Data Processing SSS30001 and JSS3
Data Processing SSS30001 and JSS3
ST QUESTIONS
I. Which of the following persons invented the 1n111d1 card machine? A. Blaise Pascal 11. Gottfried Leibniz
C. .I. Prosper Eckert D. Dr. Herman I Iollerith
2. Convcrt47.toitsbinarvcqui,·alcnt. .A.100111. B. 110011. C. 10001. D. 1111011,
3. The opcradon of checking input data against specified criteria is referred to as A. data verification.
B, data validation. C. data cross check. D. data control.
4. Which of the followinu is not a source of data collection? A. Observation 8. Interview C. Questionnaire
D. Classification ~
5. Which of the following is true about digital computers? A. They consist of magnetic core memory B. They
recognize data as a continuous measurement ofia physical quantity
C. They represent numbers through a string of binary digits D. They are mainly used for scientific purposes
6. Facebook. Twitter and Wlwt.'iApp arc examples of A. social media. B. social communication.
C. networking media. D. search engines.
7. Which of the following is not an application of computers? A. Bank notes counter B. Point of sale terminal
C. Automated teller machine D. Traffic light control
8. Which of the following is a secondary storage device? A. RAM B. Bubble memory C. Floppy disk
D. EPROM
9. Information analysis procedures include the following except A. skin and scan. B. recognizing
interrelationships. C. interpret and conclude. D. identifying propaganda and bias.
I 0. The advantages of electronic data processing include the following except A. automatic processing.
B. hacking. C. fast and reliable processing. D. storage capacity.
11. Which of the following is not a transmission medium? A. Twisted pair cables B. Coaxial cables
C. Wireless D. Modem
12. Information transmission by television is classified as A. multimedia transmission. B. polymedia
transmission. C. un imcdia transmission. D. monornedia transmission.
13. Which of the following. are the basic components of a computer network? J. A minimum of two computers
JI. Printers III. Network interface card A. I and II onlv B. I and Ill onlv C. II and Ill onlv D. L II and Ill
14. Social networking does not promote A. personal publicity. B. business expansion. C. e-commerce.
D. e-payment.
15. Companies that provide internet access are referred to as A. fixed network operators. B. network service
providers. C. internet service providers. D. internet network operators.
16. While typing a MS word document. Akin inserted footer in the document in order to A enhance the overall
appearance of the document. B. make the document more readable. C. insert page numbers. ·
D. make it appear on the document when printed.
17. The spreadsheets symbol used to convert a number to a label is A. quotation mark f' "). 8. equality sign (=).
C. underscore ( _ ) D. apostrophe sign ( ' )
18. In spreadsheets. data would not be accepted into, a cell by pressing the A. Enter key. B. Arrow key.
C. Esc key. D. Tab key.
19. A field in a database table is also known as A. index. B. relation. C. attribute. D. kev,
20. The property of a systems software that enables it to execute more than one program at a time is referred to as
A. compiling. B. virtual memory. C. multitasking. D. load modules.
2 I. Which of these operations would not close MS word application? A. Pressing the Alt+ f 4 keys
B. Clicking the X button on the title bar C. Choosing exit from the file menu drop down box
D. Selecting: close from the f e menu drop down dialogue box
22. The feature in a database application that acts as an interface between the user and the database is called a A. query 8.
report C. form D. table
23. Planning and creatinu websites are staees in A. web analvsis, B. web maintenance. C. web design.
D. web~publishing. ~ - · '·
24. The type of data entered into a table in database follow a set of rules known as A. protocols.
B. regulators. C. algorithms. D. constraints.
25. Which of the following drawing. tools would create special effects on texts? A. Smart All B. Shape tool
C. Text box D. Word Art
26. The study of the effect of interaction between the computer and human users is referred to as computer
A. ergonomy, 8. economy. C. ergophobia. D. biomechanics.
27. In MS Power Point, the action of holding down the left mouse key and moving the mouse around the slide would
A. highlight an item. B. drau an-item. C. select an item. D. move an item.
28. A file kept in case of an accident or natural disaster is called A. master. B. transition. C. back-up.
D. reference.
29. Which of the following is not a preventive maintenance measure? A. Regular update of the operating. system
13. Proper shut down of the system C. Use of uninterrupted power supply D. Data recovery
30. Which of the following is not a safety equipment in a computer laboratory? A. Surge protector · B. Metal
detector C. Smoke detector D. Fire extinguisher
2
I
31. Which of the following is not a computer professional'?
A. Network Administrator B. Web Master C. System Analyst 0. File Manager
:~~- The following are de~trn~ti\'~ softwares except_ A_. ~r!,.·~,rs1. ~- 'r~J:ms.
C. trojan horses. D. logic bomb.
~'->. The t~·pc offile orga111zat1on ma ~)VD~RO~. 'f, . • · .. '; ,: ~: :· .. '; ; ·
A. direct access. B. sequential. C. serial. · D. h1ernrch1cal..
:n. Which of these measures would not secure data in a database? A. Encryption 13. Data integration
C. Personal Identification Number D. Usemanie and passwords
TABLE I
~Tl'UF.:"il" ll>
STllDE:"iT:-.;AI\IE
, STt'l)F.~T.-\DDKESS
- TABLE II
STl DE!l-1" Ill
1
couRs•: m
COllRSI-: S..\!\H:
contst: ,~sTRl1CTIO~
The diagram above illustrates the relationsh~p ~ two tables in-a database, Use
ii to answer questions 35 and 36.
35. The student ID in Table 11 is referred to as A. primary key. B. foreign key. C. normal key. D. composite key.
36. What type of relationship exists between Tables land 11? · A. One to one 8. Three to four
C. Four to three D. One to manv
37. A program developed to protect the computer from malicious software is referred to as A. trojan. B. driver.
C. antivirus. D. spyware.
38. One of the advantages of a parallel database is A. data sharing. B. data security. C. faster processing of
data. D. uniform memory access.
38. ln a relational da1ahase 11w11ageme11I system. tiles are organized as relations and A. tuple. B. modules.
C. tables. D. forms.
40. The exchange of information over a network follow a set of rules called A. transmission rules.
B. transfer rules, C. channels. D. protocols
3
WASSCE JUNE 2015 DATA PROCESSING PAPER 2 THEORY ANSWERS
I. (a) (i) An operating system is that software that controls or 111a11ag~s both software and hardware resorc« , , computer. OR It is
a system software that manages the computer hardware and software resources a, .. _: provides common services for
compute. programs. All computer programs excluding firmware require ;i• operating system to function.
(ii) Functions ofan operating system: (l) It enhances data management, (II) lt ensures system sect: :~ . (Ill) It
allocates system resources (IV) It manages the computer resources such as the central process -~ unit, memory, disk
and printing (V) Executes and provides services for application software
(VI) It establishes user interface
(iii) Differences between un operating system and an application software
- ---
Operating system Application software
I. It is used by the computer to manage software and lt is used by the end users to achieve one or more tasks,
hardware resources. e.g word processin¥, and spreadsheet (Microsof] word)
2. It is basic to the computer hence it comes first, i.e It comes second and third its installation will be as the
it works on its own without human intervention. need arises.
3. rt is installed by the computer manufacturer. It is installed by the computer user.
4. It loads all the programs in the computer. It is being loaded by the user.
5. It allocates space memory and ensures that the It requires human intervention before it can function. ·-
various parts arc working very well.
(b) Processes/Steps involved in passwording a document in a word processing package.
(i) Click Save As. (ii) Click Options. (iii) Type your password (iv) Retype the password, (this enables you •. to ensure the
authenticity of your password) (v) Click OK.
2. (a) Define database: (i) Database is a collection of information that is organised so that it can be easily accessed, managed and
updated. ( ii) Data management system simply refers to the collection of program that assist the user to input, organise,
select, manipulate, store and extract data in ;:i database. OR lt is a computer program /software application that interacts with
the user, other applications and the database itself to capture and analvse data.
(b) Functions of Database: (i) Data definition: Database management system helps to modify the structure of the existing data,
removes data structure from database as well as defining new data structure for a database. (ii) Update: Database
managament system helps in inserting, modifying and deleting data.
(iii) Retrieval: It helps to obtain information for end-user queries and reports by applications.
(iv) Data administration: Database management system helps in registering and monitoring users, maintaining data,
security, recovering information if the system fails, dealing with concuring control as we II as enforcing data security
monitoring performance.
Database also performs the following functions: (i) Organise your file to give you more control over your
data. (ii) Creates data that assist the user (iii) Enables the user to edit his/her data (iv) Update data
(v) Retrieve data.
(c) Precautionary measures to prevent data loss: (i) By creating back-up files (ii) Updating anti-virus often. (iii)
Checking those who may have access to the system, through the use of password and access code.
(iv) Ensuring that access to the computers are folly monitored.
3. (a) (i) Define application package: Application package can be defined as a bundle of two or more computer programmes which
are together and addresses a specific business.
(ii) One use each, of the four application packages: (I) Database management: This is used for creating database. (II)
Corel Draw: This is used for creating invitation cards. calendars. complimentary cards, etc.
(Ill) Word processing as an application is used for creating document. (IV) Spreadsheet: This is used for preparing
examination results, budget management and control.
(b) Benefits of a presentation package: (i) Presentation packages are used as visual aid in lectures. (ii) Presentation packages are
used for advertisement purposes.
(c) Guideline for creating a good MS power point presentation (i) Open the power point (ii) Select the viewer tab (iii) Find
the presentation view section (iv) Click on the slide master icon.
4. (a) (i) Define: (I) Data Security: Data Security refers lo the collective measures used to protect and secure a database
management software from illegitimate use and malicious threats and attacks. These involve series of processes, methodologies
and tools. OR It is a protective digital piracj measures that are applied to prevent unauthorised access to coior-uters. database
and websites. Data security also protects data from corruption. (ii) Data risk assessment is identification of hazards that
could negatively impact an organisation's ability
4
t,--, :.~1..-~nd~1c1 husn~~:-;.~. , 11-~:)1..: ._~.),~,...:~s111l;·uL:, 11t;1p n.1,,,_,11.11.,,. •.• ,..,._,_ ·····-· ~
pn.:,cc:s:!S and cv,Hi-cls ln n::L,cc the impact of these risks to business operations. •
( h) (i) Access control :s a securuy technique that can be used to regulate who or what can view or use resources in a computing
cn\'ironment. OR Access control is a database security/features that control hO\V users .md svstcms communicate and interact
with other svstems and resources. Access is the flow of infomra.ion betwccr a'n object mid a subject. e.g program. database file,
computer etc. while the programmer, users are examples
of the subject.
(ii) Access control methods in database security: (I) Corrective access control (II) Preventive access
control (Ill) Detective access control method
(c) Role of Administration in Database: (i) Setting data privacy: This only permits authorised persons to
access and sec certain data. (ii) Controlling access to database: It is also creates log-ins for users and setting roles
for each user. (iii) Giving support to end users: This ensures that alt users know· how to use the database. (iv)
Controlling data security: This includes preventing unauthorised access to the data and protecting against other
security threats. Others include: (i) Establishing the needs of users and monitoring user access and security. (ii)
Monitoring performance and managing parameters to provide fast responses to front-end users. (iii) Mapping out the
conceptual design for a planned database. (iv) Considering both backend organisation of a data and front-end
accessibility for end-users. (v) Refining the logical design so that it can be translated into specific data model. (vi)
Further refining the pjysical design to meet system storage requirements (vii) Installing and testing new versions of
the DBMS. (viii) Maintaining data standards including adherence to the Data protection Act. l ix) Writing databse
documentation including data standards procedures and de fin ,t ions for the data. (x) Controlling access permissions
and priviledges. (xi) Developing, managing and testing back-up and recovering plans. (xii) Ensuring that storage and
archiving procedures are functioning ..:oncctly. (xiii) Capacity planning. (:,,.i\') Working closely with IT Project
managers database programmers. (xv) Communicating regularly with technical. application and operational staff to
ensure database intergriy and security. (xvi) Commissioning: mid install ing new applications and customising
existing applications in order to
make them fit for purpose.
.j
- Click on sign-in - Click on compose mail button - Click attach - Click on browse to locate the file (prices of hooks) -
Click on the file after you have found it. -Click inside the To { ) box and type mvfathcrr@vahoo.,.:om - Click inside
the title { } box and type prices of books. - In the space below. type attached here for your perusal is the prices of
hooks. - Click send.
<,. (n) Load word (i) Click on the start icon (ii) Select "Ail program", programs menu appears. (iii) Scroll to locate Microsoft
office folder (iv) Click Microsoft office folder to open it and select Microsoft office word 2007. -To select A4 paper
size and potrait orientation click file (from the menu bar)-Click page setup - Click paper size - Select A4(2 IO x
297mm) and select potrait option then Click Ok button.
(h) (i) Using enter key ( on the keyboard) to move from sentence to another (ii) Click Home Tab- Choose appropraite button
for alignment on the paragraph Group I .• Align left -Align right- center or justify (iii) Press the cap key and then type
the sentence - Highlight the text (i.e the sentence highlight) - Click on the U icon (underline) on property bar. -Click
on the •'B" icon (Bold) (iv) Press the cap key and then type the leuerts) (v) Click table (from menu bar) {vi) Select
insert option, -Click table, increase the number of column to 3 (vii) Merging I. Block the two columns to merge
together Click on merge button on property bar. Type "Total"
Total No of Vehicles
Nos
-··
..
Nos
Total 21
(vii) Click ti le (from menu bar) - Click print option - In the open(print dialogue box) - Select the printer of
your choice -Type the number of page(s) to print • Type the number of copies to print -Then click print button.
To save - Click file (from menu bar) - Click Save As - Type "vehicular traffic" - In the Save Column on the
dialogue box Then click save button.
6
WASSCE JUNE 2016 DATA PROCESSING 1 OUJf.CTIVE Tf.ST QUESTIONS
1. Who developed the first digital electrical computer'? /\. Blaise Pascal U . Joseph Jacquard C. Mauchly and Eckert D. Von
Leibniz
Which generation of computers made use of integrated circuits? A. Fourth B. Third C. Second D. First
Which of the fol\l)\\·ing is an alphabetic data? A. Beel 13. Ax4~jj C. AB+CD D. %
The type of data which consists of text. number. audio. video. graphic and animation is called /\. data set.
