Loading....
Press & Hold to Drag Around |
|||
Click Here to Close |
Question 1 Report
The following are attributes of computer virus except the ability to
Answer Details
The attribute that a computer virus does not have is to warn the user before execution. A computer virus is a type of malicious software that is designed to replicate itself and spread to other files and systems. It can also modify other files without the user's approval, and execute itself without the user's knowledge or permission. However, a virus does not typically warn the user before it starts executing and causing damage. In fact, the whole point of a virus is to run secretly, so the user is unlikely to even know that their computer is infected.
Question 2 Report
The first generation computers made use of
Answer Details
The first generation computers made use of low level programming. Low level programming involves writing code that communicates directly with the computer's hardware components, such as the processor and memory. This was necessary because first generation computers used vacuum tubes and punch cards, which required very specific instructions to operate correctly. Programmers had to write code in binary language, which is composed of only two digits (0 and 1), to perform simple tasks such as adding and subtracting numbers. This required a lot of technical knowledge and was very time-consuming. However, low level programming was the only way to make the first generation computers function properly.
Question 3 Report
The website "www.google.com" indocates that Google is
Answer Details
Google is a commercial organization. This means that it is a company that primarily exists to make a profit by selling products or services. In the case of Google, the company makes its money primarily through online advertising, which it displays on its search engine results pages, as well as on other websites and apps that use Google's advertising platform. While Google may also engage in research and educational initiatives, its main goal is to generate revenue for its shareholders.
Question 4 Report
Which of the following programs is a computer virus
Answer Details
The program that is a computer virus among the options given is "Tuareg". A computer virus is a type of malicious software that can infect a computer system and cause harm by replicating itself and spreading to other devices. A virus can cause damage to the computer, steal sensitive information, or even render the system inoperable. Kaspersky, NOD 32, and Norton are all antivirus programs designed to protect the computer from viruses and other types of malware. They work by detecting and removing viruses from the computer system. In contrast, Tuareg is not an antivirus program, but rather a type of computer virus that can cause harm to the computer system it infects. Therefore, of the options given, Tuareg is the computer virus.
Question 5 Report
Which of the following formulas would calculate the total score of ONYEBUEKE DEBORAH in the five subjects
S/N | A | B | C | D | E | F |
1 | NAME OF STUDENT | ENGLISH LANGUAGE | MATHEMATICS | DATA PROCESSING | COMPUTER STUDIES | CIVIC EDUCATION |
2 | ANENE LORRETA | 65 | 90 | 70 | 85 | 65 |
3 | BAKARE IMAN | 60 | 65 | 75 | 80 | 75 |
4 | ENEH GRACE | 75 | 65 | 65 | 75 | 60 |
5 | MOHEMMED DEJI | 65 | 60 | 65 | 60 | 60 |
6 | ONYEBUEKE DEBORAH | 89 | 65 | 60 | 60 | 65 |
Answer Details
To calculate the total score of ONYEBUEKE DEBORAH in the five subjects, we need to add up the scores for each of the five subjects she took. We can do this using the SUM function in Microsoft Excel or Google Sheets. Looking at the table, we can see that ONYEBUEKE DEBORAH's scores for the five subjects are located in columns B to F of row 6. Therefore, we can use the formula =SUM(B6:F6) to calculate her total score. This formula adds up the values in cells B6, C6, D6, E6, and F6 and returns the sum as the total score for ONYEBUEKE DEBORAH in the five subjects. So, the correct formula to calculate ONYEBUEKE DEBORAH's total score in the five subjects is =SUM(B6:F6).
Question 6 Report
A reference to another page or resource on a website is done by
Answer Details
A reference to another page or resource on a website is done by using a hyperlink. A hyperlink is a clickable link that directs you to another web page or resource, such as an image or a document. Hyperlinks are often displayed as underlined or colored text, but they can also be represented by buttons, images, or other graphical elements. When you click on a hyperlink, your web browser takes you to the page or resource that the hyperlink is pointing to.
