Which of the following persons invented the punch card machine?
2
Convert \(47_8\) to its binary equivalent.
3
The operation of checking input data against specified criteria is referred to as.
4
Which of the following is not a source of data collection.
5
Which of the following is true about digital computers.
6
Facebook, Twitter and WhatsApp are examples of
7
Which of the following is not an application of computers?
8
Which of the following is secondary storage device.
9
Information analysis procedures includes the following except
10
The advantages of electronic data processing includes the following except
11
Which of the following is not a transmission medium?
12
Information transmission by television is classified as
13
Which of the following are the basic components of a computer network? I. A minimum of two computers II. Printers III. Network interface card.
14
Social networking does not promote.
15
Companies that provide internet access are referred to as
16
While typing a MS word document, Akin inserted footer in the document in order to
17
The spreadsheet symbol used to convert a number to a label is
18
In spreadsheets, data would not be accepted into a cell by pressing the.
19
A field in a database table is also known as
20
The property of a system software that enables it to execute more than one program at a time is referred to as
21
Which of these operations would not close MS word application?
22
The feature in a database application that acts as an interface between the user and the database is called a?
23
Planning and creating websites are stages in?
24
The type of data entered into a table in database follow a set of rules known as?
25
Which of the following drawing tools would create special effects for texts?
26
The study of the effect of interaction between the computer and human users is referred to as computer
27
In MS Powerpoint, the action of holding down the left mouse key and moving the mouse around the slide would
28
A file kept in case of an accident or natural disaster is called
29
Which of the following is not a preventive maintenance measure?
30
Which of the following is not a safety equipment in a computer laboratory?
31
Which of the following is not a computer professional?
32
The following are desturctive software except
33
The type of file organisation in a DVD-ROM is?
34
Which of these measures would not secure data in database?
35
The diagram illustrates the relationship between two tables in a database. The student ID in Tables II is referred to as
36
The diagram illustrates the relationship between two tables in a database. What type of relationship exists between Tables I and II?
37
A program developed to protect the computer from malicious software is referred to as
38
One of the advantages of a parallel database is
39
In a relational database management system, files are organized as relations and
40
The exchange of information over a network follows a set of rules called
47
Who developed the first digital electrical computer?
48
Which generation of computers made use of intergrated circuit?
49
Which of the following is an alphebetical data?
50
The type of data which consist of text, number, audio, graphic and animation is called
51
Which of the following factors is not considered when classifying computers?
52
Which of the following is not used for online shopping?
53
Which of the following is a negative impact of ICT in education?
54
Which of the following are parts of a computer processor?
55
Data gathering involves the following means except
56
Two computers, X and Y are such that the processor in X has a word size of 32 bits while that of Y is 16bits. Which of the following statement is true?
57
The television set deisplays information as
58
Which of the following is not an ancient medium for transmitting information?
59
A server is a computer that provides services to other computers called
60
The rules for exchanging data on a network are known as
61
A search engine is a?
62
The feature in a browser which enables users to open the latest copy of a webpage is
63
An operating system will perform the following except
64
A Microsoft Office application suites include all the following except
65
Which of the following is not a feature of the drawing tool bar?
66
The MS Excel worksheet below shows the salary distribution for four staff in a company. The net salary is paid after deductions have been made. S/N A B C D E 1 IDENTIFICATION NUMBER BASIC SALARY (N) TOTAL ALLOWANCE (N) TOTAL DEDUCTION (N) NET SALARY (N) 2 LP/p/1202 22000 29000 7000 44000 3 L/P/1250 26000 35000 9000 52000 4 L/P/3205 15000 21000 6000 30000 5 L/P/3215 33000 41000 8000 66000 Which of the following cells contain numeric data?
