Nyansapɔ wisdom knot — symbol of wisdom, ingenuity, and patience

Data Processing1996

WASSCE · 438 questions · Answers included

438 questions

1

Which of the following persons invented the punch card machine?

2

Convert \(47_8\) to its binary equivalent.

3

The operation of checking input data against specified criteria is referred to as.

4

Which of the following is not a source of data collection.

5

Which of the following is true about digital computers.

6

Facebook, Twitter and WhatsApp are examples of

7

Which of the following is not an application of computers?

8

Which of the following is secondary storage device.

9

Information analysis procedures includes the following except

10

The advantages of electronic data processing includes the following except

11

Which of the following is not a transmission medium?

12

Information transmission by television is classified as

13

Which of the following are the basic components of a computer network? I. A minimum of two computers II. Printers III. Network interface card.

14

Social networking does not promote.

15

Companies that provide internet access are referred to as

16

While typing a MS word document, Akin inserted footer in the document in order to

17

The spreadsheet symbol used to convert a number to a label is

18

In spreadsheets, data would not be accepted into a cell by pressing the.

19

A field in a database table is also known as

20

The property of a system software that enables it to execute more than one program at a time is referred to as

21

Which of these operations would not close MS word application?

22

The feature in a database application that acts as an interface between the user and the database is called a?

23

Planning and creating websites are stages in?

24

The type of data entered into a table in database follow a set of rules known as?

25

Which of the following drawing tools would create special effects for texts?

26

The study of the effect of interaction between the computer and human users is referred to as computer

27

In MS Powerpoint, the action of holding down the left mouse key and moving the mouse around the slide would

28

A file kept in case of an accident or natural disaster is called

29

Which of the following is not a preventive maintenance measure?

30

Which of the following is not a safety equipment in a computer laboratory?

31

Which of the following is not a computer professional?

32

The following are desturctive software except

33

The type of file organisation in a DVD-ROM is?

34

Which of these measures would not secure data in database?

35

The diagram illustrates the relationship between two tables in a database. The student ID in Tables II is referred to as

36

The diagram illustrates the relationship between two tables in a database. What type of relationship exists between Tables I and II?

37

A program developed to protect the computer from malicious software is referred to as

38

One of the advantages of a parallel database is

39

In a relational database management system, files are organized as relations and

40

The exchange of information over a network follows a set of rules called

47

Who developed the first digital electrical computer?

48

Which generation of computers made use of intergrated circuit?

49

Which of the following is an alphebetical data?

50

The type of data which consist of text, number, audio, graphic and animation is called

51

Which of the following factors is not considered when classifying computers?

52

Which of the following is not used for online shopping?

53

Which of the following is a negative impact of ICT in education?

54

Which of the following are parts of a computer processor?

55

Data gathering involves the following means except

56

Two computers, X and Y are such that the processor in X has a word size of 32 bits while that of Y is 16bits. Which of the following statement is true?

57

The television set deisplays information as

58

Which of the following is not an ancient medium for transmitting information?

59

A server is a computer that provides services to other computers called

60

The rules for exchanging data on a network are known as

61

A search engine is a?

62

The feature in a browser which enables users to open the latest copy of a webpage is

63

An operating system will perform the following except

64

A Microsoft Office application suites include all the following except

65

Which of the following is not a feature of the drawing tool bar?

66

The MS Excel worksheet below shows the salary distribution for four staff in a company. The net salary is paid after deductions have been made. S/N A B C D E 1 IDENTIFICATION NUMBER BASIC SALARY (N) TOTAL ALLOWANCE (N) TOTAL DEDUCTION (N) NET SALARY (N) 2 LP/p/1202 22000 29000 7000 44000 3 L/P/1250 26000 35000 9000 52000 4 L/P/3205 15000 21000 6000 30000 5 L/P/3215 33000 41000 8000 66000 Which of the following cells contain numeric data?

