We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7
CEDARVILLE SCHOOL
PLOT 1, BLOCK LXXXII, SOLEKAN ONIYEYE ESTATE, HOTEL JUNCTION,
OFF AKALA WAY, OKE- IBADAN ESTATE, IBADAN OYO STATE 08135302091 MOTTO: Raising All Round Champions with Godly Character. SUBJECT: DATA PROCESSING SESSION: 2024/2025 EXAM TYPE: SECOND TERM EXAMINATION (Mock examination) CLASS: YEAR 11 and 12 INSTRUCTIONS: Answer all questions in this section. PAPER ONE: OBJECTIVE 1. Which generation of computers made use of integrated circuit? (a) Fourth (b) Third (c) Second (d) First 2. Which of the following is an alphabetical data? (a) Bed (b) AX44jj (c) AB + CD (d) % 3. Which of the following factors is not considered when classifying computers? (a) Location (b) Size (c) Type (d) Purpose 4. Which of the following are NOT parts of a computer processor? (a) CPU and main memory (b) Control unit and ALU (c) Main memory and storage (d) Operating system and storage 5. Which of the following is not used for online shopping? (a) Master card (b) Credit card (c) Sim card (d) Verve card 6. Two computers, X and Y are such that the processor in X has a word size of 32 bits while that of Y is 16 bits. Which of the following statements is true? (a) X can process half as much data Y at the same time (b) X can process the same amount of data as Y at the same time. (c) X can process two times as much data as Y at the same time. (d) X can process four times as much data as Y at the same time. 7. Data gathering involves the following mean except (a) Counting process (b) Voting process (c) Measuring process (d) Calculating process 8. The television set displays information as (a) Audio-visual signals (b) Audio signals (c) Visual signals (d) Antenna signals 9. Which of the following is not an ancient medium for transmitting information? (a) Fire lighting (b) Beating of drums (c) Telephone (d) Whistling 10. A server is a computer that provides services to other computers called (a) Clients (b) Peers (c) Routers (d) Switches 11. A search engine is a (a) A program that searches engine (b) Computer engines that searches a database (c) Hardware component of a computer (d) Tool that searches the web 12. The rules for exchanging data on a network are known as (a) Transmission rules (b) transfer rules (c) protocol (d) Configurations 13. An operating system will perform the following except (a) Files and folder arrangement (b) Storage location (c) User profile creation (d) protection from surge 14. Which of the following is not a feature of the drawing tool bar? (a) Oval shape (b) Line (c) Drop cap (d) Arc 15. The performance of the computer can be enhanced by (a) using large monitors (b) using faster printers (c) installing a scanner (d) increasing the memory size. 16. The moral principles that regulates the use of computers, its accessories and environment are called (a) ethics (b) conduct (c) attitude (d) appreciation 17. A technician can protect itself from electronic discharge by using (a) wrist wrap (b) voltmeter (c) screw driver (d) magnet 18. A program designed to detect and prevent malicious programs from a computer system is (a) spyware (b) passcode (c) malware (d) firewall 19. In a relational model, a tuple is a? (a) A column of table (b) key of a table (c) Row of a table (d) two-dimensional table 20. Computer virus cannot be transmitted by (a) Downloading issues (b) e-mail attachment (c) pen drives (d) Typing of keyboard 21. Which of the following operations prevent file loss? (a) File conservation (b) File backup (c) File maintenance (d) File sorting 22. A computer professional who studies an existing system with a view to evolving a computer based system from it is (a) System analyst (b) System administrator (c) Computer programmer (d) Computer engineer 23. Relationship between tables in a relational model are created by (a) foreign keys (b) determinants (c) composite keys (d) candidates keys 24. Computers stores data as (a) folders (b) files (c) documents (d) directories 25. The records of students in a school are kept in order of their arrival. What files access method would be used to access a student's record if the latest record would first be retrieved? (a) Direct (b) Indexed (c) Batch (d) Sequential 26. Which of the following defines heterogeneous distributed database? (a) Same DBMS is used at each location but data are not distributed across all nodes. (b) Same DBSM is used at each location with data distributed across all nodes. (c) Different DBSM is used at each location and data are not distributed across all nodes. (d) Different DBSM is used at each location and data are distributed across all nodes 27. The prevention of data from corruption and unauthorized access is a function of data (a) security (b) Secrecy (c) Integrity (d) Coding 28. In hexadecimal numbering system, D is equivalent to (a) 15 (b) 14 (c) 13 (d) 10 29. The teacher computed the average score of students in a given test. The result of the computation describes (a) record (b) information (c) data (d) file 30. The sum of 1102 and 1012 is (a) 11012 (b)11102 (c) 11002 (d) 10112 31. One advantage of the first generation computers is (a) processing speed (b) Portability (c) heating effect (d) burglar-proof 32. Which of the following sources of information is received by the user in visual