0% found this document useful (0 votes)
321 views50 pages

Data Processing SSS30001 and JSS3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
321 views50 pages

Data Processing SSS30001 and JSS3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 50

WASSCE .JUNE 2015 DATA PROCESSING PAPER 1 OBJECTIVE TF.

ST QUESTIONS
I. Which of the following persons invented the 1n111d1 card machine? A. Blaise Pascal 11. Gottfried Leibniz
C. .I. Prosper Eckert D. Dr. Herman I Iollerith
2. Convcrt47.toitsbinarvcqui,·alcnt. .A.100111. B. 110011. C. 10001. D. 1111011,
3. The opcradon of checking input data against specified criteria is referred to as A. data verification.
B, data validation. C. data cross check. D. data control.
4. Which of the followinu is not a source of data collection? A. Observation 8. Interview C. Questionnaire
D. Classification ~
5. Which of the following is true about digital computers? A. They consist of magnetic core memory B. They
recognize data as a continuous measurement ofia physical quantity
C. They represent numbers through a string of binary digits D. They are mainly used for scientific purposes
6. Facebook. Twitter and Wlwt.'iApp arc examples of A. social media. B. social communication.
C. networking media. D. search engines.
7. Which of the following is not an application of computers? A. Bank notes counter B. Point of sale terminal
C. Automated teller machine D. Traffic light control
8. Which of the following is a secondary storage device? A. RAM B. Bubble memory C. Floppy disk
D. EPROM
9. Information analysis procedures include the following except A. skin and scan. B. recognizing
interrelationships. C. interpret and conclude. D. identifying propaganda and bias.
I 0. The advantages of electronic data processing include the following except A. automatic processing.
B. hacking. C. fast and reliable processing. D. storage capacity.
11. Which of the following is not a transmission medium? A. Twisted pair cables B. Coaxial cables
C. Wireless D. Modem
12. Information transmission by television is classified as A. multimedia transmission. B. polymedia
transmission. C. un imcdia transmission. D. monornedia transmission.
13. Which of the following. are the basic components of a computer network? J. A minimum of two computers
JI. Printers III. Network interface card A. I and II onlv B. I and Ill onlv C. II and Ill onlv D. L II and Ill
14. Social networking does not promote A. personal publicity. B. business expansion. C. e-commerce.
D. e-payment.
15. Companies that provide internet access are referred to as A. fixed network operators. B. network service
providers. C. internet service providers. D. internet network operators.
16. While typing a MS word document. Akin inserted footer in the document in order to A enhance the overall
appearance of the document. B. make the document more readable. C. insert page numbers. ·
D. make it appear on the document when printed.
17. The spreadsheets symbol used to convert a number to a label is A. quotation mark f' "). 8. equality sign (=).
C. underscore ( _ ) D. apostrophe sign ( ' )
18. In spreadsheets. data would not be accepted into, a cell by pressing the A. Enter key. B. Arrow key.
C. Esc key. D. Tab key.
19. A field in a database table is also known as A. index. B. relation. C. attribute. D. kev,
20. The property of a systems software that enables it to execute more than one program at a time is referred to as
A. compiling. B. virtual memory. C. multitasking. D. load modules.
2 I. Which of these operations would not close MS word application? A. Pressing the Alt+ f 4 keys
B. Clicking the X button on the title bar C. Choosing exit from the file menu drop down box
D. Selecting: close from the f e menu drop down dialogue box
22. The feature in a database application that acts as an interface between the user and the database is called a A. query 8.
report C. form D. table
23. Planning and creatinu websites are staees in A. web analvsis, B. web maintenance. C. web design.
D. web~publishing. ~ - · '·
24. The type of data entered into a table in database follow a set of rules known as A. protocols.
B. regulators. C. algorithms. D. constraints.
25. Which of the following drawing. tools would create special effects on texts? A. Smart All B. Shape tool
C. Text box D. Word Art
26. The study of the effect of interaction between the computer and human users is referred to as computer
A. ergonomy, 8. economy. C. ergophobia. D. biomechanics.
27. In MS Power Point, the action of holding down the left mouse key and moving the mouse around the slide would
A. highlight an item. B. drau an-item. C. select an item. D. move an item.
28. A file kept in case of an accident or natural disaster is called A. master. B. transition. C. back-up.
D. reference.
29. Which of the following is not a preventive maintenance measure? A. Regular update of the operating. system
13. Proper shut down of the system C. Use of uninterrupted power supply D. Data recovery
30. Which of the following is not a safety equipment in a computer laboratory? A. Surge protector · B. Metal
detector C. Smoke detector D. Fire extinguisher
2
I
31. Which of the following is not a computer professional'?
A. Network Administrator B. Web Master C. System Analyst 0. File Manager
:~~- The following are de~trn~ti\'~ softwares except_ A_. ~r!,.·~,rs1. ~- 'r~J:ms.
C. trojan horses. D. logic bomb.
~'->. The t~·pc offile orga111zat1on ma ~)VD~RO~. 'f, . • · .. '; ,: ~: :· .. '; ; ·
A. direct access. B. sequential. C. serial. · D. h1ernrch1cal..
:n. Which of these measures would not secure data in a database? A. Encryption 13. Data integration
C. Personal Identification Number D. Usemanie and passwords
TABLE I
~Tl'UF.:"il" ll>
STllDE:"iT:-.;AI\IE

, STt'l)F.~T.-\DDKESS

- TABLE II
STl DE!l-1" Ill
1

couRs•: m
COllRSI-: S..\!\H:
contst: ,~sTRl1CTIO~

The diagram above illustrates the relationsh~p ~ two tables in-a database, Use
ii to answer questions 35 and 36.
35. The student ID in Table 11 is referred to as A. primary key. B. foreign key. C. normal key. D. composite key.
36. What type of relationship exists between Tables land 11? · A. One to one 8. Three to four
C. Four to three D. One to manv
37. A program developed to protect the computer from malicious software is referred to as A. trojan. B. driver.
C. antivirus. D. spyware.
38. One of the advantages of a parallel database is A. data sharing. B. data security. C. faster processing of
data. D. uniform memory access.
38. ln a relational da1ahase 11w11ageme11I system. tiles are organized as relations and A. tuple. B. modules.
C. tables. D. forms.
40. The exchange of information over a network follow a set of rules called A. transmission rules.
B. transfer rules, C. channels. D. protocols

WASSCE JUNE 2015 DATA PROCESSING PAPER 1 OBJECTIVE TEST ANSWERS


1.D 2.A 3.B 4.D 5.C 6.A 7.A 8.C 9.A 10.B 11.D 12.A 13.D 14.D 15.C 16.D 17.D 18.A 19.D 20.D 21.D 22.A
23.C 24.A 25.D 26.A 27.C 28.C
'.'.9. D 30. B 31. D 32. A 33. A 34. B 35. A 36. D 37. C 38. A 39. A 40. D

WASSCE JUNE 2015 DATA PROCESSING PAPER 2 THEORY QUESTIONS


.. .'
SECTION A
t. (a) (i) Define an operating system. (ii) State two functions of an operating system
{iii) List two differences between an operating system and an application system software
(b) Starting from the Save As dialogue box, outline the steps involved in paswording a document in a word
processing.
package.
2. (a) Define the following: (i) Database: (ii) Database Management system
{b) Mention three functions of a database management system.
(c) Mention two ways through which data can be destroyed
(d) State three precautional)' measures to prevent data loss
3. (a} (i) Define application package (ii) State one use each of any four application packages.
(b) List two benefits of a presentation package
(c) Outline three guideline for creating a good MS Power Point Presentation
4, (a) Define: (i) Data security (ii) Data risk assessment
(b) (i) Exrlain the term access control in database security (ii} List two access control methods in database security
(c) State three roles d a database administrator.

3
WASSCE JUNE 2015 DATA PROCESSING PAPER 2 THEORY ANSWERS

I. (a) (i) An operating system is that software that controls or 111a11ag~s both software and hardware resorc« , , computer. OR It is
a system software that manages the computer hardware and software resources a, .. _: provides common services for
compute. programs. All computer programs excluding firmware require ;i• operating system to function.
(ii) Functions ofan operating system: (l) It enhances data management, (II) lt ensures system sect: :~ . (Ill) It
allocates system resources (IV) It manages the computer resources such as the central process -~ unit, memory, disk
and printing (V) Executes and provides services for application software
(VI) It establishes user interface
(iii) Differences between un operating system and an application software
- ---
Operating system Application software
I. It is used by the computer to manage software and lt is used by the end users to achieve one or more tasks,
hardware resources. e.g word processin¥, and spreadsheet (Microsof] word)
2. It is basic to the computer hence it comes first, i.e It comes second and third its installation will be as the
it works on its own without human intervention. need arises.
3. rt is installed by the computer manufacturer. It is installed by the computer user.
4. It loads all the programs in the computer. It is being loaded by the user.
5. It allocates space memory and ensures that the It requires human intervention before it can function. ·-
various parts arc working very well.
(b) Processes/Steps involved in passwording a document in a word processing package.
(i) Click Save As. (ii) Click Options. (iii) Type your password (iv) Retype the password, (this enables you •. to ensure the
authenticity of your password) (v) Click OK.

2. (a) Define database: (i) Database is a collection of information that is organised so that it can be easily accessed, managed and
updated. ( ii) Data management system simply refers to the collection of program that assist the user to input, organise,
select, manipulate, store and extract data in ;:i database. OR lt is a computer program /software application that interacts with
the user, other applications and the database itself to capture and analvse data.
(b) Functions of Database: (i) Data definition: Database management system helps to modify the structure of the existing data,
removes data structure from database as well as defining new data structure for a database. (ii) Update: Database
managament system helps in inserting, modifying and deleting data.
(iii) Retrieval: It helps to obtain information for end-user queries and reports by applications.
(iv) Data administration: Database management system helps in registering and monitoring users, maintaining data,
security, recovering information if the system fails, dealing with concuring control as we II as enforcing data security
monitoring performance.
Database also performs the following functions: (i) Organise your file to give you more control over your
data. (ii) Creates data that assist the user (iii) Enables the user to edit his/her data (iv) Update data
(v) Retrieve data.
(c) Precautionary measures to prevent data loss: (i) By creating back-up files (ii) Updating anti-virus often. (iii)
Checking those who may have access to the system, through the use of password and access code.
(iv) Ensuring that access to the computers are folly monitored.
3. (a) (i) Define application package: Application package can be defined as a bundle of two or more computer programmes which
are together and addresses a specific business.
(ii) One use each, of the four application packages: (I) Database management: This is used for creating database. (II)
Corel Draw: This is used for creating invitation cards. calendars. complimentary cards, etc.
(Ill) Word processing as an application is used for creating document. (IV) Spreadsheet: This is used for preparing
examination results, budget management and control.
(b) Benefits of a presentation package: (i) Presentation packages are used as visual aid in lectures. (ii) Presentation packages are
used for advertisement purposes.
(c) Guideline for creating a good MS power point presentation (i) Open the power point (ii) Select the viewer tab (iii) Find
the presentation view section (iv) Click on the slide master icon.
4. (a) (i) Define: (I) Data Security: Data Security refers lo the collective measures used to protect and secure a database
management software from illegitimate use and malicious threats and attacks. These involve series of processes, methodologies
and tools. OR It is a protective digital piracj measures that are applied to prevent unauthorised access to coior-uters. database
and websites. Data security also protects data from corruption. (ii) Data risk assessment is identification of hazards that
could negatively impact an organisation's ability

4
t,--, :.~1..-~nd~1c1 husn~~:-;.~. , 11-~:)1..: ._~.),~,...:~s111l;·uL:, 11t;1p n.1,,,_,11.11.,,. •.• ,..,._,_ ·····-· ~
pn.:,cc:s:!S and cv,Hi-cls ln n::L,cc the impact of these risks to business operations. •
( h) (i) Access control :s a securuy technique that can be used to regulate who or what can view or use resources in a computing
cn\'ironment. OR Access control is a database security/features that control hO\V users .md svstcms communicate and interact
with other svstems and resources. Access is the flow of infomra.ion betwccr a'n object mid a subject. e.g program. database file,
computer etc. while the programmer, users are examples
of the subject.
(ii) Access control methods in database security: (I) Corrective access control (II) Preventive access
control (Ill) Detective access control method
(c) Role of Administration in Database: (i) Setting data privacy: This only permits authorised persons to
access and sec certain data. (ii) Controlling access to database: It is also creates log-ins for users and setting roles
for each user. (iii) Giving support to end users: This ensures that alt users know· how to use the database. (iv)
Controlling data security: This includes preventing unauthorised access to the data and protecting against other
security threats. Others include: (i) Establishing the needs of users and monitoring user access and security. (ii)
Monitoring performance and managing parameters to provide fast responses to front-end users. (iii) Mapping out the
conceptual design for a planned database. (iv) Considering both backend organisation of a data and front-end
accessibility for end-users. (v) Refining the logical design so that it can be translated into specific data model. (vi)
Further refining the pjysical design to meet system storage requirements (vii) Installing and testing new versions of
the DBMS. (viii) Maintaining data standards including adherence to the Data protection Act. l ix) Writing databse
documentation including data standards procedures and de fin ,t ions for the data. (x) Controlling access permissions
and priviledges. (xi) Developing, managing and testing back-up and recovering plans. (xii) Ensuring that storage and
archiving procedures are functioning ..:oncctly. (xiii) Capacity planning. (:,,.i\') Working closely with IT Project
managers database programmers. (xv) Communicating regularly with technical. application and operational staff to
ensure database intergriy and security. (xvi) Commissioning: mid install ing new applications and customising
existing applications in order to
make them fit for purpose.

WASSCE ,JUNE 2015 DATA PROCESSING PAPER


2 SECTION B: TEST OF PRACTICALS
5. Given an internet connected computer, out I ine a step by step procedure for carrying out the following operations: (a)
How to log 011 to ~:Y.Y•_'_J.lJ.YQ.QOks.cQ.!!! and obtain the prices of book W, X, Y, Zand M;
(b) How to tabulate the prices in a worksheet. showing the prices in dollars and the naira equivalent, for each book
and save the workbook as --Prices of Books". Assume that the prices of the books are given in dollars,
[ use $LOO= N 120.00]: .
(c) How to send the workbook in 5(b) as an attachment to your father's email address (myfather(a).vahoo.com)
with the subject "Price of Books".
6. A student was asked to record the type of vehicle that entered the school compound the school's main gate on a
Monday morning. The passage below is an excerpt from the student's report on the assignment. "Report on the vehicular
traffic at the gate on Monday. 1. Introduction: I was directed by the school principal to sit at the main gate and record type
and number of vehicles that passed through the gate on Monday morning. 2. Observation: 1 arrived the gate at about 8:00
am and left at 12 noon. During this period, I made the following observation:
Car, bus, bus, car, car, lorry, motorcycle. bus, bus, car, car, car, lorry, motorcycle, tricycle, motorcycle,
car, tricycle. motorcycle, bus. bus."
(a) Beg.inning from the desktop. outline a step by step procedure of how to type the passage in MS word. usingA4
paper size and potrait orientation.
(b) Slate the procedure for carrying out the follo,"ing operations in the passgage:
(i) Begin the second and third sentences in new paragraphs; (ii) Write the first sentence in capital letters, undcline it
and hold it; (iii) Begin the first letter of a sentence with capital letters; (iv) Represent the student's observation in a
table with three columns under the beadings; Serial Number, Type of vehicle, Number of vehicle: (v) Merge the
first two cells of the last row of the table, type "Total" and give the total number of vehicles observed in the column
for number of vehicles; (vi) Save the document with the name "Vehicular
traffic"; (vi) Print the document.
WASSCE JUNE 2015 DATA PROCESSING PAPER 2: PRACTICAL WORK ANSWERS
5. (a) I. Click the start menu. 2. Double click the browser (e.g. Opera or Mozilla Firefox), In the address box, enter the address i.e.
www.mvbooks.com. Identify the column that has price. Click on compose, select attach file icon. Click my document.
Select the file name. Click open (wait for few minutes to complete the attachment process) Enter in the receiver space !l!
YJ~1th.~r@\'ahoo.com. In the subject column. Enter prices of book. Then
click send.
(b) Press Ctrl + C Key - Double click the internet browser (e.g. Mozilla Firefox, or internet explorer.) - In the
address box. type the E-mail .iddress of the service provider you have account with, e.g. www.vahoo.cQl}J.
ww,y.2.mail.com or ~Y~~J:i.Qt!11ail.com. - Click on mail to sign-in with your e-mail address and password.
5

.j
- Click on sign-in - Click on compose mail button - Click attach - Click on browse to locate the file (prices of hooks) -
Click on the file after you have found it. -Click inside the To { ) box and type mvfathcrr@vahoo.,.:om - Click inside
the title { } box and type prices of books. - In the space below. type attached here for your perusal is the prices of
hooks. - Click send.
<,. (n) Load word (i) Click on the start icon (ii) Select "Ail program", programs menu appears. (iii) Scroll to locate Microsoft
office folder (iv) Click Microsoft office folder to open it and select Microsoft office word 2007. -To select A4 paper
size and potrait orientation click file (from the menu bar)-Click page setup - Click paper size - Select A4(2 IO x
297mm) and select potrait option then Click Ok button.
(h) (i) Using enter key ( on the keyboard) to move from sentence to another (ii) Click Home Tab- Choose appropraite button
for alignment on the paragraph Group I .• Align left -Align right- center or justify (iii) Press the cap key and then type
the sentence - Highlight the text (i.e the sentence highlight) - Click on the U icon (underline) on property bar. -Click
on the •'B" icon (Bold) (iv) Press the cap key and then type the leuerts) (v) Click table (from menu bar) {vi) Select
insert option, -Click table, increase the number of column to 3 (vii) Merging I. Block the two columns to merge
together Click on merge button on property bar. Type "Total"
Total No of Vehicles
Nos
-··
..
Nos
Total 21
(vii) Click ti le (from menu bar) - Click print option - In the open(print dialogue box) - Select the printer of
your choice -Type the number of page(s) to print • Type the number of copies to print -Then click print button.
To save - Click file (from menu bar) - Click Save As - Type "vehicular traffic" - In the Save Column on the
dialogue box Then click save button.