Question 7 Report
Table 1 is a part of MS Excel worksheet which shows the mark obtained by some students in an examination. Use the table to answer questions 20 and 21.
S/N | A | B | C | D | E | F |
1 | NAME OF STUDENT | ENGLISH LANGUAGE | MATHEMATICS | DATA PROCESSING | COMPUTER STUDIES | CIVIC EDUCATION |
2 | ANENE LORRETA | 65 | 90 | 70 | 85 | 65 |
3 | BAKARE IMAN | 60 | 65 | 75 | 80 | 75 |
4 | ENEH GRACE | 75 | 65 | 65 | 75 | 60 |
5 | MOHEMMED DEJI | 65 | 60 | 65 | 60 | 60 |
6 | ONYEBUEKE DEBORAH | 89 | 65 | 60 | 60 | 65 |
Which of the following formulas would calculate the average score of the students in Mathematics?
Answer Details
Question 8 Report
The protection of database against compromise is known as
Answer Details
The protection of a database against compromise is known as database security. It involves taking various measures to ensure the confidentiality, integrity, and availability of the data stored in a database. This can include implementing user authentication and access control, encrypting sensitive data, regularly backing up the database, and using firewalls and other security software to prevent unauthorized access. The goal of database security is to prevent unauthorized access to the information stored in the database, as well as protect against data loss or corruption.
Question 9 Report
At what stage of information processing is data validtion carried out?
Answer Details
Question 10 Report
Arranging records in a file according to a particular order is referred to as
Answer Details
Arranging records in a file according to a particular order is referred to as "sorting". Sorting is the process of arranging data or records in a specific order, such as alphabetical, numerical, or chronological, to make it easier to search, retrieve, or analyze the data. This can be done manually, but it is often done using computer programs or software that can sort large amounts of data quickly and efficiently. By sorting data, it becomes more organized and easier to work with, making it a crucial step in many data-related tasks and processes.
Question 12 Report
Which of the following command would undo the last operation carried out in Microsoft Word
Answer Details
The command that would undo the last operation carried out in Microsoft Word is "Ctrl + Z". When you perform an action such as typing, deleting, or formatting text in Word, the program keeps track of that action in a history of changes. The "Ctrl + Z" keyboard shortcut allows you to undo the most recent action you performed, effectively reversing its effects. For example, if you accidentally deleted a sentence in your document, you can use "Ctrl + Z" to undo the deletion and restore the sentence. If you want to redo an action that you previously undid, you can use the "Ctrl + Y" keyboard shortcut, which is the opposite of "Ctrl + Z". On the other hand, "Ctrl + W" is used to close the current document or window in Word, while "Ctrl + U" is used to underline text.
Question 14 Report
The ICT application which helps to resolve road congestion at junctions is
Answer Details
The ICT application which helps to resolve road congestion at junctions is the traffic light. Traffic lights are automated devices that use a set of signals to regulate traffic flow and prevent accidents at intersections or junctions. The lights are programmed to change colors at specific intervals, allowing vehicles and pedestrians to move in a safe and orderly manner. By controlling the flow of traffic, traffic lights can help to reduce congestion, increase efficiency, and improve safety on the roads. They are an essential tool for managing traffic in urban areas and are used in cities all over the world.
Question 15 Report
The following are advantages of networking except
Answer Details
The advantage of networking is that it allows computers and other devices to communicate and share resources with one another. This means that users can easily access files, printers, and other devices on the network, which can increase productivity and efficiency. Additionally, networking can facilitate communication between individuals and groups, which is essential for businesses, organizations, and even personal relationships. Finally, networking can also provide backup and redundancy options to ensure that data is not lost in the event of hardware failures or other disasters. The option of spamming, on the other hand, is not an advantage of networking, but rather a negative consequence of certain individuals or entities abusing the technology for their own purposes. Spamming involves sending unwanted and often unsolicited messages to large groups of people, which can be a nuisance and even a security risk.