B. multimedia data. C. multi-purpose data. D. multi-rnriablc data. Which of the following factors is not
considered when classifying computers? A. Location
5
. B. Size C. Type D. Purpose B. Credit card
6 Which of the following is not used for on line shopping? /\.Mastercard
. C. Verve card D. Sim card B. e-
7 Which of the following. is a negative impact of lCT in education? A. Plagiarism library
. C. Distance learning D. Computer•bnscd Test
8 Which ul the following are parts of a computer processor? A. CPU and main memory
. 8. Control unit and ALU C. Operating system and applications D. Main memory and storage Data gathering
9 involves the following means except A. counting. process. B. voting process.
. C. measuring process. D. calculating process.
I 0. Two computers, X and Y are such that the processor in X has a word size of 32 bits while that of Y is
16 bits. Which of the fol\owing statements is true? A. X can process half as much data as Y at the same time. 8. X can
phKL':-S the same amount of data as Y at the same time. C. X can process two times as much data as Y at the same time. D. X
can process four times as much data as Y at the same time.
11. The television set displays information as A. antenna signals. R visual signals.
C. audio siunals. D. audio•visual signals.
I:!. Which of the followimr is not an ancient n;edium fortransinittim:~ information? A. Fire liehtiuu
B. Beating of drums - C. Telephone D. Whistling - ~ -
13. A server is a computer that provides services to other computers called A. clients. 8. peers. C. routers.
D. switches. •
14. The rules for exchanging data on a network arc known as A. rransmission rules. B. transfer rules.
C. protocols. D. configurations.
15. A Search Engine is a A. program that searches engin~s. B. computer engine that searches a database.
C. hardware component of a computer. D. tool that searches the web.
16. The feature in a browser which enables users to open the latest copy of a web page is A. Refresh.
B. Forward. C. Backward. D. Redirect.
17. An operating system will perform the following functions except A. files and folders management.
B. storage locations management. C. user profile creation. D. protection from surge.
18. A Microsoft Office application suite includes all the following except A. Word. B. Access.
C. CorelDraw. D. PowerPoint.
19. Which of the following is not a feature on the drawing tool bar? A. Oval shape B. Line
C. Drop Cap D. Arc
The MS Excel worksheet below shows the salary distribution for four staff of a company. The net salary is paid
after deductions have been made. Use it to answer questions 20 and 21.
-.
sAstc sitARv ,~) rorAL ALLOWANci-1::.11-iornL osoucnos 1~i NET sALARY r~i
···- r
IOENTIFl(AT10N NUMBER '
~P/P/1202 22000 -
29000
I
7000 ~000
I
20. Which
6 of the following cells contain numeric data? A. A 1 B. A2 C. C3 D. El
21. Which oft he following formulas would be used to obtain the value in cell E2?
A.= 82 + C2 · Ill 11. = 82 + Cl + D2 C. = (82 + C2 + D2)/3 D. Cl - D2 =
22. In Database Management System (DBMS). linking entities is used t() represent A. Attribu1cs B. Objects
C. Relationships D. Relations
23. I\ data element that uniquely identifies one record from the other in a table is the A. attribute key.
7
,,. ,., .... L.._,,.u,i..:"n, '---·· '"''111t} r,\.:)'", "-'· p11111ary KC)'·
24. In MS Powerl'oint presentation, the special effects that control the order in which objects enter a slide and their
manner of appearance is A. Transition. B. Media. C. Clip Art. D. Animation.
25. Which of these packages could be used by a Data Processing teacher to design a website for his school?
A. Front Page 13. PageMah:er C. PowerPoint D. Word Perfect
26.
In graphic packages, the process of removing an unwanted part of an image is known as A. shaping.
B. resizing. C. editing. D. cropping.
27. Routine checks operations on computers in order to ensure its continued functioning is known as computer.
A services. B. repairs. C. maintenance. D. installation.
28. The performance of the computer can be enhanced by A. using a larger monitor. B. using a faster printer.
C. installing a scanner. D. increasing the memory size.
The moral principles that regulate the use of computers, its accessories and environment are called computer
A. ethics. B. conduct. C. attitude. D. appreciation.
29.
A technician can protect himself from electrostatic discharge by using A. wrist strap. B. voltmeter.
C. screw driver. D. magnet.
30.
Which of the fol Iv\\ ing operations prevents file loss? A. File backup B. File conversion
C. File maintenance D. File sorting
3 I.
A computer professional who studies an existing system with a view to evolving a computer-based system from
it is A. system analyst. B. system administrator. C. computer programmer. D. computer engineer.
·'-·
"'')
Computer virus cannot be transmincd by A. downloading files. B. e-mail attachment.
C. pen drives. D. typing on keyboard.
,.,..,
.).). A program designed to detect and prevent malicious programs from a computer system is A. spyware.
B. passcode. C. malware. D. firewall.
34. In reiational model a tuple is a A. column of a table. B. key of a table. C. row of a table.
D. two-dimensional table.
35. Relationships between tables in a relational model are created by A. foreign keys. B. determinants.
C. composite keys. D. candidate keys.
36 Computers store data as A. folders. B. files. C. documents. D. directories.
. The records of students in a school are kept in order of their arrival. What file access method would be used to
access a studenrs record if the latest record would first be retrieved? A. Direct B. Indexed
"'7 .
J .• C. Batch D. Sequential
38.
The prevention of data from corruption and unauthorized access is a function of data A. security.
B. secrecy. C. integrity. D. coding.
Which of the following defines a heterogeneous distributed database?
39.
A. Same DBMS is used at each location but data are not distributed across all nodes 8. Same
DBMS is used at each location with data distributed across all nodes
40.
C. Different DBMS is used at each location and data are not distributed across all nodes
D. Different DBMS is used at each location and data are distributed across all nodes
WASSCE JUNE 2016 DATA PROCESSING 1 OBJECTIVE TEST ANSWERS
l.A 2.C 3.C -LC 5.A 6.D 7.A 8.B 9.C 10.D 11.D 12.C 13.A 14.C
15.D 16.B 17 D 18.D 19.C 20.B 21.A 22.C 23.D 24.D 25.A 26.D 27.C 28.D
29.A 30.A 31.A 32.A 33.D 34.A 35.A 36.A 37.C 38.B 39.A 40.A
8 . 1•. , •. • ., '·.
3.(a) (i) With.the aid of a simple diagram, explain inforinotion transmission. (ii) Give one example of information
transmission.
(b) Give one example of each of the following:
(i) single user, single tasking operating system; (ii) single user, multitasking operating system; .
(iii) multi user operating system.
( c) List four features of a Graphical User Interface.
' '
4. (a) Mention four qualities of a good computer professional. (b) List four computer professional bodies ip Nigeria.
( c) Write the full meaning of the following: (i) Wifi (ii) GUI · ·
SECTION B
5.(a) Use the "information in the spreadsheet below to answer questions 5(a) i - v
- -------. - .-
• I
... .
·•------------•- ---------- ----·-·- --------•··•·--·---•··
nn•••-•••..,_-,,~•••••Ou"
--·•··-··•·--·---•·--•--•"'"
·-•-•·-···•·-- ··•-----·
•··• •········••·
A B C D E F ; _;:::::•:~•~qi,,l.W JJ
- .... ... G
1 S_N NAME AGE MATHEMJ!>.TICS ENGLISH BIOLOGY PHYSICS TOTAL !AVERAGE
2 1 JOHN 16 72 68 81 '/0
3 2 MARY 18 80 70 58 76
4 3 · PAUL . 19 69 75 83 86
5
6 •5
4
PETER
JOY 17
15
.•. 71
69
82
74
90
BO
78
85
·.·17\.
7 6 JAMES 16 73 81 81 --
83 :~ ',!
8 ·7 VERA 17 89 86 83 86
9 8 FAVOUR 17 56 59 85 58 .
10 9 CLETUS 18 54 60 73 57 ,
11 10 ETTA 17 60 68 70 59 , =1 ·····-·- ... --- .. •-----
1 ') .
,
;" ., ,)
(i) Write the formula to calculate the total score in Mathematics. . ., . , ·,,: ; .. : ;
(ii) Write two spreadsheet formulas to calculate Paul's average score in the four subjects. .· :·. , : · .. (iii)
What spreadsheet function 'can be used to determine the highest score in English?
(iv) Outline the procedure for calculating Vera's total score in all the subjects and give the result in cell HS. (v) If the
minimum pass mark is an average score of 60, write a formula tode~rnrine·ff,Etta passed or failed.
(b) Use the ~liagrmi1 below lo a11s111er questions 5(b) i - vii ·
~-~~ • '"'7· e,, --:• T,,, . .,!,,7,"·---":7,'.:,:.::~;;:•,.·::--,,.,. :,:::.~- r-.. '".,,. ;.;.;,:::~~.,;.. .. ,_,!f;._ ·····--•·-····•··-•-·• ·•-. ·' ••·-."!'~··· -~--~
~.Jr
•. ,• ;.; ;;,
.• t.
•
.,.,. ...
:...,-.-.,
:. ,;
J
...... : : .. ________,.: •... , . .:.. ~i i:~
·:-- - --- --~ -~ ~-- ;...:·~:·_::':-:-r-:~-~:·r ~·~~. : ...
•..... ..
..,~:~:::~~J-;:•,...-:-~~--
ti/.;!;~':'];:.!;\::
_.;,. . i.
.. _.
:;;
Click to add
title
--- ½~ ' - ••
;.,,.,
.... ~~J~ff;;,,~;~'
(i) What is the name of the application shown in the diagram? (ii)
State one use of the application mentioned in 5 (b) (i)
(iii) Outline the procedure to launch the application from its short cut on the desktop.
I
TJ~]~~:~L~
9
-,,----I
(iv) After launching the application, what is the name of the slide that appears by default? (v) Identify
the part labelled I.
(vi) Write the keyboard shortcut that would also perform the function of the part labelled I. (vii) Mention
three functions that can be performed by the insert button.
6.(a) Folders are used for storing tiles in the computer. List the steps for carrying out the following operations: (i) creating a folder
on the desktop; (ii) giving name to the folder; (iii) sending a file from "My Documents" folder into the folder created in 6 (a) (i);
(iv) Changing the name of the folder in 6 (a) (ii) to "RESULTS". (b) The table below shows selected fields and DataTypes in MS
Access.
Use it to ansi1:er questions 6 (b) (i) and 6 (b) (ii)
.
Mat. No. Text
Date of Birth *
Fees *
Address Memo
(i) What is the appropriate data type for: I. Date of Birth Field; JI. Fees Field?
(ii) If MS Access is running, describe the procedure to: L create a table with the fields as given above using design view; IL set
the Mat. No Field as the primary key; m. set the Full Name Field to a maxirnurnof 50 characters
l.(a) Data handling is theprocess/way ofensuring that data is obtained, stored, archived or disposed in a manner tl,M retains its
integrity/in a secured manner. OR Data handling is basically the process/way of imputing and storing uata in a computer. The
Data is then processed into information.
(b) There are two ways of handling data which are:
(i) Electronic method: This is the use of electronic systems such as Computers, storage media I ike video tape, CD,.DVD.
Memory Cards and other electronic devices to obtain, store, archive, share or dispose data. (ii) Non-electronic/ Manual
method: This involves the use of paper files, journals. laboratory notebooks. human effects and other non-c lectron ic means
to store or share data.
(c) Facto rs to be consiucr. d when handling data cir-ct ronically:
Data Integrity, Regu 'ar update of data, Validation of data. Security of data/Encryption, Type of Data, Type of qorage to be used.
Dara \, :nme/Sizc. Access Control. Regular Anti-Virus Update, Limit Physical access to storage media, Regular
Backups-,F11<;ure Data Reco,erability. Login/Password. Record Date and Time, Power
':it,pply. :.
10
-
(b) Steps involved in Information processing:
Collation oflnformation. Organization of information. Analysis oflnformation, Interpretation oflnformation. (c)
Advantages of using Computer for Information processing:
Efficiency, Automation, Reliability, Volume/Storage, I Iigh speed, Accuracy, Security, Sharing of Information/ Sharing
of Resources, Economical, Lower overall cost, Versatility, Service Improvement, Easy retrieva I. .
(d) Disadvantages of using Computers-for Information processing:
High initial investment cost, Loss of jobs due to Computerization, Requires specialized personnel, Extra cost of retraining
of staff, Virus/Hackers sescepribility, Face-to-Face Interaction among stall may be reduced, Prone to unauthorized access,.
Overwriting/Loss of Data, Power dependent, System failure/system malfunctioning.
3.(a) (i) SENDER RECEIVER
MESSAGE
.,
SOURCE CHANNEL/MEDIUM . '.- '.-DE~T,H)'ATION
Information trans1nission is the process of sending Information from one point to another through a channel. (ii)
Example: Printing of document; classroom instruction, r~eiving radio signals; DSTV signals, Telegraph, GSM,
Photography, Facsimile, Town Crying, Smoke Message, Use of Birds, Story Telling, Signs/Signals, Internet, Sate I lite
signals, Blowing Horns, Drum Beating, Fire lighting, etc.
(b) (i) pos, OS 2, PC-DOS, Palm-Os. (ii) MS Windows, Mac-OS, Linux.
(iii) Xenix, Zeuix, Unix, Linux, Mac OS, VMS, Mainframe OS.
( c) Features of a Graphical User Interface (GUI) are: Windows, Icons, Menus, Pointing device (mouse).
-
••.
j
= AVERAGE (D4. E4.F4.G4) OR =
SUM (D4:G4)/4 OR
= SUM(D4 .l:4.F4 .G4)/4 ·
(iii) Max Function OR = MAX(E~:EI I)
(i\') Click on cell lf8. Type --=SUM(DS:G8)"", Press "Enter" OR Click on 08, Hold down the Mouse and stop at H8/Highlight 08 to
HS. Click on Summation icon on the Menu Bar OR Click on HS, Type "=SUM (D8. E8.F8.G8). Press "•Enter .. · OR
Click on HS, Type =SUM (D8:G8), Press "Enter"
(v) = IF(l 11> 59. "PASSED". "FAILED") OR = IF(I} l>= 60, "PASSED", "FAILED")
(b) (i) MS PowerPoint ·
(ii) Presentation
(iii) Double-click on the icon OR Right-click on the icon, Select open (iv) Title Slide
(v) Slide Show View Icon/Slide Show Icon! Slide Show (, i) F5
(, iillnsert Shapes, Insert Textbox , Insert Word Art. Insert Comment, Insert Video, Insert Symbols, Sound Table. Clipart, Equation.
New Slide. Pictures, Header/Footer, Date & Time, Text Box. Smileys, etc.
Right-click on the folder icon and select "Rename", Type-in the new name "RESULl'S". OR.Select the folder, Click on
the Default Name/New Folder, Type "RESULTS" as the New Name, Press Enter.