6
WASSCE JUNE 2016 DATA PROCESSING 1 OUJf.CTIVE Tf.ST QUESTIONS

1. Who developed the first digital electrical computer'? /\. Blaise Pascal U . Joseph Jacquard C. Mauchly and Eckert D. Von
Leibniz
Which generation of computers made use of integrated circuits? A. Fourth B. Third C. Second D. First
Which of the fol\l)\\·ing is an alphabetic data? A. Beel 13. Ax4~jj C. AB+CD D. %
The type of data which consists of text. number. audio. video. graphic and animation is called /\. data set.
B. multimedia data. C. multi-purpose data. D. multi-rnriablc data. Which of the following factors is not
considered when classifying computers? A. Location
5
. B. Size C. Type D. Purpose B. Credit card
6 Which of the following is not used for on line shopping? /\.Mastercard
. C. Verve card D. Sim card B. e-
7 Which of the following. is a negative impact of lCT in education? A. Plagiarism library
. C. Distance learning D. Computer•bnscd Test
8 Which ul the following are parts of a computer processor? A. CPU and main memory
. 8. Control unit and ALU C. Operating system and applications D. Main memory and storage Data gathering
9 involves the following means except A. counting. process. B. voting process.
. C. measuring process. D. calculating process.
I 0. Two computers, X and Y are such that the processor in X has a word size of 32 bits while that of Y is
16 bits. Which of the fol\owing statements is true? A. X can process half as much data as Y at the same time. 8. X can
phKL':-S the same amount of data as Y at the same time. C. X can process two times as much data as Y at the same time. D. X
can process four times as much data as Y at the same time.
11. The television set displays information as A. antenna signals. R visual signals.
C. audio siunals. D. audio•visual signals.
I:!. Which of the followimr is not an ancient n;edium fortransinittim:~ information? A. Fire liehtiuu
B. Beating of drums - C. Telephone D. Whistling - ~ -
13. A server is a computer that provides services to other computers called A. clients. 8. peers. C. routers.
D. switches. •
14. The rules for exchanging data on a network arc known as A. rransmission rules. B. transfer rules.
C. protocols. D. configurations.
15. A Search Engine is a A. program that searches engin~s. B. computer engine that searches a database.
C. hardware component of a computer. D. tool that searches the web.
16. The feature in a browser which enables users to open the latest copy of a web page is A. Refresh.
B. Forward. C. Backward. D. Redirect.
17. An operating system will perform the following functions except A. files and folders management.
B. storage locations management. C. user profile creation. D. protection from surge.
18. A Microsoft Office application suite includes all the following except A. Word. B. Access.
C. CorelDraw. D. PowerPoint.
19. Which of the following is not a feature on the drawing tool bar? A. Oval shape B. Line
C. Drop Cap D. Arc
The MS Excel worksheet below shows the salary distribution for four staff of a company. The net salary is paid
after deductions have been made. Use it to answer questions 20 and 21.
-.
sAstc sitARv ,~) rorAL ALLOWANci-1::.11-iornL osoucnos 1~i NET sALARY r~i
···- r
IOENTIFl(AT10N NUMBER '
~P/P/1202 22000 -
29000
I
7000 ~000
I

VP/1250 26000 3SOO l 9000 S2000


l/P/3,.0S 15000 21000 I 6000 30000
____ L/P/ms 33000 41000 I 8000 66000
5

20. Which
6 of the following cells contain numeric data? A. A 1 B. A2 C. C3 D. El
21. Which oft he following formulas would be used to obtain the value in cell E2?
A.= 82 + C2 · Ill 11. = 82 + Cl + D2 C. = (82 + C2 + D2)/3 D. Cl - D2 =
22. In Database Management System (DBMS). linking entities is used t() represent A. Attribu1cs B. Objects
C. Relationships D. Relations
23. I\ data element that uniquely identifies one record from the other in a table is the A. attribute key.
7
,,. ,., .... L.._,,.u,i..:"n, '---·· '"''111t} r,\.:)'", "-'· p11111ary KC)'·
24. In MS Powerl'oint presentation, the special effects that control the order in which objects enter a slide and their
manner of appearance is A. Transition. B. Media. C. Clip Art. D. Animation.
25. Which of these packages could be used by a Data Processing teacher to design a website for his school?
A. Front Page 13. PageMah:er C. PowerPoint D. Word Perfect
26.
In graphic packages, the process of removing an unwanted part of an image is known as A. shaping.
B. resizing. C. editing. D. cropping.
27. Routine checks operations on computers in order to ensure its continued functioning is known as computer.
A services. B. repairs. C. maintenance. D. installation.
28. The performance of the computer can be enhanced by A. using a larger monitor. B. using a faster printer.
C. installing a scanner. D. increasing the memory size.
The moral principles that regulate the use of computers, its accessories and environment are called computer
A. ethics. B. conduct. C. attitude. D. appreciation.
29.
A technician can protect himself from electrostatic discharge by using A. wrist strap. B. voltmeter.
C. screw driver. D. magnet.
30.
Which of the fol Iv\\ ing operations prevents file loss? A. File backup B. File conversion
C. File maintenance D. File sorting
3 I.
A computer professional who studies an existing system with a view to evolving a computer-based system from
it is A. system analyst. B. system administrator. C. computer programmer. D. computer engineer.
·'-·
"'')
Computer virus cannot be transmincd by A. downloading files. B. e-mail attachment.
C. pen drives. D. typing on keyboard.
,.,..,
.).). A program designed to detect and prevent malicious programs from a computer system is A. spyware.
B. passcode. C. malware. D. firewall.
34. In reiational model a tuple is a A. column of a table. B. key of a table. C. row of a table.
D. two-dimensional table.
35. Relationships between tables in a relational model are created by A. foreign keys. B. determinants.
C. composite keys. D. candidate keys.
36 Computers store data as A. folders. B. files. C. documents. D. directories.
. The records of students in a school are kept in order of their arrival. What file access method would be used to
access a studenrs record if the latest record would first be retrieved? A. Direct B. Indexed
"'7 .
J .• C. Batch D. Sequential
38.
The prevention of data from corruption and unauthorized access is a function of data A. security.
B. secrecy. C. integrity. D. coding.
Which of the following defines a heterogeneous distributed database?
39.
A. Same DBMS is used at each location but data are not distributed across all nodes 8. Same
DBMS is used at each location with data distributed across all nodes
40.
C. Different DBMS is used at each location and data are not distributed across all nodes
D. Different DBMS is used at each location and data are distributed across all nodes
WASSCE JUNE 2016 DATA PROCESSING 1 OBJECTIVE TEST ANSWERS
l.A 2.C 3.C -LC 5.A 6.D 7.A 8.B 9.C 10.D 11.D 12.C 13.A 14.C
15.D 16.B 17 D 18.D 19.C 20.B 21.A 22.C 23.D 24.D 25.A 26.D 27.C 28.D
29.A 30.A 31.A 32.A 33.D 34.A 35.A 36.A 37.C 38.B 39.A 40.A

WASSCE .JUNE 2016 DATA PROCESSING 2 THEORY QUESTIONS SECTION


A: ESSAY

I .(a) Describe c,ara handling.


(b) Exp lam two ways of handling data.
(c) State four foe tors to consider when handling data electronically.

2.(a} Define Information Processing


(b) State four steps involved in information processing.
( c) Mention 1 h ree advantages of using computers for information processing.
1d) Highlight three disadvantages ofusing computers for information processing.

8 . 1•. , •. • ., '·.
3.(a) (i) With.the aid of a simple diagram, explain inforinotion transmission. (ii) Give one example of information
transmission.
(b) Give one example of each of the following:
(i) single user, single tasking operating system; (ii) single user, multitasking operating system; .
(iii) multi user operating system.
( c) List four features of a Graphical User Interface.
' '

4. (a) Mention four qualities of a good computer professional. (b) List four computer professional bodies ip Nigeria.
( c) Write the full meaning of the following: (i) Wifi (ii) GUI · ·

SECTION B
5.(a) Use the "information in the spreadsheet below to answer questions 5(a) i - v
- -------. - .-
• I

... .
·•------------•- ---------- ----·-·- --------•··•·--·---•··
nn•••-•••..,_-,,~•••••Ou"
--·•··-··•·--·---•·--•--•"'"
·-•-•·-···•·-- ··•-----·
•··• •········••·

A B C D E F ; _;:::::•:~•~qi,,l.W JJ
- .... ... G
1 S_N NAME AGE MATHEMJ!>.TICS ENGLISH BIOLOGY PHYSICS TOTAL !AVERAGE
2 1 JOHN 16 72 68 81 '/0
3 2 MARY 18 80 70 58 76
4 3 · PAUL . 19 69 75 83 86
5
6 •5
4
PETER
JOY 17
15
.•. 71
69
82
74
90
BO
78
85
·.·17\.

7 6 JAMES 16 73 81 81 --
83 :~ ',!

8 ·7 VERA 17 89 86 83 86
9 8 FAVOUR 17 56 59 85 58 .

10 9 CLETUS 18 54 60 73 57 ,
11 10 ETTA 17 60 68 70 59 , =1 ·····-·- ... --- .. •-----
1 ') .
,
;" ., ,)

(i) Write the formula to calculate the total score in Mathematics. . ., . , ·,,: ; .. : ;
(ii) Write two spreadsheet formulas to calculate Paul's average score in the four subjects. .· :·. , : · .. (iii)
What spreadsheet function 'can be used to determine the highest score in English?
(iv) Outline the procedure for calculating Vera's total score in all the subjects and give the result in cell HS. (v) If the
minimum pass mark is an average score of 60, write a formula tode~rnrine·ff,Etta passed or failed.
(b) Use the ~liagrmi1 below lo a11s111er questions 5(b) i - vii ·
~-~~ • '"'7· e,, --:• T,,, . .,!,,7,"·---":7,'.:,:.::~;;:•,.·::--,,.,. :,:::.~- r-.. '".,,. ;.;.;,:::~~.,;.. .. ,_,!f;._ ·····--•·-····•··-•-·• ·•-. ·' ••·-."!'~··· -~--~

~.Jr
•. ,• ;.; ;;,
.• t.

.,.,. ...
:...,-.-.,
:. ,;
J
...... : : .. ________,.: •... , . .:.. ~i i:~
·:-- - --- --~ -~ ~-- ;...:·~:·_::':-:-r-:~-~:·r ~·~~. : ...
•..... ..
..,~:~:::~~J-;:•,...-:-~~--

ti/.;!;~':'];:.!;\::
_.;,. . i.
.. _.

:;;
Click to add
title

--- ½~ ' - ••

;.,,.,
.... ~~J~ff;;,,~;~'
(i) What is the name of the application shown in the diagram? (ii)
State one use of the application mentioned in 5 (b) (i)
(iii) Outline the procedure to launch the application from its short cut on the desktop.
I
TJ~]~~:~L~
9
-,,----I
(iv) After launching the application, what is the name of the slide that appears by default? (v) Identify
the part labelled I.
(vi) Write the keyboard shortcut that would also perform the function of the part labelled I. (vii) Mention
three functions that can be performed by the insert button.

6.(a) Folders are used for storing tiles in the computer. List the steps for carrying out the following operations: (i) creating a folder
on the desktop; (ii) giving name to the folder; (iii) sending a file from "My Documents" folder into the folder created in 6 (a) (i);
(iv) Changing the name of the folder in 6 (a) (ii) to "RESULTS". (b) The table below shows selected fields and DataTypes in MS
Access.
Use it to ansi1:er questions 6 (b) (i) and 6 (b) (ii)

Field Data Types

Full Name Text

.
Mat. No. Text

Date of Birth *

Fees *

Address Memo

(i) What is the appropriate data type for: I. Date of Birth Field; JI. Fees Field?
(ii) If MS Access is running, describe the procedure to: L create a table with the fields as given above using design view; IL set
the Mat. No Field as the primary key; m. set the Full Name Field to a maxirnurnof 50 characters

WASSCE JUNE 2016 DATA PROCESSING 2 THEORY ANSWERS


SECTION A: ESSAY

l.(a) Data handling is theprocess/way ofensuring that data is obtained, stored, archived or disposed in a manner tl,M retains its
integrity/in a secured manner. OR Data handling is basically the process/way of imputing and storing uata in a computer. The
Data is then processed into information.
(b) There are two ways of handling data which are:
(i) Electronic method: This is the use of electronic systems such as Computers, storage media I ike video tape, CD,.DVD.
Memory Cards and other electronic devices to obtain, store, archive, share or dispose data. (ii) Non-electronic/ Manual
method: This involves the use of paper files, journals. laboratory notebooks. human effects and other non-c lectron ic means
to store or share data.
(c) Facto rs to be consiucr. d when handling data cir-ct ronically:
Data Integrity, Regu 'ar update of data, Validation of data. Security of data/Encryption, Type of Data, Type of qorage to be used.
Dara \, :nme/Sizc. Access Control. Regular Anti-Virus Update, Limit Physical access to storage media, Regular
Backups-,F11<;ure Data Reco,erability. Login/Password. Record Date and Time, Power
':it,pply. :.

2.(a) Information processing is the process of a..:qt1iri11~nb1aining/i.:olkcting/gathering/retrieving. manipulating/


ii and I ing/ana lysing, recording/storing and pre sen ting/ d isplay/ di ssemination of information. OR Information
processing refers to the manipulation ofdigitizl.:'d Information by Computers and other digital electronic equipment.

10
-
(b) Steps involved in Information processing:
Collation oflnformation. Organization of information. Analysis oflnformation, Interpretation oflnformation. (c)
Advantages of using Computer for Information processing:
Efficiency, Automation, Reliability, Volume/Storage, I Iigh speed, Accuracy, Security, Sharing of Information/ Sharing
of Resources, Economical, Lower overall cost, Versatility, Service Improvement, Easy retrieva I. .
(d) Disadvantages of using Computers-for Information processing:
High initial investment cost, Loss of jobs due to Computerization, Requires specialized personnel, Extra cost of retraining
of staff, Virus/Hackers sescepribility, Face-to-Face Interaction among stall may be reduced, Prone to unauthorized access,.
Overwriting/Loss of Data, Power dependent, System failure/system malfunctioning.
3.(a) (i) SENDER RECEIVER

MESSAGE

.,
SOURCE CHANNEL/MEDIUM . '.- '.-DE~T,H)'ATION
Information trans1nission is the process of sending Information from one point to another through a channel. (ii)
Example: Printing of document; classroom instruction, r~eiving radio signals; DSTV signals, Telegraph, GSM,
Photography, Facsimile, Town Crying, Smoke Message, Use of Birds, Story Telling, Signs/Signals, Internet, Sate I lite
signals, Blowing Horns, Drum Beating, Fire lighting, etc.
(b) (i) pos, OS 2, PC-DOS, Palm-Os. (ii) MS Windows, Mac-OS, Linux.
(iii) Xenix, Zeuix, Unix, Linux, Mac OS, VMS, Mainframe OS.
( c) Features of a Graphical User Interface (GUI) are: Windows, Icons, Menus, Pointing device (mouse).

4.(a) Qualities of good .Computer professional:


Multitasking ability, Adaptability, Analytical skills, Attention to detail/ Accuracy, Commitment to learning Abreast with
current trends, Communication skills, Problem-solving/Troubleshooting capabilities, Competence, Technical, Writing
Skills, Aptitude for Mathematics, Ability to Memorise, Certification, Reliability, Disciplined and
Trustworthy. • ,, ;, .
(b) Computer Professional Bodies in Ni~: . ,;~
(i) Computer Professionals Registration Counci I of Nigeria (CPNf
(ii) Nigeria Computer Society (NCS). :,? ...
(iii) The Institute of Software Practitioners of Nigefra (ISPON)
(iv) Information Technology Industry Association of Nigeria (\TAN). (v)
Nigeria Internet Group (NIG)
(vi) lntemet Service Providers Association of Nigeria (!SPAN).
(CJ (i) Wi-Fi - Wireless Fidelity. '
(ii) GUI - Graphical User Interface.

SECTION B: TEST OF PRACTICAL WORK


5.(a) (i) = SUM(D2, D3, D4, D5, 06, D7, D8, D9, D10, Dll) . OR = (D2+D3+D4+DS+D6+D7+D8+09+O 1 0+Df I) OR
= SUM (D2:DI I) OR
= SUM (011:D~)
(ii) = AVERAGE (D4:G4) OR = (D4+E4+F4+G4)/4 OR
11

-
••.
j
= AVERAGE (D4. E4.F4.G4) OR =
SUM (D4:G4)/4 OR
= SUM(D4 .l:4.F4 .G4)/4 ·
(iii) Max Function OR = MAX(E~:EI I)
(i\') Click on cell lf8. Type --=SUM(DS:G8)"", Press "Enter" OR Click on 08, Hold down the Mouse and stop at H8/Highlight 08 to
HS. Click on Summation icon on the Menu Bar OR Click on HS, Type "=SUM (D8. E8.F8.G8). Press "•Enter .. · OR
Click on HS, Type =SUM (D8:G8), Press "Enter"
(v) = IF(l 11> 59. "PASSED". "FAILED") OR = IF(I} l>= 60, "PASSED", "FAILED")
(b) (i) MS PowerPoint ·
(ii) Presentation
(iii) Double-click on the icon OR Right-click on the icon, Select open (iv) Title Slide
(v) Slide Show View Icon/Slide Show Icon! Slide Show (, i) F5
(, iillnsert Shapes, Insert Textbox , Insert Word Art. Insert Comment, Insert Video, Insert Symbols, Sound Table. Clipart, Equation.
New Slide. Pictures, Header/Footer, Date & Time, Text Box. Smileys, etc.

S.(a) (i) To Create a ·folder on the desktop


.. Right-click on the desktop and select "New", Select "Folder"
(ii) Naming the folder
Click on the default name' of the new folder, Type-in the name, Press enter or click elsewhere on the desktop OR 'Right-
click· on the folcfer-icon and select "Rename", Type-in-the-Ne,,, Naine OR Select the folder, Click on the
Default.Name/New Folder; Type New Name, Press Enter.
(iii) Sending a file to the new folder
Double-click on "My Documents" folder icon, Right-click on the desired file· icon and select "copy", Open the folder
created. Paste the copied file OR Select the file in My Documents Folder, Drag it to the created· folder on the Desktop.
Drop/Release the Mouse button OR Open the Filein My Document, Click on file, Save As, Select Desktop, Select Target
Folder, Click on Save.
(iv) Renaming the folder

 Right-click on the folder icon and select "Rename", Type-in the new name "RESULl'S". OR.Select the folder, Click on
the Default Name/New Folder, Type "RESULTS" as the New Name, Press Enter.
(b) ( i) {I) Date of Bi11h---Dateffime. · -- --- ··
U 1) F.:!e<;-------------Currcncy.
(ii) (I) create a blank database and give it a name, click on the "create" tab on the menu bar and select "table design/design
view". Type the field names and set the data types as required. Save the file.
(II) select the Mat.No field. Right-click on the field and select primary key OR
Sc lcct the Mat.No fie Id. c I ick on the primary key icon on the menu bar
( !II) click on the Full Name field. set the field size to 50,
(iii) Click on the Full name field. Go to the Field Properties. Change the.Field Size from 255 to 50.