67

The MS Excel worksheet below shows the salary distribution for four staff  of a company. The net salary is paid after deductions have been made. S/N A B C D E 1 IDENTIFICATION NUMBER BASIC SALARY (N) TOTAL ALLOWANCE (N) TOTAL DEDUCTION (N) NET SALARY (N) 2 LP/p/1202 22000 29000 7000 44000 3 L/P/1250 26000 35000 9000 52000 4 L/P/3205 15000 21000 6000 30000 5 L/P/3215 33000 41000 8000 66000 Which of the following for mulas would be used to obtain the value in cell E2?

68

In Database Management System (DBMS), linking entities is used to represent?

69

A data element that uniquely identifies one record from the other in a table is the

70

In MS PowerPoint presentation, the special effects that control the order in which objects enter a slide and their manner of appearance is

71

Which of these packages could be used by a Data processing teacher to design a website for a school

72

In graphic packages, the process of removing unwanted part of an image is known as

73

Routine checks operations on computers in order to ensure its continuous functioning is known as computer

74

The perfomance of the computer can be enhanced by

75

The moral principles that regulates the use of computers, its accessories and environment are called

76

A technician can protect itself from electronic discharge by using

77

Which of the following operations prevent file loss?

78

Acomputer pofessional who studies an existing system with a view to evolving a computer based system from it is

79

Computer virus cannot be transmitted by

80

A program designed to detect and prevent malicious programs from a computer system is

81

In relational model, a tuple is a?

82

Relationship between tables in a relational model are created by

83

Computers store data as

84

The records of students in a school are kept in order of their arrival. What files access method would be used to access a student's record if the latest record would first be retrieved?

85

The prevention of data from corruption and unauthorized access is a function of data

86

Which of the following defines heterogeneous distributed database?

93

One of the characteristic feature of the second generation computer is the presence of

94

Convert 4\(_{10}\) to a number in base two

95

Data processed into its useful form is referred to as

96

Which of the following is an example of qualitative data?

97

Which of the following is not a characteristics of a personal computer

98

The gap between ownership, access, and benefits from computer and it's application is termed degital

99

Magnetic Ink Character Recognition (MICR) are used to read codes on

100

the device that sends information to the CPU is the

101

Which of the following is not a procedure for information processing?

102

The assembling of data according to a predetermined order is known as

103

Information transmission medium from location P to location Q in space is called

104

Which of the following is not a type of wireless transmission

105

The basic criterion for classifying a network is

106

Which of the following measures are used to secure data on-line? I. Password II. Encryption III. Personal Identification Number (PIN)

107

In e-mail context, bcc stands for

108

An internet-based system that allows people different geographical locations to have in-personmeeting is known as

109

The following software programs coordinates and control all other computer progra, programs, hardware and users' action except

110

In word processing applications, the symbol B, I and U are commonly used buttons found on the

111

Bola intends to evoke the synonyms of a certain word during Word processing. What is the most appropriate tool to use?

112

In a worksheet, which of the following actions would select non-contiguous cells?

113

Which of these formulas will not be executed in MS Excel?

114

MS Access is an example of a

115

When a database recovery manager is invoked after a crash, restart proceeds in the following three phases; I. Undo II. Redo III. Analysis. Arrange these phases in the right order.

116

During presentation, slide transition can be activated by

117

Planning and creating of website is called web

118

Magazines and brochures can be produced using a

119

Which of the following is one of the tools used to maintain the computer

120

Which of the following is not a good computer maintenance practice?

121

Commonly accepted practices, rules or methods in computing are called

122

Which of the following is safety measure in the computer laboratory?

123

Safety measures to be observed when using the computer include all of the following except

124

A computer professional who studies an existing system with a view to evolving a computer-based system from it is called?

125

Which of the following is not an anti-virus?

126

Which of the following is used to retrieve specific information from database tables?

127

Which of these methods would delete a relationship defined between two tables in MS Access?

128

Which of the following is not an effect of computer virus?

129

What file organization would require that all the five (5) records be read before the 6th record is written?