Question 16 Report
Extracting information in Database Management System (DCMS) involves
Answer Details
In a Database Management System (DBMS), extracting information involves querying the database. A query is a request for specific information from the database. It allows users to retrieve data that meets certain criteria, such as all customers who have made a purchase in the past month or all products with a price higher than a certain amount. Users can specify the information they want to retrieve by writing a query in a query language, such as SQL (Structured Query Language). The DBMS then processes the query and returns the requested information in a readable format. Sorting, editing, and cross-referencing are additional functions that can be performed on the queried data once it has been extracted from the database.
Question 17 Report
Stages in data processing cycle includes the following except data
Answer Details
Question 18 Report
The media which enable electromagnetic signals to be transmitted through free space is known as
Answer Details
The media which enable electromagnetic signals to be transmitted through free space is known as unguided media. Unguided media refers to any wireless communication technology that uses air or space as the medium for transmitting signals. Examples of unguided media include radio waves, microwave, and infrared radiation. These types of media are not confined to any physical structure or pathway and can travel through free space in any direction. In contrast, guided media, such as twisted pair cables or fiber optic cables, rely on physical pathways or structures to transmit signals. Intranet and Ethernet, on the other hand, are not types of media for transmitting signals through free space, but rather refer to computer networks and communication protocols used to transfer data within a network.
Question 20 Report
The following are advantages of a Database Management System (DBSM) except
Answer Details
A Database Management System (DBMS) is software used to manage and organize data in a database. It offers several advantages such as restricting unauthorized access to data, providing multiple interfaces to different classes of users, and providing backup and recovery options. However, compromising data integrity is not an advantage of a DBMS. Data integrity is the accuracy and consistency of data in a database. A DBMS is designed to ensure that data is stored and managed in a consistent and accurate manner. It includes features like data validation, transaction management, and concurrency control that help to maintain data integrity. Therefore, compromising data integrity would be a disadvantage of a DBMS, not an advantage.
Question 21 Report
Which of the following is not considered when classifying computers
Answer Details
The location of a computer is not considered when classifying computers. The other three factors, size, type, and purpose, are typically used to classify computers. Size refers to the physical dimensions of a computer, and can range from small handheld devices to large tower systems. Type refers to the specific design and architecture of a computer, such as a desktop, laptop, tablet, or server. Purpose refers to the intended use of a computer, such as personal use, business use, or gaming. Classifying computers based on these factors helps to determine the appropriate hardware and software for a particular need or use case.
Question 22 Report
A relational database model is designed according to set of rules known as
Answer Details
A relational database model is designed according to a set of rules known as normalization. Normalization is a process of organizing the data in a database to minimize redundancy and dependency. It involves breaking down a large table into smaller, more manageable tables and establishing relationships between them. This helps to ensure data integrity, improve performance and prevent data anomalies. Normalization also helps to simplify the database design and make it easier to maintain and update. Normalization is an important concept in relational database design, as it helps to ensure that the data is stored in a consistent and organized manner. This helps to prevent data inconsistencies and errors, and makes it easier to retrieve and analyze the data as needed.
Question 23 Report
Computer virus is not transmitted through
Answer Details
A computer virus is a malicious software program that can replicate itself and infect other computers. Computer viruses can be transmitted through various means, but there is one option in the list that is not a way for a computer virus to be transmitted: formatting of documents. Formatting of documents is a process of changing the appearance and layout of a document, such as adjusting the font, margins, or spacing. It does not involve the transfer of any executable code or software, which is necessary for a virus to infect a computer. On the other hand, email, external storage devices, and the internet can all be used as vectors for transmitting computer viruses. Email attachments, for example, can contain infected files that, when opened, can infect the recipient's computer. External storage devices, such as USB flash drives, can carry viruses that can infect computers when the device is plugged in. The internet can also be a source of viruses, as they can be downloaded or installed from websites or through malicious links. To prevent virus infections, it is important to keep your computer's antivirus software up-to-date, avoid opening suspicious email attachments, and be careful when downloading files from the internet or using external storage devices.