12
WASSCE JUNE 2017 DATA PROCESSING 1 OBJECTIVE TEST
---
QUESTIONS One characteristic featlire of the second generation· computers is the presence
I.
of A. vacuum tubes. B. transistors. C. micro-chips. D. integrated circuit.
2. Convert 4 to a number in base two. A. IO B. 11
10 C. I 00 D. 110
\ 3. Da!a processed into its useful form is referred to as A. unique data. B. raw data. C. knowledge.
D. information, · -
Li. Which of the following is an example of qualitative data? A. Colour B. Height C. Length· D. Shoe size
5. Which of the following is not a characteristic of a personal computer? A. Automation B. Complex
C. Digital D. High speed
6. The gap between ownership, access and benefits from computer and its application is
termed digital A. separation. B. divide. C. deprivation. D. annihilation.
7. Magnetic Ink Character Recognition (MICR) are used to read codes on A. postal orders. B. Multiple
8. Choice Examination answer sheets. ~ C. bank tellers. D. bank cheques.
The device that sends information to the CPU is the A. bus. B. input device. C. output device. D.
9. processor. Which of the following is not a procedure for information process mg? A. Segregation B.
Organization
10.
C. Interpretation D.~Collation
11 The assembling of data according to a predetermined order is known as A. collation. B.
. interpretation. C. organization. D. summarization. .
12. Information transmission medium from location P to location Q in space is caJled /(. wireless
transmission. B. wired transmission. C. cabled transmission. D .. asynchronous transmission.
Which of the following is not a type of wireless transmission? A. Bluetooth B. Fibre optic C. Infrared
13. D.WiFi .
The basic criterion for classifying a network is A. psychological consideration. B. geographical scope.
14. C. equipment availability. D. economic reason. ~ ~
Which of the following measures are used to secure data on-line? I. Password II. Encryption
l 5. 111. Personal Identification Number (PIN) A. JI on lv B. III on Iv C. II and Ill onlv D. J, II and Ill
In e-mail context, bee stands for A. backup carbon copy. B. blank carbon copy. C.~blind carbon
16. copy.
D. bulk carbon copy. ·
An internet-based system that allows people of different geographical locations to have in-person meeting
17. is known as A. voice messaging system. B. video conferencing system. C. on-line mailing-system. .
D. fax system. ..
18. The following software r,rograms coordinate and control all other computer programs, hardware and
users'
19. actions except A. ZEJ..JTfI. B. UNIX C. DOS. D. DBMS. .
In Word processing applications, the symbols B, I and U are commonly used buttons found on the
20. A. standard toolbar. B. menu bar .. C. formatting toolbar. D. drawingtoolbar.
Bola intends to evoke the synonym of a certain word during Word processing. What is the most
21. appropriate tool to use? A. Assistant 8. Change case C. Grammar checker 'D. Thesaurus
In a worksheet, which of the following actions would select non-contiguous cells? A. Holding down t~e
22. Shift key B. Holdinz down the Crtl key C. Holding down-the Alt Key D. HoldingdownCtrl+Shrftkey
Which of these formulas will not be executed in MS Excel? A. =SUM(examscore) B.
23. =SUM(Examscore)-12 C. =SUM(exam_score)*8 Q. =SUM(exam score)/3
MS Access is.an example of a A. relational model. 8. network model. C. hierarchical model.
24. D. flat file model. • ·
When a database recovery manager is invoked after a crash, restart proceeds in the following three
, 25. phases:
I. Undo; II. Redo; Ill. Analysis. Arrange these phases in the right order. A. I, II, Ill B. II, I, III
26. C. In, 11, I D. I, III, II . •
During presentation, slide transition can be activated by A. rizht-click. B. mouse drag. C. mouse click.
27. D. double-click, ~
Planning and creating of websites is called web A. analvsis. B. design. C. maintenance. D.
28. publishing. Magazines and brochures can be produced using a A. data processing software. B.
graphics softwai ~-
C. presentation software. D. web authoring software. . · .
29. Which of the follow mg 1s one of the tools used to rnamtarn the computer? A. Blower B.
Calhper C. Cotton· wool D. Kerosine
30. Which of the following is not a good computer maintenance practice? A. Blowing the svstem unit with a
blower B. Blowing the keyboard with a blower C. Cleaning the screen with wet cloth D. Cleaning the
CD-ROM
31. drive with lens cleaher ~
Commonly accepted practices, rules or methods in computing are cal led A. Conventions. 8. Habits.
C. Laws. D. Standards. ·
..,,., Which o~ the following is a safety measure in the computer laboratory? A. Eating iJl the computer
·"'-· laboratory B. lllum111at1011111 the computer laboratory · C. Opening up the 1110111tor by
unauthorized persons
D. Poor ventilation in the computer laboratory :
Safety measures to be observed when using the computer include all of the following
except A. use of anti-gfare protector. B. sitting posture. C. maintaining a dust-free
environment.
D. dropping liquids 111 the computer room. . A computer professional who studies an existing system
with a view to evolving a computer-based systerr. from
it is called A. computer engineer. B. computer programmer. C. database administrator. .
D. systemanalyst.

13
33. Which of the following is not an anti-virus? A. Avast £3. AVG C. Compaq D. Norton •
34. Which of the following is used to retrieve specific information from database tables'? J\. Index B. Query
C. Report D. Table
35. Which of these methods would delete a relationship defined between two tables in MS Access'? A. Selecting Delete relationship
from the Edit menu dialog box B. Selecting the relationship line and pressing Delete key C. Selecting Delete from the relationship
menu D. Selecting Delete relationship from the file drop down menu
36. Which of the following is not an effect of computer virus? It A. distorts the computer screen. 13. interferes
with computer operation. C. damages the computer. D. corrupts the computer. ·
37. What file organization would require that all the five (5) records be read before the 6th record is written?
A. Direct-access file B. Index sequential file C. Random access file . D. Sequential access file
38. Which of the following is not mi advantage of file organization? A. Faster processing of data input
B. Post data retrieval C. Prevention of data failure and data loss D. Safctv of data and information in a
storage medium -
39. Maintainin~ the value and content of data is part of data A. coding. B. integrity. C. secrecy. D. security.
40. Which of these operations would not improve the performance of a parallel database system? .
A. Building indexes B. Deleting unwanted data C. Evaluating queries D. Storing data across-several sites
WASSCE JUNE 2017 DATA PROCESSING 1 OBJECTIVE TEST ANSWERS
l.B 2.C 3.D 4.A 5.B 6.B 7.D 8.B 9.A 10.C 11.A 12.B 13.B 14.D
15.D 16.B 17.A · 18.C 19.D 20.B 21.13 22.A 23.C 24.C 25.B 26.B 27.A 28.C
29.D 30.B 31.D 32.D 33.C 34.B 35.A 36.A 37.C 38.C 39.D 40.D
WASSCE JUNE 2017 DATA PROCESSING 2 THEORY QUESTIONS
SECTION A: ESSAY
I. (a) State four classes of computer based on size. (b) Define the term Information and Co1111111111icalio11 Technology (!CT). (c) I
lig.hlight three ways (JCT) has impacted 011 the society.
2.(a)(i) What is Computer Ethics'? (ii) State three computer room management ethics.

3.
(b) List fin laboratory rules and regulations. ,
Mr. Okafor has a company that specializes in the production of beverages with headquarters in Abuja. He intends to monitor the sales •
and transactions in the ccmpanys branches across Nigeria as well as interact with his customers. (a) Through what platform can Mr.
Okafor ac h ieve his i ntcnt ions? (b) What computer professional should Mr. Okafor hire to design the platform in 3(a)'7 I c) State
two software packages needed to create the platform for Mr. Okafor. (d) If Mr. Okafor decides to connect all the offices within the
headquarters in Abuja in a single network: (i) what type of network is appropriate" (ii} mention three reasons to support his
decision. ·.(e) Mention two transmission media that can be used to implement the network in 3(d)(i).
4.(-a) Define the term Software Mai111e11a11ce. (b) List four types of software maintenance.
(c) State four importance-of software maintenance. ·

SECTION B
5.(a) A teacher asked a student to capture and print out a one-slide presentation assignment using. A1S word, showing everything on the
screen. (i) What keys or combination of keys can be used to carry out this operation? • (ii) Describe the procedure to be fol lowed by
the student in carrying out th is assignment using the keyboard. (b) A system analyst was hired to set up a computer laboratory for
Bofe International School. (i) 1',1ention three hardware devices the analyst would need to set up the laboratory. (ii) List three
database application packages likely to be recommended by the analyst. (iii) State three Word processing packages likely to be
installed.
( c) Complete Table l_ on keyboard shortcuts.
6.(a) Use Fig. I lo answer questions (i) to (vi)
Table >.
l V VIIi ,

SIN Keystroke Action VI


I
(i) Page break

(ii) Ctr+F

(iii). Fl
(iv) Ctrl+F2

14:
CO:\
TINl1EI) FROM
PAGE .15
ID Name Score Grade
001 Abdul 55 C
002 Emeka 52 C'
003 Kola 49 p
I

WASSCE JUNE 2020 DATA PROCESSING 1 OBJECTIVE TEST QUESTIONS


1. The use of Visual Display Unit was a major breakthrough in the A. First generation computers.
B. second generation computers. C. third generation computers. D. fifth generation computers.
2. In hexadecimal system, D is equivalent to A. 15. B. 14. C. 13. D. 10.
J:. A teacher computed the average score of students in a given test. The result of the computation describes
A. record. B. information. C. data. D. file. ·
4. Thesumofll0,andlOl,is A.1101,. B.1110,. C.1100,. 0.1011,. .
5. One advantage of the first generation compute-rs is A. processing speed. B. portability. C. heating
effect. D. burglar-proof. · . .
6. · Magnetic Ink Character Recognition is applied on A. voice recognition devices: B. mobile devices.
.. C. large data capturing machines. D. bank cheques, . · .
7•: · Internet banking entails A. applying computer networks in banking operations. B. applying.~omputers to automate
banking operations. · C. generating tokens and One- Time-Passwords for online payments.
D. using ATM for banking operations. .
8. Which of the following parts of the computer ensures the smooth operation of its hardware?
A. Main memory. B. Control unit. C. Auxiliary storage. D. Arithmetic and Logic Unit.
9 .. Basic computer operations include the following except A. control. B. input. C. output. D. process.
10. One disadvantage of electronic data processing is A. handling complex computation. B. medium for effective
storage. C. processing data at a phenomenal speed. D. vulnerability to attack.
11. Which of the following sources of information is received by the user in visual mode only?
. A. Television. B. Radio. C. Photograph. D. Computer. ·
12. Which of the options A to Dis not a medium of information transmission?
A. Cable. B. Satellite. C. Television set. D. Wireless channel.
13. A company has four computer systems, one printer and one scanner for its daily operations. One factor that can
motivate the company to connect all the devices in a network is the need to A. provide efficient services. B. save
running cost. C. share software only. D. use a wireless connection.
14. One similarity between the internet and intranet is that they both A. were invented by Ute same
.. . company. B. use the same technology. C. have the same coverage. D. are open to the public. }5. The
process of copying data or information from the internet to a personal computer is termed
. . A. browsing. B. downloading. C. retrieving. D. surfing. · .
16. An entrepreneur who wishes to send digital data over a telephone line would need a · A. hub. B. modem. C. router. D.
switch.
17. Graphical User Interface is considered user-friendly because of the following reasons except that it A. compels . the
user to learn all the commands before operating the system. B. displays all the options available to the user for · · · easy
access. C. is easier for users to operate and understand. D. makes the icons and menus familiar to the user.
18. The symbols dialog box of MS Word application is located on the A. format menu. B. help menu.
C. insert menu; D. view menu.
19. Pressing the ke.y combination Ctrl +Jon a selected text in a Microsoft Word document would
A. align the text. B. deselect the text. C. justify the paragraph. D. juxtapose the text; .
20. The Merge button in Spreadsheet application is used to A. combine adjacent tables. B. convert selected cells into
a single cell. C. merge two tables. O.-split a cell into two or more cells. ..
21. If cell A20 in MS Excel co,ntains the value 5, then the formula "=A20"3" will return a value equal to
A. 15. B. 25. C. 75. D. 125.
22. A database contains list of customers and their phone numbers. What type of relationship describes a customer '
having multiple phone numbers? A. Many-to-many. B . .Many-to-cne. C. One-to-many. D. One-to-one.
Table Marksheet 23. The DBMS statement, select* from Marksheet in
· table Marksheetwill display all records in the
fields: · A. ID and Name only.· B. ID, Score and
Grade only. C. Score and Grade only. D. ID,
Name, Score and Grade.
24. Which of the following objects is not located on the slide layout tab? A. Animations. B. Charts. C. Lists. D. Titles.
25. The following programming tools are employed by a web developer.except A. c_oBOL.
B. css. C. HTML. D. PHP. I

26. Graphics can be captured using the following devices excepf A. webcam. B. scanners. t. joystick.
D. digital camera •
27. Which of the following substances is used for cleaning the mouse ball?
A. Distilled water. B. Engine oil. C. Isopropyl alcohol. D. Kerosene.
. 28. One characteristic of a dirty mouse is that the mouse A. is not recognized by the system .
. B. unmounts itself from the system. C. pointer changes appearances. D. pointer moves erratically.

2020-1
-·~ __ ......-..yu•=nn~w.:i-y u1 u:rn,g me computer 1s A. sortware piracy. B. phishing. C. pharming.
D. ethical hacking. · ·
. 30. Any activity carried out to protect the user from hazards while using the computer is called A. computer ethics. B.
computer maintenance. C. laboratory rules. D. safety measure.
3 I. In order to protect a computer on the world wide web from threats, the user should A. install the latest operating system
version. B. install a single user antivirus software. C. implement an internet security
software. D. deploy on line transaction applications. _ .
32. Responsibilities ofa database administrator include the following except performing A. database backup.
B .. data recovery. C. network maintenance. D. user authentication.
33. The following tools are used for protecting the computer against virus attack except A. Avast anti malware. B.
Kaspersky. C. Norton. D. Trojan horse.
34. Which of the following software replicates itself without being executed by the user? A. worm.
B. Trojan. C. Plug-ins, ntriver. -
35. In the model: Furniture (Tab , Chair, Wardrobe), Furniture is A. a relation. B. a schema. C. a tuple.
D. an attribute.
36. Which of the following dat base operations does not require a Data Manipulation language?
A. Modification of information. B: Insertion of new information. C. Deletion of information. D. Creation of
information.
37. The file organization method which allows records to be accessed in any sequence is A. index.
B. random. C. sequential. D. serial. ·
38. A file organization that has reference which identifies a record in relation to other records is called A. indexed file
organization. B. random file organization. C. sequential file organization. D. serial file
organization. 1 - _ . .

39. Providing access control to a school record is the responsibility of a A. database administrator.
B. programmer, C. systems administrator. D. system analyst.
40. Figure 1 depicts A. a distributed database. B. a parallel
Site t I I Site 2 ~ database. C. an extranet. D. an intranet.

WASSCE JUNE 2020 DATA PROCESSING 1


Comput
er OBJECTIVE TEST ANSWERS
Networ
k
1. C. 2. C. 3. B. 4. D. 5. A. 6. D. 7. A. 8. B. 9. A. 10. D. 11.C.
Figure 12.C. 13.B. 14.B. 15.B. 16.C. 17.A. 18.C. 19.C. 20. B. 21. C. 22.
1 C. 23. D. 24. A. 25. A. 26. C. 27. C. 28. D. 29. D. 30. D. 31. C.
32. C. 33. D. 34. A. 35. A. 36. C. 37. B. 38.A. 39.A. 40.C.

WASSCE JUNE 2020 DATA PROCESSING 2 - SECTION A - SHORT-STRUCTURED QUESTIONS Answer


three questions only from this section. All questions carry equal marks.
I. (a) What is a function in MS Excel?
(b) List two categories of functions in MS Excel
(c) What is cell referencing in MS Excel?
(d) (i) State two types of cell referencing in MS Excel.• (ii)
Give one example of each type in l (d) (i).

2. Ciroma ChukwumaAdekunle has just opened a computer business centre within a school environment. (a) State
three computer services that may be. provided in the business centre.
(b) List three devices required in the business centre. ·
(c) Give two application software needed in the business centre.
(d) Outline two precautions that must be taken by Ciroma Chukwuma Adekunle to ensure the safety of his computers ifhe must
accept documents in movable devices from his customers.

3. (a) State the keyboard shortcut keys to: (i) rotate an object in CorelDraw; (ii) position an object in CorelDraw; (iii)
navigate to ceJI A 1 in MS Excel worksheet.
(b) Give one reason for including the plus sign(+) in the search texts in a search engine.
(c) With the aid of diagrams, differentiate between LAN and WAN. .,
4. A school decides to harmonize the operations of its two campuses using a distributed database system as ·w~II as install
air conditioners and uninterruptible power supply in the computer laboratory.
(a) State three: (i) importance of using the distributed database system; ·
(ii) disadvantages of using computers to J?fO~ess information i !! the school, . .
(b) Give two reasons for installing the: (1) air conditioners; (11) Uninterruptible power supply devices.

2020-2
/
,
WASSCE JUNE 2020 DATA PROCESSING 2 - SECTION A - SHORT STRUCTURED ANSWERS (a)A
function is a predefined formula that performs calculations using specific values in a particular order. (b)-Autosum - Insert
- Look up and Reference - Database - Date and Time - Logical
- Maths & Trigonometry- Financial - Statistical - Engineering- Compatibility - Web-Text - Cube .- Information (c)Cell
referencing is the use of alphanumeric value to identify a specific cell in a spreadsheet application. OR Cell referencing
is the combination of a column letter and a row number that identifies a cell on a worksheet. (d)(i) - Absolute
referencing - Relative referencing - Mixed referencing (ii)= A3*C3 (Relative - without the$ sign) = $A3$1 (Absolute -
with the$ sign)
= $A3*B$2 (Mixed)
(a)Computer services rendered by computer business centre: - printing of documents - production of cards - large
format printing·- internet services -(FTP, browsing, sms, video conferencing, web hosting)- photocopying of documents -
scanning of documents - typesetting of documents - production of posters - logo design - lamination of documents -
binding of documents i- data analysis - on line registration - on line payment - biometric capturing- checking of results.
(b) Devices required by a computer business centre: - computer system - uninterruptible power supply (UPS) -
scanners (biometrics/optical) - printers - photocopiers - internet modem /ISP devices - router - laminating machine -
spiral binding machine - staplers - guillotine/paper cutter - staple remover- CCTV - microphone -
speaker/headphone/earpiece - webcam/digital camera -paper punch/ perforator - external hard disk - USB/flash drive -
paper shredder.
(c) Application software needed in a computer business centre: - Word .processor; Abiword, Apple i Work,
Apple Text Edit, Corel Word Perfect, Google Docs, Libre Office, Microsoft Word, Open Office. - Spreadsheet
packages; Microsoft Excel, Open Office Cale, Lotus 1-2-3, Stat View, Gnumeric, Word Perfect Office Quattro Pro, Plan
Maker, Corel Calculate, Ability Office, Apache Office, Microsoft Power Business Intelligence. - Presentation
Packages; Microsoft PowerPoint, Google Slides, Keynote, Prezi, Zoho show, Post toon, Customshow, Slide bean, Slide
Dog, Libre Office Impress, Adobe in Design, WPS presentation. - SPSS_ (Statistical Package for the Social Sciences)
- Desktop Publishers (Corel Draw, Creative suite, Photoshop, Picture Editor, MS Publisher)
- Document converter - Adobe PageMaker - Acrobat Reader - Antivirus ,_ Browsers - Search
Engines =Ms Access - Online Meeting Applications (Zoom, Skype, Teams, Google Meeting).
(d) Preeautions to ensure safety against movable devices: - Installation of antimalware - regular update of the
systems - scanning of all movable devices before use - Regular backup of documents.

