figure 1 is passed through the device in Figure 2 before going into the logic gate in Figure 1, what will be the value of the output Z?

575

If the input variable Y in Figure 1 is passed through the device in Figure 2 before going into the logic gate in Figure 1, compute the resulting value of the output at Z. X Y 0 0 1 1 0 1 0 1

576

Using the given values of X and Y for the device in Figure 1, what will be the value of the output Z if it is passed through the device in Figure 2? X Y 0 0 1 1 0 1 0 1

577

The part labeled Q in Figure 3 is called

578

MS Access is an example of

579

Which of the following statements explains the function of device drivers? They

580

One usefulness of utility software in the computer is

581

Which of the following statements about operating system is false? It

582

Debugging in program development is the process of

583

Figure 4 is a flowchart symbol. Use it to answer questions this question. Identify the flowchart symbol in Figure 4.

584

Figure 4 is a flowchart symbol. Use it to answer questions this question. The flowchart symbol in Figure 4 is used to

585

Which of the following operations will be executed last in a program?

586

A The equation x =p + qr +s) can be expressed in Q BASIC programming

587

Which of the following statements is true about the rules of flowcharting?

588

In computer programming, it is advised to translate source code into intermediate code to

589

A graphic or text in a document or web page that links to another file or object is referred to

590

Instant messages can be sent with little or no tine lag using

591

Which of the following statements is true about preventing phishing?

592

Which of the following statements is true about star topologies?

593

An internet user secures his social  media account by regularly changing passwords. Which of the following passwords produces the best security?

594

Which of the following statements is true about intranet?

595

The art of checking for errors in a Word document before publishing is referred to as

596

Columns in MS Access are referred to as

597

Which of the following application packages is suitable for making budgets?

598

What happens when a user clicks on the icon in Figure 5 on the Microsoft Excel menu bar?

599

30. New comment can be added to a cell in MS Excel by using the procedure

600

What is the function of the CorelDraw Toolbox object shown in Figure 6? It IS used to

601

Which of the following statements about index is true? It is a data structure

602

A collection of computer wires used to identify memory location in a computer is

603

Read Only Memory (ROM) contains

604

What happens when the Shift key is pressed down while deleting a file from the computer? The file is

605

Which of the following statements about warm booting is true? The computer

606

The ASCII character set represents alphabetical and control characters using numeric code ranging from

607

Which of the following hard disk drive memory capacities can store the largest size of data?

608

The equivalent of the letter A in the standard ASCII is

609

One example of a file containing reference data which is usually altered is

610

Figure 7 represents a procedure to

611

A user observed that a certain file in a removable storage device changed to a shortcut icon. This implies that

612

Set of characters used to authenticate a computer user is called

613

Which of the following statements about firewall is correct?

619

The first calculator was built by ?

620

A similarity between data and information is that both

621

The computer hardware can be classified into

622

The outcome of processed data in a computer is known as

623

Which of the following devices is not a microcomputer?

624

Which of the following computing devices did not exist in the pre-computing age to the 19th century?

625

The computing devices invented by Charles Babbage are

626

In a computer, the set of instructions that directs it in performing a particular task is called

627

The property of a disk that determines the amount of data it may contain is

628

Which of the following items best describes the term hard copy?

629

Which of the following is not an output device?

630

Which of the following signifies the correct association between a hardware component and its function?

631

Fig 1 is a logic gate; use it to answer these questions. Fig 1 represents?

632

In Fig. 1, X, Y, and Z represent

633

Which of the following software is best suited for keeping records during the national population census?

634

A major function of system software is

635

An advantage of the Graphical User Interface (GUI) over the Disk Operating System (DOS) is that it allows the use of

636

Which of the following methods is not suitable for securing files?

637

Which of the following programming languages needs no translator for it to run?

638

Which of the following programming languages needs no translator for it to run?

639

Fig. 2 is a System Development Cycle. Use it to answer this question The path labeled II is the

640

The path labeled III is the

641

Fig 3 is a flow chart. Use it to answer this question The part labelled I represents?

642

The part labeled II represents?

643

The Part labeled III represents?

644

The acronym HTTP stands for

645

In ring topology, the computer that is allowed to transmit data possesses the .

646

The most cost-effective and secure way of transmitting confidential messages among the employees of an organization is the

647

The application software that allows information available on the internet to be obtained is called

648

A modem and a telephone connection are provided. Other things needed to be able to connect a computer to the internet are

649

Which of the following is employed in the transfer of data between computers and a network?

650

Which of the following software can be used for graphic production?

651

In word processing, the icon in Fig. 4 is used for

652

Which of the following items is not located on the MS Word menu bar?

653

Use the table above to answer this question. In Table 3, the content of cell 5 is?

654

The number of cells in row 1 in the image above is?

655

Use Table 3 to answer this question. Which of the cells in Table 3 contains numeric data with the least value?

656

In changing the storage location of a file, the command to use is

657

Which of the following statements is true about registers?

658

The instruction fetched into the CPU is decoded by the

659

The process of restarting a computer is known as

660

Evaluate the BASIC statement LET Z = 4*W2 + 2*y given that W = 5 and Y = 10.

661

Given that 2610 = (X)2, X is

662

A = 10, B = 11, C = 12, D =13, E = 14, F = 15 B, D, F = 11, 13, 15, respectively. In the hexadecimal number system, B, D, F represent

663

The conversion of 110012 to base 10 equals

664

The transaction file can also be described as

665

Which of the following statements is not true about a computer file?

666

An advantage of sequential access over serial access is that

667

The use of electronic systems to send an unsolicited e-mail to someone's address is known as

668

Which of the following ideals is protected by copyright?