Question 24 Report
Which of the following devices would not transmit signals from one point to another?
Question 25 Report
Which of the following is a characteristic of parallel databases?
Question 26 Report
The main components of the central processing unit (CPU) of the computer are
Answer Details
The main components of the central processing unit (CPU) of a computer are the control unit and the arithmetic logic unit (ALU). The control unit is responsible for directing and coordinating the operations of the other components in the computer. It retrieves instructions from memory, decodes them and then directs the ALU and other components to execute the instructions. The ALU, on the other hand, performs arithmetic operations such as addition, subtraction, multiplication, and division. It also performs logical operations such as comparisons and bitwise operations. The ALU is the part of the CPU that actually performs the calculations and manipulates the data. Together, the control unit and ALU form the heart of the CPU and are responsible for executing all the tasks and operations of the computer.
Question 28 Report
Set of moral principles that regulate the ise of computers and concerns professional and social conduct is known as
Answer Details
The correct answer is "computer ethics". Computer ethics refers to a set of moral principles that guide the use of computers, technology, and the internet. It includes the responsible use of computers, the protection of personal information, the prevention of cyberbullying, and the avoidance of illegal activities online. Computer ethics addresses professional and social conduct related to the use of technology. It sets a standard for the ethical behavior of individuals, organizations, and society as a whole. Adhering to computer ethics ensures that individuals and organizations use technology in a responsible and accountable manner.
Question 29 Report
Which of these channels would enable business transactions between a buyer from Nigeria and a seller from Ghana
Answer Details
The channel that would enable business transactions between a buyer from Nigeria and a seller from Ghana is e-commerce. E-commerce refers to the buying and selling of goods and services over the internet. It involves the use of electronic platforms, such as websites or mobile apps, to conduct commercial transactions. E-commerce allows buyers and sellers from different parts of the world to connect and transact business in a convenient and efficient manner. In this case, a buyer from Nigeria and a seller from Ghana can use an e-commerce platform to conduct their business transactions. The buyer can browse through the seller's products on the platform, make a selection, and place an order. The seller can receive the order, process it, and arrange for shipping to the buyer's location in Nigeria. Payment can also be made securely through the e-commerce platform, using a variety of payment options. Therefore, e-commerce is the channel that would enable business transactions between a buyer from Nigeria and a seller from Ghana.
Question 30 Report
Information that stimulates both the senses of hearing and sight is called
Answer Details
Information that stimulates both the senses of hearing and sight is called "audio-visual". This refers to any form of media or communication that combines both auditory and visual elements. For example, a video with sound would be considered audio-visual because it includes both visual and auditory information. This type of information is often used in movies, television shows, presentations, and other forms of media to engage and communicate with audiences in a more dynamic and impactful way.
Question 31 Report
A special effect that controls the way slides appear in PowerPoint presentation is called
Answer Details
The special effect in PowerPoint that controls the way slides appear during a presentation is called a Transition. Transitions add animation and visual effects to slides, making the presentation more engaging and interesting for the audience. A Transition determines how one slide replaces another, such as fading in or sliding out, or any other effects between slides. PowerPoint provides a range of Transition options to choose from, including simple effects like fade or dissolve, and more complex effects like 3D flip or rotate. WordArt, Theme, and ClipArt are not special effects that control the way slides appear in PowerPoint. WordArt is a feature in PowerPoint that lets users create stylized text with different effects and shapes. Themes provide a consistent look and feel for the entire presentation, including the background, fonts, and color scheme. ClipArt is a library of images and illustrations that users can add to their slides to enhance their presentation.