. (a) (i) Alt+ F8 /Alt+ Right Arrow/ Alt+ Left Arrow/ Alt+ Up Arrow (ii) Alt+ F7 (iii) Ctrl + Home
(b) It is used to indicate terms that must be returned or included in the search results or it is a command that tells the
search engine to find pages that have the exact term.

LAN~

iii
~ ~

ii LA
NI

ETHERNET
i
(a)(i) Importance of di~tributed database: - it improves readability of data - easy expansion
- faster response time to queries - it ensures avai la bi lity of data - it enhances sharing of data - reflects the organizational
structure - reliability - cheaper to create - protection of valuable data - improved
performance - local or site autonomy - modularity- continuous operation ·
(ii) Disadvantages of using computer for information processing in the school: - initial investment cost is high -
extra cost for employment of computer experts - loss of jobs/job displacement
- training/retraining of staff - reduced face-to-face interaction/social cost - prone to virus attack - electricity dependent -
prone to hackers.
(b)(i) Reasons for using air conditioners in computer laboratory: - dust control - protection of equipment and
critical data - increased productivity/computer system life spans
- optimized low humidity levels/temperature control - comfort for users/dehydration control - hear
control. (ii) Importance of UPS in computer laboratory. ,
- to protect the system against power interruptions - to provide adequate power during power fluctuation
- to avoid loss of data/improper shut down - to serve as a back-up source of power - power surge/
spike control - power sag control ·

2020- 3
SECTION B - TEST OF PRACTICAL
WORK Answer all the questions in this
section.
5. A Director gave a manuscript to the secretary for typesetting. The secretary is expected to provide the
total number of words, lines of text, number of pages and nurriber of paragraphs contained in the
document. After proofreading the printout, the Director effected certain corrections on the printout and
instructed that the corrected version be saved with the filename "updated" while the original document
be saved with the filename "initial". (a) Outline the steps the secretary would take to display the number
of words, lines of text, number of pages and number of paragraphs contained in the corrected version of
the document. (b) Highlight the steps the secretary would take to display the original and corrected
versions of the document as well as the corrections effected on the document on the screen for the
Director to see at the same time for comparison. (c) List the steps to secure the document with password
in order to prevent unauthorized access to the document.

6. You are provided with a computer system that has a Microsoft PowerPoint application running. Outline
the steps to be followed in performing the following tasks; (a) creating a four-slide presentation;
(b) modifying the presentation to show the following on the Footer of all slides except the title slide:
A. Today's date; B. Slide number; C. Your surname.
(c) inserting a picture saved in the picture folder of your computer hard drive on the second slide.
(d) typing your name as the main title and personal profile as the subtitle.
(e) making each slide to run for five seconds continuously until the "Esc" key is pressed during slide
show.
SECTION B - TEST OF PRACTICAL WORK ANSWERS
5. (a) Steps to display number of words, lines of text, number of pages and number of paragraphs.
~ Open the corrected version of the document named "updated".- click on the "review"/"tools" tab on the
menu - click on the "word count" on proofing subgroup.
(b) Steps to display the original and corrected versions ot the document and the corrections.
- click on file on the menu bar- open the "updated" file OR the "initial" file-click on the "review" tab
- click on the "compare" button/drop down menu - select compare in the "original document" list box,
- click on the "Arrow/Browse" to select the "initial" file in the "revised documents" list box, - click on
>-

the "arrow/browse" to select the "updated" file - click on "OK". OR - Open the two documents - click on
"windows" tab - click on "compare side-by-side with" - view/edit document as required -
click on "close side-by-side" when done. ·
(c) Steps to secure the document with password: - open the file - click on "file" menu and click on
"Save As" - click on "Tools" (in the dialog box) and select "General Option" - type in the password -
retype the password - click on "OK" button - click on the "Save" button. OR - Open the file - click on
"file" on the menu bar - click on info - click on "protect document" - click on "encrypt with password" -
type in the password - click "QK". OR - Open the file - click on windows icon on the ribbon - click on
! prepare - select encrypt document - enter password - click on OK.
. ·
-
6. (a) Steps to create slide presentation: - Press "Ctrl + N" OR click on "file" then select "new"
- press "crrl + M" or click on "New.slide" on the menu bar three times to add 3 more slides.
(b) Steps to modify the presentation: A - Click on "insert" on the menu bar - click on "header & footer"/
"date & time" OR 'slide number" - click the· "date & time" box. H - Check the "slide number" box - check
"footer" box.
C - Type surname in the "footer textbox" - check "don't show on title slide" box - click on "apply to
· all".
(c) Steps to insert pictures. - click Qn the second slide- click on "insert" on the menu bar- click on
"picture" - select the picture from the pictures folder and click "insert" OR double click on the picture. (d)
Steps to type name as the main title and personal profile as sub title.
- Click on thetitle slide/first slide -Type your name as the main title in the "title textbox"
- type personal profile in "subtitle textbox",
(e) Steps to make each slide run continuously until the "Esc" key is pressed: - Click on "slide
show"/"transitions - click "advance slide" automatic - set time to 5 seconds ..,. click "apply to all
·slides"- click on "set up show" on the slide show tab - select "Loop continuously until Esc" - select "All
on show slides" - click "OK"
• I

2020-4
/.
CONTINUED ON PAGE 14
6.(a) Use Fig. I 10 answer question (i) to (iv). (i) What does Fig. I represent? (ii) Identify two output components in Fig. I. (iii)
Give the names for the parts labelled HI. VI and VII. (iv) State one precautionary measure that should be taken to protect the set-
up from power fluctuations while in use. (v) Data entry into the system can be achieved through theparts labelled: (\'i) Mention
one device that can be used to access the part labelled Vll. (b) Figures 2 and 3 represent mass storage media. Use the figures to
answer questions (i) lo (iv).
(i) Identify the media represented by:
Fig. 2 .....................:................... Fig. 3 ................................................
(ii) The transaction files of a company are to be recorded and accessed in tile order which
Fig. they arrive. Which of the media is most suitable for the purpose? (iii) In which media will
2 the stored data be accessed faster?
(iv) State the file access method for each medium.
Fig. 2................................. Fig. 3 ...................................
(c) A CCTV camera system has a 300 MB storage device. Each image size is 300 kB. (i)
How many images can be stored by the CCTV?. (ii) lfthe storage device is full, mention
one measure that should be taken to ensure that the system continues to capture and store
Fig. images without losing the already stored
3 images.

WASSCE JUNE 2017 DATA PROCESSING 2 TIIEORY ANSWERS


SECTfON A: ESSAY
1 .· (a) State four classes of computer based on size: (1) Microcomputers (Personal computer): This is the smallest general purpose
processing -systern. The older PC Standard 8 bit processor with speed of 371'!B and current PC 64 bit processor with speed of
466GB. (2) Mini Computer: This is a medium size computer that is more powerful than a microcomputer. These computers arc
usually designed to serve multiple users simultaneously. They are more expensive than microcomputer. (3) Mainframe Computer:
These are computers with large storage capacities and very high speed processing. They support a large number of terminals for
simultaneous use by a number of users like ATM transactions. (4) Super computers: These are computers with extremely large
storage capacities and computing speed which arc many times faster than other computers.
lb) Define infornuttlon and Com1111111icatio11 Technology (/CT) is 4 means of using computer with other gadgets in
collecting and giving information. OR It is a world of encompassing/ combining computers together with other communication
devices to generate, process and transmit information. lCT is a diverse means of collecting, processing, storing and transmitting
information using modern equipment/ gadgets/ devices. lCT can also referred to all the technolouies used to handle
telecommunication. and information transmission svsterns.
(c) Highlight three way; ICT has impacted on the society: (i) It enhances comnrnnicatio11 speed
· (ii) It lowers communication cost. (iii) It is a reliable mode of communication. ( iv) It is an effective means of sharing information. (vi) It
makes our society/ environment paperless. (vi) It creates borderless communication. (vii) Health problems. (viii) Social problems
(cyber crime. hackers' threat)." (ix) Improves quality of instructions (Education). (x) Enhances entertainment and sports. (xi) It
improves security and control. (xii) lt helps in the military. (xiii) It enhance physical and mental stress. (xiv) lt reduces
unemployment. (xv) It causes back pain. (xvi) It improves service delivery.

2. (a) (i) What is Computer Ethics? Computer ethics is defined as the set of moral principles /values that regulate the use of computers.
OR Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions
regarding professional and social conduct. OR Computer ethics can be defined as a set of acceptable behavior exhibited within a
computer envii·onment to ensure safety of users, computer devices. software and the computer environment. (ii) State three
Computer room management ethics: ( 1) Avoiding use of devices from un-trusted sources. (2) Avoid unauthorized access.
(3) Observing copyrights. (4) Avoid stealing/ cheating with computers. (5) No visitors should be allowed. (6) There should be
proper sitting arrangement (free flow of movement). (7) Avoid explosive materials. (8) Always set the computers before students
come in. (9) There should be appropriate lighting system (illumination).
( I 0) Always maintaina dust-free environment. ( 11) There must be appropriate ventilation/working air conditioning. ( 12) Always
avoid taking any liquid into the computer room.' ( 13) Ensure that all apparatus are properly switch off after use. .(b) List five
laboratory rules and regulations: (1) Students arc prohibited to enter the laboratory unless authorized by the teacher. (2)
Ensure that all disks/ diskettes are scanned before using them. (3) Report all problems related to the system to the teacher. (4)
Never attempt to repair laboratory equipment. (5) No equipment should be moved from its original position." (6) Do not load or
remove software from the system. ~7) Do not change the settings in the computer. (8) Ensure that all works are saved in external
storage

15
uevrce ano not 111 the computer. (9) Turn off the computer after use. ( I 0) Do not bring in bags, food and dri 11 ks into the
laboratory. ( l 1) Internet facility is strictly for educational purposes only. ( 12) Teachers should record the use of computer
laboratory in the computer log book. ( 13) A II users should record the use of computers i 11 the log book, ( 14). The
laboratory should be kept clean and tidy at all times. ( 15) Switch off all power supplies before leaving the laboratory. ( l 6) Be
responsible when using equipment, soft,vareand facility in the laboratory. ( 17) Proper shut down of computers. ·

. (a) Through the company's website (b) Web /Website developer (programmer) OR Web /Website designer OR Webmaster OR
, System analyst OR Programmer (c) Website design packages: Software packages needed / ~reate the platform, Adobe
J
. Dreamweaver, Adobe Muse, Amaya, Antenna Web, Bluefish, BlueGriffon, Coda; Coffee Cup, Design Studio, Galaxy Web,
GoDaddy, Google Web Design, Rapid Weaver, H5P, HTML, iWeb, Microsoft Expression web 3.0 and studio, Microsoft
FrontPage, MySQI, Net objects fusion, Odoo Website, Photon fx Easy, Sandfox, Vb-Net, Web plus x4, Web.Com, Website
Pro, Webydo, Weebly.
(d)(i) Local Area Network (LAN)/ Intranet (ii) Importance of computer network: file sharing, printer sharing, sharing of
media, media centre server, security, communication, preservation /Storage, sharing of resources, reduced cost, improved
customer service, better performance, ease of setup.
(e) Transmission media that can be used to implement the network in 3(~)(i) ()) UTP (2) SIP (3) Coaxial / (lpper (4)
Fibre Optics (5) Bluetooth (6) Infrared (7) Radio (8) WiFi (9) Hot-Spots (10) Satellite.

4
. (a) Define Software Mainfell{mce: Software maintenance is the modification of a software product after delivery to correct
faults, improve performance or other attributes. OR It can be seen as the fixing of defect in software. (b) List four types of
software maintenance: (i) Corrective maintenance. (ii) Perfective maintenance. (iii) Adaptive maintenance. (iv) Preventive
maintenance. (c) State four importance of software main~naucc: (i) To correct-faults (e.g. scanning and virus removal,
defragmentation).
(ii) To improve performance (e.g. software upgrading/updating). (iii) To adapt to a changing environment.
(iv) To prevent faults (e.g. installation of Anti-virus). (v) To.proffer solutions to identified software problems. (vi) To predict
software expenses (predictive cash flow).

SECTION B: TEST OF PRACTICAL WORK


.•
5 (aX
J Print Screen (PrtSc) OR Ctr I + PrtSc OR Alt + PrtSc
. i) JI Ctrl + V
Ill : Ctrl + P
Procedure to be followed by the students in carrying out the assignment using the keyboard.
(ii) Step 1: In Microsoft PowerPoint, press "Print Screen {PrtSc)" OR Ctrl + PrtSc OR Alt+ i>rtSc
Step 2; Launch Microsoft Word/ Open blank document. · ·
Step 3: Press "Ctrl + V" I Paste
Step 4: Press "Ctrl + P"
(b)(i) Hardware devices lhe analyst would need to set up the laboratory:· Monitor, Keyboard, Mouse,::
· Speaker, Printer, Scanner, Inverter, Photocopier, UPS, System Unit, Network Devices, Router, Hubs, Back up Devices, Power
Stabilizers, Modem, Surge Protector, Switches. (ii) Word Processing packages likely to be installed are: Ami Pro, Appl
ix Word, Atlantis Word Processor, Corel Word Perfect, emacs, Google Docs, IA Writer, Kingsoft writer, Locoscript, Lotus
WordPro, Microsoft Write, MS Edit, MS Word, Nisus Writer, Open Office Word, Polaris Office, Quick Word, Tech Writer,
TextMaker, Word Craft, Word Perfect.
Word Pad I Notepad, Wordstar, Zoho Writer.
(c)
SIN Keystroke
-Action 6(a)(i) Computer set-up/Computer Connections/ Computer
Systems. (ii) Output Computer in Fig. I ·
(i) Ctrl+Enter/Rcturn 'Page break r - Monitor I\' - Speaker VIII - Printer .
(ii) Ctrl+F (iii) Na111es for the part labelled III, VI and VHI
Ill - System unit, VI - Power supply/ Socket
(iii) Fl Vil - Internet/ Cloud. •
(iv) Ctrl+F2 (iv) Precautionary measure that should be taken to protect the set-
up from power fluctuation while in use: AYR, UPS, Inverter,
Power Stabilizer, Surge Protector.
(v) Data entering into the system can be achieved through the parts labelled: II - Keyboard. IV - Mouse
(vi) The part that can be used to access the part labelled Vil: Modem, VSat, Mobile Phones. .
(b)(i) Fig 2:. CD-ROM OR DVD-ROM. Fig 3: Magnetic tape/ Cassette (Audio, Videotape) (ii) The media most suitable for the
purpose is Magnetic tape. (iii) In which media will the stored data be accessed faster? In the CD-ROM OR DVD-ROM (iv) Fife
access method for each medium: Fig 2: Direct, Random Access. Fig 3: Serial Access / Sequential Access. (c)(i) 3Q0MB =
300,000KB, Number of Images = 300,000KB I 300KB = I 000 images OR I 024 images. (ii) Reniove the storage device and
replace it with
· a new one OR Backup the storage device and format it OR Save in the cloud. ·

16
WASSCE JUNE 2018 DATA PROCESSING I OilJECTIVE TEST QUESTIONS.

The first generation computers made use of A. low level programming language. 13. high level programming language. C.
object-oriented programming language. D. procedural programming language. Microprocessor was used as the main
electronic component of the A. first generation computers.
B. second generation computers. C. third generation computers .. D. fourth generation computers, The act of producing
information from figures, text or images is called data /\. collation .. B. conversion.
C. preparation. D. processing. .
The following are primary sources of information except A. questionnaire. 13. publication.
C. observation., D. interview.
Which of the fotf~wiog factors is not considered when classifying computers? A. Size B. Type
C. Location D. Purpose .
.Which of these channels would enable business transactions between a buyer from Nigeria and a seller from
Ghana? A. e-portal B. e-library C. e-commerce D. Podcasting
The JCT application which helps to resolve road congestion at junctions is A. automatic teller machine ..
B. automatic traffic marshal. C. street licht. D. traffic liuht.
The main co~~,s of the central processing unit (Cl'U) ;f the computer arc A. register and 'memory,
B. control unit and register. C. control unit and ALU. . D. ALU and BUS
Stages in ~~~~~ng cycle include the following except data A. collation. B. gathering. C. parsing.
D. processmc.f-1~ . .
0. At what stage of information processing is data validation carried out? A. Data analvsis B. Data collection
; C. Data processing D. Data summarization
I 1. The media w~enable electromagnetic signals to be transmitted through free spaceis known as
A. unguided media. B. intranet. C. guided media. D. cthemct.
12. Information that stimulates both the senses of hearing and sight is called A. audio information.
! B. audio-visual information. C. video information. D. visual information.
!3. The following are advantages of networking except A. spamming. 13. sharing of resources.
' C. communication. D. backup.
)·L Which of the following devices would not transmit signals from one point to another? A. Telephone line
· B. Modem C. Fibre optics D. Coaxial cable ·
1.5. Another term for Uniform Resource Locator (URL) is A. website address. B. JP address. C. domain name.
D. data link.

'I
16. The website "www.google.cotn ·· indicates that Google is A, a commercial organization. 13. a non-profit

oruanization. C. a research oruanization. D. an educational oruanizatiou ..