130

Which of the following is not an advantage of file organization?

131

Maintaining the value nd content of data is part of data

132

Which of these operations would not improve the performance of a parallel database system?

139

The use of Visual Display Unit was a major breakthrough in the

140

In hexadecimal system, D is equivalent to

141

A teacher computed the average score of students in a given test. The result of the computation describes

142

The sum of 110\(_2\) and 101\(_2\) is

143

One advantage of the first generation computers is

144

Magnetic Ink Charcter Recognition is applied on

145

Internet banking entails

146

Which of the following parts of the computer ensures the smooth operation of its hardware?

147

Basic computer operations include the following except

148

One disadvantage of electronic data processing is

149

Which of the following sources of information is received by the user in visual mode only?

150

Which of the options A to D is not a medium of information transmission?

151

A company has four computer system, one printer and one scanner for its daily operations. One factor that can motivate the company to connect all the devices in a network is the need to

152

One similarity  between the internet and intranet is that they both

153

The process of copying data or information form the internet to a personal computer is termed

154

An entrepreneur who wishes to send digital data over a telephone line would need a

155

Graphical User Interface is considered user friendly because of the following reasons except that it

156

The symbols dialog box of MS Word application is located on the

157

Pressing the key combination Ctrl + J on a selected text in a Microsoft Word document would

158

The merge button in spreadsheet application is used to

159

If cell A20 in MS Excel contains the value 5, then the formula "A=A20^3" will return a value equal to

160

A database contains list of customers and their phone numbers. What typ of relationship desribes a customer having multiple phone numbers?

161

The DBSM statement select* from Marksheet in table Marksheet will display all records in the fields; ID NAME SCORE GRADE 001 Abdul 55 C 002 Emeka 52 C 003 Kola 49 P

162

Which of the following objects is not located on the slide layout

163

The following programming tools are employed by a web developer except

164

Graphics can be captured using the following devices except

165

Which of the following substances is used for cleaning the mouse ball

166

One characteristics of a dirty mouse is that the mouse

167

One responsible way of using the computer is

168

Any activity carried out to protect the user from hazards while using the computer is called

169

In order to protect a computer on the World Wide Web from throats, the user should

170

Responsibilities of a database administrator includes the following except performing

171

The following tools are used for protecting the computer against virus attack except

172

Which of the following software replicates itself without being executed by the user

173

In the model; Furniture (Table, Chair, Wardrobe) Furniture is...

174

Which of the following database operations does not require a Data Manipulation Language?

175

The file organisation method which allows records to be accessed in any sequence is

176

A file organization that has reference which identifies a record in relation to other records is called...

177

Providing access control to a school is the responsibility of a

178

Figure 1  ABOVE depicts.

185

The first generation computers made use of

186

Microprocessor was used as the main electronic component of the

187

The act of producing information from figures, text or images is called data

188

The following are primary sources of information except

189

Which of the following is not considered when classifying computers

190

Which  of these channels would enable business transactions between a buyer from Nigeria and a seller from Ghana

191

The ICT application which helps to resolve road congestion at junctions is

192

The main components of the central processing unit (CPU) of the computer are

193

Stages in data processing cycle includes the following except data

194

At what stage of information processing is data validtion carried out?

195

The media which enable electromagnetic signals to be transmitted through free space is known as

196

The following are advantages of networking except

197

Which of the following devices would not transmit signals from one point to another?

198

Another term for Uniform Resources Locator (URL) is

199

The website "www.google.com" indicates that Google is

200

Identify an operating system from the following software

201

Which of the following command would undo the last operation carried out in Microsoft Word

202

While typing, a series of letters were highlighted and the keyboard key combination "Ctrl + B" was executed, the highlighted letters would be

203

Table 1 is a part of MS Excel worksheet that shows the marks obtained by some students in an examination. Use the table to answer questions 20 and 21. S/N A B C D E F 1 NAME OF STUDENT ENGLISH LANGUAGE MATHEMATICS DATA PROCESSING COMPUTER STUDIES CIVIC EDUCATION 2 ANENE LORRETA 65 90 70 85 65 3 BAKARE IMAN 60 65 75 80 75 4 ENEH GRACE 75 65 65 75 60 5 MOHEMMED DEJI 65 60 65 60 60 6 ONYEBUEKE DEBORAH 89 65 60 60 65 Which of the following formulas would calculate the average score of the students in Mathematics?