mode only? (a) Television (b) Radio (c) Photograph (d) Computer 33. A company has four computer system, one printer and one scanner for its daily operations. One factor that can motivate the company to connect all the devices in a network is the need to (a) provide efficient services (b) save running cost (c) share software only (d) use a wireless connection 34. One similarity between the internet and intranet is that they both (a) were invented by the same company (b) use the same technology (c) have the same coverage (d) are open to the public 35. The process of copying data or information form the internet to a personal computer is termed (a) browsing (b) downloading (c) retrieving (d) surfing 36. Graphical User Interface is considered user friendly because of the following reasons except that it (a) compels the user to learn all the command before operating the system(b) displays all the actions available to the user for easy access (c) is easier for user to operate and understand (d) makes the icons an menu familiar to the user 37. The symbols dialog box of MS Word application is located on the (a) format menu (b) help menu (c) insert menu (d) view menu 38. An entrepreneur who wishes to send digital data over a telephone line would need a (a) Hub (b) Modem (c) Router (d) Switch 39. The merge button in spreadsheet application is used to (a) combine adjacent cell (b) convert selected cell into single cell (c) merge two tables (d) split a cell into two or more cells 40. A database contains list of customers and their phone numbers. What type of relationship describes a customer having multiple phone numbers? (a) many-to-many (b) many-to-one (c) one-to-many (d) one-to-one 41. The following programming tools are employed by a web developer except (a) COBOL (b) CSS (c) HTML (d) PHP 42. One responsible way of using the computer is (a) Software piracy (b) Phishing (c) pharming (d) Ethical hacking 43. The difference engine and the analytical engine were invented by (a) Ada Lovelace and Charles Babbage (b) Blaise Pascal (c) Blaise Pascal and Ada Lovelace (d) Charles Babbage 44. Which of the following computer types represents data as variables and continuous values (a) Analogue computer (b) Hashed file organization (d) Sequential file organization 45. One application of ICT medicine is (a) seismic software (b) computerized axial recognition (c) optical character recognition (d) global positional system 46. Computer malware is detected by (a) adware (b) logic bomb (c) antivirus (d) antiglare 47. The speed of access to files in a random access file compared to the files organization methods is (a) Very slow (b) the same (c) relatively fast (d) slow 48. The process of drawing inference from a piece of information is called (a) Interpretation (b) analysis (c) collation (d) organization 49. A computer system under use was found to be usually slow, freezes often and very dusty. What is needed to correct this problem? (a) Hit the system unit with a blower (b) delete some files (c) change the location of the computer (d) perform maintenance procedure 50. The allocation and de-allocation of computing resources in a computer is the function of (a) browsers (b) operating system (c) application software (d) memory unit 51. The following terms describe the importance of data security except data (a) availability (b) integrity (c) normalization (d) consistency 52. Which of the following data elements ranks highest in size? (a) Field (b) Byte (c) Record (d) Bit 53. The modern definition of a computing machine is based on a concept known as (a) circuit switching (b) digital circuit (c) packet switching (d) stored program 54. The process of gathering facts and statistics from different sources is known as data (a) analysis (b) collection (c) collation (d) retrieval 55. A chart is a representation of (a) data (b) map (c) process (d) transmission 56. The use of transistors in circuit was a major advancement in the (a) First generation (b) second generation computers (c) third generation computers (d) fourth generation computers 57. The manipulation of digitized information by computer or other digital electronic equipment is known as (a) data collection (b) data manipulation 58. A program that enables the computer hardware to communicate and function effectively is (a) translator (b) liveware (b) operating system (d) application software 59. A word document can have any of these file extension except (a) .doc (b) .docx (c) .jpg (d) .rtf 60. Dust from the system unit casing can be removed using (a) antistatic wipes (b) cotton wool (c) static wipes (d) wet cloth 61. Convert 478 to its binary equivalent. (a) 1001112 (b) 1100112 (c) 100012 (d) 11110112 62. Which of the following is true about digital computers? (a) They consist of magnetic core memory (b) They understand data as a continuous measurement of a physical quantity (c) They represent numbers through string of binary digits. (d) They are mainly used for scientific purposes 63. Which of the following is a secondary storage device? (a) RAM (b) Bubble memory (c) floppy disk (d) EPROM 64. Information analysis procedures includes the following except (a) skim and scan (b) recognizing interrelationships (d) identifying propaganda and bias 65. The advantages of electronic data processing