(b) ( i) {I) Date of Bi11h---Dateffime. · -- --- ··
U 1) F.:!e<;-------------Currcncy.
(ii) (I) create a blank database and give it a name, click on the "create" tab on the menu bar and select "table design/design
view". Type the field names and set the data types as required. Save the file.
(II) select the Mat.No field. Right-click on the field and select primary key OR
Sc lcct the Mat.No fie Id. c I ick on the primary key icon on the menu bar
( !II) click on the Full Name field. set the field size to 50,
(iii) Click on the Full name field. Go to the Field Properties. Change the.Field Size from 255 to 50.
12
WASSCE JUNE 2017 DATA PROCESSING 1 OBJECTIVE TEST
---
QUESTIONS One characteristic featlire of the second generation· computers is the presence
I.
of A. vacuum tubes. B. transistors. C. micro-chips. D. integrated circuit.
2. Convert 4 to a number in base two. A. IO B. 11
10 C. I 00 D. 110
\ 3. Da!a processed into its useful form is referred to as A. unique data. B. raw data. C. knowledge.
D. information, · -
Li. Which of the following is an example of qualitative data? A. Colour B. Height C. Length· D. Shoe size
5. Which of the following is not a characteristic of a personal computer? A. Automation B. Complex
C. Digital D. High speed
6. The gap between ownership, access and benefits from computer and its application is
termed digital A. separation. B. divide. C. deprivation. D. annihilation.
7. Magnetic Ink Character Recognition (MICR) are used to read codes on A. postal orders. B. Multiple
8. Choice Examination answer sheets. ~ C. bank tellers. D. bank cheques.
The device that sends information to the CPU is the A. bus. B. input device. C. output device. D.
9. processor. Which of the following is not a procedure for information process mg? A. Segregation B.
Organization
10.
C. Interpretation D.~Collation
11 The assembling of data according to a predetermined order is known as A. collation. B.
. interpretation. C. organization. D. summarization. .
12. Information transmission medium from location P to location Q in space is caJled /(. wireless
transmission. B. wired transmission. C. cabled transmission. D .. asynchronous transmission.
Which of the following is not a type of wireless transmission? A. Bluetooth B. Fibre optic C. Infrared
13. D.WiFi .
The basic criterion for classifying a network is A. psychological consideration. B. geographical scope.
14. C. equipment availability. D. economic reason. ~ ~
Which of the following measures are used to secure data on-line? I. Password II. Encryption
l 5. 111. Personal Identification Number (PIN) A. JI on lv B. III on Iv C. II and Ill onlv D. J, II and Ill
In e-mail context, bee stands for A. backup carbon copy. B. blank carbon copy. C.~blind carbon
16. copy.
D. bulk carbon copy. ·
An internet-based system that allows people of different geographical locations to have in-person meeting
17. is known as A. voice messaging system. B. video conferencing system. C. on-line mailing-system. .
D. fax system. ..
18. The following software r,rograms coordinate and control all other computer programs, hardware and
users'
19. actions except A. ZEJ..JTfI. B. UNIX C. DOS. D. DBMS. .
In Word processing applications, the symbols B, I and U are commonly used buttons found on the
20. A. standard toolbar. B. menu bar .. C. formatting toolbar. D. drawingtoolbar.
Bola intends to evoke the synonym of a certain word during Word processing. What is the most
21. appropriate tool to use? A. Assistant 8. Change case C. Grammar checker 'D. Thesaurus
In a worksheet, which of the following actions would select non-contiguous cells? A. Holding down t~e
22. Shift key B. Holdinz down the Crtl key C. Holding down-the Alt Key D. HoldingdownCtrl+Shrftkey
Which of these formulas will not be executed in MS Excel? A. =SUM(examscore) B.
23. =SUM(Examscore)-12 C. =SUM(exam_score)*8 Q. =SUM(exam score)/3
MS Access is.an example of a A. relational model. 8. network model. C. hierarchical model.
24. D. flat file model. • ·
When a database recovery manager is invoked after a crash, restart proceeds in the following three
, 25. phases:
I. Undo; II. Redo; Ill. Analysis. Arrange these phases in the right order. A. I, II, Ill B. II, I, III
26. C. In, 11, I D. I, III, II . •
During presentation, slide transition can be activated by A. rizht-click. B. mouse drag. C. mouse click.
27. D. double-click, ~
Planning and creating of websites is called web A. analvsis. B. design. C. maintenance. D.
28. publishing. Magazines and brochures can be produced using a A. data processing software. B.
graphics softwai ~-
C. presentation software. D. web authoring software. . · .
29. Which of the follow mg 1s one of the tools used to rnamtarn the computer? A. Blower B.
Calhper C. Cotton· wool D. Kerosine
30. Which of the following is not a good computer maintenance practice? A. Blowing the svstem unit with a
blower B. Blowing the keyboard with a blower C. Cleaning the screen with wet cloth D. Cleaning the
CD-ROM
31. drive with lens cleaher ~
Commonly accepted practices, rules or methods in computing are cal led A. Conventions. 8. Habits.
C. Laws. D. Standards. ·
..,,., Which o~ the following is a safety measure in the computer laboratory? A. Eating iJl the computer
·"'-· laboratory B. lllum111at1011111 the computer laboratory · C. Opening up the 1110111tor by
unauthorized persons
D. Poor ventilation in the computer laboratory :
Safety measures to be observed when using the computer include all of the following
except A. use of anti-gfare protector. B. sitting posture. C. maintaining a dust-free
environment.
D. dropping liquids 111 the computer room. . A computer professional who studies an existing system
with a view to evolving a computer-based systerr. from
it is called A. computer engineer. B. computer programmer. C. database administrator. .
D. systemanalyst.
13
33. Which of the following is not an anti-virus? A. Avast £3. AVG C. Compaq D. Norton •
34. Which of the following is used to retrieve specific information from database tables'? J\. Index B. Query
C. Report D. Table
35. Which of these methods would delete a relationship defined between two tables in MS Access'? A. Selecting Delete relationship
from the Edit menu dialog box B. Selecting the relationship line and pressing Delete key C. Selecting Delete from the relationship
menu D. Selecting Delete relationship from the file drop down menu
36. Which of the following is not an effect of computer virus? It A. distorts the computer screen. 13. interferes
with computer operation. C. damages the computer. D. corrupts the computer. ·
37. What file organization would require that all the five (5) records be read before the 6th record is written?
A. Direct-access file B. Index sequential file C. Random access file . D. Sequential access file
38. Which of the following is not mi advantage of file organization? A. Faster processing of data input
B. Post data retrieval C. Prevention of data failure and data loss D. Safctv of data and information in a
storage medium -
39. Maintainin~ the value and content of data is part of data A. coding. B. integrity. C. secrecy. D. security.
40. Which of these operations would not improve the performance of a parallel database system? .
A. Building indexes B. Deleting unwanted data C. Evaluating queries D. Storing data across-several sites
WASSCE JUNE 2017 DATA PROCESSING 1 OBJECTIVE TEST ANSWERS
l.B 2.C 3.D 4.A 5.B 6.B 7.D 8.B 9.A 10.C 11.A 12.B 13.B 14.D
15.D 16.B 17.A · 18.C 19.D 20.B 21.13 22.A 23.C 24.C 25.B 26.B 27.A 28.C
29.D 30.B 31.D 32.D 33.C 34.B 35.A 36.A 37.C 38.C 39.D 40.D
WASSCE JUNE 2017 DATA PROCESSING 2 THEORY QUESTIONS
SECTION A: ESSAY
I. (a) State four classes of computer based on size. (b) Define the term Information and Co1111111111icalio11 Technology (!CT). (c) I
lig.hlight three ways (JCT) has impacted 011 the society.
2.(a)(i) What is Computer Ethics'? (ii) State three computer room management ethics.
3.
(b) List fin laboratory rules and regulations. ,
Mr. Okafor has a company that specializes in the production of beverages with headquarters in Abuja. He intends to monitor the sales •
and transactions in the ccmpanys branches across Nigeria as well as interact with his customers. (a) Through what platform can Mr.
Okafor ac h ieve his i ntcnt ions? (b) What computer professional should Mr. Okafor hire to design the platform in 3(a)'7 I c) State
two software packages needed to create the platform for Mr. Okafor. (d) If Mr. Okafor decides to connect all the offices within the
headquarters in Abuja in a single network: (i) what type of network is appropriate" (ii} mention three reasons to support his
decision. ·.(e) Mention two transmission media that can be used to implement the network in 3(d)(i).
4.(-a) Define the term Software Mai111e11a11ce. (b) List four types of software maintenance.
(c) State four importance-of software maintenance. ·
SECTION B
5.(a) A teacher asked a student to capture and print out a one-slide presentation assignment using. A1S word, showing everything on the
screen. (i) What keys or combination of keys can be used to carry out this operation? • (ii) Describe the procedure to be fol lowed by
the student in carrying out th is assignment using the keyboard. (b) A system analyst was hired to set up a computer laboratory for
Bofe International School. (i) 1',1ention three hardware devices the analyst would need to set up the laboratory. (ii) List three
database application packages likely to be recommended by the analyst. (iii) State three Word processing packages likely to be
installed.
( c) Complete Table l_ on keyboard shortcuts.
6.(a) Use Fig. I lo answer questions (i) to (vi)
Table >.
l V VIIi ,
(ii) Ctr+F
•
(iii). Fl
(iv) Ctrl+F2
14:
CO:\
TINl1EI) FROM
PAGE .15
ID Name Score Grade
001 Abdul 55 C
002 Emeka 52 C'
003 Kola 49 p
I
26. Graphics can be captured using the following devices excepf A. webcam. B. scanners. t. joystick.
D. digital camera •
27. Which of the following substances is used for cleaning the mouse ball?
A. Distilled water. B. Engine oil. C. Isopropyl alcohol. D. Kerosene.
. 28. One characteristic of a dirty mouse is that the mouse A. is not recognized by the system .
. B. unmounts itself from the system. C. pointer changes appearances. D. pointer moves erratically.
2020-1
-·~ __ ......-..yu•=nn~w.:i-y u1 u:rn,g me computer 1s A. sortware piracy. B. phishing. C. pharming.
D. ethical hacking. · ·
. 30. Any activity carried out to protect the user from hazards while using the computer is called A. computer ethics. B.
computer maintenance. C. laboratory rules. D. safety measure.
3 I. In order to protect a computer on the world wide web from threats, the user should A. install the latest operating system
version. B. install a single user antivirus software. C. implement an internet security
software. D. deploy on line transaction applications. _ .
32. Responsibilities ofa database administrator include the following except performing A. database backup.
B .. data recovery. C. network maintenance. D. user authentication.
33. The following tools are used for protecting the computer against virus attack except A. Avast anti malware. B.
Kaspersky. C. Norton. D. Trojan horse.
34. Which of the following software replicates itself without being executed by the user? A. worm.
B. Trojan. C. Plug-ins, ntriver. -
35. In the model: Furniture (Tab , Chair, Wardrobe), Furniture is A. a relation. B. a schema. C. a tuple.
D. an attribute.
36. Which of the following dat base operations does not require a Data Manipulation language?
A. Modification of information. B: Insertion of new information. C. Deletion of information. D. Creation of
information.
37. The file organization method which allows records to be accessed in any sequence is A. index.
B. random. C. sequential. D. serial. ·
38. A file organization that has reference which identifies a record in relation to other records is called A. indexed file
organization. B. random file organization. C. sequential file organization. D. serial file
organization. 1 - _ . .
39. Providing access control to a school record is the responsibility of a A. database administrator.
B. programmer, C. systems administrator. D. system analyst.
40. Figure 1 depicts A. a distributed database. B. a parallel
Site t I I Site 2 ~ database. C. an extranet. D. an intranet.
2. Ciroma ChukwumaAdekunle has just opened a computer business centre within a school environment. (a) State
three computer services that may be. provided in the business centre.
(b) List three devices required in the business centre. ·
(c) Give two application software needed in the business centre.
(d) Outline two precautions that must be taken by Ciroma Chukwuma Adekunle to ensure the safety of his computers ifhe must
accept documents in movable devices from his customers.
3. (a) State the keyboard shortcut keys to: (i) rotate an object in CorelDraw; (ii) position an object in CorelDraw; (iii)
navigate to ceJI A 1 in MS Excel worksheet.
(b) Give one reason for including the plus sign(+) in the search texts in a search engine.
(c) With the aid of diagrams, differentiate between LAN and WAN. .,
4. A school decides to harmonize the operations of its two campuses using a distributed database system as ·w~II as install
air conditioners and uninterruptible power supply in the computer laboratory.
(a) State three: (i) importance of using the distributed database system; ·
(ii) disadvantages of using computers to J?fO~ess information i !! the school, . .
(b) Give two reasons for installing the: (1) air conditioners; (11) Uninterruptible power supply devices.
2020-2
/
,
WASSCE JUNE 2020 DATA PROCESSING 2 - SECTION A - SHORT STRUCTURED ANSWERS (a)A
function is a predefined formula that performs calculations using specific values in a particular order. (b)-Autosum - Insert
- Look up and Reference - Database - Date and Time - Logical
- Maths & Trigonometry- Financial - Statistical - Engineering- Compatibility - Web-Text - Cube .- Information (c)Cell
referencing is the use of alphanumeric value to identify a specific cell in a spreadsheet application. OR Cell referencing
is the combination of a column letter and a row number that identifies a cell on a worksheet. (d)(i) - Absolute
referencing - Relative referencing - Mixed referencing (ii)= A3*C3 (Relative - without the$ sign) = $A3$1 (Absolute -
with the$ sign)
= $A3*B$2 (Mixed)
(a)Computer services rendered by computer business centre: - printing of documents - production of cards - large
format printing·- internet services -(FTP, browsing, sms, video conferencing, web hosting)- photocopying of documents -
scanning of documents - typesetting of documents - production of posters - logo design - lamination of documents -
binding of documents i- data analysis - on line registration - on line payment - biometric capturing- checking of results.
(b) Devices required by a computer business centre: - computer system - uninterruptible power supply (UPS) -
scanners (biometrics/optical) - printers - photocopiers - internet modem /ISP devices - router - laminating machine -
spiral binding machine - staplers - guillotine/paper cutter - staple remover- CCTV - microphone -
speaker/headphone/earpiece - webcam/digital camera -paper punch/ perforator - external hard disk - USB/flash drive -
paper shredder.
