0% found this document useful (0 votes)
21 views7 pages

Year 11.2

Uploaded by

Moses Sozo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views7 pages

Year 11.2

Uploaded by

Moses Sozo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

CEDARVILLE SCHOOL

PLOT 1, BLOCK LXXXII, SOLEKAN ONIYEYE ESTATE, HOTEL JUNCTION,


OFF AKALA WAY, OKE- IBADAN ESTATE,
IBADAN OYO STATE
08135302091
MOTTO: Raising All Round Champions with Godly Character.
SUBJECT: DATA PROCESSING
SESSION: 2024/2025
EXAM TYPE: SECOND TERM EXAMINATION (Mock examination)
CLASS: YEAR 11 and 12
INSTRUCTIONS: Answer all questions in this section.
PAPER ONE: OBJECTIVE
1. Which generation of computers made use of integrated circuit? (a) Fourth (b) Third (c) Second
(d) First
2. Which of the following is an alphabetical data? (a) Bed (b) AX44jj (c) AB + CD (d) %
3. Which of the following factors is not considered when classifying computers? (a) Location (b)
Size (c) Type (d) Purpose
4. Which of the following are NOT parts of a computer processor? (a) CPU and main memory (b)
Control unit and ALU (c) Main memory and storage (d) Operating system and storage
5. Which of the following is not used for online shopping? (a) Master card (b) Credit card (c) Sim
card (d) Verve card
6. Two computers, X and Y are such that the processor in X has a word size of 32 bits while that of
Y is 16 bits. Which of the following statements is true? (a) X can process half as much data Y at
the same time (b) X can process the same amount of data as Y at the same time. (c) X can process
two times as much data as Y at the same time. (d) X can process four times as much data as Y at
the same time.
7. Data gathering involves the following mean except (a) Counting process (b) Voting process (c)
Measuring process (d) Calculating process
8. The television set displays information as (a) Audio-visual signals (b) Audio signals (c) Visual
signals (d) Antenna signals
9. Which of the following is not an ancient medium for transmitting information? (a) Fire lighting
(b) Beating of drums (c) Telephone (d) Whistling
10. A server is a computer that provides services to other computers called (a) Clients (b) Peers (c)
Routers (d) Switches
11. A search engine is a (a) A program that searches engine (b) Computer engines that searches a
database (c) Hardware component of a computer (d) Tool that searches the web
12. The rules for exchanging data on a network are known as (a) Transmission rules (b) transfer rules
(c) protocol (d) Configurations
13. An operating system will perform the following except (a) Files and folder arrangement (b)
Storage location (c) User profile creation (d) protection from surge
14. Which of the following is not a feature of the drawing tool bar? (a) Oval shape (b) Line (c) Drop
cap (d) Arc
15. The performance of the computer can be enhanced by (a) using large monitors (b) using faster
printers (c) installing a scanner (d) increasing the memory size.
16. The moral principles that regulates the use of computers, its accessories and environment are
called (a) ethics (b) conduct (c) attitude (d) appreciation
17. A technician can protect itself from electronic discharge by using (a) wrist wrap (b) voltmeter (c)
screw driver (d) magnet
18. A program designed to detect and prevent malicious programs from a computer system is (a)
spyware (b) passcode (c) malware (d) firewall
19. In a relational model, a tuple is a? (a) A column of table (b) key of a table (c) Row of a table (d)
two-dimensional table
20. Computer virus cannot be transmitted by (a) Downloading issues (b) e-mail attachment (c) pen
drives (d) Typing of keyboard
21. Which of the following operations prevent file loss? (a) File conservation (b) File backup (c) File
maintenance (d) File sorting
22. A computer professional who studies an existing system with a view to evolving a computer
based system from it is (a) System analyst (b) System administrator (c) Computer programmer
(d) Computer engineer
23. Relationship between tables in a relational model are created by (a) foreign keys (b) determinants
(c) composite keys (d) candidates keys
24. Computers stores data as (a) folders (b) files (c) documents (d) directories
25. The records of students in a school are kept in order of their arrival. What files access method
would be used to access a student's record if the latest record would first be retrieved? (a) Direct
(b) Indexed (c) Batch (d) Sequential
26. Which of the following defines heterogeneous distributed database? (a) Same DBMS is used at
each location but data are not distributed across all nodes. (b) Same DBSM is used at each
location with data distributed across all nodes. (c) Different DBSM is used at each location and
data are not distributed across all nodes. (d) Different DBSM is used at each location and data are
distributed across all nodes
27. The prevention of data from corruption and unauthorized access is a function of data (a) security
(b) Secrecy (c) Integrity (d) Coding
28. In hexadecimal numbering system, D is equivalent to (a) 15 (b) 14 (c) 13 (d) 10
29. The teacher computed the average score of students in a given test. The result of the computation
describes (a) record (b) information (c) data (d) file
30. The sum of 1102 and 1012 is (a) 11012 (b)11102 (c) 11002 (d) 10112
31. One advantage of the first generation computers is (a) processing speed (b) Portability (c) heating
effect (d) burglar-proof
32. Which of the following sources of information is received by the user in visual mode only? (a)
Television (b) Radio (c) Photograph (d) Computer
33. A company has four computer system, one printer and one scanner for its daily operations. One
factor that can motivate the company to connect all the devices in a network is the need to (a)
provide efficient services (b) save running cost (c) share software only (d) use a wireless
connection
34. One similarity between the internet and intranet is that they both (a) were invented by the same
company (b) use the same technology (c) have the same coverage (d) are open to the public
35. The process of copying data or information form the internet to a personal computer is termed (a)
browsing (b) downloading (c) retrieving (d) surfing
36. Graphical User Interface is considered user friendly because of the following reasons except that
it (a) compels the user to learn all the command before operating the system(b) displays all the
actions available to the user for easy access (c) is easier for user to operate and understand (d)
makes the icons an menu familiar to the user