204

Which of the following formulas would calculate the total score of ONYEBUEKE DEBORAH in the five subjects S/N A B C D E F 1 NAME OF STUDENT ENGLISH LANGUAGE MATHEMATICS DATA PROCESSING COMPUTER STUDIES CIVIC EDUCATION 2 ANENE LORRETA 65 90 70 85 65 3 BAKARE IMAN 60 65 75 80 75 4 ENEH GRACE 75 65 65 75 60 5 MOHEMMED DEJI 65 60 65 60 60 6 ONYEBUEKE DEBORAH 89 65 60 60 65

205

The following are advantages of a Database Management System (DBSM)  except

206

Extracting information in Database Management System (DCMS) involves

207

A special effect that controls the way slides appear in PowerPoint presentation is called

208

A reference to another page or resource on a website is done by

209

The design output of a graphic package can be in the following file formats except

210

The proactive maintenance of computer equipment before a fault or failure occurs is called

211

A good computer maintenance practice entails

212

Set of moral principles that regulate the ise of computers and concerns professional and social conduct is known as

213

Which of the following programs is a computer virus

214

Precautionary measures on computer do not include

215

The computer professional responsible for designing and maintaining a database is called database

216

Computer virus is not transmitted through

217

The following are attributes of computer virus except the ability to

218

A relational database model is designed according to set of rules known as

219

Which of the foolowing statements about relational model is not correct?

220

Arranging records in a file according to a particular order is referred to as

221

One advantage of indexed sequential file organization is that

222

The protection of database against compromise is known as

223

Which of the following is a characteristic of parallel databases?

230

Information that stimulates both the senses of hearing and sight is called

231

The modern definition of a computing machine is based on a concept known as

232

Arrange the following ICT tools in the order of invention from the earliest to the latest; cell phone, internet, satellite and radio

233

The pocess of gathering facts and statistics from different sources is known as data

234

A chart is a graphical representation of

235

The use of transistors in circuit was a major advancement in the

236

An ICT-based service that uses telecommunication devices to hold meeting among many participants in two or more location known as

237

Which of these devices does not support wireless communication

238

The manipulation of digitised information by computer or other digital electronic equipment is known as

239

Which of the following statements explains information processing

240

The information transmission medium from location A to location B in space is called

241

What is the role of the part labeled II in Figure 1 above?

242

Which of these technologies allows wireless connectivity in a Personal Area Network

243

The main function of the device in the part labeled II in Figure 2 above is

244

Use Figure 3 above to answer question below The title of the web page being accessed on the interface in Figure 3 is displayed on the part labeled

245

Use Figure 3 above  to answer  this question The shortcut key combination for adding a new tab in Figure 3 is

246

A program that enables the computer hardware to communicate and function effectively is

247

A Word document can have any of these file extension except

248

Which of the command shortcuts can be used to display the dialog box in Figure 4 when the application is running

249

The first step taken in editing a chart in MS Excel is

250

By default numeric values in a worksheet are

251

The diagram in Figure 5 depicts a

252

Which of the following sets are available when creating a table in "Design view" in Microsoft Access?