(c) Application software needed in a computer business centre: - Word .processor; Abiword, Apple i Work,
Apple Text Edit, Corel Word Perfect, Google Docs, Libre Office, Microsoft Word, Open Office. - Spreadsheet
packages; Microsoft Excel, Open Office Cale, Lotus 1-2-3, Stat View, Gnumeric, Word Perfect Office Quattro Pro, Plan
Maker, Corel Calculate, Ability Office, Apache Office, Microsoft Power Business Intelligence. - Presentation
Packages; Microsoft PowerPoint, Google Slides, Keynote, Prezi, Zoho show, Post toon, Customshow, Slide bean, Slide
Dog, Libre Office Impress, Adobe in Design, WPS presentation. - SPSS_ (Statistical Package for the Social Sciences)
- Desktop Publishers (Corel Draw, Creative suite, Photoshop, Picture Editor, MS Publisher)
- Document converter - Adobe PageMaker - Acrobat Reader - Antivirus ,_ Browsers - Search
Engines =Ms Access - Online Meeting Applications (Zoom, Skype, Teams, Google Meeting).
(d) Preeautions to ensure safety against movable devices: - Installation of antimalware - regular update of the
systems - scanning of all movable devices before use - Regular backup of documents.
. (a) (i) Alt+ F8 /Alt+ Right Arrow/ Alt+ Left Arrow/ Alt+ Up Arrow (ii) Alt+ F7 (iii) Ctrl + Home
(b) It is used to indicate terms that must be returned or included in the search results or it is a command that tells the
search engine to find pages that have the exact term.
LAN~
iii
~ ~
ii LA
NI
ETHERNET
i
(a)(i) Importance of di~tributed database: - it improves readability of data - easy expansion
- faster response time to queries - it ensures avai la bi lity of data - it enhances sharing of data - reflects the organizational
structure - reliability - cheaper to create - protection of valuable data - improved
performance - local or site autonomy - modularity- continuous operation ·
(ii) Disadvantages of using computer for information processing in the school: - initial investment cost is high -
extra cost for employment of computer experts - loss of jobs/job displacement
- training/retraining of staff - reduced face-to-face interaction/social cost - prone to virus attack - electricity dependent -
prone to hackers.
(b)(i) Reasons for using air conditioners in computer laboratory: - dust control - protection of equipment and
critical data - increased productivity/computer system life spans
- optimized low humidity levels/temperature control - comfort for users/dehydration control - hear
control. (ii) Importance of UPS in computer laboratory. ,
- to protect the system against power interruptions - to provide adequate power during power fluctuation
- to avoid loss of data/improper shut down - to serve as a back-up source of power - power surge/
spike control - power sag control ·
2020- 3
SECTION B - TEST OF PRACTICAL
WORK Answer all the questions in this
section.
5. A Director gave a manuscript to the secretary for typesetting. The secretary is expected to provide the
total number of words, lines of text, number of pages and nurriber of paragraphs contained in the
document. After proofreading the printout, the Director effected certain corrections on the printout and
instructed that the corrected version be saved with the filename "updated" while the original document
be saved with the filename "initial". (a) Outline the steps the secretary would take to display the number
of words, lines of text, number of pages and number of paragraphs contained in the corrected version of
the document. (b) Highlight the steps the secretary would take to display the original and corrected
versions of the document as well as the corrections effected on the document on the screen for the
Director to see at the same time for comparison. (c) List the steps to secure the document with password
in order to prevent unauthorized access to the document.
6. You are provided with a computer system that has a Microsoft PowerPoint application running. Outline
the steps to be followed in performing the following tasks; (a) creating a four-slide presentation;
(b) modifying the presentation to show the following on the Footer of all slides except the title slide:
A. Today's date; B. Slide number; C. Your surname.
(c) inserting a picture saved in the picture folder of your computer hard drive on the second slide.
(d) typing your name as the main title and personal profile as the subtitle.
(e) making each slide to run for five seconds continuously until the "Esc" key is pressed during slide
show.
SECTION B - TEST OF PRACTICAL WORK ANSWERS
5. (a) Steps to display number of words, lines of text, number of pages and number of paragraphs.
~ Open the corrected version of the document named "updated".- click on the "review"/"tools" tab on the
menu - click on the "word count" on proofing subgroup.
(b) Steps to display the original and corrected versions ot the document and the corrections.
- click on file on the menu bar- open the "updated" file OR the "initial" file-click on the "review" tab
- click on the "compare" button/drop down menu - select compare in the "original document" list box,
- click on the "Arrow/Browse" to select the "initial" file in the "revised documents" list box, - click on
>-
the "arrow/browse" to select the "updated" file - click on "OK". OR - Open the two documents - click on
"windows" tab - click on "compare side-by-side with" - view/edit document as required -
click on "close side-by-side" when done. ·
(c) Steps to secure the document with password: - open the file - click on "file" menu and click on
"Save As" - click on "Tools" (in the dialog box) and select "General Option" - type in the password -
retype the password - click on "OK" button - click on the "Save" button. OR - Open the file - click on
"file" on the menu bar - click on info - click on "protect document" - click on "encrypt with password" -
type in the password - click "QK". OR - Open the file - click on windows icon on the ribbon - click on
! prepare - select encrypt document - enter password - click on OK.
. ·
-
6. (a) Steps to create slide presentation: - Press "Ctrl + N" OR click on "file" then select "new"
- press "crrl + M" or click on "New.slide" on the menu bar three times to add 3 more slides.
(b) Steps to modify the presentation: A - Click on "insert" on the menu bar - click on "header & footer"/
"date & time" OR 'slide number" - click the· "date & time" box. H - Check the "slide number" box - check
"footer" box.
C - Type surname in the "footer textbox" - check "don't show on title slide" box - click on "apply to
· all".
(c) Steps to insert pictures. - click Qn the second slide- click on "insert" on the menu bar- click on
"picture" - select the picture from the pictures folder and click "insert" OR double click on the picture. (d)
Steps to type name as the main title and personal profile as sub title.
- Click on thetitle slide/first slide -Type your name as the main title in the "title textbox"
- type personal profile in "subtitle textbox",
(e) Steps to make each slide run continuously until the "Esc" key is pressed: - Click on "slide
show"/"transitions - click "advance slide" automatic - set time to 5 seconds ..,. click "apply to all
·slides"- click on "set up show" on the slide show tab - select "Loop continuously until Esc" - select "All
on show slides" - click "OK"
• I
2020-4
/.
CONTINUED ON PAGE 14
6.(a) Use Fig. I 10 answer question (i) to (iv). (i) What does Fig. I represent? (ii) Identify two output components in Fig. I. (iii)
Give the names for the parts labelled HI. VI and VII. (iv) State one precautionary measure that should be taken to protect the set-
up from power fluctuations while in use. (v) Data entry into the system can be achieved through theparts labelled: (\'i) Mention
one device that can be used to access the part labelled Vll. (b) Figures 2 and 3 represent mass storage media. Use the figures to
answer questions (i) lo (iv).
(i) Identify the media represented by:
Fig. 2 .....................:................... Fig. 3 ................................................
(ii) The transaction files of a company are to be recorded and accessed in tile order which
Fig. they arrive. Which of the media is most suitable for the purpose? (iii) In which media will
2 the stored data be accessed faster?
(iv) State the file access method for each medium.
Fig. 2................................. Fig. 3 ...................................
(c) A CCTV camera system has a 300 MB storage device. Each image size is 300 kB. (i)
How many images can be stored by the CCTV?. (ii) lfthe storage device is full, mention
one measure that should be taken to ensure that the system continues to capture and store
Fig. images without losing the already stored
3 images.
2. (a) (i) What is Computer Ethics? Computer ethics is defined as the set of moral principles /values that regulate the use of computers.
OR Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions
regarding professional and social conduct. OR Computer ethics can be defined as a set of acceptable behavior exhibited within a
computer envii·onment to ensure safety of users, computer devices. software and the computer environment. (ii) State three
Computer room management ethics: ( 1) Avoiding use of devices from un-trusted sources. (2) Avoid unauthorized access.
(3) Observing copyrights. (4) Avoid stealing/ cheating with computers. (5) No visitors should be allowed. (6) There should be
proper sitting arrangement (free flow of movement). (7) Avoid explosive materials. (8) Always set the computers before students
come in. (9) There should be appropriate lighting system (illumination).
( I 0) Always maintaina dust-free environment. ( 11) There must be appropriate ventilation/working air conditioning. ( 12) Always
avoid taking any liquid into the computer room.' ( 13) Ensure that all apparatus are properly switch off after use. .(b) List five
laboratory rules and regulations: (1) Students arc prohibited to enter the laboratory unless authorized by the teacher. (2)
Ensure that all disks/ diskettes are scanned before using them. (3) Report all problems related to the system to the teacher. (4)
Never attempt to repair laboratory equipment. (5) No equipment should be moved from its original position." (6) Do not load or
remove software from the system. ~7) Do not change the settings in the computer. (8) Ensure that all works are saved in external
storage
15
uevrce ano not 111 the computer. (9) Turn off the computer after use. ( I 0) Do not bring in bags, food and dri 11 ks into the
laboratory. ( l 1) Internet facility is strictly for educational purposes only. ( 12) Teachers should record the use of computer
laboratory in the computer log book. ( 13) A II users should record the use of computers i 11 the log book, ( 14). The
laboratory should be kept clean and tidy at all times. ( 15) Switch off all power supplies before leaving the laboratory. ( l 6) Be
responsible when using equipment, soft,vareand facility in the laboratory. ( 17) Proper shut down of computers. ·
. (a) Through the company's website (b) Web /Website developer (programmer) OR Web /Website designer OR Webmaster OR
, System analyst OR Programmer (c) Website design packages: Software packages needed / ~reate the platform, Adobe
J
. Dreamweaver, Adobe Muse, Amaya, Antenna Web, Bluefish, BlueGriffon, Coda; Coffee Cup, Design Studio, Galaxy Web,
GoDaddy, Google Web Design, Rapid Weaver, H5P, HTML, iWeb, Microsoft Expression web 3.0 and studio, Microsoft
FrontPage, MySQI, Net objects fusion, Odoo Website, Photon fx Easy, Sandfox, Vb-Net, Web plus x4, Web.Com, Website
Pro, Webydo, Weebly.
(d)(i) Local Area Network (LAN)/ Intranet (ii) Importance of computer network: file sharing, printer sharing, sharing of
media, media centre server, security, communication, preservation /Storage, sharing of resources, reduced cost, improved
customer service, better performance, ease of setup.
(e) Transmission media that can be used to implement the network in 3(~)(i) ()) UTP (2) SIP (3) Coaxial / (lpper (4)
Fibre Optics (5) Bluetooth (6) Infrared (7) Radio (8) WiFi (9) Hot-Spots (10) Satellite.
4
. (a) Define Software Mainfell{mce: Software maintenance is the modification of a software product after delivery to correct
faults, improve performance or other attributes. OR It can be seen as the fixing of defect in software. (b) List four types of
software maintenance: (i) Corrective maintenance. (ii) Perfective maintenance. (iii) Adaptive maintenance. (iv) Preventive
maintenance. (c) State four importance of software main~naucc: (i) To correct-faults (e.g. scanning and virus removal,
defragmentation).
(ii) To improve performance (e.g. software upgrading/updating). (iii) To adapt to a changing environment.
(iv) To prevent faults (e.g. installation of Anti-virus). (v) To.proffer solutions to identified software problems. (vi) To predict
software expenses (predictive cash flow).
16
WASSCE JUNE 2018 DATA PROCESSING I OilJECTIVE TEST QUESTIONS.
The first generation computers made use of A. low level programming language. 13. high level programming language. C.
object-oriented programming language. D. procedural programming language. Microprocessor was used as the main
electronic component of the A. first generation computers.
B. second generation computers. C. third generation computers .. D. fourth generation computers, The act of producing
information from figures, text or images is called data /\. collation .. B. conversion.
C. preparation. D. processing. .
The following are primary sources of information except A. questionnaire. 13. publication.
C. observation., D. interview.
Which of the fotf~wiog factors is not considered when classifying computers? A. Size B. Type
C. Location D. Purpose .
.Which of these channels would enable business transactions between a buyer from Nigeria and a seller from
Ghana? A. e-portal B. e-library C. e-commerce D. Podcasting
The JCT application which helps to resolve road congestion at junctions is A. automatic teller machine ..
B. automatic traffic marshal. C. street licht. D. traffic liuht.
The main co~~,s of the central processing unit (Cl'U) ;f the computer arc A. register and 'memory,
B. control unit and register. C. control unit and ALU. . D. ALU and BUS
Stages in ~~~~~ng cycle include the following except data A. collation. B. gathering. C. parsing.
D. processmc.f-1~ . .
0. At what stage of information processing is data validation carried out? A. Data analvsis B. Data collection
; C. Data processing D. Data summarization
I 1. The media w~enable electromagnetic signals to be transmitted through free spaceis known as
A. unguided media. B. intranet. C. guided media. D. cthemct.
12. Information that stimulates both the senses of hearing and sight is called A. audio information.
! B. audio-visual information. C. video information. D. visual information.
!3. The following are advantages of networking except A. spamming. 13. sharing of resources.
' C. communication. D. backup.
)·L Which of the following devices would not transmit signals from one point to another? A. Telephone line
· B. Modem C. Fibre optics D. Coaxial cable ·
1.5. Another term for Uniform Resource Locator (URL) is A. website address. B. JP address. C. domain name.
D. data link.
'I
16. The website "www.google.cotn ·· indicates that Google is A, a commercial organization. 13. a non-profit
:,
NAME OF
I
ENGLISH lANGUAGE MATHEMATICS \DATA PROCESSI\JG icor,'.P~·ER CIVIC
EDUCATIO:~
STUDENT ANtNE
- c~ I ~: STUDIES
LORR ET A LI t :, I I
E'!EH GRME
BAKARE IMAN I ~: i ·-··-i~--- -~ ________:! -----'-----------:--·-
IWHAMl;it.D [1EJ: ~- .
. ~-·---- ----
i
----
i ·-
__,
- ·-------- ~
_______________________________________.,_
·--------
:
-
17
20. Which of the following formulas would calculate the average score of the students in Mathematics?
A. =Average (C2: C6)' B. =Average (C2: F2) C. =Average (Cl: C6) D. =Average (CJ: Fl)
21. Which of the following formulas would calculate the total score of ONYEBUEKE OEBORAH in the n
subiects" A. ==SUM(B2: 86) B. c:SUM(A6: G6) C. ==SUM(A2: A6) D. =SUM(B6: F6)
22. The fol lowing are advantages of a Database J\1anage·ment System (DBA1S) except A. restriction of unauthoriz
data. B. provision of niultiple interfaces to different classes of users. C. grovision of backup a
recovery services. D. compromise of data integrity. ·
23. Extracting information in Database Management System (DBMS) involves A: sorting .. B. querying.
C. editing, D. cross-referencing. . •~
24. A special effect that controls the way slides appear in PowerPoint presentation is called A. Word Art.
8. Transition. C. Theme. D. Clip Art. ·
25. · A reference to another page or resource on a website is done by A. FTP. B. HyperHnks. C~ SMTP. D. Web pag
26. The design output of a graphic package can be in the following file format:HXcept A.,i.tf. B .. jpg. C. .g·
D .. l>mp. . '
27. The proactive maintenance of computer equipment before a fault or failure occurs
0
is caIJed A. correcti
maintenance. B. predictive maintenance. C. preventive maintenance·. D. presen4111i-,,e mAintenance.