Question 32 Report
Another term for Uniform Resources Locator (URL) is
Answer Details
Another term for Uniform Resource Locator (URL) is "website address". A URL is a string of characters that identifies a web page on the internet. It contains the protocol used to access the page (such as HTTP or HTTPS), the domain name where the page is hosted, and the specific location of the page on the server. The term "website address" is often used interchangeably with URL because it's a more user-friendly way of referring to the location of a website. It's the address that a user types into their web browser to access a specific website or web page on the internet.
Question 33 Report
Which of the foolowing statements about relational model is not correct?
Answer Details
The statement "Data in the rows of a table are of the same data type" is not correct. In a relational database model, the columns of a table have a defined data type (such as integer, text, date, etc.), but the data type of values in a row can be different for different columns in that row. For example, in a table of employees, a column for the employee's name might have a data type of text, while a column for their hire date might have a data type of date, and a column for their salary might have a data type of integer. The values in each row of the table would then contain a text value for the name, a date value for the hire date, and an integer value for the salary.
Question 34 Report
The computer professional responsible for designing and maintaining a database is called database
Answer Details
The computer professional responsible for designing and maintaining a database is called a database administrator. They are responsible for managing the database system, ensuring that it is organized and efficient, and that the data is secure and accessible to those who need it. They work closely with programmers to design and implement the database structure, and they monitor and troubleshoot any issues that arise. A database administrator also ensures that backups and recovery processes are in place in case of system failure or data loss. Essentially, they are the caretakers of the database system, ensuring that it is running smoothly and serving the needs of the organization.
Question 35 Report
Identify an operating system from the following software
Answer Details
The operating system in the list is Linux. An operating system is the software that manages all the other software and hardware on a computer. It acts as a bridge between the computer hardware and the programs or applications that run on the computer. Linux is a popular open-source operating system that is known for its stability, security, and versatility. It is used on a wide range of devices, including servers, laptops, smartphones, and embedded systems. Linux is free and can be modified by anyone, which makes it a popular choice for people who want more control over their computer's software.
Question 37 Report
The proactive maintenance of computer equipment before a fault or failure occurs is called
Answer Details
The proactive maintenance of computer equipment before a fault or failure occurs is called preventive maintenance. This involves regularly checking and servicing computer equipment to prevent potential problems before they happen. The goal is to keep the equipment running smoothly and avoid unexpected downtime, which can be costly and disruptive. Preventive maintenance can include tasks such as cleaning, lubricating, and replacing worn parts. By staying ahead of potential issues, preventive maintenance helps to extend the life of computer equipment and improve its reliability.
Question 38 Report
The design output of a graphic package can be in the following file formats except
Answer Details
The design output of a graphic package cannot be saved in the .rtf format. Rich Text Format (.rtf) is a file format used for text documents that may include formatting, such as bold or italic text. However, .rtf does not support images or other graphical elements. Therefore, graphic design software packages cannot save their output in .rtf format. On the other hand, .jpg, .gif, and .bmp are all file formats commonly used for saving images and can be used as output formats for graphic design software.
Question 39 Report
The act of producing information from figures, text or images is called data
Answer Details
The act of producing information from figures, text or images is called processing data. Processing data involves using computers or other tools to analyze and manipulate information in order to produce meaningful insights and conclusions. This can involve tasks such as sorting, filtering, and calculating data to extract important patterns and trends. The other options - collation, conversion, and preparation - all relate to different stages in the process of gathering and organizing data before it is processed.
Question 40 Report
While typing, a series of letters were highlighted and the keyboard key combination "Ctrl + B" was executed, the highlighted letters would be
Answer Details
If you highlight a series of letters while typing and execute the keyboard key combination "Ctrl + B," the highlighted letters would be bolded. This is because "Ctrl + B" is the shortcut key for applying bold formatting to text. The bold formatting is often used to make text stand out or emphasize important information.