67
The MS Excel worksheet below shows the salary distribution for four staff of a company. The net salary is paid after deductions have been made. S/N A B C D E 1 IDENTIFICATION NUMBER BASIC SALARY (N) TOTAL ALLOWANCE (N) TOTAL DEDUCTION (N) NET SALARY (N) 2 LP/p/1202 22000 29000 7000 44000 3 L/P/1250 26000 35000 9000 52000 4 L/P/3205 15000 21000 6000 30000 5 L/P/3215 33000 41000 8000 66000 Which of the following for mulas would be used to obtain the value in cell E2?
68
In Database Management System (DBMS), linking entities is used to represent?
69
A data element that uniquely identifies one record from the other in a table is the
70
In MS PowerPoint presentation, the special effects that control the order in which objects enter a slide and their manner of appearance is
71
Which of these packages could be used by a Data processing teacher to design a website for a school
72
In graphic packages, the process of removing unwanted part of an image is known as
73
Routine checks operations on computers in order to ensure its continuous functioning is known as computer
74
The perfomance of the computer can be enhanced by
75
The moral principles that regulates the use of computers, its accessories and environment are called
76
A technician can protect itself from electronic discharge by using
77
Which of the following operations prevent file loss?
78
Acomputer pofessional who studies an existing system with a view to evolving a computer based system from it is
79
Computer virus cannot be transmitted by
80
A program designed to detect and prevent malicious programs from a computer system is
81
In relational model, a tuple is a?
82
Relationship between tables in a relational model are created by
83
Computers store data as
84
The records of students in a school are kept in order of their arrival. What files access method would be used to access a student's record if the latest record would first be retrieved?
85
The prevention of data from corruption and unauthorized access is a function of data
86
Which of the following defines heterogeneous distributed database?
93
One of the characteristic feature of the second generation computer is the presence of
94
Convert 4\(_{10}\) to a number in base two
95
Data processed into its useful form is referred to as
96
Which of the following is an example of qualitative data?
97
Which of the following is not a characteristics of a personal computer
98
The gap between ownership, access, and benefits from computer and it's application is termed degital
99
Magnetic Ink Character Recognition (MICR) are used to read codes on
100
the device that sends information to the CPU is the
101
Which of the following is not a procedure for information processing?
102
The assembling of data according to a predetermined order is known as
103
Information transmission medium from location P to location Q in space is called
104
Which of the following is not a type of wireless transmission
105
The basic criterion for classifying a network is
106
Which of the following measures are used to secure data on-line? I. Password II. Encryption III. Personal Identification Number (PIN)
107
In e-mail context, bcc stands for
108
An internet-based system that allows people different geographical locations to have in-personmeeting is known as
109
The following software programs coordinates and control all other computer progra, programs, hardware and users' action except
110
In word processing applications, the symbol B, I and U are commonly used buttons found on the
111
Bola intends to evoke the synonyms of a certain word during Word processing. What is the most appropriate tool to use?
112
In a worksheet, which of the following actions would select non-contiguous cells?
113
Which of these formulas will not be executed in MS Excel?
114
MS Access is an example of a
115
When a database recovery manager is invoked after a crash, restart proceeds in the following three phases; I. Undo II. Redo III. Analysis. Arrange these phases in the right order.
116
During presentation, slide transition can be activated by
117
Planning and creating of website is called web
118
Magazines and brochures can be produced using a
119
Which of the following is one of the tools used to maintain the computer
120
Which of the following is not a good computer maintenance practice?
121
Commonly accepted practices, rules or methods in computing are called
122
Which of the following is safety measure in the computer laboratory?
123
Safety measures to be observed when using the computer include all of the following except
124
A computer professional who studies an existing system with a view to evolving a computer-based system from it is called?
125
Which of the following is not an anti-virus?
126
Which of the following is used to retrieve specific information from database tables?
127
Which of these methods would delete a relationship defined between two tables in MS Access?
128
Which of the following is not an effect of computer virus?
129
What file organization would require that all the five (5) records be read before the 6th record is written?
130
Which of the following is not an advantage of file organization?
131
Maintaining the value nd content of data is part of data
132
Which of these operations would not improve the performance of a parallel database system?