28. A good computer maintenance practice entai Is A. washing the dusty computer parts with soap and water.
B. keeping computers exposed to sunlight to dry the body. C. cleaningthcf~lay ~ with methylat@d spiri
D. blowing the system unit with blower. ' ·i: ·· ~. · ·. . ·
29. Set of moral princi pies that regulate the use of computers and concerns prof~fonal and s~ial conduct is know•
as A. computer ethics. B. comp~tter misuse act. C. computer use act. 0. safety measure.
. ,
30. Whilh of the following pcograms is a computer virus? A. Kaspersky B. NOD 32 C. Norton D. Tuareg '
31. Precautionary measures 011 computer do not include A. handling all filn with care. B. giving access td unauthorize
in
into the computer room. C. avoiding smoking the cainputer room.
D. avoiding dirts and dust in the computer room.
32. The computer professional responsible for designing and maintaining a database is called database
A. programmer. B. operator. C. instructor. D. administrator.
33. Computer virus is not transmitted through. A. formatting of documents. B. e-mail C. external storage device, D. Inte
34. The following are attributes of computer virus except the ability to A. modify other files. B. replicate itself ill order t
other files and systems. C. execute without the user's approval. D. warn the user before -
execution.
3
5 A relational database model is designed according to set of rules known as A. NormaJization. B. Isolation.
3. C. Grouping. D. Enurneration. . . .-~' : ' -,~ .. ·•:;,. Which of the foll owing statements about re lationa I database mode
corrl(,t~. A. AJlte ,eq.;ei,'i. ~ ·
is related records B. A record consists of a row of data containing single value from
6
. a
column C~.,Data r the column of a table are of the same data type D. Data in the rows of table «e of the same data ty
Arranging records in a file according to a particular order is referred to as A. matching. B. merging.' ·'\,.,,f., C. sorting. D
3
7 updating. >,:·,., ~ -
3. One advantage of indexed sequential file organization is that A. index tables are small and can be searche quickly. B. i
8 cost effective. C. it is suitable for dynamically changing files.
. 0. it requires less storage space.
3 The protection of database against compromise is known as A. data pass wording. 8. data- protect~,
9 C. database encoding. D. database securitv. ..~· ·~
~ ~ .
4. Which of the following is a characteristic of parallel databases? A. There can be shared-memory or shared~disk
0 8. They are connected using public purpose networks C. Machines in this environment are in different locations D. It ha
. autonomy
I.A 2.C
WASSCE JUNE 2018 0ATA PROCESSING I Oll.JECTIVE TE'-r ANSWERS ·'!'
l
4. (a) Outline the steps involved in creating the Query By Example (QBE) 'in figure 1 assum ingthe table tblcustomer exists already.
(b) Write the steps to generate the SQL statement for the action in 4(a).
-
Lastname Firstnarne Town
•field
tblcustomer tblcustorner tblcustomer
Table •
So11
Show 0 0 0
like 'John'
Criteri
a
Figure
Or 1
SECTION B
5 (a) ltoro was tasked with the responsibility of producing the report of his group project. He is to submit both the soft and hard
copies of the report to his form teacher. The soft copy must be sumbitted to the email: [email protected].(i) List two:
I. applications required to carry out the task; II. hardware required to carry out-the task. .
(ii) Identify two conditions to be satisfied by Itoro to submit the electronic copy of the report. (iii) On the first attempt to send the
soft copy of the report, ltoro observed a 'spinning wait curscir'/'spinning disc pointer' on the screen for a long time. ldentif y three
possible reasons for the observation. (iv) State one output device that can be used to produce the hard copy of the report.
In figure 2 is an interface of an application software. Use the figure to answer question S(b) .
·- - - - - - - - .. :--. (b)(i) Name the type of application software represented in figure 2
"{ili'rC
~~...:.......::.'·
)' (ii) List three examples of the application in 5(b)(i). (iii) Given that the application
in figure 2 is running on a computer that has Internet access, out! i ne the steps to
follow in creating an email addresss/account.
6. Figure 3 is created using a Word Processor, Use the figure to answer question
6(a).
18
~Assist in the development of sound education. =Ensurs
that educational standards are maintained.
~ Give the people of West Africa a vision of the great potentials which lie beyond examinations.
VISION
To be a world~class examining CORE VALUES
body adding value to the Excellence
educational goals of its stake-holders. JntegT-ity
MISSION
To remain Africa's foremost examining Professionalism
body, providing qualitative and reliable
educational assessment, encouraging Accountabliity
academic and moral excellence and
promoting sustainable human resource Transparency
development and ·international co-
operation. Team work
Innovativeness
Figure 3
6. (a)(i) What is the name given to the feati1re on the first character in the document in figure 3? (ii)
Highlight the steps to: I. achieve the feature on the first character in 6(a)(i);
IL obtain the two columns as shown in figure 3.
(b) Give two objects that can be placed on a document usiag the 'Insert mean' on MS Word application.
(c) Outline the steps to perform the following actions in Corel Draw application: (i) inserting a circular shape: (ii) addi
caption 'Happy Birthday'; (iii) changing the colour of the caption to Red; (iv) fitting the caption around the circular object
Graphic
al data Dcscri pti No Code Owner
vc data
300/J 200 M. Toth
Photograj)h 300/1 I 250 P. Rab
y
(b) Relational data model: This is characterized by clear distinction between the graphical and descriptive data of territo
elements. Graphical elements are stored in layers of digital computer map, attribute data form of relational·
20
database table. After the inter-connections between the graphical and descnpnve uata, aii:.1•) ·,:-, o...,,,, ,,c 1114u~ ,., a
model created this way. ( c) Data models of Environment: For effective creation of graphical ar. ; i!'.'t1-'.~raphical
digital data, various data models are created. They come from basic approaches to environmental data modelling,
from methods and technologies for further processing and usage. (d) Topological data model: Topology without
using it as a mathematical discipline can be applied on modelling of basic relations among real world entities by
topology, they can be exactly defined by planner graphic. their models and polygons, borders of shapes.
2. (a)(i) Microsoft word. (ii) Watermark. (iii) Bypasswordingthedocument. (b)(i) Icon: This is a pictogram or
Ideogram displayed on a computer screen in order to help the user navigate a computer system or mobile device. It
is a quickly comprehensible symbol of a software tool function or a data file, accessible on the system and is more
likely a traffic sign than a detailed illustration of the actual entity it represents. (ii) Browser: A web browser is a
software application for accessing infomation on the world wide web. Each individual web page, image and video
is identified by a distinct URL enabling browsers to retrieve and display them on the user's
device.
3, (a)(l) Click on file on the menu bar (a drop down menu will appear, click on print). (2) Click on print (the printing
dialog box will appear). (3) Go to pages on the box and enter 1-5. (4) Click on the print option to select the portion
you want to use in printing your document. t5) Click on print.
(b)(i) Possible cause of the pop-up: This is caused by clicking on a link or loading a web page. They are usually
generated by java script and uses cross-site scripting (XSS) sometimes with a seccondary payload that uses Adobe
flash. They can also be generated by other vulnerabilities/security holes on broswer security or might come from a
rnalware infection. (ii) Possible source of the clement causing the pop-up: Some site that sell products might cause
a pop-up to open when you try to leave the site or through the internet browser.
(iii) Measure needed to stop the pop-up from reoccuring: (1) Open the chrome app. (2) To the right of the address
bar, tap more settings. (3) Tap site settings pop-up. ( 4) Turn pop-up to Allowed or Block.
(c)(i) Computer application package suitable to prepare and deliver his speech is the: Microsoft, Powerpoint
application. (ii) Output device that can be used to transmit Mr. Aneke's speech note from the computer is the:
Projector. (d) Types of computer network: (i) Local area network (LAN); (ii) Wide area
network (WAN); (iii) Metropolitan network. (MAN).
4. (a) Steps involved in creating the Query By Example (QB£) in figure 1:
Step I : Add data sources. (I) On the create tab. in the other group, click. Query design. (2) In the 'show Table
dialog box. on the Tables, Queries or both tabsdouble c I ick each data source that you want to use or select each
data source and then click add. (3) Use the show table 1.fr,J,,g box.
OR
( 1) Choose the tables or queries that you want to use as sources of data. (2) Specify the fields that you want to
include from the data source. (3) Optionally, specify criteria to I imit the record that the query returns. After you
have created a selected query, you run it to see the results. To run a selected query, you open it in datasheet view. If
you save the query, you can reuse it whenever you need, e.g. as a data source for a form, report. etc.
SECTION B
TEST OF PRACTICAL WORK
5. (a)(i) List two: (l) Applications required to carry out the task are: (a) Application software (rnicrosoft word). (b)
Internet application (an email address). (II) Hardware required to carry out the tnsk : -Computer keyboard; -
Cornputer monitor; - Electronic printer.
k (ii) Conditions to be satisfied by Itoro to submit the electronic copy of the report: (1) Ensuring that
there is internet access on the computer. (2) Ensure that he has an email address. (3) Ensure that the report ii
properly attached to the email before sending. (4) Ensure that the proper email address is entered so that the
...,. email will not bounce back. (iii) Possible reasons for the observation: (I) The Mac may be rendering calculating
something. (2) The Mac might be spinning up the hard drive after being awakened from sleep.
(3) lt may occur due to the number of applications currently opened. (iv) Output device that can be u~w to
produce the hard copy of the report: -Electronic printer.
(b)(i) Type of application software represented in figure 2 above is: -Internet browser (web browser). (ii) Examples
of the application in 5(b )(i): =lnternet explorer. -Google_ chrome. -Fire fox. -Opera mini. -UL. browser. -
Kongueror. -Lynx, etc. (iii) Steps to follow in creating an email addresss/account:
-Click on the free sign up botton. -Enter all mandatory fields (first name, last name, gender, etc).
- Type in your desired email address out of our page selection, e.g. biker.com, accountant.com, chef.net).
21
-Choose a secure password (al least 8 characters. mixing letters, numbers, lower and upper case. and usin~ special
characters). -Select your security question type in your answer. -Verify your registration by typing the number in the
captcha picture. -Click the "Accept" button underneath.
6. (a)(i) The name glven to the feature on the first character- in the document in figure 3 is known as:
Drop cap. (ii) Steps to achieve the feature on the first character in 6(a)(i): -Select/highlight the character. -Click Oli drop
cap and select the format or type of drop cap you need. -Click on ok.
(ii) To obf.1in the hni columns as shown in figure 3: =Specify where you want to add a drop cap.
-Use the drop cap option. On the format menu, click drop cap. The drop cap dialog box appears. -Select the type of drop
cap, select the dropped or in margin drop cap style. -Select font (when the drop cap style is selected,
. the font drop down box appears enabled. Select a desired font style for the drop cap). -Select number of lines to drop. (b)
Objects that can he placed on a document using the 'Insert menu' on MS Word application: -Clipart. -Picture.
+Table. -Graph .. -Chart, -Shapes.
(c) Seeps to perform the following actions in Coretlrraw application: {i) Inserting a circular shapes: -Click on the
ellipse flyout, (select circle). -Place the mouse point on the drawing space. left click the mouse and drag it on the drawing
area until you get the size of circle 'you want. ( ii) Adding the caption "Happy Birthday: -Add/type the text "Happy
Birthday" by making use of the text tool in the work space. -Select all the text and then go to "Text, fit Text to path".
OR,
-Select the pick tool (or press key FI0) and select the shape around which you want the text to follow by selecting Text>
fit text to path". -Once this is done, you will see the cursor on top of the shape and whatever will go around the shape. (iii)
Changing the colour of the caption to Red: -Go to Edit. -Click on the find colour drop down menu, select the
eyedropper tool near the bottom of the colour palette menu. "With the eyedropper selected, move the mouse over a red leaf
in the drawing and click to select the colour". ( i,") Fitting the caption around the cin.·ularobject: -Select in text object
using the pick tool. -Click TEXT: Fit TEXT TO PATH. The pointer changes to the fit text to path pointer .. As the mouse is
moved over the path. a pointer of where the text will be fitted is displayed.
22
~NASSC"f. .JUNE :?~W• DATA PROCESSING 1 OJl.JF.CTJVE TEST QUESTIONS
The' modern definition i:' a:1 ,:,_J,11puting machine is based on a concept known as A. circuit switching.
G. digital circuit. C. pad,et switching. D. stored program. I
, Annngc the following !CT tools in the order of invention from the earliest 10 the latest: cell phone, Internet.
,;atcililc- and radio. A Cell phone, satellite. radio, Internet B. Internet. satellite. cell phone, radio
C. Radio. satellite. lnternet. cell phone D. Radio.cell phone, satellite. Internet
.., The process (If gathering facts and statistics from different sources is known as data A. analysis . B . ..:o! lcction.
.
l C. collation. D. retrieval.
A chart is a graphical representation of A. data. B. map. C. process. D. transmission.
The use 0f transistors in circuits was a major advancement in the A. first generation computers.
B. second generation computers. C. third generation computers. D. fourth generation computers .
. \ :, _.,Ct-l,a ..• ._,r;I serv ice that uses tclcconnnunication devices to hoid 11 ccting among many participants in h110 er :r,oi;:
lccanons i:; known as A. broadcasting. B. multimedia. C. pod casting. D. teleconference.
Which of these devices does not support wireless conununicarion? A. GSM phone B. Mouse
C. Route1 D. Telephone
8 Yhc- fol km ing ha, dware devices arc used for output operations except, A. monitor. B. microphone. C. plotter, D.
, projector. . ... -. • The manipulation of digitized information by computer or other d igiw ! electron ic equipment is k
fJ,
uown a.'> A. data collauon, B. data manipulation. C. information manipulation. D. information processing.
iO. Which of'rhe following statements explains information processing'? /\. Saving documents in a device
8. Changing information detectable by an observer C. Data upload to server D. Transfer of information between devices
! l. The information transmission medium from location A to location Bin space is called A. asvnchronous transmission.