37. The symbols dialog box of MS Word application is located on the (a) format menu (b) help menu
(c) insert menu (d) view menu
38. An entrepreneur who wishes to send digital data over a telephone line would need a (a) Hub (b)
Modem (c) Router (d) Switch
39. The merge button in spreadsheet application is used to (a) combine adjacent cell (b) convert
selected cell into single cell (c) merge two tables (d) split a cell into two or more cells
40. A database contains list of customers and their phone numbers. What type of relationship
describes a customer having multiple phone numbers? (a) many-to-many (b) many-to-one (c)
one-to-many (d) one-to-one
41. The following programming tools are employed by a web developer except (a) COBOL (b) CSS
(c) HTML (d) PHP
42. One responsible way of using the computer is (a) Software piracy (b) Phishing (c) pharming (d)
Ethical hacking
43. The difference engine and the analytical engine were invented by (a) Ada Lovelace and Charles
Babbage (b) Blaise Pascal (c) Blaise Pascal and Ada Lovelace (d) Charles Babbage
44. Which of the following computer types represents data as variables and continuous values (a)
Analogue computer (b) Hashed file organization (d) Sequential file organization
45. One application of ICT medicine is (a) seismic software (b) computerized axial recognition (c)
optical character recognition (d) global positional system
46. Computer malware is detected by (a) adware (b) logic bomb (c) antivirus (d) antiglare
47. The speed of access to files in a random access file compared to the files organization methods is
(a) Very slow (b) the same (c) relatively fast (d) slow
48. The process of drawing inference from a piece of information is called (a) Interpretation (b)
analysis (c) collation (d) organization
49. A computer system under use was found to be usually slow, freezes often and very dusty. What is
needed to correct this problem? (a) Hit the system unit with a blower (b) delete some files (c)
change the location of the computer (d) perform maintenance procedure
50. The allocation and de-allocation of computing resources in a computer is the function of (a)
browsers (b) operating system (c) application software (d) memory unit
51. The following terms describe the importance of data security except data (a) availability (b)
integrity (c) normalization (d) consistency
52. Which of the following data elements ranks highest in size? (a) Field (b) Byte (c) Record (d) Bit
53. The modern definition of a computing machine is based on a concept known as (a) circuit
switching (b) digital circuit (c) packet switching (d) stored program
54. The process of gathering facts and statistics from different sources is known as data (a) analysis
(b) collection (c) collation (d) retrieval
55. A chart is a representation of (a) data (b) map (c) process (d) transmission
56. The use of transistors in circuit was a major advancement in the (a) First generation (b) second
generation computers (c) third generation computers (d) fourth generation computers
57. The manipulation of digitized information by computer or other digital electronic equipment is
known as (a) data collection (b) data manipulation
58. A program that enables the computer hardware to communicate and function effectively is (a)
translator (b) liveware (b) operating system (d) application software
59. A word document can have any of these file extension except (a) .doc (b) .docx (c) .jpg (d) .rtf
60. Dust from the system unit casing can be removed using (a) antistatic wipes (b) cotton wool (c)
static wipes (d) wet cloth
61. Convert 478 to its binary equivalent. (a) 1001112 (b) 1100112 (c) 100012 (d) 11110112
62. Which of the following is true about digital computers? (a) They consist of magnetic core
memory (b) They understand data as a continuous measurement of a physical quantity (c) They
represent numbers through string of binary digits. (d) They are mainly used for scientific
purposes
63. Which of the following is a secondary storage device? (a) RAM (b) Bubble memory (c) floppy
disk (d) EPROM
64. Information analysis procedures includes the following except (a) skim and scan (b) recognizing
interrelationships (d) identifying propaganda and bias
65. The advantages of electronic data processing includes the following except (a) automatic
processing (b) hacking (c) fast and reliable processing (d) storage capacity
66. Information transmission by television is classified as (a) multimedia transmission (b) polymedia
transmission (c) unimedia transmission (d) monomedia transmission
67. Social networking does not promote (a) personal publicity (b) business expansion (c) e-commerce
(d) e-payment
68. The spreadsheets symbol used to convert a number to a label is (a) quotation mark (“ “) (b)
equality (=) (c) underscore (_) (d) apostrophe sign (‘)
69. The property of a system software that enables it to execute more than one program at a time is
referred to as (a) compiling (b) virtual memory (c) multitasking (d) load modules
70. The feature in a database application that acts as an interface between the user and the database is
called a? (a) query (b) report (c) form (d) table
71. Planning and creating websites are stages in? (a) web analysis (b) web maintenance (c) web
design (d) web publishing
72. The types of data entered into a table in database follow a set of rules known as? (a) protocols (b)
regulators (c) algorithms (d) constraints
73. Which of the following drawing tools would create special effects for texts? (a) Smart Art (b)
Shape tool (c) Textbox (d) Word Art
74. Which of the following is not a preventive maintenance measure? (a) Regular update of the
update operating system (b) proper shut down of the system (c) use of uninterrupted power
supply (d) data recovery
75. Which of the following is not a computer professional? (a) Network administrator (b) Web server
(c) System analyst (d) File manager
76. The type of file organization in a DVD-ROM is? (a) direct access (b) sequential (c) serial (d)
hierarchical
77. Which of these measures would not secure data in database? (a) Encryption (b) Data integration
(c) Personal Identification number (d) username and passwords
78. One of the advantages of a parallel database is (a) Data sharing (b) data security (c) faster
processing of data (d) uniform memory access
79. Which of the following are a parts of a computer processor? (a) CPU and main memory (b)
control unit and ALU (c) Operating system and application (d) Main memory and storage
80. The MS Excel worksheet below shows the salary distribution for four staff of a company. The net
salary is paid after deductions have been made.