includes the following except (a) automatic processing (b) hacking (c) fast and reliable processing (d) storage capacity 66. Information transmission by television is classified as (a) multimedia transmission (b) polymedia transmission (c) unimedia transmission (d) monomedia transmission 67. Social networking does not promote (a) personal publicity (b) business expansion (c) e-commerce (d) e-payment 68. The spreadsheets symbol used to convert a number to a label is (a) quotation mark (“ “) (b) equality (=) (c) underscore (_) (d) apostrophe sign (‘) 69. The property of a system software that enables it to execute more than one program at a time is referred to as (a) compiling (b) virtual memory (c) multitasking (d) load modules 70. The feature in a database application that acts as an interface between the user and the database is called a? (a) query (b) report (c) form (d) table 71. Planning and creating websites are stages in? (a) web analysis (b) web maintenance (c) web design (d) web publishing 72. The types of data entered into a table in database follow a set of rules known as? (a) protocols (b) regulators (c) algorithms (d) constraints 73. Which of the following drawing tools would create special effects for texts? (a) Smart Art (b) Shape tool (c) Textbox (d) Word Art 74. Which of the following is not a preventive maintenance measure? (a) Regular update of the update operating system (b) proper shut down of the system (c) use of uninterrupted power supply (d) data recovery 75. Which of the following is not a computer professional? (a) Network administrator (b) Web server (c) System analyst (d) File manager 76. The type of file organization in a DVD-ROM is? (a) direct access (b) sequential (c) serial (d) hierarchical 77. Which of these measures would not secure data in database? (a) Encryption (b) Data integration (c) Personal Identification number (d) username and passwords 78. One of the advantages of a parallel database is (a) Data sharing (b) data security (c) faster processing of data (d) uniform memory access 79. Which of the following are a parts of a computer processor? (a) CPU and main memory (b) control unit and ALU (c) Operating system and application (d) Main memory and storage 80. The MS Excel worksheet below shows the salary distribution for four staff of a company. The net salary is paid after deductions have been made.
Which of the following formulas would be used to obtain the value in cell E2? (a) = B2 + C2 – D2 (b) = B2 + C2 + D2 (c) = (B2 + C2 + D2)/3 (d) = C2 – D2
PAPER TWO: THEORY (ANSWER ALL)
1(a) Hamza, Emeka, Funsho, Fejiro and Idongesit were friends from secondary school. Now, Hamza is a pilot, Emeka is a businessman, Funsho is banker, Fejiro is a manufacturer while Idongesit is a teacher. State two ways by which any of these friends can apply ICT in their respective professions. (b) What is teleconferencing? (c)(i) What is the major function of a modem? (ii) List two means of transmitting information. 2(a) A secondary school has over twenty personal computers. The school management intends to connect all the computer in a network. Give four reasons that must have motivated the school management into connecting the computers together. (b) List four network devices required to accomplish the task in 2(a) (c) State one function each of any function of the devices listed in 3(b) 3(a) Explain the following database management terms; (i) entities (ii) attributes (iii) relationship (b) What is a data model? (c) State three types of data model. 4(a) List 5 major requirements for internet. (b) What is internet security? (c) List and explain 4 common internet threats. 5(a) Define an Operating system. (b) State two functions of an Operating system. (c) State three differences between an operating system and application 6(a) Define application package. (b) State one use each of any four application packages. (c) List two benefits of presentation packages.
PAPER THREE (TEST OF PRACTICAL QUESTIONS)
ANSWER THREE IN THIS SECTION 1(a) List the type to be pressed on the keyboard in order to: (i) Move a selected text from on file to another file; (ii) Save a file; (iii) Select all items in a file; (iv) Underline text; 2(a) Given an internet connected computer, outline a step by step procedure for carrying out the following operations; (a) How to log on to www.mybooks.com and obtain the prices of books W, X, Y, Z and M. (b) How to tabulate the prices in a worksheet, showing the prices in dollars and the naira equivalent, for each book and save the worksheet as "Prices of Books". Assume that the prices of the books are given in dollars, [use $1.00=N120.00]. (c) How to send the workbook in 5(b) as an attachment to your father's email address ([email protected]) with the subject "Price of Books". 3. (a) Folders are used for storing files in the computer. List the steps for carrying out the following operations; (i) creating a folder on the desktop (ii) giving name on the folder (iii) sending a file from "My Documents" folder into another file (v) Changing the name of the folder to "RESULTS". 4. The table below shows selected fields and data types in MS Access.
Field Data Types
Full Name Reg No. Text Date of Birth Address Memo Fees What is the appropriate data type for (i) Full name (ii) Fees (iii) Date of birth