B. guided transmission. C. synchronous transmission. [). wireless transmission.
CAR -, CAR I I:!. What is the role of the rart labelled U in Figure !? A.
-
~~u",.,
l\LIIIVfL -,
1\/\,"\t)
LIVVI\ I
I
interpreter B. Medunn C. Receiver D. Source
I il
I l
Figure 1
13. Which of these technologies allows wireless connectivity in a Personal Area Network? A. Bandwidth B. Bluetooth C. Broadband
D. Satellite
Figure 15. The title of the web page being accessed on the
·- _/ __ .••..•. ,<' -._,. •. ---•-· 2
.•.•• _>
Use Figure
interface lo answer
in 3Figun~ quession« on
3 i-, di~;played 15 the part
,... . function of the device in the part labelled JI in Figure 2 is
; 4. The main
-~-----·- .....-:----...__pl, - I of data transfer to the part lahc I led I. B.
____~ .•.rate and
la 16.
bcl led
___ _j ____.
A. speeding up the
f ~ •.• . ..:
II;~:: •~
A. I. 8. Tl. C. Ill. D. IV.
-.:
··-·... - ··
providing services lo the other devices in the s1:111p. C. 16. The shortcut keycombination for adding a
··
l-~-~~~-~~
··
forwarding
~-...-,>;;;;.::v- data packets II between computers. D (l:im,d!ing the Os, .• · Q · ~l Lit 0:.,1-,.;._ "h- ,.._ ~ ~-:.:• :;.
·1 new tab in Figure 3 is A. Alt-:- N.
access 10 the part labelled I. B. Alt+ T. C Ctrl + N. D. Crrl + T.
,·o• •:~
23 Google
111----- l ◄
21. By default, numeric values in a worksheet are A. centered. B. left-aligned. · C. right-aligned. D. unaligned.
· · 24. The lii-; Power Point feature which can be used 10 change the appearance of the entire presentation is the A. Add slide option. B.
Design template. C. Online view. D. Slide Layout option.
25. One example of web design package is A. A!S FrontPage. B. MS Outlook. C. Peachtree. D. SPSS.
26. The part labelled II in Figure 6 is used to A. shape objects. B. select and transform
I~
objects. C. draw lines and cures. D. create texts.
27. In computer maintenance, the dampen material can be used on the fol towing devices
except. A. DVD lens. B. keyboard. C. mouse. D. screen. Dust from the system unit
fci:1.---··--- ~IV
Ill
28. casing can be removed using A. antistatic wipes. B. cotton wool. C. static wipes. D.
wet cloth.
29. Indiscriminate sending of unsolicited e-mails to many e-mail addresses is known as A.
plagiarism. B. phishing. C. pharming. D. spamming.
--••
01----V 30. In computing, ergonomics is a term associated with computer
A. ethics. B. maintenance. C. malware detection. D. safety measure. A novice is
~VI 3 I. discouraged from opening the CRT monitor for maintenance because A. it cannot be
appropriately reassembled after opening.
VII B. it may habour pests carrying in~ctious diseases. C. it may contain high static
voltage. D. the tube is fragile.
--·- --- V Ill 32. Computer professional bodies in Nigeria include the following except
A. Internet Service Providers Association ofN igeria. B. Nigerian Computer Society.
~ IX
C. Nigerian Information Technology Development Agency.
'-Figure
----- 6 D. Nigeria Internet group.
24
= ···"-•'·~----·---·-··-· -· •• ·--
33. The malware which appears as a harmless object but attacks its victims at the slightest opportunity is called A. worm.
B. trojan horse. C. macro virus. D. logic bomb.
J'.\. Virus effect can be prevented by J\.. installing and updating anti virus. B. installing new operating system.
C. purchasing new computer. D. using external disks on public computer system.
35. The part of the object in Figure 7 labbeled II are called attributes. B.
i--- Cuitomers I entities." C. models. D. relations.
36. j } The arrangement that gives the correct order of magnitude of the database elements
,-~ 10
is A. character, field, record, table, database, file. B. character, field, record, table,
file.darabase.
fltH N•mc- C. database, table, file, record, field, character.
L•st Name D. database, record, file, field, table, character.
37. ~trc<t Aad,eul ~ IIOne unique feature ofindex file is that it contains
A. reference number. B. relative number. C. sequential
St•tit
number. D. static number.
2.tp Cod~
f.l'l\all
38. Figure 7 Which of the following file organizations requires a primary key? A. Indexed file
organization B.
Random
file organization C. Serial file organization D. Sequential file organization
39. Ensuring the correctness and consistency of data is referred to as data A. security. B. reliability.
C. productivity D. integrity.
40. In distributed database management system, breaking a relation into smaller relations is known as A.
replication. B. fragmentation. C. indexing D. normalization.
WASSCE JUNE 2019 DATA PROCESSING 1 OBJECTIVE TEST ANSWERS
l.D 2.C 3.C 4.A 5.B 6.D 7.0 8.C 9.B 10.B 11.D 12.A 13.B 14.B
JS.A 16.C 17.C 18.C 19.R 20.B 21.C 22.C 23.D 24.D 25.A 26.B 27.A 28.A
29.D 30.A 31.D 32.D 33 .B 34.A 35.A 36.B 3 7 .A 38.A 39.D 40.B
WASSCE JUNE 2019 DATA PROCESSING 2 THEORY QUESTIONS
SECTION A: ESSAY
I. (a) What is teleconferencing'! (b) State four uses of Automated Teller Machine (AT,\!).
( c )(i) Give the function of a modem. (ii) List the two means of transmitting information. ~ ..
2. Hamza, Emeka, Funsho, Fe_jiro and ldongesit were friends from secondary school. Now, Hamza is.a pilot, Emeka is
a businessman, Funsho is a banker, Fejiro is a manufacturer while ldongesit is a teacher.' State two ways by which
each of these friends can apply JCT in their respective professions.
3. (a) A secondary school has over twenty personal computers. The school management intends to connect all the
computers in a network. Give four reasons that must have motivated the school management into connecting the
computers together. (b) List four network devices required to accomplish the task in J(a). (c) State one function each
for any two of the devices listed in 3(b).
4. (a) Explain the following database management terms: (i) entities (ii) attributes; (iii) relationships.
, (b)(i) Define cardinality in database management. (ii) Mention three cardinality relationships in database
management.
SECTION B
5 ..
I
X
(a) Figure 1 illustrates a part of a computer system. (i) Identify
the part labelled Y .. (ii) State: I. the technology used in the
part labelled z. II. the function of the part labelled X. 111.
one maintenance practice for the part labelled z. ·
Fiaure
,,. 1
25
Figure 2
: (b) Figure 2 shows a setup of a computer system. State- one function of each of the parts labelled !1', Q, R. S.
- and T. P: _________________________Q: •. R: ______________
. S: ---~--- T:
. (c) Outline the steps taken to perform the following tasks in Corel Draw application: (i) insert a circular shape; (ii) add the caption
"Happy Birthday" around the circular shape; (iii) change the colour of the caption to
. ireen_..
6. Table 1 shows the list of items and the quantity of the item needed by a student. The table was created on an .'t/S :
Excel worksheet. Use the table to answer questions 6(a)(i) ~ (iv) ·
'
Table 1
~
ITEM QU4IVTITY (a) Outline the steps to: (i) create a bar chart on the worksheet such that
the items would be labeled on the chart and the percentage of each
. TEXTBOOK 12 item included. (ii) add to the table. a new; A. colunm; B. row. (iii)
. BIRO 5 State one function in AIS Excel that can be used to determine the
EXERCISE BOOK 18 item with the highest quantity. (b) Outline the steps to add page
PENCIL ,.,
.) borderto a document using Art Design Tool in MS Word
application.
CALCULATO
R
ERASE
,,2 (c) An MS Word document contains the phrase "WAEC Exam".
R Highlight the steps to link the phrase above to the WAEC website.
('1t1p:l/1nnt'. waec.org.ng]
26
. Applic~1tion of ICT: (i) As " Pilot: As a pilot. one can use ICT in the following ureas: -Fur storing of all oncrat ions and
. cnnuuunicat ions on the tl iuht into a data recorder and a tliuht recorder or black box so as lo cuide investigation if an
, accident occurs. -With the use otK"]', flying has made quite a safe mode of travel. -1c1· use in aviation extends to
booking. scheduling. flight control. payments. radar operation. weight determination, balance of air craft. loading.
communication to ground based station, instrument readings and display warning signa ls. fire detect ion. engine
performance monitoring. emergency operation, cargo tagging and tracking, etc.
(ii) As :1 Businessman: - Standard office applications, c.g. MS.Word, reports. etc. Spreadsheets, e.g. MS Excel: Anulvsc
Financial Information. calculations. etc. -Database software:, e.!.!.. Oracle. Microsoft SQL Server, Access. mauauinz data
in manv forn~s. etc. -Presentation Software. e.!.!.. Ncw;lctters. Mauazines. etc.
-Graphics Soft\\;re, c.g. Adobe Photoshop; create and edit images ~uch as logs, drawingsor picturing.
=Spccialist application. -Accouuting application.
(iii) As a Banker: It is used for an Automated Teller Machine . -Cash line Machine. -For clearing cheques.
-For Electronic Transfer (EFT). -Smart card.
(iv) As a Manufacturer: -Euhances the automation. Smart Sensor System for processing and control and
robotics within the food process chain. -Enhances effective communication.
(v) As a Teacher: It has» -Enable teachers to transform their teaching practices.. -Jmproves the nature through which
teaching !ICT use impacts on students achievement. -Lesson planning is crucial when using JCT. - It is a tool that helps
teachers create more learner-centric learning environment. -Use to support change and
to support/extend existing· teaching practices. -For information presentation. ·
3. (a) Reasons that Might Motivate the School Management into Connecting the Computers Together arc= -To
enhance communication and availability of information. -It allows for more convenient resource sharing. -It makes file
sharing easier. -It is highly flexible. -It is an inexpensive system. -It increases cost efficiency -It boosts storage
capacity.
(b) Network Devices Required to Accomplish the Task in 3(a) -Computer system; -Network cable; -Network
interface card; -HUP; -Switch: -Routcr: -Proxy server; -Bridge; -Firewall; -Modem. Network Cable: It is a device that
enables a computer to be connected to the network.
Network Interface Card: -It controls the wired and wireless connections of a computer to exchange information with
other computers. -!t connects the computer to a local data network. -!t enables computer to communicate with one
another. -It serves as a mediator for network and computer.
Hub: -Use to connect segments of a LAN. -Connect multiple computers or other network devices together. Switch: -As
access or OSI layer L -For connecting multiple hosts (PCs). -Forward a message to a specific host. Router: -Connecting
multiple networks and forward packets destined either for its own networks or other networks. -It forwards data packets
toward their destination. -It forwards the packet to the destination of the TTL value is 0. -It changes the destination IP
address of data packages before forwarding them to an exit interface. -It determines the best path based on the destination
MAC address. -It acts as an intersection between multiple IP networks.
Proxy Server: -Verifics and forwards incoming client request to other server for further communication. -Acts as an
intermediary between the web browser and the web server. -Provides internal system security.
-Speeds up resource access. -Applies policies for tracking organisational internet use or accessing employee
progress. -To by-pass special controls such as parental or security controls. -To scan for viruses and malware -To
circumvent regional restrictions.
Network Bridge: =Connccts two segments of a network toget Iler. -Divides network into manageable sections.
Firew ~,II: -Protects networks or network devices. -Fi hers packets. -Filters incoming networks and outgoing networks. -
Prcvcnts network traffic. -Inspects packets which is supposed to forward. to determine whether
. they correspond to a desired template for traffic patterns.
Modem: -Converts digital signals generated by the computer into analog signals. -Modulates signals.
-Data compression. -Error correction. -Flow control.
4. (a)(i) Entities: An entity is an object in the system that we want to model and store information about. Entities arc
usually recognisable concepts either concrete or abstract such as person, places, things or events which have relevance to
the database.
(ii) Anributcs [Charactcr'isties]: -It is a database component such as a table. it is also seen as a database field. they
describe the instances in the row of a database. OR It is a column or field in a database table, e.g.
given a customer table. a name column.
27
(iii) Relationships: A relationship 1n the context of database is a situation that exists between two relational database tables when
one table has a foreign key that references the primary key to the other table. Relationship allows relational databases to split and
store data in different tables. while linking. disparate data items.
(b)( i) Cardinality: Refers to the uniqueness of data values contained in a column. High cardinality means that .the column
a
contains a large percentage of totally unique values. Low cardinality means that the column contains lot of "repeats" in its data
range.
(ii)· Three Cardinality Relationships in Database Management: - (I) One-to-one (I: I) relationship. (2) One-to-
many (I: M) relationship. (3) Many-to-many (M: M) relationship,
;.~- Figure l:
(a)(i) Disk driver- (i) The technology used in the part labelled z is disk (compact disk).
(ii) --x - for oning and offing. (iii) Always clean the surface with white clean cloth.
(b) Figure 2:
P - It is used to view/sec what the computer is doing.
Q - It is the system unit where the computer memory is located.
R- It is used to move round the screen of the monitor. it is used to give command to the computer. S - It is used to
type/send in data into the computer.
T ·- It is used to store data that can be used on any computer system.
(c)(i) -Hold down ctrl and drag in the drawing window until the circle is the size you want. -In the box. click the 3-point ellipse
tool in the drawing window. drag to draw the central I ine of the ellipse at the angle you want.
(ii) Steps to fit Caption Around Circular Object: -Select the circular shape and the caption "Happy Birthday" using the pick
tool. -Click on text menu and select "tit to path". OR -Select the caption using the pick tool and click on text menu. -Click on fit
to path and click on the circular shape. Changing the colour of the caption to green -Select the caption and use the i nteracr: \'C 1,
!l tool or the mesh fil I. -Choose the colour you want and click.
6. (a)(i) Type/Create the Table with the Values Needed for the Chart. -Highlighi the datas. -On the menu
bar click on insert and select the type of bar chart design you want and click.
(ii)(a) To Add a New Row: -Pick a cell or row that's not the header row and right click. -Point to insert and pick table rows
above to insert a new row. (ii)(b) To Add a New Column: -Pick any cell in the table and right click. -Point to insert table column
to the left to insert a new column. (iii) Max Formula: Returns the largest value from the numbers provided. (b) How to Create a
Page Border in Microsoft Word: -Open Microsoft word. -Click on the page layout tab. -In the page layout background group,
click the page border options. -In the border and shading window, click the page border tab. -Select box if you want a square
border around your page. -Select the style of border you want on ti,..: page which can be solid, dotted or dashed. -Click the OK
button to apply the border.