253

The MS PowerPoint feature which can be used to change the appearance of the entire presentation is the

254

One example of web design package is

255

The part labeled II in Figure 6 ABOVE is used to

256

In computer maintenance the dampen material can be used on the following devices except

257

Dust from the system unit casing can be removed using

258

Indiscriminate sending of unsolicited e-mails to many addresses is known as

259

In computing, ergonomics is a term associated with computer

260

A novice is discouraged from opening the CRT monitor for maintenance because

261

Computer professional bodies in Nigeria include the following except

262

The malware which appears as a harmless object but attack it's victims at the slightest opportunity is called

263

Virus effect can be prevented by

264

The parts of the object in Figure 7above labeled II are called

265

The arrangement that gives the correct order of magnitude of the database elements is

266

One unique feature of index file is that it contains

267

Which of the following file organization requires a primary key

268

Ensuring the correctness and consistency of data is referred to as data

269

In distributed database management system, breaking a relation into smaller relations is known as

276

The main component of the first generation computer was

277

The term Garbage-In-Garbage-Out is used to explain the characteristics of the computer in terms of

278

The number 101100101\(2\) in denary is

279

Which of the following statements is true?

280

The type of computer that counts in discrete form only is referred to as

281

Which of the following media involves point-to-point communication?

282

Fourth generation computer application can execute the following operations except

283

The joystick is mainly used for

284

The manipulation of digitalized information by computer or other electronic equipment is known as

285

Which of the following actions is not a source of computer virus?

286

When information is conveyed from one space to another, it is referred to as information

287

Which of the following file organizations requires primary Key?

288

The protocol for transferring file(s) from one machine to another is

289

Mr Francis has an office complex with 20 rooms. What type of network is suitable for connecting all the computers in their various rooms into a single network?

290

The following software are web browsers except

291

Use Figure 1 to answer question 16 To visit the previous page using the interface in Figure 1, the user will click on the part labeled

292

An operating systemthat enables more than one user to access the same data is called

293

The feature of a word document that shows the page, number of words and errors found in a document is the

294

Figure 2 shows a dialog box from Microsoft Word application. Use it to answer question 19 Which of the following command shortcuts can be used to display the dialog bax in Figure when the application is running?

295

S/N A B C D E F G H 1 STAFF DAYS ITEMS SALES (N) ITEMS SALES (N) ITEMS SALES (N) ITEMS SALES (N) ITEMS SALES (N) ITEMS SALES (N) 2 JOY MON 208 300 500 400 300 158 3 AKIN TUE 300 200 500 400 200 200 4 KEN WED 400 300 400 500 100 300 Figure 3 The highest sale by Joy is recorded in cell

296

The formula to calculate the average of a given range of data from cell B2 to cell D4 in a Microsoft Excel worksheet is

297

The field in a database which uniquely identifies each record is called a

298

The correct order of the steps taken in creating a database from the database template in MS Access 2007 is

299

To show the whole presentation in Microsoft PowerPoint 2007, select slide show from the

300

Web design packages includes the following except

301

Figure 4 shows CorelDraw tool bar. The part labeled I is used to

302

One precautionary measure taken when cleaning a monitor is

303

The erratic movement of the mouse pointer is usually caused by

304

The use of the internet to perform illegal activities is generally called

305

One safety measure to consider in a computer room is

306

Security breaches in computing cannot be prevented through the use of

307

A system analyst is a person who

308

The malware which is programmed to initiate at a specific date or when a specific event occurs is called

309

One advantage of information processing is that

310

The function of the SQL statement SELECT Student ID, Surname, House Name FROM Student, is that it

311

The best arrangement that gives the correct order of magnitude of the database element is

312

A file organization that contains a reference number is called

313

The following media are used for information transmission except

314

To prevent the loss of data in the computer, it is better to implement file

315

Which of the following terms is not a feature of distributed database?

321

The database tool that allows the user to select and filter data from multiple tables is referred to as

322

The following statements are steps used in creating a new workbook in a Microsoft Excel application. I. Click on New II. Click on the Microsoft Office button III. Choose blank document Which of the following arrangements shows the correct order of operation from the steps above?

323

Shared-memory is an architecture in

324

One example of web design package is

325

Preventive maintenance measures in computer room do not include

326

Corrective maintenance of software refers to

327

To search for information using the interface in Figure above, the keywords of the search subject is typed into part labelled

328

To access a website, the URL of the website is typed into the part labelled

329

One of the major differences between WAN and MAN is that

330

Which of the following malware does not replicate itself?