Question 41 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
(a) Itoro was tasked with the responsibility of producing the report of hi group project He is to submit both the soft and hard copies of the report to his form teacher. The soft copy must be submitted to the email; form teacher@school.edu.ng
(i) List two;
I. Applications required to carry out the task
II. Hardware required to carry out the task
(ii) Identify two conditions to be satisfied by Itoro to submit the electronic copy of the report.
(iii) On the first attemot to send the soft copy of the report, Itoro observed a "spinning wait cursor"/"spinning disc pointer" on the screen for a long time.
Identify three possible reasons for this observation.
(iv) State one output device that can be used to produce the hard copy report.
Figure 2 is an interface of an application software. Use the figure to answer question 5(b)
Figure 2
(b)(i) Name the type of application software represented in figure 2.
(ii) List three examples of the application in 5(b)(i)
(iii) Given that the application in figure 2 is running on a computer that has internet access, outline the steps to follow in creating an email address/account.
None
Answer Details
None
Question 42 Report
(a) Outline the steps involved in printing the first five pages of a word document from the print dialog box on a computer with two printers installed.
(b) Sadiq complained that a pop-up usually appears on the screen of his personal computer thereby disturbing him while using the computer;
(i) What is the possible cause of the pop-up?
(ii) State a possible cause of the element causing the pop-up.
(iii) What measure would be necessary to stop the pop-up from reoccurring?
(c) Mr Aneke is billed to address audience in an auditorium.
(i) What computer application package is suitable to prepare and deliver his speech?
(ii) State the output device that can be used to transmit Mr Aneke's speech note from his computer to a large screen in the auditorium.
(d) Give two types of computer network.
Question 43 Report
(a) Outline the steps involved in creating the Query By Example (QBE) in figure 1 assuming the table customer exist already.
Figure 1
(b) Write the steps to generate the SQL statement for the action in 4 (a).
a) Steps involved in creating a Query By Example (QBE) in Figure 1:
b) Steps to generate the SQL statement for the action in 4 (a):
The final SQL statement for the action in 4 (a) would look like this:
SELECT First Name, Last Name, City
FROM customer
WHERE City = 'London';
Answer Details
a) Steps involved in creating a Query By Example (QBE) in Figure 1:
b) Steps to generate the SQL statement for the action in 4 (a):
The final SQL statement for the action in 4 (a) would look like this:
SELECT First Name, Last Name, City
FROM customer
WHERE City = 'London';
Question 44 Report
(a) Vera a secretary to the manager of her organization is saddled with the responsibility of typing a confidential report. She is also instructed to insert the word "CONFIDENTIAL" diagonally in the background of every page of the report.
(i) State the most suitable application software needed by Vera to produce the report.
(ii) What feature of the application software can be used to insert the word "CONFIDENTIAL" as instructed?
(iii) Mention one measure that can be taken to ensure the confidentiality of the soft copy of the report in the computer.
(b) Explain the following terms;
(i) Icon
(ii) Browser
Answer Details
None
Question 45 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
(a) Figure 3 is created using a Word processor. Use the figure to answer question 6(a)
Figure 3
(a)(i) What is the name given to the feature on the first character in the document in figure 3?
(ii) Highlight the step to;
I. Achieve the feature on the first character in 6(a)(i)
II. Obtain the two columns as shown in figure 3.
(b) Give two objects that can be placed on a document using the "insert menu" on MS Word application.
(c) Outline the steps to perform the following actions in CorelDraw application;
(i) inserting a circular shape
(ii) adding the caption "Happy Birthday"
(iiI) changing the colour of the caption to Red
(iv) fitting the caption around the circular object.
Answer Details
None
Question 46 Report
(a)(i) What is data model?
(ii)State three types of data model
(b)(i) List three approaches to data modeling.
(ii) Explain any one approach listed in1(b)(i)
None
Answer Details
None
Would you like to proceed with this action?