139
The use of Visual Display Unit was a major breakthrough in the
140
In hexadecimal system, D is equivalent to
141
A teacher computed the average score of students in a given test. The result of the computation describes
142
The sum of 110\(_2\) and 101\(_2\) is
143
One advantage of the first generation computers is
144
Magnetic Ink Charcter Recognition is applied on
145
Internet banking entails
146
Which of the following parts of the computer ensures the smooth operation of its hardware?
147
Basic computer operations include the following except
148
One disadvantage of electronic data processing is
149
Which of the following sources of information is received by the user in visual mode only?
150
Which of the options A to D is not a medium of information transmission?
151
A company has four computer system, one printer and one scanner for its daily operations. One factor that can motivate the company to connect all the devices in a network is the need to
152
One similarity between the internet and intranet is that they both
153
The process of copying data or information form the internet to a personal computer is termed
154
An entrepreneur who wishes to send digital data over a telephone line would need a
155
Graphical User Interface is considered user friendly because of the following reasons except that it
156
The symbols dialog box of MS Word application is located on the
157
Pressing the key combination Ctrl + J on a selected text in a Microsoft Word document would
158
The merge button in spreadsheet application is used to
159
If cell A20 in MS Excel contains the value 5, then the formula "A=A20^3" will return a value equal to
160
A database contains list of customers and their phone numbers. What typ of relationship desribes a customer having multiple phone numbers?
161
The DBSM statement select* from Marksheet in table Marksheet will display all records in the fields; ID NAME SCORE GRADE 001 Abdul 55 C 002 Emeka 52 C 003 Kola 49 P
162
Which of the following objects is not located on the slide layout
163
The following programming tools are employed by a web developer except
164
Graphics can be captured using the following devices except
165
Which of the following substances is used for cleaning the mouse ball
166
One characteristics of a dirty mouse is that the mouse
167
One responsible way of using the computer is
168
Any activity carried out to protect the user from hazards while using the computer is called
169
In order to protect a computer on the World Wide Web from throats, the user should
170
Responsibilities of a database administrator includes the following except performing
171
The following tools are used for protecting the computer against virus attack except
172
Which of the following software replicates itself without being executed by the user
173
In the model; Furniture (Table, Chair, Wardrobe) Furniture is...
174
Which of the following database operations does not require a Data Manipulation Language?
175
The file organisation method which allows records to be accessed in any sequence is
176
A file organization that has reference which identifies a record in relation to other records is called...
177
Providing access control to a school is the responsibility of a
178
Figure 1 ABOVE depicts.
185
The first generation computers made use of
186
Microprocessor was used as the main electronic component of the
187
The act of producing information from figures, text or images is called data
188
The following are primary sources of information except
189
Which of the following is not considered when classifying computers
190
Which of these channels would enable business transactions between a buyer from Nigeria and a seller from Ghana
191
The ICT application which helps to resolve road congestion at junctions is
192
The main components of the central processing unit (CPU) of the computer are
193
Stages in data processing cycle includes the following except data
194
At what stage of information processing is data validtion carried out?
195
The media which enable electromagnetic signals to be transmitted through free space is known as
196
The following are advantages of networking except
197
Which of the following devices would not transmit signals from one point to another?
198
Another term for Uniform Resources Locator (URL) is
199
The website "www.google.com" indicates that Google is
200
Identify an operating system from the following software
201
Which of the following command would undo the last operation carried out in Microsoft Word
202
While typing, a series of letters were highlighted and the keyboard key combination "Ctrl + B" was executed, the highlighted letters would be
203
Table 1 is a part of MS Excel worksheet that shows the marks obtained by some students in an examination. Use the table to answer questions 20 and 21. S/N A B C D E F 1 NAME OF STUDENT ENGLISH LANGUAGE MATHEMATICS DATA PROCESSING COMPUTER STUDIES CIVIC EDUCATION 2 ANENE LORRETA 65 90 70 85 65 3 BAKARE IMAN 60 65 75 80 75 4 ENEH GRACE 75 65 65 75 60 5 MOHEMMED DEJI 65 60 65 60 60 6 ONYEBUEKE DEBORAH 89 65 60 60 65 Which of the following formulas would calculate the average score of the students in Mathematics?