331

One disadvantage of using computer for information processing is

332

The part labelled III in the figure above is used to

333

Table 1 is a portion of a Microsoft Excel Worksheet which shows the marks obtained by some students in an examination. A B C D E F 1.NAME OF         STUDENT ENGLISH LANG MATHEMATICS DATA PROCESSING COMP.     STUDIES CIVIC EDUCATION 2.ANENE LORRETA 65 90 70 85 65 3.BAKARE IMAM 60 65 75 80 75 4.ENEM GRACE 75 65 65 75 60 5.MOHAMMED DEJI 65 60 65 60 60 6.ONYEBUEKE DEBORAH 89 65 60 65 65 Which of the following formulas can be used to find the average score for ENEH GRACE?

334

An application of ICT which allows a person to participate in a meeting from a remote location is called

335

The category of computers used for weather forecasting is known as

336

When choosing a file organization method a system administrator will not consider

337

A suitable application software for creating Tables 1 and 2 is

338

Table 2 can be derived from table 1 by

339

The part labelled I in this figure is used in Microsoft Word to

340

In Microsoft PowerPoint, the command: ctrl + m is used to create

341

The capacity of a communication channel is referred to as

342

A desktop computer is switched on and the monitor displays an error message which reads: No input signal. The likely cause of this error is

343

The concept of stored program for electronic devices was introduced by

344

At what stage in data processing does data manipulation take place?

345

One quality of a computer programmer

346

A file organization method that has reference which identifies a record in relation to other records is called

347

One application of ICT in education is

348

The process of sending and receiving information from one place to another is called information

349

Computer virus replicates itself into

350

High level programming languages such as COBOL and FORTRAN were first used in the

351

The subdivision of tracks in a hard disk is called

352

The standard way of arranging information is known as

353

Any meaningful fact and knowledge item that can be expressed in words and numbers is called

354

The type of network which has a restricted coverage within an enterprise is called

355

Arrange the following steps in the correct order for editing data type in data sheet view of a Microsoft Access database I. Click the type of data that that will be entered into the fields II. Click the data sheet tab on the ribbon III. Click the field you wish to define IV. Click the 'down' arrow next to the data type

356

Frequent backup of computer files helps to

357

A user working on a computer that is running on Windows 7 issued the command: Ctrl +Alt +Del while typing a document. What interface is expected to be displayed on the screen?

358

The following computer files will open on a computer that has only Microsoft office 1997 - 2003 installed except

359

The legal right given to the owner of an intellectual property to prevent others from duplicating or using the work freely is known as

360

Which of the following practices is a safety measure?

367

The Difference Engine and the Analytical Engine were invented by

368

A type of file organization that stores data in the order of their arrival is called

369

Which of the following computer types represents data as variable and continuous values?

370

The following feature are found in the toolbox of CorelDraw application except

371

The ruler feature in MS Word that is used to indent the second and subsequent lines of a paragraph is

372

Advantages of parallel database include the following except

373

The volume of data that can be sent from one point to another in a given time period is called

374

One application of ICT in medicine is

375

Figure 2 is an email application interface. Use it to answer questions 15 and 16 . New messages received are save in the part labelled

376

Figure 2 is an email application interface. Use it to answer questions 15 and 16 . To send an e-mail, the user must click on the part labelled

377

Computer malware is detected by

378

When performing computer recovery operations after a system crash, the startup disk is used to

379

The speed of access to files in a random access file compared to other file organization methods is

380

Which of the following devices is needed by a technician for protection against electrostatic discharge?