(c) Steps to Link the Phrase "WAEC Exam" to the WAEC Website (http://www.waec.org.ng): -Go to the webpage to
which you want to link in order to find the link for a website specific page, you must go to the page first. -Select the webpages
address the top of the web browser. -Copy the address. -Find a place to post the link. -Paste your link. -Test your link.
SECTION B
(TEST OF PRACTICAL WORK)
28
~--------------Natio,rwiu 29. The fuel used for brazing is a mixture
of oxygen and (a) acetylene (b) charcoal
(c) kerosine (d) petrol (e) water
30. Technology simply means the application of __ ideas in practice
(a) accounting (b) executive (c) law (d) scientific (e) traditional
7 ,-/
------------------t----------------N"tiomvi,le
41. The speed of the processor in the 1st 55. The procedure for information
processing which allows resource
generation of computer was measured
gathering is __ (a) analysis (b) collation (c)
in __ second (a) Femto (b) Micro (c) Milli (d)
interpretation (d) organization
Neno (e) Pico
(e) redundancy
42. Which of these areas does not involve the
56. ICT plays a vital role in industries in the
application of ICT? (a) Carpentry
following areas except (a) auditing operations
(b) Commerce (c) Education (d) Health
(b) inventory control (t) management information
(e) Industries
systems (d) payroll preparation (e) X-ray
43. The. __ is an example of unguided
techniques
transmission medium of information (a)
57. What is the acronym for UNIVAC? (a)
coaxial (b) fiber optic (c) infra red (d) shielded
United Nations Institute Variable Automatic
twisted pair
Computers (b) United Numerical Integrated
44. Power-Point program is a __ package in
Value Calculator (c) Universal Automatic
computer communication (a) computing (b)
Calculator (d) Universal Automatic Computer (e)
graphics (c) presentation (d) utility (e) visual 45.
Universal Numerical Integrated Value And
A Scottish mathematician __ Napier
Computing
invented the bone (a) Blaise (b) Charles
58. The acronym WiFi connotes Wireless (a)
~{c} Herman (d) Joseph (e) John
fidelity (b) fiction (c) file (d) finder (e) firewall 59.
· 46:\~hich of these is an example of
Which of the following is a major type of system
Micr<1soft office? (a) Access (b) CorelDraw (c)
software? (a) Assembler (b) Compiler (c)
Dreamweaver (d) Instant Artist (e) Photoshop 47.
The Drawing tool [3Jin Microsoft paint
Firmware (d) Translator (e) Utilities 60. To save
an existing document with a different file name,
environment is called __ (a) brush (b) crop (c)
click/press Ctr! + (a) A (b) C (c) S (d) V (e) Y
elipse (d) eraser .(e) magnifier
48. Which of these is a disadvantage of
ICT? (a) Data redundancy (b) Electronic mail (c)
Minimize cost (d) Resource sharing
PAPER Ill
(e) Saves time
COMPUTER STUDIES PRACTICAL
49. Ctrl __ is to Redo an action (a) C (b) V (c)
Time
X (d) Y (e) Z
45:minutes Use Microsoft Word to type an
50. The four ways to align a text are (a)
essay on how you spent your last holiday.
centre, justify, left, right (b) centre, left, right,
__ middle (c) diagonal, justify, left, right Instruction:
(0) diagonal, middle, left, right (e) justify, middle, Font style - Time New Roman
centre. right Font size - 12 inches
51. Communication is an act of __ Use the following tips as guideline
information (a) coding (b) forwarding 1. Heading
- (c) hoarding (d) transmitting (e) zipping 2. Your Name
52. The __ is a program that performs a 3. Where you spent your last holiday
useful task while simultaneously allow
4. Your activities (what yott did, tourist sites visited,
distinctive act in the computer system
what you saw etc)
(a) time bomb (b) trap doors (c) trojan horse
5. Your experiences (new things learnt,
( d) worm ( e) zombie
memories}
53. The features of old economy includes
6. Your advice to your friends
the following except (a) digitalization
7. Conclusion.
(b) distance constraint (c) labour based
(d) mechanization (e) time consuming
54. The __ prevents direct access to
computer system (a) back-door (b) malware
(c) password (d) pop-ups (e) virus
18
i
------------------.---------------Natiu11wide
COMPUTER STUDIES 2018 (e) Service-based
t
31. Processed data is called __ (a) database 45. A computer on the network that shares
h {b) document (c) file {d) information (e) product resources is called __________(a) client (b)
32. The __ bar is usually located below the mainframe (c) server (d) transmitter (e) xender
(o
title bar that provides categorized option (a) 46. In spreadsheet, the v-alue of 41\ 2 is __ (a)
af
header (b) menu (c) scroll (d) status (e) tool 2 (b) 6 (c) 8 (d) 16 (e) 32
)
33. The ______key allows an exit from a 4 7. The presentation graphics feature
uy includes the following except __ (a) auto
n program when pressed (a) arrow (b) escape
ee content wizard (b) design template (c) range
t (c) function (d) return (e) spacebar
34. The second generation of computers layout (d) slide layout (e) transition pattern
were developed from (a) 1949 to 1955 (b) 48. Which of the following storage media is
r the fastest in speed? (a) Floppy disk (b) Hard
k 1956 to 1965 (c) 1965 to 1970 (d) 1970 to 1990
disk (c) RAM (d) Register (e) ROM
(e) 1990 to 1995
49. A __ is an elementary building block of a
i 35. What does "SMS" stand for? (a) Short
af digital circuit (a) logic gate (b) motherboard (c)
Machine Service (b) Short Machine System
r nibble (d) system bus (e) word 50. One point of
(c) Short Memory Service (d) Short Message a font is~of an inch (a) 1/27 (b) 2/27 (c) 1/72 (d)
Service (e) Short Message System 2/72 (e) 1/127 51. The __ are engaged in the
36. The term e-commerce is described as design of integrated hardware and software
__ through the internet (a) buying and selling solutions for technical problems (a)
of goods and services (b) production of computer programmers (b) computer system
commerce textbooks (c) receiving and sending of engineers (c) network system administrators (d)
message (d) sending and receiving of goods and
system analysts (e) web developers
services (e) studying of commerce as a subject
52. The ______is an access channel for
37. Information stored in RAM is __ (a) computers to exchange information
invisible (b) non volatile (c) secured {d) virus
(a) gateway (b) model (c) port (d) protocol
infected (e) volatile
(e) socket
38. 20 nibbles is equivalent to __ bits (a)
53. Which of the following is not a
51 (b) 62 (c) 70 (d) 80 (e) 100
multitasking operation system? __
39. The letter "S" in the acronym BASIC
(a) DOS (b) UNIX (c) MAC (d) WINDOWS
represents (a) sage (b) semantic (c) software (e) WIN NT
(d) symbolic (e) systematic
54. In a computer system environment,
40. Which of the following is an
operating system can be classified
example of a single user operating system?
basically into __ classes. (a) 2 (b) 3 (c) 4 (d)
(a) LINUS (b) PC-MOS (c) UNIX (d) WINDOWS
5 (e) 7
95 (e)XEROX
55. In BASIC programming, which command
41. In BASIC programming, which of the
gives an output? (a) CLS (b) END (c) GOTO (d)
following is not a logical operator? ________ PRINT (e) REM
(a) * (b) > (c) + (d) - (e) /
56. A person who breaks into a computer
42. The size of a font is measured in_ (a)
system to steal information without
bytes (b) inches (c) metres (d) points
authorization is called a/an __
(e) words
(a) administrator (b) cracker (c) hacker
43. What does "COM" stand for? (a) Central
(d) phisher (e) spammer
Output Machine (b) Central Output Modem
57. What is the default font used in MS
(c) Central Output Monitor (d) Computer Output
Word 2010 document? (a) Algerian (b) Arial (c)
Microfilm (e) Computer Output Microphone 44.
Arial Black (d) Calibri (e) Times New Roman 58.
Which of the following is a feature of new
Which of the following is the smallest unit
economy? (a) Analog (b) Digital
of a worksheet? (a) Cell (b-) Column
(c) Labour-based (d) Mechanical
(c) Range (d) Row (e) Worksheet
87
59. Microsoft __ is the most appropriate software for calculating in com_puter
(a) Excel (b) Frontpage (c) Groove (d) Outlook (e) Publisher
60. Which of the following is the current generation of information ages? {a) Fifth (b) Fourth (c) Second (d)
Sixth (e) Third
PAPER Ill
COMPUTER STUDIES PRACTICAL Instruction: Answer the questions.
Create a spreadsheet document of a company payroll as shown below and perform the underlying tasks.
Note: Candidates' work and values should be different.
APPLICATION
(i) Provide four different names-of your choice
to complete the table.
(ii) Give the values of HOURS WORKED ranging between 3-4 hours for each name provided.
(iii) Provide the corresponding values for the PAY PER HOUR ranging between N300 to N700.
(iv) Calculate the BASIC PAY for the values provided to complete the table.
(v) Give the cell references and corresponding results for the following:
(a) total HOURS WORKED by the staff of the company.
(b) the BASIC PAY of the last five names
on the payroll.
Note: BASIC PAY = HOURS WORKED *PAY
PER HOUR (15 marks)
E
COMPUTER STUDIES 2019
31. A computer worm is different from a computer virus because it __ (a) corrupts computer files (b) does not
attach itself to an existing program (c) does not prevent unauthorised access to computer (d) does not reduce memory or
disk space
(e) replicates itself
32. Which of the following scientists did not contribute to the development of computer? (a) Augusta Ada (b)
Charles Babbage (c) Gottfried Leibniz (d) Joseph Jacquard (e) Max Weber
33. When was "Internet Explorer" invented? __ (a} 1904 (b) 1970 (c) 1985 (d) 1995 (e) 2000
34. A computer memory is said to be 'volatile' if the information stored in it is __ when there is a power
failure (a} copied (b) edited (c) lost (d) regained (e) saved 35. The keyboard button that erases characters to the
right is __ ·_ key
(a) backspace (b) delete (c} escape (d) shift (e} tab
36. In Microsoft Windows, the graphical pattern used as a desktop background is called __ (a) animation (b)
icons (c) menu bar (d) picture (e) wall paper
37. Which of the following is not an ICT gadget? (a) Computer (b) Phone (c) Radio (d) Television (e) Xylophone
38. A_ is an example of a storage medium that uses sequential method of file organization (a) compact disc
(b) floppy sick (c) hard disk (d) magnetic strip
(e) video cassette
39. Microsoft Word is not suitable for __ (a) creating assignments and articles (b) creating resumes (c} creating
worldwide web pages (d) formatting documents
(e) preparing payrolls
6
40. The following are examples of Microsoft I Nationwide
of a web browser? __ (a) Address bar
application softwares except __ (a) Access (b) Excel
(b) Back button (c) Search bar (d) Send button (e)
(c) Outlook (d) Paint (e) Word -11. The most important Tools tab
attribute of a system analyst is his/her_ (a) ability to
54. The 'CLS' statement in BASIC
design hardware (b) marketing strategy (c)
programming is used for _________(a) clearing
programming skills (d) technical management
11
the screen (b) conditional branching· (c) conditioning
skills {e) writing skills
logical statements (d) displaying data on the screen
42. A computer systems' motherboard is enclosed in
(e) inputting data
its __ {a) keyboard (b) monitor
55. Power Point application package is
(c) mouse {d) speaker (e) system unit
mostly useful when ___________(a) creating
43. A computer network that uses internet
company logos and greeting cards (b)·creating slides,
protocol technology to share an organization's
speaker notes on audience handout (c) preparing
information within that organization is called_
database (d) preparing legal copies, letters and
(a) ethernet
memos (e) preparing student results sheets and
· (b) homeplug (c) intercom (d) intranet (e)
budgets
workgroup
56. The Binary Number System uses how many
44. The __ key on an enhanced keyboard is not
digits? __ (a) 2 {b) 3 (c) 4 (d) 5 (e) 8 57. The
labelled (a) Caps lock (b) · Esc
combination of the Ctrl key and __ on a computer
(c) Function (d) Shift (e) Space Bar
keyboard will redo an action in Microsoft Word
45. Which of the following op·erating systems is
environment (a) A (b) C (c) _V (d) Y (e) Z
based on the use of disk drives? (a) DOS (b)
Linux (c) UNIX (d) Windows (e) Xenix
58. Which of the following cannot be used as a
primary key? __ (a) Date of birth
46. The invention of Point of Sale is an
(b) Department number (c) Receipt number (d)
application of ICT in __ sector
Registration number (e) Subject code
(a) agricultural (b) commercial (c) educational (d)
59. A piece of computer hardware or software
health (e) political
that access services provided by a server is
47. An example of a floating point quantity
called a_ {a) client (b) customer (c) device (d)
number is __ (a) 0 (b) -10 (c) -18 (d) 0.4E7 (e) 40000
receiver (e) token ·
48. A digital file is a collection of data that
60. The diagram below is a __ network topology
cannot be stored in a __ (a) cabinet drawer {b) flash
drive (c) floppy disc (d) hard disk ., '
..
(e) zip folder •I
- '
!
49. Which of these is not a social media platform?
(a) Facebook (b) lnstagram
(c) Google (d) Snapchat (e) Whatsapp
50. A folder in which related records are kept in a
computer is called __ (a) archive (b) database (c)
document (d) field (e) file
· 51. An electronic device that sends and
I
retrieves printed messages over a (a) bus (b) linear (c) ring (d) star (e) tree telephone line
is called __ (a) fax machine
(b) intercom (c) printer (d) photocopy machine (e) scanner-
52. Based on size, __ computer is the
least (a) macro (b) mainframe (c) micro {d) mini Instructions:
(e) super (i)
PAPER Ill COMPUTER
Answer the question
STUDIES PRACTICAL
53. Which of the following is not a feature (ii) Use
Time: 45 minutes
Arial narrow font style with font size 11
167
all through your work except otherwise stated. 1. Use CorelDraw to produce a staff identity card as shown in the
format below.
LOGO IBEKWE EBUKA NUR/PRY SCHOOL (Knowledge is light)
PMB 258,ALBISHIRI ROAD MINNA, NIGER STATE.
□
STAFF IDENTITY CARD
NAME ----------------------------------------------
DESIGNATION------------------------- FILE NUMBER--------------------------
DA TE ISSUED ------------------------HOLDER'S SIGN-----------------------
APPLICATION
(i) Use the first alphabet of your surname in capital letter as a logo, using font size 24.
(ii) Replace "IBEKWE EBUKA" as used in the name of the school with your full name, using font size 24 and bold it.