204
Which of the following formulas would calculate the total score of ONYEBUEKE DEBORAH in the five subjects S/N A B C D E F 1 NAME OF STUDENT ENGLISH LANGUAGE MATHEMATICS DATA PROCESSING COMPUTER STUDIES CIVIC EDUCATION 2 ANENE LORRETA 65 90 70 85 65 3 BAKARE IMAN 60 65 75 80 75 4 ENEH GRACE 75 65 65 75 60 5 MOHEMMED DEJI 65 60 65 60 60 6 ONYEBUEKE DEBORAH 89 65 60 60 65
205
The following are advantages of a Database Management System (DBSM) except
206
Extracting information in Database Management System (DCMS) involves
207
A special effect that controls the way slides appear in PowerPoint presentation is called
208
A reference to another page or resource on a website is done by
209
The design output of a graphic package can be in the following file formats except
210
The proactive maintenance of computer equipment before a fault or failure occurs is called
211
A good computer maintenance practice entails
212
Set of moral principles that regulate the ise of computers and concerns professional and social conduct is known as
213
Which of the following programs is a computer virus
214
Precautionary measures on computer do not include
215
The computer professional responsible for designing and maintaining a database is called database
216
Computer virus is not transmitted through
217
The following are attributes of computer virus except the ability to
218
A relational database model is designed according to set of rules known as
219
Which of the foolowing statements about relational model is not correct?
220
Arranging records in a file according to a particular order is referred to as
221
One advantage of indexed sequential file organization is that
222
The protection of database against compromise is known as
223
Which of the following is a characteristic of parallel databases?
230
Information that stimulates both the senses of hearing and sight is called
231
The modern definition of a computing machine is based on a concept known as
232
Arrange the following ICT tools in the order of invention from the earliest to the latest; cell phone, internet, satellite and radio
233
The pocess of gathering facts and statistics from different sources is known as data
234
A chart is a graphical representation of
235
The use of transistors in circuit was a major advancement in the
236
An ICT-based service that uses telecommunication devices to hold meeting among many participants in two or more location known as
237
Which of these devices does not support wireless communication
238
The manipulation of digitised information by computer or other digital electronic equipment is known as
239
Which of the following statements explains information processing
240
The information transmission medium from location A to location B in space is called
241
What is the role of the part labeled II in Figure 1 above?
242
Which of these technologies allows wireless connectivity in a Personal Area Network
243
The main function of the device in the part labeled II in Figure 2 above is
244
Use Figure 3 above to answer question below The title of the web page being accessed on the interface in Figure 3 is displayed on the part labeled
245
Use Figure 3 above to answer this question The shortcut key combination for adding a new tab in Figure 3 is
246
A program that enables the computer hardware to communicate and function effectively is
247
A Word document can have any of these file extension except
248
Which of the command shortcuts can be used to display the dialog box in Figure 4 when the application is running
249
The first step taken in editing a chart in MS Excel is
250
By default numeric values in a worksheet are
251
The diagram in Figure 5 depicts a
252
Which of the following sets are available when creating a table in "Design view" in Microsoft Access?