381

Figure 3 is a Microsoft Excel Worksheet. Use it to answer questions 20 and 21 . A B C D E 1 IDENTICATION NUMBER BASIC SALARY (N) TOTAL ALLOWANCE (N) TOTAL DEDUCTION (N) NET SALARY (N) 2 WASC/LPT/001 800000 60000 40000 820000 3 WASC/LPT/002 700000 40000 20000 720000 4 WASC/LPT/003 300000 10000 5000 305000 5 WASC/LPT/004 400000 20000 10000 410000 Figure 3 What formula will correctly display the total number of individuals involved in the computation as shown in Figure 3 ?

382

Figure 3 is a Microsoft Excel Worksheet. Use it to answer questions 20 and 21 . A B C D E 1 IDENTICATION NUMBER BASIC SALARY (N) TOTAL ALLOWANCE (N) TOTAL DEDUCTION (N) NET SALARY (N) 2 WASC/LPT/001 800000 60000 40000 820000 3 WASC/LPT/002 700000 40000 20000 720000 4 WASC/LPT/003 300000 10000 5000 305000 5 WASC/LPT/004 400000 20000 10000 410000 Figure 3 What formula will calculate the total number of individuals who earn less than ₦500,000 from the table as shown in Figure 3 ?

383

Figure 4 is an entity relationship diagram in MS Access . Use it to answer questions 22 and 23 . How many entity are listed in Figure 4 ?

384

Figure 4 is an entity relationship diagram in MS Access . Use it to answer questions 22 and 23 . What kind of relationship exists between users and products as shown in Figure 4 ?

385

Database Administrator is a professional who

386

The aim of administering questionaire is to collect

387

A pointing device that controls cursor movement on the screen is

388

The information processing stage that produces detailed evaluation of data is

389

A digital platform for the delivery of public sector information and seminar to citizens is called

390

The following precautionary measures are taken against virus infection except

391

Artificial intelligence is a feature of

392

Macromedia Dreamweaver application is used for

393

People who use cathode ray tube monitor without antiglare screen are susceptible to

394

Figure 5 is an MS PowerPoint application interface. The part used to apply motion effect to different objects of a slide is labelled

395

Use Table 1 to answer questions 35 and 36 . Table 1: TableStudent Reg No House Age 18/001 Yellow 14 18/002 Blue 15 18/003 Yellow 15 Columns 2 and 3 in Table 1 cannot be used as primary key because both fields contain

396

Use Table 1 to answer questions 35 and 36 . Table 1: TableStudent Reg No House Age 18/001 Yellow 14 18/002 Blue 15 18/003 Yellow 15 The attributes in Table 1 are

397

Computer ethical practises include the following except

398

The process of drawing inference from a piece of information is called

399

A computer system under use was found to be unusually slow, freezes often and very dusty. What is needed to correct this problem?

400

The equipment shown in Figure 1 is used for

401

Use the information below to answer questions 13 and 14 . A student in the school hostel was able to upload some personal details on the school portal via the school's WiFi . The ISP and the hostel are both domiciled in the school premises. What type of network is illustrated above?

402

Use the information below to answer questions 13 and 14 . A student in the school hostel was able to upload some personal details on the school portal via the school's WiFi . The ISP and the hostel are both domiciled in the school premises. The physical infrastructure through which internet traffic are exchanged between the ISP in the school illustrated above and other ISP s is called

403

The allocation and de-allocation of computing resources in a computer is the function of

404

The following terms describe the importance of data security except data

405

Which of the following data elements ranks highest in size?

410

The Stepped Reckoner was developed by

411

The binary number 100101, can be written in denary as

412

The first stage in computer data processing procedure is

413

One advantage of electronic data processing is that it

414

The type of computer that has the ability of counting in discrete form is referred to as

415

One reason for using Computer Aided Design in manufacturing is that

416

Which one of the following statements is true about Voice Over IP? it

417

Which one of the following sets of devices can be used to store data during processing?

418

The process of inspecting, transforming and modeling data to get useful information is known as

419

One disadvantage of using computer for information processing is

420

The diagram in Figure 1 illustrates process called

421

The transmitter in communication is the component that

422

Which of the following resources is not usually shared in a network?