7. Identify an operating system ft;m the following software. A. \\~·iter B. 1'!S One note C. MS Access D. Linux
8. Which of the following commands would undo the last operation carried out in Microsoft Word?
A. Crtl + Z B. Crtl + Y C. Crtl + W D. Crtl + U .
I9. While typing. a series ofletters were high I ighted and the keyboard key combination "Ctrl + ff" :Yas executed. The
hiahliuhtcd letters would be A. underlined. B. italicized. C. deleted, D. bold.
•...
Table -
1,_ is a part of MS Excel worksheet which shows the marks. obtained by some students in an examination. Use the table
to answer questions 20 and ; L
Table 1

:,

NAME OF
I
ENGLISH lANGUAGE MATHEMATICS \DATA PROCESSI\JG icor,'.P~·ER CIVIC
EDUCATIO:~
STUDENT ANtNE
- c~ I ~: STUDIES

LORR ET A LI t :, I I
E'!EH GRME
BAKARE IMAN I ~: i ·-··-i~--- -~ ________:! -----'-----------:--·-
IWHAMl;it.D [1EJ: ~- .
. ~-·---- ----
i
----
i ·-

__,
- ·-------- ~
_______________________________________.,_
·--------
:
-

17
20. Which of the following formulas would calculate the average score of the students in Mathematics?
A. =Average (C2: C6)' B. =Average (C2: F2) C. =Average (Cl: C6) D. =Average (CJ: Fl)
21. Which of the following formulas would calculate the total score of ONYEBUEKE OEBORAH in the n
subiects" A. ==SUM(B2: 86) B. c:SUM(A6: G6) C. ==SUM(A2: A6) D. =SUM(B6: F6)
22. The fol lowing are advantages of a Database J\1anage·ment System (DBA1S) except A. restriction of unauthoriz
data. B. provision of niultiple interfaces to different classes of users. C. grovision of backup a
recovery services. D. compromise of data integrity. ·
23. Extracting information in Database Management System (DBMS) involves A: sorting .. B. querying.
C. editing, D. cross-referencing. . •~
24. A special effect that controls the way slides appear in PowerPoint presentation is called A. Word Art.
8. Transition. C. Theme. D. Clip Art. ·
25. · A reference to another page or resource on a website is done by A. FTP. B. HyperHnks. C~ SMTP. D. Web pag
26. The design output of a graphic package can be in the following file format:HXcept A.,i.tf. B .. jpg. C. .g·
D .. l>mp. . '
27. The proactive maintenance of computer equipment before a fault or failure occurs
0
is caIJed A. correcti
maintenance. B. predictive maintenance. C. preventive maintenance·. D. presen4111i-,,e mAintenance.
28. A good computer maintenance practice entai Is A. washing the dusty computer parts with soap and water.
B. keeping computers exposed to sunlight to dry the body. C. cleaningthcf~lay ~ with methylat@d spiri
D. blowing the system unit with blower. ' ·i: ·· ~. · ·. . ·
29. Set of moral princi pies that regulate the use of computers and concerns prof~fonal and s~ial conduct is know•
as A. computer ethics. B. comp~tter misuse act. C. computer use act. 0. safety measure.
. ,
30. Whilh of the following pcograms is a computer virus? A. Kaspersky B. NOD 32 C. Norton D. Tuareg '
31. Precautionary measures 011 computer do not include A. handling all filn with care. B. giving access td unauthorize
in
into the computer room. C. avoiding smoking the cainputer room.
D. avoiding dirts and dust in the computer room.
32. The computer professional responsible for designing and maintaining a database is called database
A. programmer. B. operator. C. instructor. D. administrator.
33. Computer virus is not transmitted through. A. formatting of documents. B. e-mail C. external storage device, D. Inte

34. The following are attributes of computer virus except the ability to A. modify other files. B. replicate itself ill order t
other files and systems. C. execute without the user's approval. D. warn the user before -
execution.
3
5 A relational database model is designed according to set of rules known as A. NormaJization. B. Isolation.
3. C. Grouping. D. Enurneration. . . .-~' : ' -,~ .. ·•:;,. Which of the foll owing statements about re lationa I database mode
corrl(,t~. A. AJlte ,eq.;ei,'i. ~ ·
is related records B. A record consists of a row of data containing single value from
6
. a
column C~.,Data r the column of a table are of the same data type D. Data in the rows of table «e of the same data ty
Arranging records in a file according to a particular order is referred to as A. matching. B. merging.' ·'\,.,,f., C. sorting. D
3
7 updating. >,:·,., ~ -

3. One advantage of indexed sequential file organization is that A. index tables are small and can be searche quickly. B. i
8 cost effective. C. it is suitable for dynamically changing files.
. 0. it requires less storage space.

3 The protection of database against compromise is known as A. data pass wording. 8. data- protect~,
9 C. database encoding. D. database securitv. ..~· ·~
~ ~ .
4. Which of the following is a characteristic of parallel databases? A. There can be shared-memory or shared~disk
0 8. They are connected using public purpose networks C. Machines in this environment are in different locations D. It ha
. autonomy

I.A 2.C
WASSCE JUNE 2018 0ATA PROCESSING I Oll.JECTIVE TE'-r ANSWERS ·'!'

15. 3 .A 4. f3 5 .C 6.f: 7 I~ o rs "~ ·~· ~-


16. 17.D 18.n 19.D
C A 3 I.B 32.D 33.A
29. 30.
A A
W,:\SSCE JUNE 2018 DATA PROCESSING 2 THEORY QUESTIONS
~ SECTION A: ESSAY
I. (a)(i) What is data model? (ii) State three types of data model. (b)(i) List three approaches to data modelling.
(ii) Explain any one approach listed in l(b)(i). ·
2. (a) Vera, a secretary to the manager of the organization is saddled with the responsibility of typing a confidential report, She is also
instructed to insert the word "CONFIDENTIAL" diagonally in the background of every page of the report. (i) State the most
suitable application software needed by Vera to produce the report.
(ii) What feature of the application software can be usedto insert the word "CONFIDENTIAL" as instructed? (iii) Mention one
measure that can be taken to ensure the confidentiality of the soft copy of the report in the computer. (b) Explain the following
terms: (i) icon (ii) browser.
3. (a) Outline the steps involved in printing the first five pages of a Word document from the print dialog box on a computer with two
printers installed. (b) Sadiq complained that a pop-up usually appears on the screen of his personal computer thereby disturbing him
while using the computer. (i) What is the possible cause of the popup? (ii) State a possible source of the element causing the pop-
up? (iii) What measure would be necessary to stop the pop-up from reoccurring? (c) Mr. Aneke is billed to address a large
audience in an audiorium. (i) What computer application package is suitable to prepare and deliver his speech? (ii) State the output
device that can be used to transmit Mr. Anekes speech note from his computer to a large screen in the auditorium.
( d) Give two types of computer network. . '

l
4. (a) Outline the steps involved in creating the Query By Example (QBE) 'in figure 1 assum ingthe table tblcustomer exists already.
(b) Write the steps to generate the SQL statement for the action in 4(a).

-
Lastname Firstnarne Town
•field
tblcustomer tblcustorner tblcustomer
Table •
So11
Show 0 0 0
like 'John'
Criteri
a
Figure
Or 1
SECTION B
5 (a) ltoro was tasked with the responsibility of producing the report of his group project. He is to submit both the soft and hard
copies of the report to his form teacher. The soft copy must be sumbitted to the email: [email protected].(i) List two:
I. applications required to carry out the task; II. hardware required to carry out-the task. .
(ii) Identify two conditions to be satisfied by Itoro to submit the electronic copy of the report. (iii) On the first attempt to send the
soft copy of the report, ltoro observed a 'spinning wait curscir'/'spinning disc pointer' on the screen for a long time. ldentif y three
possible reasons for the observation. (iv) State one output device that can be used to produce the hard copy of the report.

In figure 2 is an interface of an application software. Use the figure to answer question S(b) .
·- - - - - - - - .. :--. (b)(i) Name the type of application software represented in figure 2
"{ili'rC
~~...:.......::.'·
)' (ii) List three examples of the application in 5(b)(i). (iii) Given that the application
in figure 2 is running on a computer that has Internet access, out! i ne the steps to
follow in creating an email addresss/account.
6. Figure 3 is created using a Word Processor, Use the figure to answer question
6(a).

T1ie \Vest African Examinations Council is West Africa's foremost examining


hoard cstabl ished by law to determine the examinations required in the public
interest in the English-speaking West African countries, to conduct the examinations
and to6.Caward certificates
7.t:S <'5.L ~-L
comparable 10.A·
to those 11.B
of equivalent 12.B
examining13.A
authorities14.B
Figure 20.A . 21.0 22.O 23.B 24.B 25.B 26.A 27.C 28.D
2 internationally. By this mandate, the Counci I is expected to:
34.D 35.D
19 36.C 37.C 38.C 39.B 40.A

18
~Assist in the development of sound education. =Ensurs
that educational standards are maintained.
~ Give the people of West Africa a vision of the great potentials which lie beyond examinations.
VISION
To be a world~class examining CORE VALUES
body adding value to the Excellence
educational goals of its stake-holders. JntegT-ity
MISSION
To remain Africa's foremost examining Professionalism
body, providing qualitative and reliable
educational assessment, encouraging Accountabliity
academic and moral excellence and
promoting sustainable human resource Transparency
development and ·international co-
operation. Team work

Innovativeness

Figure 3

6. (a)(i) What is the name given to the feati1re on the first character in the document in figure 3? (ii)
Highlight the steps to: I. achieve the feature on the first character in 6(a)(i);
IL obtain the two columns as shown in figure 3.
(b) Give two objects that can be placed on a document usiag the 'Insert mean' on MS Word application.
(c) Outline the steps to perform the following actions in Corel Draw application: (i) inserting a circular shape: (ii) addi
caption 'Happy Birthday'; (iii) changing the colour of the caption to Red; (iv) fitting the caption around the circular object

WASSCE JUNE 2018 DATA PROCESSING 2 THEORY ANSWERS


SECTION A: ESSAY
(a)(i) What is""'" modett A data model refers to the logical inter-relationships and data flow between different data elemen
involved in the foforrnation world. A data model defines how data is connected to each other and how they are processed and s
inside the system. A data model is a representation of real world situation about which data is to be collected and stored in a
database. It depicts the data flow and logical inter-relationships among different data eleinents. (ii) Types of Data Model: (a)
Physical data model: This is usually generated in one of the two ways~ either by reverse engineering from a physical database
automatically by the mode II ing tool. Such as ERwin that was used to design the logical data models. {b) Logical data model
where data modellers come into their own and add significant values. ( c) Conceptual data model: They are used to establish
agreement with business users about the most important things of interest and subject areas in the business.
( d) Semantic data models: Are used to combine meaning and graphic presentation to add values to other types of data mod
This is concerned with partitions, CPUs, table spaces, etc.
(b )(i) Approaches to Data Modelling: ( a) Object-oriented data model: Is a compound set of objects interacting . with on
another. Object is charaterized by its attributes (static properties) and behaviour (methods, i.e, functions which an object
performs).

Graphic
al data Dcscri pti No Code Owner
vc data
300/J 200 M. Toth
Photograj)h 300/1 I 250 P. Rab
y

(b) Relational data model: This is characterized by clear distinction between the graphical and descriptive data of territo
elements. Graphical elements are stored in layers of digital computer map, attribute data form of relational·

20
database table. After the inter-connections between the graphical and descnpnve uata, aii:.1•) ·,:-, o...,,,, ,,c 1114u~ ,., a
model created this way. ( c) Data models of Environment: For effective creation of graphical ar. ; i!'.'t1-'.~raphical
digital data, various data models are created. They come from basic approaches to environmental data modelling,
from methods and technologies for further processing and usage. (d) Topological data model: Topology without
using it as a mathematical discipline can be applied on modelling of basic relations among real world entities by
topology, they can be exactly defined by planner graphic. their models and polygons, borders of shapes.
2. (a)(i) Microsoft word. (ii) Watermark. (iii) Bypasswordingthedocument. (b)(i) Icon: This is a pictogram or
Ideogram displayed on a computer screen in order to help the user navigate a computer system or mobile device. It
is a quickly comprehensible symbol of a software tool function or a data file, accessible on the system and is more
likely a traffic sign than a detailed illustration of the actual entity it represents. (ii) Browser: A web browser is a
software application for accessing infomation on the world wide web. Each individual web page, image and video
is identified by a distinct URL enabling browsers to retrieve and display them on the user's
device.
3, (a)(l) Click on file on the menu bar (a drop down menu will appear, click on print). (2) Click on print (the printing
dialog box will appear). (3) Go to pages on the box and enter 1-5. (4) Click on the print option to select the portion
you want to use in printing your document. t5) Click on print.
(b)(i) Possible cause of the pop-up: This is caused by clicking on a link or loading a web page. They are usually
generated by java script and uses cross-site scripting (XSS) sometimes with a seccondary payload that uses Adobe
flash. They can also be generated by other vulnerabilities/security holes on broswer security or might come from a
rnalware infection. (ii) Possible source of the clement causing the pop-up: Some site that sell products might cause
a pop-up to open when you try to leave the site or through the internet browser.
(iii) Measure needed to stop the pop-up from reoccuring: (1) Open the chrome app. (2) To the right of the address
bar, tap more settings. (3) Tap site settings pop-up. ( 4) Turn pop-up to Allowed or Block.
(c)(i) Computer application package suitable to prepare and deliver his speech is the: Microsoft, Powerpoint
application. (ii) Output device that can be used to transmit Mr. Aneke's speech note from the computer is the:
Projector. (d) Types of computer network: (i) Local area network (LAN); (ii) Wide area
network (WAN); (iii) Metropolitan network. (MAN).
4. (a) Steps involved in creating the Query By Example (QB£) in figure 1:
Step I : Add data sources. (I) On the create tab. in the other group, click. Query design. (2) In the 'show Table
dialog box. on the Tables, Queries or both tabsdouble c I ick each data source that you want to use or select each
data source and then click add. (3) Use the show table 1.fr,J,,g box.
OR
( 1) Choose the tables or queries that you want to use as sources of data. (2) Specify the fields that you want to
include from the data source. (3) Optionally, specify criteria to I imit the record that the query returns. After you
have created a selected query, you run it to see the results. To run a selected query, you open it in datasheet view. If
you save the query, you can reuse it whenever you need, e.g. as a data source for a form, report. etc.

SECTION B
TEST OF PRACTICAL WORK
5. (a)(i) List two: (l) Applications required to carry out the task are: (a) Application software (rnicrosoft word). (b)
Internet application (an email address). (II) Hardware required to carry out the tnsk : -Computer keyboard; -
Cornputer monitor; - Electronic printer.
k (ii) Conditions to be satisfied by Itoro to submit the electronic copy of the report: (1) Ensuring that
there is internet access on the computer. (2) Ensure that he has an email address. (3) Ensure that the report ii
properly attached to the email before sending. (4) Ensure that the proper email address is entered so that the
...,. email will not bounce back. (iii) Possible reasons for the observation: (I) The Mac may be rendering calculating
something. (2) The Mac might be spinning up the hard drive after being awakened from sleep.
(3) lt may occur due to the number of applications currently opened. (iv) Output device that can be u~w to
produce the hard copy of the report: -Electronic printer.
(b)(i) Type of application software represented in figure 2 above is: -Internet browser (web browser). (ii) Examples
of the application in 5(b )(i): =lnternet explorer. -Google_ chrome. -Fire fox. -Opera mini. -UL. browser. -
Kongueror. -Lynx, etc. (iii) Steps to follow in creating an email addresss/account:
-Click on the free sign up botton. -Enter all mandatory fields (first name, last name, gender, etc).
- Type in your desired email address out of our page selection, e.g. biker.com, accountant.com, chef.net).

21
-Choose a secure password (al least 8 characters. mixing letters, numbers, lower and upper case. and usin~ special
characters). -Select your security question type in your answer. -Verify your registration by typing the number in the
captcha picture. -Click the "Accept" button underneath.
6. (a)(i) The name glven to the feature on the first character- in the document in figure 3 is known as:
Drop cap. (ii) Steps to achieve the feature on the first character in 6(a)(i): -Select/highlight the character. -Click Oli drop
cap and select the format or type of drop cap you need. -Click on ok.
(ii) To obf.1in the hni columns as shown in figure 3: =Specify where you want to add a drop cap.
-Use the drop cap option. On the format menu, click drop cap. The drop cap dialog box appears. -Select the type of drop
cap, select the dropped or in margin drop cap style. -Select font (when the drop cap style is selected,
. the font drop down box appears enabled. Select a desired font style for the drop cap). -Select number of lines to drop. (b)
Objects that can he placed on a document using the 'Insert menu' on MS Word application: -Clipart. -Picture.
+Table. -Graph .. -Chart, -Shapes.
(c) Seeps to perform the following actions in Coretlrraw application: {i) Inserting a circular shapes: -Click on the
ellipse flyout, (select circle). -Place the mouse point on the drawing space. left click the mouse and drag it on the drawing
area until you get the size of circle 'you want. ( ii) Adding the caption "Happy Birthday: -Add/type the text "Happy
Birthday" by making use of the text tool in the work space. -Select all the text and then go to "Text, fit Text to path".
OR,
-Select the pick tool (or press key FI0) and select the shape around which you want the text to follow by selecting Text>
fit text to path". -Once this is done, you will see the cursor on top of the shape and whatever will go around the shape. (iii)
Changing the colour of the caption to Red: -Go to Edit. -Click on the find colour drop down menu, select the
eyedropper tool near the bottom of the colour palette menu. "With the eyedropper selected, move the mouse over a red leaf
in the drawing and click to select the colour". ( i,") Fitting the caption around the cin.·ularobject: -Select in text object
using the pick tool. -Click TEXT: Fit TEXT TO PATH. The pointer changes to the fit text to path pointer .. As the mouse is
moved over the path. a pointer of where the text will be fitted is displayed.

22
~NASSC"f. .JUNE :?~W• DATA PROCESSING 1 OJl.JF.CTJVE TEST QUESTIONS

The' modern definition i:' a:1 ,:,_J,11puting machine is based on a concept known as A. circuit switching.
G. digital circuit. C. pad,et switching. D. stored program. I

, Annngc the following !CT tools in the order of invention from the earliest 10 the latest: cell phone, Internet.
,;atcililc- and radio. A Cell phone, satellite. radio, Internet B. Internet. satellite. cell phone, radio
C. Radio. satellite. lnternet. cell phone D. Radio.cell phone, satellite. Internet
.., The process (If gathering facts and statistics from different sources is known as data A. analysis . B . ..:o! lcction.
.
l C. collation. D. retrieval.
A chart is a graphical representation of A. data. B. map. C. process. D. transmission.
The use 0f transistors in circuits was a major advancement in the A. first generation computers.
B. second generation computers. C. third generation computers. D. fourth generation computers .
. \ :, _.,Ct-l,a ..• ._,r;I serv ice that uses tclcconnnunication devices to hoid 11 ccting among many participants in h110 er :r,oi;:
lccanons i:; known as A. broadcasting. B. multimedia. C. pod casting. D. teleconference.
Which of these devices does not support wireless conununicarion? A. GSM phone B. Mouse
C. Route1 D. Telephone
8 Yhc- fol km ing ha, dware devices arc used for output operations except, A. monitor. B. microphone. C. plotter, D.
, projector. . ... -. • The manipulation of digitized information by computer or other d igiw ! electron ic equipment is k
fJ,
uown a.'> A. data collauon, B. data manipulation. C. information manipulation. D. information processing.
iO. Which of'rhe following statements explains information processing'? /\. Saving documents in a device
8. Changing information detectable by an observer C. Data upload to server D. Transfer of information between devices
! l. The information transmission medium from location A to location Bin space is called A. asvnchronous transmission.
B. guided transmission. C. synchronous transmission. [). wireless transmission.