253
The MS PowerPoint feature which can be used to change the appearance of the entire presentation is the
254
One example of web design package is
255
The part labeled II in Figure 6 ABOVE is used to
256
In computer maintenance the dampen material can be used on the following devices except
257
Dust from the system unit casing can be removed using
258
Indiscriminate sending of unsolicited e-mails to many addresses is known as
259
In computing, ergonomics is a term associated with computer
260
A novice is discouraged from opening the CRT monitor for maintenance because
261
Computer professional bodies in Nigeria include the following except
262
The malware which appears as a harmless object but attack it's victims at the slightest opportunity is called
263
Virus effect can be prevented by
264
The parts of the object in Figure 7above labeled II are called
265
The arrangement that gives the correct order of magnitude of the database elements is
266
One unique feature of index file is that it contains
267
Which of the following file organization requires a primary key
268
Ensuring the correctness and consistency of data is referred to as data
269
In distributed database management system, breaking a relation into smaller relations is known as
276
The main component of the first generation computer was
277
The term Garbage-In-Garbage-Out is used to explain the characteristics of the computer in terms of
278
The number 101100101\(2\) in denary is
279
Which of the following statements is true?
280
The type of computer that counts in discrete form only is referred to as
281
Which of the following media involves point-to-point communication?
282
Fourth generation computer application can execute the following operations except
283
The joystick is mainly used for
284
The manipulation of digitalized information by computer or other electronic equipment is known as
285
Which of the following actions is not a source of computer virus?
286
When information is conveyed from one space to another, it is referred to as information
287
Which of the following file organizations requires primary Key?
288
The protocol for transferring file(s) from one machine to another is
289
Mr Francis has an office complex with 20 rooms. What type of network is suitable for connecting all the computers in their various rooms into a single network?
290
The following software are web browsers except
291
Use Figure 1 to answer question 16 To visit the previous page using the interface in Figure 1, the user will click on the part labeled
292
An operating systemthat enables more than one user to access the same data is called
293
The feature of a word document that shows the page, number of words and errors found in a document is the
294
Figure 2 shows a dialog box from Microsoft Word application. Use it to answer question 19 Which of the following command shortcuts can be used to display the dialog bax in Figure when the application is running?
295
S/N A B C D E F G H 1 STAFF DAYS ITEMS SALES (N) ITEMS SALES (N) ITEMS SALES (N) ITEMS SALES (N) ITEMS SALES (N) ITEMS SALES (N) 2 JOY MON 208 300 500 400 300 158 3 AKIN TUE 300 200 500 400 200 200 4 KEN WED 400 300 400 500 100 300 Figure 3 The highest sale by Joy is recorded in cell
296
The formula to calculate the average of a given range of data from cell B2 to cell D4 in a Microsoft Excel worksheet is
297
The field in a database which uniquely identifies each record is called a
298
The correct order of the steps taken in creating a database from the database template in MS Access 2007 is
299
To show the whole presentation in Microsoft PowerPoint 2007, select slide show from the
300
Web design packages includes the following except
301
Figure 4 shows CorelDraw tool bar. The part labeled I is used to
302
One precautionary measure taken when cleaning a monitor is
303
The erratic movement of the mouse pointer is usually caused by
304
The use of the internet to perform illegal activities is generally called
305
One safety measure to consider in a computer room is
306
Security breaches in computing cannot be prevented through the use of
307
A system analyst is a person who
308
The malware which is programmed to initiate at a specific date or when a specific event occurs is called
309
One advantage of information processing is that
310
The function of the SQL statement SELECT Student ID, Surname, House Name FROM Student, is that it
311
The best arrangement that gives the correct order of magnitude of the database element is
312
A file organization that contains a reference number is called
313
The following media are used for information transmission except
314
To prevent the loss of data in the computer, it is better to implement file
315
Which of the following terms is not a feature of distributed database?
321
The database tool that allows the user to select and filter data from multiple tables is referred to as
322
The following statements are steps used in creating a new workbook in a Microsoft Excel application. I. Click on New II. Click on the Microsoft Office button III. Choose blank document Which of the following arrangements shows the correct order of operation from the steps above?
323
Shared-memory is an architecture in
324
One example of web design package is
325
Preventive maintenance measures in computer room do not include
326
Corrective maintenance of software refers to
327
To search for information using the interface in Figure above, the keywords of the search subject is typed into part labelled
328
To access a website, the URL of the website is typed into the part labelled
329
One of the major differences between WAN and MAN is that
330
Which of the following malware does not replicate itself?