423

Factors to be considered when creating a backup system in a computer network include

424

The URL www.exams.edu.ng represents the website of

425

The Post Ofice Protocol (POP) is used to

426

A user working on a computer that is running on Windows 7 issued the com- mand "Ctrl + Alt + Del" while typing a document. What interface is expected to be displayed on the screen?

427

Header and Footer are added to a document in MS Word by just clicking on the

428

A typist positioned the insertion point at the beginning of a line of text in a word processor and then pressed down the Shift key and clicked at the opposite end of the text. What would be the result of this action? The text will be

429

The Microsoft Excel menu bar icon shown in Figure 2 is used to

430

To add a new column to the right of the IGR column on the interface in the figure above, the user would.

431

The function of the foreign key in a database is to

432

How many primary keys exist in the figure above?

433

Which of the following lists contains the primary keys in the figure above?

434

Web design packages include the following, except

435

The part labelled IV in the image above is used to

436

One precautionary measure taken when cleaning a monitor is

437

Which one of the following practices is considered ethical?

438

Proper network implementation and good ICT policies are types of

439

Preventive maintenance measures in the computer room include the following options except

440

A database administrator is responsible for the following tasks except

441

Measures taken to avoid eye strain include the following except

442

A computer virus replicates itself into other programs or certain areas on the disk during the

443

A malware that copies and replicates itself using computer network and security flaws is

444

The entities in the figure above are named

445

Which one of the following statements is true about database tables?

446

The major difference between serial and sequential files is that sequential files are

447

Which one of the following pairs contains computer file classification?

448

Which of the following statements supports the goals of data backup? I. Need for duplication II. Need for future reference III. Protection against data loss

449

Which of the following characteristics is associated with the architecture of parallel database?

456

Who among the following scientists invented the punch card?

457

Which of the following computers is designed to perform a variety of tasks?

458

The special feature in word processing which allows the sending of multiple data copies of document to different people without having it retyped is

459

A motion path is a

460

Which of the following can be used to make a PowerPoint slide in a presentation to have the same look?

461

The correctness and completeness of the data in a database are its

462

Which of the following conditions is used to transmit packets over a medium at the same time?

463

Which of the following is not a normal form of relational database?

464

The two major types of computer chips are

465

Which of the following is an advantage of electronic data processing?

466

The following are examples of relational operators. Use the image in the explanation to answer these questions.

467

A ______ In a database represents a relationship among a set of values

468

Strategic data modeling is the

469

A data model has how many components?

470

How many types of index (es) is/are there in the structured query language server?

471

Which of the following is an audiovisual medium of receiving information?

472

The following are examples of operating systems by Microsoft Corporation, except

473

Software that defines a database, stores the data, supports a query language, produces reports, and creates data entry screens is a

474

The database design that consists of multiple tables that are linked together through matching data stored in each table is called a:

475

Which of the following items is not an advantage of a DBMS?

476

The feature in word processing that compares every word with an electronic dictionary is

477

Which of the following is not a database security tip?

478

The process of distributing information over a communication network or medium is referred to as

479

Computers store data in units called

480

How do you minimize and maximize windows?

481

Excel worksheet version 8 has how many columns?

482

Which of the function keys opens the "Save-As" windows in MS word?

483

Multitasking allows the _____  to access several programs at the same time

484

Which of the following fields can uniquely identify a record of a student's performance in a school?

485

The execution of an instruction by a processor is in three distinct phases. They are

486

The function of the history link in the standard navigation bar of Internet Explorer is to

487

The roles of a database administrator include the following except

488

Ctrl + B is?

489

The following are the benefits of parallel databases, except

490

The slide that is used to introduce a topic during a presentation is called

491

Word has a list of predefined typing, spelling, capitalization, and grammar errors that ______ detect and correct.

492

The process of converting data or information into a form which is readily for processing is called

493

The ring technology is a protocol at which layer of the OSI model?

494

Where was the abacus invented?

495

A program installed on a computer that secretly collects information about the user is called