Which of the following formulas would be used to obtain the value in cell E2?
(a) = B2 + C2 – D2
(b) = B2 + C2 + D2
(c) = (B2 + C2 + D2)/3
(d) = C2 – D2

PAPER TWO: THEORY (ANSWER ALL)


1(a) Hamza, Emeka, Funsho, Fejiro and Idongesit were friends from secondary school. Now, Hamza is a
pilot, Emeka is a businessman, Funsho is banker, Fejiro is a manufacturer while Idongesit is a teacher.
State two ways by which any of these friends can apply ICT in their respective professions.
(b) What is teleconferencing?
(c)(i) What is the major function of a modem?
(ii) List two means of transmitting information.
2(a) A secondary school has over twenty personal computers. The school management intends to connect
all the computer in a network. Give four reasons that must have motivated the school management into
connecting the computers together.
(b) List four network devices required to accomplish the task in 2(a)
(c) State one function each of any function of the devices listed in 3(b)
3(a) Explain the following database management terms; (i) entities (ii) attributes (iii) relationship
(b) What is a data model?
(c) State three types of data model.
4(a) List 5 major requirements for internet.
(b) What is internet security?
(c) List and explain 4 common internet threats.
5(a) Define an Operating system.
(b) State two functions of an Operating system.
(c) State three differences between an operating system and application
6(a) Define application package.
(b) State one use each of any four application packages.
(c) List two benefits of presentation packages.

PAPER THREE (TEST OF PRACTICAL QUESTIONS)


ANSWER THREE IN THIS SECTION
1(a) List the type to be pressed on the keyboard in order to:
(i) Move a selected text from on file to another file;
(ii) Save a file;
(iii) Select all items in a file;
(iv) Underline text;
2(a) Given an internet connected computer, outline a step by step procedure for carrying out the following
operations;
(a) How to log on to www.mybooks.com and obtain the prices of books W, X, Y, Z and M.
(b) How to tabulate the prices in a worksheet, showing the prices in dollars and the naira equivalent, for
each book and save the worksheet as "Prices of Books". Assume that the prices of the books are given in
dollars, [use $1.00=N120.00].
(c) How to send the workbook in 5(b) as an attachment to your father's email address
([email protected]) with the subject "Price of Books".
3. (a) Folders are used for storing files in the computer. List the steps for carrying out the following
operations;
(i) creating a folder on the desktop
(ii) giving name on the folder
(iii) sending a file from "My Documents" folder into another file
(v) Changing the name of the folder to "RESULTS".
4. The table below shows selected fields and data types in MS Access.

Field Data Types


Full Name
Reg No. Text
Date of Birth
Address Memo
Fees
What is the appropriate data type for (i) Full name (ii) Fees (iii) Date of birth

You might also like