CAR -, CAR I I:!. What is the role of the rart labelled U in Figure !? A.
-
~~u",.,
l\LIIIVfL -,
1\/\,"\t)
LIVVI\ I
I
interpreter B. Medunn C. Receiver D. Source

I il
I l
Figure 1
13. Which of these technologies allows wireless connectivity in a Personal Area Network? A. Bandwidth B. Bluetooth C. Broadband
D. Satellite
Figure 15. The title of the web page being accessed on the
·- _/ __ .••..•. ,<' -._,. •. ---•-· 2
.•.•• _>
Use Figure
interface lo answer
in 3Figun~ quession« on
3 i-, di~;played 15 the part
,... . function of the device in the part labelled JI in Figure 2 is
; 4. The main
-~-----·- .....-:----...__pl, - I of data transfer to the part lahc I led I. B.
____~ .•.rate and
la 16.
bcl led
___ _j ____.
A. speeding up the
f ~ •.• . ..:
II;~:: •~
A. I. 8. Tl. C. Ill. D. IV.

-.:
··-·... - ··
providing services lo the other devices in the s1:111p. C. 16. The shortcut keycombination for adding a

··
l-~-~~~-~~

··
forwarding
~-...-,>;;;;.::v- data packets II between computers. D (l:im,d!ing the Os, .• · Q · ~l Lit 0:.,1-,.;._ "h- ,.._ ~ ~-:.:• :;.
·1 new tab in Figure 3 is A. Alt-:- N.
access 10 the part labelled I. B. Alt+ T. C Ctrl + N. D. Crrl + T.
,·o• •:~
23 Google
111----- l ◄

! ·:;·.= _:._: ~,:~~~ ~==:c:


.
1v------~- --- -···-- __ ., _______ ,,_, .. ==-·~c:-:·· ·:·
·::J.
Figure 3 ·
17. A program that enables the computer hardware to communicate and funcnor ·;;i~•ctively is A. translator, B. liveware. C.
operating system. D. application software.
18. A Word document can have any of these file extension except.
A .. doc. · B .. docx. C. .jpg. D .. rtf.

l 9. Which of the fol km in; command shortcuts can be used to


Save As . X display the dialog box in Figure 4 when the application is
running? A. Ctrt+ 0 B. Ctrl + S C. Ctr!+ Y D. Ctrl + Z.
@@ fl 'Dr!~ktop Vil ii Search ,oj 20. The first step taken in editing a chart in MS Excel is
file :Nan;c!WASSCE (SC) 2019 91 A. click and drag the chart object
B. click the chart object. C. copy the chart object. D. drag the
Save As iword Document qj chart object.
I
4 11 Caned J
Figure SaYc

21. By default, numeric values in a worksheet are A. centered. B. left-aligned. · C. right-aligned. D. unaligned.

22. The diagram in Figure 5 depicts a · A. flat file database.


I3. hierarchical database. C. network database. D.
parallel database.
23. Which of the following sets are available when creating a
table in "Design View" in Microsoft Access? A.
Data'Iype, Description and Field Name B. Description,
Criteria and Field Property
C. Field Name, Data Type and Field Property
D. Criteria. Field Name and Description
Figure S

· · 24. The lii-; Power Point feature which can be used 10 change the appearance of the entire presentation is the A. Add slide option. B.
Design template. C. Online view. D. Slide Layout option.
25. One example of web design package is A. A!S FrontPage. B. MS Outlook. C. Peachtree. D. SPSS.

26. The part labelled II in Figure 6 is used to A. shape objects. B. select and transform

I~
objects. C. draw lines and cures. D. create texts.
27. In computer maintenance, the dampen material can be used on the fol towing devices
except. A. DVD lens. B. keyboard. C. mouse. D. screen. Dust from the system unit

fci:1.---··--- ~IV
Ill
28. casing can be removed using A. antistatic wipes. B. cotton wool. C. static wipes. D.
wet cloth.
29. Indiscriminate sending of unsolicited e-mails to many e-mail addresses is known as A.
plagiarism. B. phishing. C. pharming. D. spamming.

--••
01----V 30. In computing, ergonomics is a term associated with computer
A. ethics. B. maintenance. C. malware detection. D. safety measure. A novice is
~VI 3 I. discouraged from opening the CRT monitor for maintenance because A. it cannot be
appropriately reassembled after opening.
VII B. it may habour pests carrying in~ctious diseases. C. it may contain high static
voltage. D. the tube is fragile.
--·- --- V Ill 32. Computer professional bodies in Nigeria include the following except
A. Internet Service Providers Association ofN igeria. B. Nigerian Computer Society.
~ IX
C. Nigerian Information Technology Development Agency.

'-Figure
----- 6 D. Nigeria Internet group.

24

= ···"-•'·~----·---·-··-· -· •• ·--
33. The malware which appears as a harmless object but attacks its victims at the slightest opportunity is called A. worm.
B. trojan horse. C. macro virus. D. logic bomb.
J'.\. Virus effect can be prevented by J\.. installing and updating anti virus. B. installing new operating system.
C. purchasing new computer. D. using external disks on public computer system.

35. The part of the object in Figure 7 labbeled II are called attributes. B.
i--- Cuitomers I entities." C. models. D. relations.
36. j } The arrangement that gives the correct order of magnitude of the database elements
,-~ 10
is A. character, field, record, table, database, file. B. character, field, record, table,
file.darabase.
fltH N•mc- C. database, table, file, record, field, character.
L•st Name D. database, record, file, field, table, character.
37. ~trc<t Aad,eul ~ IIOne unique feature ofindex file is that it contains
A. reference number. B. relative number. C. sequential
St•tit
number. D. static number.
2.tp Cod~
f.l'l\all

38. Figure 7 Which of the following file organizations requires a primary key? A. Indexed file
organization B.
Random
file organization C. Serial file organization D. Sequential file organization
39. Ensuring the correctness and consistency of data is referred to as data A. security. B. reliability.
C. productivity D. integrity.
40. In distributed database management system, breaking a relation into smaller relations is known as A.
replication. B. fragmentation. C. indexing D. normalization.
WASSCE JUNE 2019 DATA PROCESSING 1 OBJECTIVE TEST ANSWERS
l.D 2.C 3.C 4.A 5.B 6.D 7.0 8.C 9.B 10.B 11.D 12.A 13.B 14.B
JS.A 16.C 17.C 18.C 19.R 20.B 21.C 22.C 23.D 24.D 25.A 26.B 27.A 28.A
29.D 30.A 31.D 32.D 33 .B 34.A 35.A 36.B 3 7 .A 38.A 39.D 40.B
WASSCE JUNE 2019 DATA PROCESSING 2 THEORY QUESTIONS
SECTION A: ESSAY
I. (a) What is teleconferencing'! (b) State four uses of Automated Teller Machine (AT,\!).
( c )(i) Give the function of a modem. (ii) List the two means of transmitting information. ~ ..
2. Hamza, Emeka, Funsho, Fe_jiro and ldongesit were friends from secondary school. Now, Hamza is.a pilot, Emeka is
a businessman, Funsho is a banker, Fejiro is a manufacturer while ldongesit is a teacher.' State two ways by which
each of these friends can apply JCT in their respective professions.
3. (a) A secondary school has over twenty personal computers. The school management intends to connect all the
computers in a network. Give four reasons that must have motivated the school management into connecting the
computers together. (b) List four network devices required to accomplish the task in J(a). (c) State one function each
for any two of the devices listed in 3(b).
4. (a) Explain the following database management terms: (i) entities (ii) attributes; (iii) relationships.
, (b)(i) Define cardinality in database management. (ii) Mention three cardinality relationships in database
management.
SECTION B
5 ..
I

X
(a) Figure 1 illustrates a part of a computer system. (i) Identify
the part labelled Y .. (ii) State: I. the technology used in the
part labelled z. II. the function of the part labelled X. 111.
one maintenance practice for the part labelled z. ·
Fiaure
,,. 1
25
Figure 2

: (b) Figure 2 shows a setup of a computer system. State- one function of each of the parts labelled !1', Q, R. S.
- and T. P: _________________________Q: •. R: ______________
. S: ---~--- T:
. (c) Outline the steps taken to perform the following tasks in Corel Draw application: (i) insert a circular shape; (ii) add the caption
"Happy Birthday" around the circular shape; (iii) change the colour of the caption to
. ireen_..
6. Table 1 shows the list of items and the quantity of the item needed by a student. The table was created on an .'t/S :
Excel worksheet. Use the table to answer questions 6(a)(i) ~ (iv) ·
'
Table 1
~
ITEM QU4IVTITY (a) Outline the steps to: (i) create a bar chart on the worksheet such that
the items would be labeled on the chart and the percentage of each
. TEXTBOOK 12 item included. (ii) add to the table. a new; A. colunm; B. row. (iii)
. BIRO 5 State one function in AIS Excel that can be used to determine the
EXERCISE BOOK 18 item with the highest quantity. (b) Outline the steps to add page
PENCIL ,.,
.) borderto a document using Art Design Tool in MS Word
application.
CALCULATO
R
ERASE
,,2 (c) An MS Word document contains the phrase "WAEC Exam".
R Highlight the steps to link the phrase above to the WAEC website.
('1t1p:l/1nnt'. waec.org.ng]

WASSCE JUNE 2019 DATA PROCF.SSING 2 THEORY ANSWERS


SECTION A: ESSAY
I. (a) What 1s teleconferencing] A teleconferencing is the live exchange and mass articulation of information among several
persons and machines remote from one another but linked by a telecommunication system.
OR A teleconferencing is a telephone meeting among two or more participants involving technology more sophisticated than a
simple two-way phone connection. OR Teleconferencing means meeting through a telecommunication medium. OR
Teleconferencing is the holding of a conference among people remote from one another by means of telecommunication
devices (such as telephones or computer terminals).
(b) Uses of Automated Machine (ATM): -Shopping. +Recharging airtime on mobile phones and devices: -Quick teller
option; with quick. teller, you can buy airtime, make payment online and shop on line. -Buying and transferring airtime to
others. -Cash withdrawer. -Printing of mini statement of your account. -Intra bank
transfer. -Inter bank transfer. -Send or transfer rnonev to vour fami Iv members. relatives or friends. -Check account balance. -
Check account number. -Pavmei1t fo~· DSTV, eicctricitv hills and other utility bills.
. , .
-Airlines payment for pre-booked aero air tickets and others. -Card based cash deposit -Cardless cash
deposit. (c) Function of a Modem: -To transmit digital information via analog system. -To modulate an analog carrier
signal to carry digital information. -Tn demodulate a similar signal so as to decode the digital information from the analog
carrier signal. (d) Means of Transmitting Information: (i) Ancient method this include: -oral: -beaten drums; -town crier:
-whistling: -drawing diagrams: -making representation.
(ii) Modern method: This include:- =print out copies; -tetephone: -radio: -television: -jnternet: -rclcx: -satellite: -S. M.

26
. Applic~1tion of ICT: (i) As " Pilot: As a pilot. one can use ICT in the following ureas: -Fur storing of all oncrat ions and
. cnnuuunicat ions on the tl iuht into a data recorder and a tliuht recorder or black box so as lo cuide investigation if an
, accident occurs. -With the use otK"]', flying has made quite a safe mode of travel. -1c1· use in aviation extends to
booking. scheduling. flight control. payments. radar operation. weight determination, balance of air craft. loading.
communication to ground based station, instrument readings and display warning signa ls. fire detect ion. engine
performance monitoring. emergency operation, cargo tagging and tracking, etc.
(ii) As :1 Businessman: - Standard office applications, c.g. MS.Word, reports. etc. Spreadsheets, e.g. MS Excel: Anulvsc
Financial Information. calculations. etc. -Database software:, e.!.!.. Oracle. Microsoft SQL Server, Access. mauauinz data
in manv forn~s. etc. -Presentation Software. e.!.!.. Ncw;lctters. Mauazines. etc.
-Graphics Soft\\;re, c.g. Adobe Photoshop; create and edit images ~uch as logs, drawingsor picturing.
=Spccialist application. -Accouuting application.
(iii) As a Banker: It is used for an Automated Teller Machine . -Cash line Machine. -For clearing cheques.
-For Electronic Transfer (EFT). -Smart card.
(iv) As a Manufacturer: -Euhances the automation. Smart Sensor System for processing and control and
robotics within the food process chain. -Enhances effective communication.
(v) As a Teacher: It has» -Enable teachers to transform their teaching practices.. -Jmproves the nature through which
teaching !ICT use impacts on students achievement. -Lesson planning is crucial when using JCT. - It is a tool that helps
teachers create more learner-centric learning environment. -Use to support change and
to support/extend existing· teaching practices. -For information presentation. ·
3. (a) Reasons that Might Motivate the School Management into Connecting the Computers Together arc= -To
enhance communication and availability of information. -It allows for more convenient resource sharing. -It makes file
sharing easier. -It is highly flexible. -It is an inexpensive system. -It increases cost efficiency -It boosts storage
capacity.
(b) Network Devices Required to Accomplish the Task in 3(a) -Computer system; -Network cable; -Network
interface card; -HUP; -Switch: -Routcr: -Proxy server; -Bridge; -Firewall; -Modem. Network Cable: It is a device that
enables a computer to be connected to the network.
Network Interface Card: -It controls the wired and wireless connections of a computer to exchange information with
other computers. -!t connects the computer to a local data network. -!t enables computer to communicate with one
another. -It serves as a mediator for network and computer.
Hub: -Use to connect segments of a LAN. -Connect multiple computers or other network devices together. Switch: -As
access or OSI layer L -For connecting multiple hosts (PCs). -Forward a message to a specific host. Router: -Connecting
multiple networks and forward packets destined either for its own networks or other networks. -It forwards data packets
toward their destination. -It forwards the packet to the destination of the TTL value is 0. -It changes the destination IP
address of data packages before forwarding them to an exit interface. -It determines the best path based on the destination
MAC address. -It acts as an intersection between multiple IP networks.
Proxy Server: -Verifics and forwards incoming client request to other server for further communication. -Acts as an
intermediary between the web browser and the web server. -Provides internal system security.
-Speeds up resource access. -Applies policies for tracking organisational internet use or accessing employee
progress. -To by-pass special controls such as parental or security controls. -To scan for viruses and malware -To
circumvent regional restrictions.
Network Bridge: =Connccts two segments of a network toget Iler. -Divides network into manageable sections.
Firew ~,II: -Protects networks or network devices. -Fi hers packets. -Filters incoming networks and outgoing networks. -
Prcvcnts network traffic. -Inspects packets which is supposed to forward. to determine whether
. they correspond to a desired template for traffic patterns.
Modem: -Converts digital signals generated by the computer into analog signals. -Modulates signals.
-Data compression. -Error correction. -Flow control.
4. (a)(i) Entities: An entity is an object in the system that we want to model and store information about. Entities arc
usually recognisable concepts either concrete or abstract such as person, places, things or events which have relevance to
the database.
(ii) Anributcs [Charactcr'isties]: -It is a database component such as a table. it is also seen as a database field. they
describe the instances in the row of a database. OR It is a column or field in a database table, e.g.
given a customer table. a name column.