(iii) Type the motto "knowledge is light" using font type Arial black with font size 10.
(iv) Replace the given school address with your home address.
-:--:-----------------------------,------------------------,,·11nolf•·itk
(d) hinges (e) locks (c) character (d) file (e) record
42. The abbreviation, ALU stands for __ (a)
COMPUTER STUDIES Arithmetic Log Unit (b) Alihncs: Lngy( • Unit
31. Which of the following information ages (c)Artthmetic Logic Unit (cf)~ r r guag Unit (e)
lasted between the end of Bronze age and the Articulating Logging UI .
spread of Roman Empire?_ (a) Electronic (b) 43. The period it takes a co•p ••• , ID
Industrial (c) Iron (d) Mechanical (e) Stone process a job is called_tillle (a) baol Cb)
32. The third generation computers used __ construction (c) execution (d) rear (e) speed 44. A
in place of transistors (a) electronic valve (b) good information that contains the facts
integrated circuit (c) sockets (d) vacuum tubes necessary for decision makers to solve a
(e) very large scale integration 33. The scientist problem is characterized by its __ (a) accuracy
that invented analytical engine is __ (a) Blaise (b) completeness (c) consistency (d) reliability (e)
Pascal (b) Charles Babbage (c) Gottfried Leibniz uniqueness
(d) John Napier (e) John Thompson 45. Which of the following is not a function of
34. Computers designed to handle variety of an operating system? (a) Disk management (b)
tasks can be described as a/an __ purpose File management (c) Invasion of privacy (d)
computer (a) application (b) general (c) Resource allocation (e) System monitoring
information (d) program (e) specific 46. The following are computer professional
35. The component of computer that holds bodies in Nigeria except __ · (a) CPRC (b) ISPN
program and data used for immediate (c) ISSN (d) !TAN (e) NCS 47. The abbreviation,
processing is called __ (a) control unit WIFI stands for Wireless __ (a) fiction (b) fidelity
(b) hard disk (c) memory (d) register (c) file
(e) storage unit (d) finder (e) firewall
36. Which of the following is not a source of 48. BASIC is a/an __ language (a) assembly (b)
data and information? __ (a) Internet (b) high level (c) low level (d) machine (e) object
Newspaper (c) Printer (d) Radio (e) Television 37. oriented
The acronym PC-DOS stands for __ (a) 49. A byte is made up of __ bits (a) 2 (b) 4 (c)
Pentium Computer Drive Operating System (b) 6 (d) 8 (e) 12
Personal Computer Design Organizing Server (c) 50. Which of the following is not a. feature of
Personal Computer Disk Operating System (d) spreadsheet package? (a) Colour palette · (b)
Petabyte Computer Disk Organizing System (e) Columns (c) Formula (d) Functions (e) Rows 51.
Processor Computer Disk Operating Server The following are features of new world
38. The part of computer where processing of economy except __ (a) a level playing ground for
lnformation•is carried out is __ (a) ALU (b) all (b) over reliance in subsistence farming (c) rapid
BIOS (c) CMOS (d) CPU (e) RAM globalization (d) the ability of small firms to think
39. The connection of computers to share big (e) the chance to create new emerging markets
information worldwide is known as __ (a) fax 52. A protective mechanism that allows a user
(b) internet (c) network (d) router (e) server 40. to only examine a file without bein·g able to
Which of the following describes the four modify it is called __ (a) anti-virus shield (b)
basic operations of a computer? __ (a) Input, hidden flag (c) password protected (d) read and
archiving, processing and storage (b) Input, write flag (e) read-only flag
processing, output and storage (c) Input, 53. Which of the following is not a source of
selecting, processing and storage (d) Input, computer virus? __ (a) Duplication of software
storage, transmitting and processing (e) Output, (b) E-mails (c) Infected CD-ROM~
recessing, receiving and archiving (d) Infected diskettes (e) Internet downloads 54.
1. A collection of fields that relates to ingle A statistical tool which is divided into slices
unit is called __ (a) bit (b) byte to illustrate numerical proportion is called __
(a) bar chart (b) bar graph
245
(c) histogram (d) pie chart (e) scatter plot (ii) Bold the heading of each column
55. The BASIC programming language (iii) Replace 21834321 lAA with your
statement which stops the program at a examination number.
particular line is __ (a) CLS (b) END (c) IF (iv) Copy the replaced examination number and
ELSE (d) PRINT (e) READ paste it in row 2 to 6 of Examination Number
56. Which of the following is not a type of column.
computer network? __ (a} LAN (b) MAN (c) (v) Replace the two alphabets in the pasted
PING (d) SAN (e) WAN examination number in rows 2 to 6 with any other
57 .. An example of a volatile memory is __ two alphabets between B and G.
(a) EEPROM (b) EPROM (c) PROM (d) RAM (e) Note: No replaced alphabets must be the same
ROM for rows 2 to 6.
58. Which of the following applications is (vi) Type any six full names of your family
a word processing package? __ members in the aCANDIDATE NAMES• column.
(a) Access (b) CorelDraw {c) Lotus 1-2-3
Note: Full name should consist of surname and
(d) Photoshop (e) Wordpad
59. This icon below is called __ in a first name.
graphic package (vii) Type your year of birth in the "AMOUNT
PAIDn first row.
(viii) Type any five different years of your choice
for rows 2 to 6 in the same column above. Note:
Year of birth should be in four digits e.g. 2009
(ix) Type your full name at the bottom left side of
(a) ellipse (b) fill (c) hand (d) pick (e) zoom your registration number at the bottom right si_de
60. A responsible way of using computers using Arial Black font style.
is by __ (a) changing computer settings of other (x) Print out the hard copy
users in their absence (b) playing games during
work hours (c) spreading malware to other
computers (d) using it for data collection (e) NATIONAL EXAMINATION COUNCIL BASIC
viewing pornographic materials EDUCATION CERllACATE EXAMINATION PRE-
VOCATIONAL STUDIES 2020 PAPER1
COMPUTER STUDIES PRACTICAL AGRICULTURE
Instruction: 1. The deliberate effort made by man to till
Answer all questions using: the soil, cultivate crops and rear animals
(i) Microsoft word for food and other purposes is termed __
(ii) Times New Roman font style· (a) agriculture (b) agronomy (c) apiculture
(iii) Font size "14" throughout your work except (d) aquaculture (e) horticulture
otherwise state. 2. The form of agriculture practised by
Use the format below to perform the underlisted Fulani herdsmen in Nigeria is referred to
task. as __ farming (a) arable (b) integrated
I
-------------------------------,-----------------------Nuti1mwick
2 4 6 8 (b) concentrated, directed and memorized (c) conditional,
50
instructional and intentional (d) distributed, relational and centralised
40
(e) ring, process and light
30
45. The following are types of Wireless Communication except
20
(a) bluetooth (b) fibre optic (c) infrared (d) radio frequency (e) satellite
10
46. Which of the following is a disadvantage of disk operating
(a) bar graph (b) histogram (c) line graph (d) system? (a) Commands are simple to remember and use (b) It has a
pictogram (e) pie chart very stable operating system (c) It has character-based interface (d) It is
41. The process of collecting and translating the underlying operating system of all windows products (e) it takes less
raw facts into meaningful information is __ space on the hard drive
(a) computerization (b) conversion (c) data 47. Graphics package is an application program that is used __
processing (d) data storage (e) technology (a) for arithmetical/ logical operations (b) for planning and productiofi
42. A vast network that connects computers of payrolls (c) to create and manipulate images (d) to create slide
all over the world is __ (a) ethernet (b) extranet
presentations (e) to type letters and create memos.
(c) internet (d) intranet (e) spectranet 43. Which
48. In BASIC programming, REM is __ (a) a non-executable
of the following is not an internet browser?
statement (b) an executable statement (c) used to assign value to a
(a) Mozilla Firefox (b) Google Chrome (c)
variable (d) used to instruct computer to run a program (e) used to
Messenger (d) Netscape (e) Safari 44. Types of
instruct computer to stop running a program
database are __
49. A benefit of ICT is __ (a) cyber bullying (b) cybercrime (c)
(a) concentrated, conditional and distributed
plagiarism (d) pornography (e) social networking
50. Which of the following led to poor technology in old
economy? (a) A level playing field (b) Better opportunities (c)
Globalisation (d) New markets (e) Time wastage 51. In Microsoft
Paint toolbar, which of the following is not an option in
10 "Resize" drop down window? (a) Crop (b) Horizontal
(c) Percentage (d) Pixels (e) Vertical
52. The use of Ctrl + V on a computer keyboard will_a
document (a) copy (b) cut (c) paste (d) print (e) save
53. Information received through sound only is __ (a) Audio
(b) Audio-visual
(c) Network (d) Print (e) Visual
54. Which of the following is a disadvantage of satellite
communication? (a) Difficult to maintain (b) High bandwidth
( p r a ( Versatility
c S er re bil d (e) Wireless and mobile
) u io li ity ) 321
1
N11tionwilk
55. A function of an operating system that
first row and fill in scores for first, second, and
allows users to interact with a computer is
third terms. (Note: Use the numbers between
__ (a) file management (b) user interface (c)
0 and 100 to fill the scores).
system profiler (d) resources management (e)
(b) Type additional records for the remaining
task management
five (5) students showing their surname, first
56. How many bits make a byte? (a) 2 (b) 4
name and scores for each term.
(c) 6 (d) 8 (e) 10
(c) What is the total score of students in the
57. An example of anti-virus program is __
first term?
(a) Alabama (b) Christmas
(d) What is the total score of students in the
(c) Dr. Solomon (d) Logic bomb (e) Sleeper 58.
third term?
Which of the following signs indicates that
(e) What is the formula for calculating the sum
a computer system has not been infected
of scores for the second term?
by virus? (a) Disks and disk drives are
(f) Create a new column titled "Average
accessible (b) Ii restarts on its own and fails to
Scores" after "Third Term" and calculate the
run normally (c) it runs slowly (d) it switches
average score for each students.
itself off and restarts every few minutes
(g) Type your name and registration number at
(e) unusual error message pops out
the bottom left corner of your work.
59. Which of the following is not a feature of
(h) Print out the hard copy of your work,
graphics packages? (a) Colour palette (b)
showing the gridlines of rows and columns
Menu bar (c) Printable area (d) Slide views (e)
Tool bar
NATIONAL EXAMINATIONS COUNCIL BASIC
60. A disadvantage of ICT is __ (a) cyber
EDUCATION CERTIFICATE EXAMINATION PRE-
bullying (b) e-commerce (c) information
VOCATIONAL STUDIES 2021
resources (d) online-shopping (e) software
AGRICULTURAL SCIENCE
production .
PAPER 1
1. The earliest form of agriculture stated
PAPER Ill
with (a) extension service (b) fish farming
COMPUTER STUDIES PRACTICAL
(c) gathering of fruits (d) marketing of produce
INSTRUCTIONS:
(i) Use computer system to answer the (e) rearing of animals
question. (ii) Use Microsoft Excel to create the 2. Agriculture is important to the farmer and
table below. (iii) No contents of the candidates' his family because it provides them mainly
with (a) food (b) medicinal herbs (c) raw
work should be the same.
materials (d) shelter (e) social amenities 3. The
(iv) You are required to print out the hard
growing of ornamental plants, fruits and
copy(ies) of your answers.
vegetables is called __ (a) apiculture (b)
1. The table below represents the annual score
floriculture (c) heliculture (d) horticulture (e)
sheet of students in a school.
olericulture
Use the diagram below to answer question
Name of student
Third
I
I
Scores
S/No. I Surname I First Name I First Second I 4 and5
Term Term
Term
2
3
4
5
6
APPLICATION:
(a) Type your surname and first name in the 322
BASIC SCIENCE AND TECHNOLOGY 2017 PAPER2
BASIC TECHN. COMPUTER
1. A 11. E 21. D 31. E 41. C 51. D
2. C 12. B 22. 8 32. D 42.A 52. C ·
3. D 13. C 23.A 33.A 43. C 53. A.
4. C 14. C 24. D 34. C 44. C 54. C
5. C 15. A 25. A 35. E 45. E 55. B
6. B 16. B 26. C 36. 8 46. A 56. 8
7. B 17. C 27. E 37. 8 47. E 57. D 58.A
8. A 18. A 28. A 38. D 48.A 59. D
9. C 19. C 29.A 10. E 20. B 30. D 39. D 49. D 60. D
40. C 50.A
BASIC TECHN. BASIC SCIENCE AND TECHNOLOGY
COMPUTER2018 PAPER2
1. C 11. C 21. D 31.D 41.8 51. B
2. D 12. B 22. D 32. 8 42. D 52. C
3. A 13. C 23. C 33. B 43 .. A 53. B
4. C 14. E 24. C 34. B 44. B 54. B
5. A 15. C 25. C 35. D 45. C 55. D
6. E 16.A 26. C 36. A '46. D 56. C ·57_ D
7. B 17. D 27. D 37. E 47.A 58.A 59.A 60. A
8. D 18. A 28. E 38. D 48. E
9. D 19. E 29. D 10. D 20. D 30. D 39. D 49.A
40. D 50. C
7
BASIC SCIENCE AND TECHNOLOGY 2019 PAPER 2
BASIC TECH. COMPUTER
1. B 11. D 21. B 31.B 41.D 51.A
2. A 12. E 22. D 32.A 42. E 52. C
3. E 13. E 23. E 33. D 43. D 34.C 44. E 53. E · 54.A 55. B 56.A
4. 8 14: D 24. D 35. B 45. A 57. D
5. E 15. E 25. B 36. E 46. B 58. C 59.A 60. B
6. B 16. A 26. C 37. E 47. D
7. C 17. A 27. C 38. D 48.A
8. E 18. C 28. C 39. E 49. C
9. E 19. B 29. A 10. E 20. C 30. C 40. D 50. E
BASIC SCIENCE AND TECHNOLOGY 2020
PAPER2
BASIC TECH. COMPUTER
1. D 11. D 21. B 31. E 41. E 51. A
2. C 12.A 22.B 32.B 42.C 52.E
3. C 13. A 23.A 33.B 43.C 53.A
4. B 14. C 24. C 34.B 44.A 54. D
5. E 15. B 25.0 35.C 45.C 55. B
6. B 16. B 26. D 36.C 46. C 56. C
7. C 17. C 27.B 37.C 47. B 57. D
8. B 18.A 28. D 38. D 48.B 58. E
9. E 19. A 29.E 39.B 49. D 59. E
10. D 20. C 30. A 40.B 50.A 60. D
COMPUTER STUDIES PRACTICAL ANSWER