331
One disadvantage of using computer for information processing is
332
The part labelled III in the figure above is used to
333
Table 1 is a portion of a Microsoft Excel Worksheet which shows the marks obtained by some students in an examination. A B C D E F 1.NAME OF STUDENT ENGLISH LANG MATHEMATICS DATA PROCESSING COMP. STUDIES CIVIC EDUCATION 2.ANENE LORRETA 65 90 70 85 65 3.BAKARE IMAM 60 65 75 80 75 4.ENEM GRACE 75 65 65 75 60 5.MOHAMMED DEJI 65 60 65 60 60 6.ONYEBUEKE DEBORAH 89 65 60 65 65 Which of the following formulas can be used to find the average score for ENEH GRACE?
334
An application of ICT which allows a person to participate in a meeting from a remote location is called
335
The category of computers used for weather forecasting is known as
336
When choosing a file organization method a system administrator will not consider
337
A suitable application software for creating Tables 1 and 2 is
338
Table 2 can be derived from table 1 by
339
The part labelled I in this figure is used in Microsoft Word to
340
In Microsoft PowerPoint, the command: ctrl + m is used to create
341
The capacity of a communication channel is referred to as
342
A desktop computer is switched on and the monitor displays an error message which reads: No input signal. The likely cause of this error is
343
The concept of stored program for electronic devices was introduced by
344
At what stage in data processing does data manipulation take place?
345
One quality of a computer programmer
346
A file organization method that has reference which identifies a record in relation to other records is called
347
One application of ICT in education is
348
The process of sending and receiving information from one place to another is called information
349
Computer virus replicates itself into
350
High level programming languages such as COBOL and FORTRAN were first used in the
351
The subdivision of tracks in a hard disk is called
352
The standard way of arranging information is known as
353
Any meaningful fact and knowledge item that can be expressed in words and numbers is called
354
The type of network which has a restricted coverage within an enterprise is called
355
Arrange the following steps in the correct order for editing data type in data sheet view of a Microsoft Access database I. Click the type of data that that will be entered into the fields II. Click the data sheet tab on the ribbon III. Click the field you wish to define IV. Click the 'down' arrow next to the data type
356
Frequent backup of computer files helps to
357
A user working on a computer that is running on Windows 7 issued the command: Ctrl +Alt +Del while typing a document. What interface is expected to be displayed on the screen?
358
The following computer files will open on a computer that has only Microsoft office 1997 - 2003 installed except
359
The legal right given to the owner of an intellectual property to prevent others from duplicating or using the work freely is known as
360
Which of the following practices is a safety measure?
367
The Difference Engine and the Analytical Engine were invented by
368
A type of file organization that stores data in the order of their arrival is called
369
Which of the following computer types represents data as variable and continuous values?
370
The following feature are found in the toolbox of CorelDraw application except
371
The ruler feature in MS Word that is used to indent the second and subsequent lines of a paragraph is
372
Advantages of parallel database include the following except
373
The volume of data that can be sent from one point to another in a given time period is called
374
One application of ICT in medicine is
375
Figure 2 is an email application interface. Use it to answer questions 15 and 16 . New messages received are save in the part labelled
376
Figure 2 is an email application interface. Use it to answer questions 15 and 16 . To send an e-mail, the user must click on the part labelled
377
Computer malware is detected by
378
When performing computer recovery operations after a system crash, the startup disk is used to
379
The speed of access to files in a random access file compared to other file organization methods is
380
Which of the following devices is needed by a technician for protection against electrostatic discharge?
381
Figure 3 is a Microsoft Excel Worksheet. Use it to answer questions 20 and 21 . A B C D E 1 IDENTICATION NUMBER BASIC SALARY (N) TOTAL ALLOWANCE (N) TOTAL DEDUCTION (N) NET SALARY (N) 2 WASC/LPT/001 800000 60000 40000 820000 3 WASC/LPT/002 700000 40000 20000 720000 4 WASC/LPT/003 300000 10000 5000 305000 5 WASC/LPT/004 400000 20000 10000 410000 Figure 3 What formula will correctly display the total number of individuals involved in the computation as shown in Figure 3 ?