27
(iii) Relationships: A relationship 1n the context of database is a situation that exists between two relational database tables when
one table has a foreign key that references the primary key to the other table. Relationship allows relational databases to split and
store data in different tables. while linking. disparate data items.
(b)( i) Cardinality: Refers to the uniqueness of data values contained in a column. High cardinality means that .the column
a
contains a large percentage of totally unique values. Low cardinality means that the column contains lot of "repeats" in its data
range.
(ii)· Three Cardinality Relationships in Database Management: - (I) One-to-one (I: I) relationship. (2) One-to-
many (I: M) relationship. (3) Many-to-many (M: M) relationship,

;.~- Figure l:
(a)(i) Disk driver- (i) The technology used in the part labelled z is disk (compact disk).
(ii) --x - for oning and offing. (iii) Always clean the surface with white clean cloth.
(b) Figure 2:
P - It is used to view/sec what the computer is doing.
Q - It is the system unit where the computer memory is located.
R- It is used to move round the screen of the monitor. it is used to give command to the computer. S - It is used to
type/send in data into the computer.
T ·- It is used to store data that can be used on any computer system.
(c)(i) -Hold down ctrl and drag in the drawing window until the circle is the size you want. -In the box. click the 3-point ellipse
tool in the drawing window. drag to draw the central I ine of the ellipse at the angle you want.
(ii) Steps to fit Caption Around Circular Object: -Select the circular shape and the caption "Happy Birthday" using the pick
tool. -Click on text menu and select "tit to path". OR -Select the caption using the pick tool and click on text menu. -Click on fit
to path and click on the circular shape. Changing the colour of the caption to green -Select the caption and use the i nteracr: \'C 1,
!l tool or the mesh fil I. -Choose the colour you want and click.
6. (a)(i) Type/Create the Table with the Values Needed for the Chart. -Highlighi the datas. -On the menu
bar click on insert and select the type of bar chart design you want and click.
(ii)(a) To Add a New Row: -Pick a cell or row that's not the header row and right click. -Point to insert and pick table rows
above to insert a new row. (ii)(b) To Add a New Column: -Pick any cell in the table and right click. -Point to insert table column
to the left to insert a new column. (iii) Max Formula: Returns the largest value from the numbers provided. (b) How to Create a
Page Border in Microsoft Word: -Open Microsoft word. -Click on the page layout tab. -In the page layout background group,
click the page border options. -In the border and shading window, click the page border tab. -Select box if you want a square
border around your page. -Select the style of border you want on ti,..: page which can be solid, dotted or dashed. -Click the OK
button to apply the border.
(c) Steps to Link the Phrase "WAEC Exam" to the WAEC Website (http://www.waec.org.ng): -Go to the webpage to
which you want to link in order to find the link for a website specific page, you must go to the page first. -Select the webpages
address the top of the web browser. -Copy the address. -Find a place to post the link. -Paste your link. -Test your link.
SECTION B
(TEST OF PRACTICAL WORK)
28
~--------------Natio,rwiu 29. The fuel used for brazing is a mixture
of oxygen and (a) acetylene (b) charcoal
(c) kerosine (d) petrol (e) water
30. Technology simply means the application of __ ideas in practice
(a) accounting (b) executive (c) law (d) scientific (e) traditional

COMPUTER STUDIES 2017


31. General purpose and special purpose computers are classification of computer based on? (a) Generation
(b) Speed (c) Size (d) Types (e) Versality
32. A parallel port is most often used by a __ (a) camera (b) monitor (c) mouse
(d) printer (e) scanner
33. What is the commonly used unit for measuring the speed of data transmission? (a) Bits per second (b)
Characters per second (c) Mega hertz (d) Nanc second (e) Words per second
34. Which of the following is most oriented to scientific programming? (a) BASIC
(b) COBOL (c) Fortran (d) Java (e) PL/l
35. Which of these is a proprietary source operating system? (a) Android (b) Linux-
(c) Sun Solaris (d) Unix (e) Windows
36. Usually in MS-DOS, the primary hard disk drive has the letter (a) A: (b) C: (c) D: (d) E: (e) F:
37. Hardware or software designed to guard against unauthorized access to a computer network is known as
a/an (a) encryption (b) firewall (c) password {d) program
( e) spyware ·
38. The __ is a piece of code which i~ capable of copying itself and typically has a detrimental effect on
computer system (a) coding (b) encryption (c) hacking (d) virus (e) zombie
39. Analyzing the system to establish its strengths and weaknesses is a rote of
a ______(a) computer operator (b) project
manager (c) software programmer (d) system analyst (e) system engineer
40. The period during which a job :s processed by the computer is __ time i (a) constructive (b) down (c) execution
(d) reh., ~
(e) salary _/ r

7 ,-/
------------------t----------------N"tiomvi,le
41. The speed of the processor in the 1st 55. The procedure for information
processing which allows resource
generation of computer was measured
gathering is __ (a) analysis (b) collation (c)
in __ second (a) Femto (b) Micro (c) Milli (d)
interpretation (d) organization
Neno (e) Pico
(e) redundancy
42. Which of these areas does not involve the
56. ICT plays a vital role in industries in the
application of ICT? (a) Carpentry
following areas except (a) auditing operations
(b) Commerce (c) Education (d) Health
(b) inventory control (t) management information
(e) Industries
systems (d) payroll preparation (e) X-ray
43. The. __ is an example of unguided
techniques
transmission medium of information (a)
57. What is the acronym for UNIVAC? (a)
coaxial (b) fiber optic (c) infra red (d) shielded
United Nations Institute Variable Automatic
twisted pair
Computers (b) United Numerical Integrated
44. Power-Point program is a __ package in
Value Calculator (c) Universal Automatic
computer communication (a) computing (b)
Calculator (d) Universal Automatic Computer (e)
graphics (c) presentation (d) utility (e) visual 45.
Universal Numerical Integrated Value And
A Scottish mathematician __ Napier
Computing
invented the bone (a) Blaise (b) Charles
58. The acronym WiFi connotes Wireless (a)
~{c} Herman (d) Joseph (e) John
fidelity (b) fiction (c) file (d) finder (e) firewall 59.
· 46:\~hich of these is an example of
Which of the following is a major type of system
Micr<1soft office? (a) Access (b) CorelDraw (c)
software? (a) Assembler (b) Compiler (c)
Dreamweaver (d) Instant Artist (e) Photoshop 47.
The Drawing tool [3Jin Microsoft paint
Firmware (d) Translator (e) Utilities 60. To save
an existing document with a different file name,
environment is called __ (a) brush (b) crop (c)
click/press Ctr! + (a) A (b) C (c) S (d) V (e) Y
elipse (d) eraser .(e) magnifier
48. Which of these is a disadvantage of
ICT? (a) Data redundancy (b) Electronic mail (c)
Minimize cost (d) Resource sharing
PAPER Ill
(e) Saves time
COMPUTER STUDIES PRACTICAL
49. Ctrl __ is to Redo an action (a) C (b) V (c)
Time
X (d) Y (e) Z
45:minutes Use Microsoft Word to type an
50. The four ways to align a text are (a)
essay on how you spent your last holiday.
centre, justify, left, right (b) centre, left, right,
__ middle (c) diagonal, justify, left, right Instruction:
(0) diagonal, middle, left, right (e) justify, middle, Font style - Time New Roman
centre. right Font size - 12 inches
51. Communication is an act of __ Use the following tips as guideline
information (a) coding (b) forwarding 1. Heading
- (c) hoarding (d) transmitting (e) zipping 2. Your Name
52. The __ is a program that performs a 3. Where you spent your last holiday
useful task while simultaneously allow
4. Your activities (what yott did, tourist sites visited,
distinctive act in the computer system
what you saw etc)
(a) time bomb (b) trap doors (c) trojan horse
5. Your experiences (new things learnt,
( d) worm ( e) zombie
memories}
53. The features of old economy includes
6. Your advice to your friends
the following except (a) digitalization
7. Conclusion.
(b) distance constraint (c) labour based
(d) mechanization (e) time consuming
54. The __ prevents direct access to
computer system (a) back-door (b) malware
(c) password (d) pop-ups (e) virus
18
i
------------------.---------------Natiu11wide
COMPUTER STUDIES 2018 (e) Service-based
t
31. Processed data is called __ (a) database 45. A computer on the network that shares
h {b) document (c) file {d) information (e) product resources is called __________(a) client (b)
32. The __ bar is usually located below the mainframe (c) server (d) transmitter (e) xender
(o
title bar that provides categorized option (a) 46. In spreadsheet, the v-alue of 41\ 2 is __ (a)
af
header (b) menu (c) scroll (d) status (e) tool 2 (b) 6 (c) 8 (d) 16 (e) 32
)
33. The ______key allows an exit from a 4 7. The presentation graphics feature
uy includes the following except __ (a) auto
n program when pressed (a) arrow (b) escape
ee content wizard (b) design template (c) range
t (c) function (d) return (e) spacebar
34. The second generation of computers layout (d) slide layout (e) transition pattern
were developed from (a) 1949 to 1955 (b) 48. Which of the following storage media is
r the fastest in speed? (a) Floppy disk (b) Hard
k 1956 to 1965 (c) 1965 to 1970 (d) 1970 to 1990
disk (c) RAM (d) Register (e) ROM
(e) 1990 to 1995
49. A __ is an elementary building block of a
i 35. What does "SMS" stand for? (a) Short
af digital circuit (a) logic gate (b) motherboard (c)
Machine Service (b) Short Machine System
r nibble (d) system bus (e) word 50. One point of
(c) Short Memory Service (d) Short Message a font is~of an inch (a) 1/27 (b) 2/27 (c) 1/72 (d)
Service (e) Short Message System 2/72 (e) 1/127 51. The __ are engaged in the
36. The term e-commerce is described as design of integrated hardware and software
__ through the internet (a) buying and selling solutions for technical problems (a)
of goods and services (b) production of computer programmers (b) computer system
commerce textbooks (c) receiving and sending of engineers (c) network system administrators (d)
message (d) sending and receiving of goods and
system analysts (e) web developers
services (e) studying of commerce as a subject
52. The ______is an access channel for
37. Information stored in RAM is __ (a) computers to exchange information
invisible (b) non volatile (c) secured {d) virus
(a) gateway (b) model (c) port (d) protocol
infected (e) volatile
(e) socket
38. 20 nibbles is equivalent to __ bits (a)
53. Which of the following is not a
51 (b) 62 (c) 70 (d) 80 (e) 100
multitasking operation system? __
39. The letter "S" in the acronym BASIC
(a) DOS (b) UNIX (c) MAC (d) WINDOWS
represents (a) sage (b) semantic (c) software (e) WIN NT
(d) symbolic (e) systematic
54. In a computer system environment,
 40. Which of the following is an
operating system can be classified
example of a single user operating system?
basically into __ classes. (a) 2 (b) 3 (c) 4 (d)
(a) LINUS (b) PC-MOS (c) UNIX (d) WINDOWS
5 (e) 7
95 (e)XEROX
55. In BASIC programming, which command
41. In BASIC programming, which of the
gives an output? (a) CLS (b) END (c) GOTO (d)
following is not a logical operator? ________ PRINT (e) REM
(a) * (b) > (c) + (d) - (e) /
56. A person who breaks into a computer
42. The size of a font is measured in_ (a)
system to steal information without
bytes (b) inches (c) metres (d) points
authorization is called a/an __
(e) words
(a) administrator (b) cracker (c) hacker
43. What does "COM" stand for? (a) Central
(d) phisher (e) spammer
Output Machine (b) Central Output Modem
57. What is the default font used in MS
(c) Central Output Monitor (d) Computer Output
Word 2010 document? (a) Algerian (b) Arial (c)
Microfilm (e) Computer Output Microphone 44.
Arial Black (d) Calibri (e) Times New Roman 58.
Which of the following is a feature of new
Which of the following is the smallest unit
economy? (a) Analog (b) Digital
of a worksheet? (a) Cell (b-) Column
(c) Labour-based (d) Mechanical
(c) Range (d) Row (e) Worksheet
87
59. Microsoft __ is the most appropriate software for calculating in com_puter
(a) Excel (b) Frontpage (c) Groove (d) Outlook (e) Publisher
60. Which of the following is the current generation of information ages? {a) Fifth (b) Fourth (c) Second (d)
Sixth (e) Third

PAPER Ill
COMPUTER STUDIES PRACTICAL Instruction: Answer the questions.
Create a spreadsheet document of a company payroll as shown below and perform the underlying tasks.
Note: Candidates' work and values should be different.

S/N Name of Hours Pay per Basic pay (N)


Staff worked Hour(N)
1 ljilusi Opeyerni 2 400 800
2 Omoniyi Sola 3 200 600
3 Agati Fatgan 4 100 400
4 Umar Abdulahi 3 100 300
5 I bekwe E bu ka 2 200 400
6
7
8
9
TOTAL

APPLICATION
(i) Provide four different names-of your choice
to complete the table.
(ii) Give the values of HOURS WORKED ranging between 3-4 hours for each name provided.
(iii) Provide the corresponding values for the PAY PER HOUR ranging between N300 to N700.
(iv) Calculate the BASIC PAY for the values provided to complete the table.
(v) Give the cell references and corresponding results for the following:
(a) total HOURS WORKED by the staff of the company.
(b) the BASIC PAY of the last five names
on the payroll.
Note: BASIC PAY = HOURS WORKED *PAY
PER HOUR (15 marks)

E
COMPUTER STUDIES 2019
31. A computer worm is different from a computer virus because it __ (a) corrupts computer files (b) does not
attach itself to an existing program (c) does not prevent unauthorised access to computer (d) does not reduce memory or
disk space
(e) replicates itself
32. Which of the following scientists did not contribute to the development of computer? (a) Augusta Ada (b)
Charles Babbage (c) Gottfried Leibniz (d) Joseph Jacquard (e) Max Weber
33. When was "Internet Explorer" invented? __ (a} 1904 (b) 1970 (c) 1985 (d) 1995 (e) 2000
34. A computer memory is said to be 'volatile' if the information stored in it is __ when there is a power
failure (a} copied (b) edited (c) lost (d) regained (e) saved 35. The keyboard button that erases characters to the
right is __ ·_ key
(a) backspace (b) delete (c} escape (d) shift (e} tab
36. In Microsoft Windows, the graphical pattern used as a desktop background is called __ (a) animation (b)
icons (c) menu bar (d) picture (e) wall paper
37. Which of the following is not an ICT gadget? (a) Computer (b) Phone (c) Radio (d) Television (e) Xylophone
38. A_ is an example of a storage medium that uses sequential method of file organization (a) compact disc
(b) floppy sick (c) hard disk (d) magnetic strip
(e) video cassette
39. Microsoft Word is not suitable for __ (a) creating assignments and articles (b) creating resumes (c} creating
worldwide web pages (d) formatting documents
(e) preparing payrolls
6
40. The following are examples of Microsoft I Nationwide
of a web browser? __ (a) Address bar
application softwares except __ (a) Access (b) Excel
(b) Back button (c) Search bar (d) Send button (e)
(c) Outlook (d) Paint (e) Word -11. The most important Tools tab
attribute of a system analyst is his/her_ (a) ability to
54. The 'CLS' statement in BASIC
design hardware (b) marketing strategy (c)
programming is used for _________(a) clearing
programming skills (d) technical management
11
the screen (b) conditional branching· (c) conditioning
skills {e) writing skills
logical statements (d) displaying data on the screen
42. A computer systems' motherboard is enclosed in
(e) inputting data
its __ {a) keyboard (b) monitor
55. Power Point application package is
(c) mouse {d) speaker (e) system unit
mostly useful when ___________(a) creating
43. A computer network that uses internet
company logos and greeting cards (b)·creating slides,
protocol technology to share an organization's
speaker notes on audience handout (c) preparing
information within that organization is called_
database (d) preparing legal copies, letters and
(a) ethernet
memos (e) preparing student results sheets and
· (b) homeplug (c) intercom (d) intranet (e)
budgets
workgroup
56. The Binary Number System uses how many
44. The __ key on an enhanced keyboard is not
digits? __ (a) 2 {b) 3 (c) 4 (d) 5 (e) 8 57. The
labelled (a) Caps lock (b) · Esc
combination of the Ctrl key and __ on a computer
(c) Function (d) Shift (e) Space Bar
keyboard will redo an action in Microsoft Word
45. Which of the following op·erating systems is
environment (a) A (b) C (c) _V (d) Y (e) Z
based on the use of disk drives? (a) DOS (b)
Linux (c) UNIX (d) Windows (e) Xenix
58. Which of the following cannot be used as a
primary key? __ (a) Date of birth
46. The invention of Point of Sale is an
(b) Department number (c) Receipt number (d)
application of ICT in __ sector
Registration number (e) Subject code
(a) agricultural (b) commercial (c) educational (d)
59. A piece of computer hardware or software
health (e) political
that access services provided by a server is
47. An example of a floating point quantity
called a_ {a) client (b) customer (c) device (d)
number is __ (a) 0 (b) -10 (c) -18 (d) 0.4E7 (e) 40000
receiver (e) token ·
48. A digital file is a collection of data that
60. The diagram below is a __ network topology
cannot be stored in a __ (a) cabinet drawer {b) flash
drive (c) floppy disc (d) hard disk ., '
..
(e) zip folder •I
- '
!
49. Which of these is not a social media platform?
(a) Facebook (b) lnstagram
(c) Google (d) Snapchat (e) Whatsapp
50. A folder in which related records are kept in a
computer is called __ (a) archive (b) database (c)
document (d) field (e) file
· 51. An electronic device that sends and
I
retrieves printed messages over a (a) bus (b) linear (c) ring (d) star (e) tree telephone line
is called __ (a) fax machine
(b) intercom (c) printer (d) photocopy machine (e) scanner-
52. Based on size, __ computer is the
least (a) macro (b) mainframe (c) micro {d) mini Instructions:
(e) super (i)
PAPER Ill COMPUTER
Answer the question
STUDIES PRACTICAL
53. Which of the following is not a feature (ii) Use
Time: 45 minutes
Arial narrow font style with font size 11
167
all through your work except otherwise stated. 1. Use CorelDraw to produce a staff identity card as shown in the
format below.
LOGO IBEKWE EBUKA NUR/PRY SCHOOL (Knowledge is light)
PMB 258,ALBISHIRI ROAD MINNA, NIGER STATE.


STAFF IDENTITY CARD

NAME ----------------------------------------------
DESIGNATION------------------------- FILE NUMBER--------------------------
DA TE ISSUED ------------------------HOLDER'S SIGN-----------------------