382
Figure 3 is a Microsoft Excel Worksheet. Use it to answer questions 20 and 21 . A B C D E 1 IDENTICATION NUMBER BASIC SALARY (N) TOTAL ALLOWANCE (N) TOTAL DEDUCTION (N) NET SALARY (N) 2 WASC/LPT/001 800000 60000 40000 820000 3 WASC/LPT/002 700000 40000 20000 720000 4 WASC/LPT/003 300000 10000 5000 305000 5 WASC/LPT/004 400000 20000 10000 410000 Figure 3 What formula will calculate the total number of individuals who earn less than ₦500,000 from the table as shown in Figure 3 ?
383
Figure 4 is an entity relationship diagram in MS Access . Use it to answer questions 22 and 23 . How many entity are listed in Figure 4 ?
384
Figure 4 is an entity relationship diagram in MS Access . Use it to answer questions 22 and 23 . What kind of relationship exists between users and products as shown in Figure 4 ?
385
Database Administrator is a professional who
386
The aim of administering questionaire is to collect
387
A pointing device that controls cursor movement on the screen is
388
The information processing stage that produces detailed evaluation of data is
389
A digital platform for the delivery of public sector information and seminar to citizens is called
390
The following precautionary measures are taken against virus infection except
391
Artificial intelligence is a feature of
392
Macromedia Dreamweaver application is used for
393
People who use cathode ray tube monitor without antiglare screen are susceptible to
394
Figure 5 is an MS PowerPoint application interface. The part used to apply motion effect to different objects of a slide is labelled
395
Use Table 1 to answer questions 35 and 36 . Table 1: TableStudent Reg No House Age 18/001 Yellow 14 18/002 Blue 15 18/003 Yellow 15 Columns 2 and 3 in Table 1 cannot be used as primary key because both fields contain
396
Use Table 1 to answer questions 35 and 36 . Table 1: TableStudent Reg No House Age 18/001 Yellow 14 18/002 Blue 15 18/003 Yellow 15 The attributes in Table 1 are
397
Computer ethical practises include the following except
398
The process of drawing inference from a piece of information is called
399
A computer system under use was found to be unusually slow, freezes often and very dusty. What is needed to correct this problem?
400
The equipment shown in Figure 1 is used for
401
Use the information below to answer questions 13 and 14 . A student in the school hostel was able to upload some personal details on the school portal via the school's WiFi . The ISP and the hostel are both domiciled in the school premises. What type of network is illustrated above?
402
Use the information below to answer questions 13 and 14 . A student in the school hostel was able to upload some personal details on the school portal via the school's WiFi . The ISP and the hostel are both domiciled in the school premises. The physical infrastructure through which internet traffic are exchanged between the ISP in the school illustrated above and other ISP s is called
403
The allocation and de-allocation of computing resources in a computer is the function of
404
The following terms describe the importance of data security except data
405
Which of the following data elements ranks highest in size?
410
The Stepped Reckoner was developed by
411
The binary number 100101, can be written in denary as
412
The first stage in computer data processing procedure is
413
One advantage of electronic data processing is that it
414
The type of computer that has the ability of counting in discrete form is referred to as
415
One reason for using Computer Aided Design in manufacturing is that
416
Which one of the following statements is true about Voice Over IP? it
417
Which one of the following sets of devices can be used to store data during processing?
418
The process of inspecting, transforming and modeling data to get useful information is known as
419
One disadvantage of using computer for information processing is
420
The diagram in Figure 1 illustrates process called
421
The transmitter in communication is the component that
422
Which of the following resources is not usually shared in a network?
423
Factors to be considered when creating a backup system in a computer network include
424
The URL www.exams.edu.ng represents the website of
425
The Post Ofice Protocol (POP) is used to
426
A user working on a computer that is running on Windows 7 issued the com- mand "Ctrl + Alt + Del" while typing a document. What interface is expected to be displayed on the screen?
427
Header and Footer are added to a document in MS Word by just clicking on the
428
A typist positioned the insertion point at the beginning of a line of text in a word processor and then pressed down the Shift key and clicked at the opposite end of the text. What would be the result of this action? The text will be
429
The Microsoft Excel menu bar icon shown in Figure 2 is used to
430
To add a new column to the right of the IGR column on the interface in the figure above, the user would.
431
The function of the foreign key in a database is to
432
How many primary keys exist in the figure above?
433
Which of the following lists contains the primary keys in the figure above?
434
Web design packages include the following, except
435
The part labelled IV in the image above is used to
436
One precautionary measure taken when cleaning a monitor is
437
Which one of the following practices is considered ethical?
438
Proper network implementation and good ICT policies are types of
439
Preventive maintenance measures in the computer room include the following options except
440
A database administrator is responsible for the following tasks except
441
Measures taken to avoid eye strain include the following except
442
A computer virus replicates itself into other programs or certain areas on the disk during the
443
A malware that copies and replicates itself using computer network and security flaws is
444
The entities in the figure above are named
445
Which one of the following statements is true about database tables?
446
The major difference between serial and sequential files is that sequential files are
447
Which one of the following pairs contains computer file classification?
448
Which of the following statements supports the goals of data backup? I. Need for duplication II. Need for future reference III. Protection against data loss
449
Which of the following characteristics is associated with the architecture of parallel database?
456
Who among the following scientists invented the punch card?
457
Which of the following computers is designed to perform a variety of tasks?
458
The special feature in word processing which allows the sending of multiple data copies of document to different people without having it retyped is
459
A motion path is a
460
Which of the following can be used to make a PowerPoint slide in a presentation to have the same look?
461
The correctness and completeness of the data in a database are its
462
Which of the following conditions is used to transmit packets over a medium at the same time?
463
Which of the following is not a normal form of relational database?
464
The two major types of computer chips are
465
Which of the following is an advantage of electronic data processing?
466
The following are examples of relational operators. Use the image in the explanation to answer these questions.
467
A ______ In a database represents a relationship among a set of values
468
Strategic data modeling is the
469
A data model has how many components?
470
How many types of index (es) is/are there in the structured query language server?
471
Which of the following is an audiovisual medium of receiving information?
472
The following are examples of operating systems by Microsoft Corporation, except
473
Software that defines a database, stores the data, supports a query language, produces reports, and creates data entry screens is a
474
The database design that consists of multiple tables that are linked together through matching data stored in each table is called a:
475
Which of the following items is not an advantage of a DBMS?
476
The feature in word processing that compares every word with an electronic dictionary is
477
Which of the following is not a database security tip?
478
The process of distributing information over a communication network or medium is referred to as
479
Computers store data in units called
480
How do you minimize and maximize windows?
481
Excel worksheet version 8 has how many columns?
482
Which of the function keys opens the "Save-As" windows in MS word?
483
Multitasking allows the _____ to access several programs at the same time
484
Which of the following fields can uniquely identify a record of a student's performance in a school?
485
The execution of an instruction by a processor is in three distinct phases. They are
486
The function of the history link in the standard navigation bar of Internet Explorer is to
487
The roles of a database administrator include the following except
488
Ctrl + B is?
489
The following are the benefits of parallel databases, except
490
The slide that is used to introduce a topic during a presentation is called
491
Word has a list of predefined typing, spelling, capitalization, and grammar errors that ______ detect and correct.
492
The process of converting data or information into a form which is readily for processing is called
493
The ring technology is a protocol at which layer of the OSI model?
494
Where was the abacus invented?
495
A program installed on a computer that secretly collects information about the user is called