APPLICATION
(i) Use the first alphabet of your surname in capital letter as a logo, using font size 24.
(ii) Replace "IBEKWE EBUKA" as used in the name of the school with your full name, using font size 24 and bold it.
(iii) Type the motto "knowledge is light" using font type Arial black with font size 10.
(iv) Replace the given school address with your home address.
-:--:-----------------------------,------------------------,,·11nolf•·itk
(d) hinges (e) locks (c) character (d) file (e) record
42. The abbreviation, ALU stands for __ (a)
COMPUTER STUDIES Arithmetic Log Unit (b) Alihncs: Lngy( • Unit
31. Which of the following information ages (c)Artthmetic Logic Unit (cf)~ r r guag Unit (e)
lasted between the end of Bronze age and the Articulating Logging UI .
spread of Roman Empire?_ (a) Electronic (b) 43. The period it takes a co•p ••• , ID
Industrial (c) Iron (d) Mechanical (e) Stone process a job is called_tillle (a) baol Cb)
32. The third generation computers used __ construction (c) execution (d) rear (e) speed 44. A
in place of transistors (a) electronic valve (b) good information that contains the facts
integrated circuit (c) sockets (d) vacuum tubes necessary for decision makers to solve a
(e) very large scale integration 33. The scientist problem is characterized by its __ (a) accuracy
that invented analytical engine is __ (a) Blaise (b) completeness (c) consistency (d) reliability (e)
Pascal (b) Charles Babbage (c) Gottfried Leibniz uniqueness
(d) John Napier (e) John Thompson 45. Which of the following is not a function of
34. Computers designed to handle variety of an operating system? (a) Disk management (b)
tasks can be described as a/an __ purpose File management (c) Invasion of privacy (d)
computer (a) application (b) general (c) Resource allocation (e) System monitoring
information (d) program (e) specific 46. The following are computer professional
35. The component of computer that holds bodies in Nigeria except __ · (a) CPRC (b) ISPN
program and data used for immediate (c) ISSN (d) !TAN (e) NCS 47. The abbreviation,
processing is called __ (a) control unit WIFI stands for Wireless __ (a) fiction (b) fidelity
(b) hard disk (c) memory (d) register (c) file
(e) storage unit (d) finder (e) firewall
36. Which of the following is not a source of 48. BASIC is a/an __ language (a) assembly (b)
data and information? __ (a) Internet (b) high level (c) low level (d) machine (e) object
Newspaper (c) Printer (d) Radio (e) Television 37. oriented
The acronym PC-DOS stands for __ (a) 49. A byte is made up of __ bits (a) 2 (b) 4 (c)
Pentium Computer Drive Operating System (b) 6 (d) 8 (e) 12
Personal Computer Design Organizing Server (c) 50. Which of the following is not a. feature of
Personal Computer Disk Operating System (d) spreadsheet package? (a) Colour palette · (b)
Petabyte Computer Disk Organizing System (e) Columns (c) Formula (d) Functions (e) Rows 51.
Processor Computer Disk Operating Server The following are features of new world
38. The part of computer where processing of economy except __ (a) a level playing ground for
lnformation•is carried out is __ (a) ALU (b) all (b) over reliance in subsistence farming (c) rapid
BIOS (c) CMOS (d) CPU (e) RAM globalization (d) the ability of small firms to think
39. The connection of computers to share big (e) the chance to create new emerging markets
information worldwide is known as __ (a) fax 52. A protective mechanism that allows a user
(b) internet (c) network (d) router (e) server 40. to only examine a file without bein·g able to
Which of the following describes the four modify it is called __ (a) anti-virus shield (b)
basic operations of a computer? __ (a) Input, hidden flag (c) password protected (d) read and
archiving, processing and storage (b) Input, write flag (e) read-only flag
processing, output and storage (c) Input, 53. Which of the following is not a source of
selecting, processing and storage (d) Input, computer virus? __ (a) Duplication of software
storage, transmitting and processing (e) Output, (b) E-mails (c) Infected CD-ROM~
recessing, receiving and archiving (d) Infected diskettes (e) Internet downloads 54.
1. A collection of fields that relates to ingle A statistical tool which is divided into slices
unit is called __ (a) bit (b) byte to illustrate numerical proportion is called __
(a) bar chart (b) bar graph
245
(c) histogram (d) pie chart (e) scatter plot (ii) Bold the heading of each column
55. The BASIC programming language (iii) Replace 21834321 lAA with your
statement which stops the program at a examination number.
particular line is __ (a) CLS (b) END (c) IF (iv) Copy the replaced examination number and
ELSE (d) PRINT (e) READ paste it in row 2 to 6 of Examination Number
56. Which of the following is not a type of column.
computer network? __ (a} LAN (b) MAN (c) (v) Replace the two alphabets in the pasted
PING (d) SAN (e) WAN examination number in rows 2 to 6 with any other
57 .. An example of a volatile memory is __ two alphabets between B and G.
(a) EEPROM (b) EPROM (c) PROM (d) RAM (e) Note: No replaced alphabets must be the same
ROM for rows 2 to 6.
58. Which of the following applications is (vi) Type any six full names of your family
a word processing package? __ members in the aCANDIDATE NAMES• column.
(a) Access (b) CorelDraw {c) Lotus 1-2-3
Note: Full name should consist of surname and
(d) Photoshop (e) Wordpad
59. This icon below is called __ in a first name.
graphic package (vii) Type your year of birth in the "AMOUNT
PAIDn first row.
(viii) Type any five different years of your choice
for rows 2 to 6 in the same column above. Note:
Year of birth should be in four digits e.g. 2009
(ix) Type your full name at the bottom left side of
(a) ellipse (b) fill (c) hand (d) pick (e) zoom your registration number at the bottom right si_de
60. A responsible way of using computers using Arial Black font style.
is by __ (a) changing computer settings of other (x) Print out the hard copy
users in their absence (b) playing games during
work hours (c) spreading malware to other
computers (d) using it for data collection (e) NATIONAL EXAMINATION COUNCIL BASIC
viewing pornographic materials EDUCATION CERllACATE EXAMINATION PRE-
VOCATIONAL STUDIES 2020 PAPER1
COMPUTER STUDIES PRACTICAL AGRICULTURE
Instruction: 1. The deliberate effort made by man to till
Answer all questions using: the soil, cultivate crops and rear animals
(i) Microsoft word for food and other purposes is termed __
(ii) Times New Roman font style· (a) agriculture (b) agronomy (c) apiculture
(iii) Font size "14" throughout your work except (d) aquaculture (e) horticulture
otherwise state. 2. The form of agriculture practised by
Use the format below to perform the underlisted Fulani herdsmen in Nigeria is referred to
task. as __ farming (a) arable (b) integrated
I

SI Examinatio Candida Amou (c) mixed (d) pastoral (e) taungya


N n Number teNam nt 3. Nigeria earns foreign exchange from
1 218343213A es Paid agriculture through the __ (a) construction
.2 A {N of silos for storage (b) employment- of youths (c)
.3 importation of farm machines (d) production of
.4 cash crops (e) sales of produce to other
.5 countries
.6 4. Which of the following crops has
. leaves with net venation?_--_· _ (a)
Application: Coconut
(i) Reproduce the table above (b) Cowpea (c) Maize (d) Plantain (e) _Rice
246
COMPUTER STUDIES
31. The early counting devices are __ (a) bottles, keys and stones (b) cowries, fingers and stones (c) drums,
fingers and bamboo (d) fingers, rings and ball (e) paper, sand and rocks 32. Which of the following is a rule and
regulation in computer laboratory? (a) Arrange the computer and peripherals in an orderly manner (b) Format
the computers in the laboratory (c) Hibernate the computers (d) Restart computers in the laboratory (e) Unplug the
computer when in use
33. Information and Communication Technology cannot be used to __ (a) build a traditional counting device (b)
create algorithms and flowcharts (c) format a system (d) process information (e) read a compact disll
0
34. The widely used word processor is __ (a)
AmiPro (b) Goggle Docs (c) LibreOffice Writer (d)
Ms Word (e) Word Perteet
35. The organization that regulates the
computing professions in Nigeria is __ (a)
Computer Professionals Registration Council of
Nigeria (CPRN) (b) Information Technology
Association of Nigeria (ITAN) (c) Institute of
Management Information System (IMJS) (d)
Nigeria Computer Society (NCS)
(e) Nigeria Internet Group (NIG).
36. ICT can be used to develop the society
through (a) breaking internet security protocols
(b) creating more advanced viruses (c) the creation
of models to increase efficiency in workers (d) the
elimination of competitive markets (e) the reduction
of literacy rate
37. The application package that is formula
oriented is __ (a) CorelDraw (b) Ms Excel (c) Ms
Power Point (d) Ms Word (e) Instant Artist 38. In a
spreadsheet, the selected cell where data is
to be entered is __ (a) active (b) dormant (c)
highlighted (d) quick access (e) task
39. Letters and memos are suitably typed
using __ (a) CorelDraw (b) Ms Access
(c) Ms PowerPoint {d) Ms Word (e) Paint
40. The graphical illustration below is a_

-------------------------------,-----------------------Nuti1mwick
2 4 6 8 (b) concentrated, directed and memorized (c) conditional,
50
instructional and intentional (d) distributed, relational and centralised
40
(e) ring, process and light
30
45. The following are types of Wireless Communication except
20
(a) bluetooth (b) fibre optic (c) infrared (d) radio frequency (e) satellite
10
46. Which of the following is a disadvantage of disk operating
(a) bar graph (b) histogram (c) line graph (d) system? (a) Commands are simple to remember and use (b) It has a
pictogram (e) pie chart very stable operating system (c) It has character-based interface (d) It is
41. The process of collecting and translating the underlying operating system of all windows products (e) it takes less
raw facts into meaningful information is __ space on the hard drive
(a) computerization (b) conversion (c) data 47. Graphics package is an application program that is used __
processing (d) data storage (e) technology (a) for arithmetical/ logical operations (b) for planning and productiofi
42. A vast network that connects computers of payrolls (c) to create and manipulate images (d) to create slide
all over the world is __ (a) ethernet (b) extranet
presentations (e) to type letters and create memos.
(c) internet (d) intranet (e) spectranet 43. Which
48. In BASIC programming, REM is __ (a) a non-executable
of the following is not an internet browser?
statement (b) an executable statement (c) used to assign value to a
(a) Mozilla Firefox (b) Google Chrome (c)
variable (d) used to instruct computer to run a program (e) used to
Messenger (d) Netscape (e) Safari 44. Types of
instruct computer to stop running a program
database are __
49. A benefit of ICT is __ (a) cyber bullying (b) cybercrime (c)
(a) concentrated, conditional and distributed
plagiarism (d) pornography (e) social networking
50. Which of the following led to poor technology in old
economy? (a) A level playing field (b) Better opportunities (c)
Globalisation (d) New markets (e) Time wastage 51. In Microsoft
Paint toolbar, which of the following is not an option in
10 "Resize" drop down window? (a) Crop (b) Horizontal
(c) Percentage (d) Pixels (e) Vertical
52. The use of Ctrl + V on a computer keyboard will_a
document (a) copy (b) cut (c) paste (d) print (e) save
53. Information received through sound only is __ (a) Audio
(b) Audio-visual
(c) Network (d) Print (e) Visual
54. Which of the following is a disadvantage of satellite
communication? (a) Difficult to maintain (b) High bandwidth
( p r a ( Versatility
c S er re bil d (e) Wireless and mobile
) u io li ity ) 321
1

N11tionwilk
55. A function of an operating system that
first row and fill in scores for first, second, and
allows users to interact with a computer is
third terms. (Note: Use the numbers between
__ (a) file management (b) user interface (c)
0 and 100 to fill the scores).
system profiler (d) resources management (e)
(b) Type additional records for the remaining
task management
five (5) students showing their surname, first
56. How many bits make a byte? (a) 2 (b) 4
name and scores for each term.
(c) 6 (d) 8 (e) 10
(c) What is the total score of students in the
57. An example of anti-virus program is __
first term?
(a) Alabama (b) Christmas
(d) What is the total score of students in the
(c) Dr. Solomon (d) Logic bomb (e) Sleeper 58.
third term?
Which of the following signs indicates that
(e) What is the formula for calculating the sum
a computer system has not been infected
of scores for the second term?
by virus? (a) Disks and disk drives are
(f) Create a new column titled "Average
accessible (b) Ii restarts on its own and fails to
Scores" after "Third Term" and calculate the
run normally (c) it runs slowly (d) it switches
average score for each students.
itself off and restarts every few minutes
(g) Type your name and registration number at
(e) unusual error message pops out
the bottom left corner of your work.
59. Which of the following is not a feature of
(h) Print out the hard copy of your work,
graphics packages? (a) Colour palette (b)
showing the gridlines of rows and columns
Menu bar (c) Printable area (d) Slide views (e)
Tool bar
NATIONAL EXAMINATIONS COUNCIL BASIC
60. A disadvantage of ICT is __ (a) cyber
EDUCATION CERTIFICATE EXAMINATION PRE-
bullying (b) e-commerce (c) information
VOCATIONAL STUDIES 2021
resources (d) online-shopping (e) software
AGRICULTURAL SCIENCE
production .
PAPER 1
1. The earliest form of agriculture stated
PAPER Ill
with (a) extension service (b) fish farming
COMPUTER STUDIES PRACTICAL
(c) gathering of fruits (d) marketing of produce
INSTRUCTIONS:
(i) Use computer system to answer the (e) rearing of animals
question. (ii) Use Microsoft Excel to create the 2. Agriculture is important to the farmer and
table below. (iii) No contents of the candidates' his family because it provides them mainly
with (a) food (b) medicinal herbs (c) raw
work should be the same.
materials (d) shelter (e) social amenities 3. The
(iv) You are required to print out the hard
growing of ornamental plants, fruits and
copy(ies) of your answers.
vegetables is called __ (a) apiculture (b)
1. The table below represents the annual score
floriculture (c) heliculture (d) horticulture (e)
sheet of students in a school.
olericulture
Use the diagram below to answer question
Name of student

Third
I
I
Scores
S/No. I Surname I First Name I First Second I 4 and5

Term Term
Term
2
3
4
5
6

APPLICATION:
(a) Type your surname and first name in the 322
BASIC SCIENCE AND TECHNOLOGY 2017 PAPER2
BASIC TECHN. COMPUTER
1. A 11. E 21. D 31. E 41. C 51. D
2. C 12. B 22. 8 32. D 42.A 52. C ·
3. D 13. C 23.A 33.A 43. C 53. A.
4. C 14. C 24. D 34. C 44. C 54. C
5. C 15. A 25. A 35. E 45. E 55. B
6. B 16. B 26. C 36. 8 46. A 56. 8
7. B 17. C 27. E 37. 8 47. E 57. D 58.A
8. A 18. A 28. A 38. D 48.A 59. D
9. C 19. C 29.A 10. E 20. B 30. D 39. D 49. D 60. D
40. C 50.A
BASIC TECHN. BASIC SCIENCE AND TECHNOLOGY
COMPUTER2018 PAPER2
1. C 11. C 21. D 31.D 41.8 51. B
2. D 12. B 22. D 32. 8 42. D 52. C
3. A 13. C 23. C 33. B 43 .. A 53. B
4. C 14. E 24. C 34. B 44. B 54. B
5. A 15. C 25. C 35. D 45. C 55. D
6. E 16.A 26. C 36. A '46. D 56. C ·57_ D
7. B 17. D 27. D 37. E 47.A 58.A 59.A 60. A
8. D 18. A 28. E 38. D 48. E
9. D 19. E 29. D 10. D 20. D 30. D 39. D 49.A
40. D 50. C

7
BASIC SCIENCE AND TECHNOLOGY 2019 PAPER 2
BASIC TECH. COMPUTER
1. B 11. D 21. B 31.B 41.D 51.A
2. A 12. E 22. D 32.A 42. E 52. C
3. E 13. E 23. E 33. D 43. D 34.C 44. E 53. E · 54.A 55. B 56.A
4. 8 14: D 24. D 35. B 45. A 57. D
5. E 15. E 25. B 36. E 46. B 58. C 59.A 60. B
6. B 16. A 26. C 37. E 47. D
7. C 17. A 27. C 38. D 48.A
8. E 18. C 28. C 39. E 49. C
9. E 19. B 29. A 10. E 20. C 30. C 40. D 50. E
BASIC SCIENCE AND TECHNOLOGY 2020
PAPER2
BASIC TECH. COMPUTER
1. D 11. D 21. B 31. E 41. E 51. A
2. C 12.A 22.B 32.B 42.C 52.E
3. C 13. A 23.A 33.B 43.C 53.A
4. B 14. C 24. C 34.B 44.A 54. D
5. E 15. B 25.0 35.C 45.C 55. B
6. B 16. B 26. D 36.C 46. C 56. C
7. C 17. C 27.B 37.C 47. B 57. D
8. B 18.A 28. D 38. D 48.B 58. E
9. E 19. A 29.E 39.B 49. D 59. E
10. D 20. C 30. A 40.B 50.A 60. D
COMPUTER STUDIES PRACTICAL ANSWER

SIN EXAMINATION CANDIDATE AMOUNT


NUMBERS NAMES PAID(N)
I. 218343212AA lbikunle Oluwanifemi 2004
2. 218343213BC lbikunle Jolaoluwa 2006

3. 218343213DE lbikunle Adefunke 1999


4. 218343213CO lbikunle Oluwadarasir i 2010

5. 218343213FE lbikunle Adesomo 1998

6. 218343213CE lbikunle Adeyemisi 1994

AKOLADE SALAM AJIBODE 218300429CG


--------------------,---------------Natiumvid<
Saving = 25 x 360 COMPUTER STUDIES PRACTICAL ANSWER
100. = 90° Name of Student Scores
S/No. Surname First First Secon Third Average
Name Term dTerm Term Score
General maintenance = 20 x 360 1. PRE-VOCATIONAL 95 STUDIES
95 95 2021 95
AKANDE ABIOLA
100 72° PAPER 1
2. POPOOlA AJIBOLA 100 90 80 90
AGRICULTURAL
90
SCIENCE
80 90 86.5
3. ONIFADE REBECCA
Others = 1 O x 360 1.C
4. 11.E 21. B 31.80
C
ADEAGA SEMILORE BO41. B90 51.B
83.3
100 = 36° 5. 12.A
2.A AYANFE AZEEZ
22.A 32.70
C 9042. 100
D 52.86.7
B
6. D 13.
3. OLAITAN
E RUTH
23. B 33.80C 10043. C70 53.83.3
C
BASIC SCIENCE AND TECHNOLOGY 2021 4. E 14. C 24.E
TOTAL
515
34.B SUM 1525
44. B 54. B
E3:E8
PAPER! 5. A 15. A 25.C 35. 8 45.A 55.A
6. C 16. A 26. D 36. D 46. E 56. D
BASIC SCIENCE P.H.E 7. C 17. B 27. B 37. D 47. D 57. C
1. E 11. C 21. B 31. C 41.A 51. C 8. B 18. E 28.C 38. C 48. D 58.A
2. B 12. B 22. E 32.A 42. E 52. B 9. A 19. B 29. B 39. C 49.E 59.A
3. E 13. D 23.C 33. B 43.A 53. D 10. E 20. A 30.A 40.C 50.A 60. D
4. C 14. A 24. C 34.A 44. 8 54. E
5. 015.A 25. B 35. B 45.C 55. E PRE-VOCATIONAL STUDIES 2021
6. A 16. B 26.A 36. C 46.A 56. B PAPER2
7. D 17. E 27. E 37.C 47. B 57. B HOME ECONOMICS
8. D 18. B 28. D 38. D 48.E 58.A 1.B 11.E 21. D 31. D 41. C 51.B
9. D 19. B 29. C 39. E 49. B 59.A 2. A 12. D 22.D 32.C 42.E 52. B
10. D 20.E 30. C 40.C 50. E 60.AC 3. C 13. D 23.A 33.A 43. B. 53. B
4. D 14. A 24.B 34. B 44. D 54.A
5. C 15. E 25.A 35. D 45. B 55. B
BASIC SCIENCE AND TECHNOLOGY 2021 6. A 16.Rayon 26. A 36.C 46.E 56.A
PAPER 11 7. C 17. C 27. B 37.C 47. D 57. C
BASIC TECH. COMPUTER STUDIES 8. C 18. B 28. B 38. C 48. C 58. B
1.811.B 21. C 31. B 41. C 51. C 9. C 19. E 29.B 39.C 49. B 59. B
2. A 12. B 22.C 32.A 42.C 52.C 10. A 20. D 30. B 40. D 50. E 60. E
3. C 13. B 23. B 33.A 43.C 53.A
4. A 14. - 24. B 34. D 44. D 54.A NATIONAL VALUES EDUCATION 2021
5. D 15. D 25. E 35.A 45. B 55. B PAPER 1
6. A 16. E 26. E 36.C 46.C 56. D CIVIC EDUCATION
7. C 17. E 27. E 37. B 47.C 57. C 1.C 11.A 21.B 31. A 41. B 51. B
8. A, 18. A 28.D 38.A 48.A 58.A 2. B 12, D 22. D 3t B 42.D 52. C
9. C 19. B 29.E 39. D 49.E 59. D 3. C 13.A 23. E 33. B 43.B 53. B
10. C 20.A 30.A 40. C 50. E 60.A 4. C 14. D 24.A 34.A 44. C 54. B
,
l
,,,.,,.. ...•. .. 25. E 35.B 45. B 55.A
.•..
'•,. 5. E
6. C 16.
15. D
B 26.C 36. B 46.A 56.A
446
"""

You might also like