Loading....
Press & Hold to Drag Around |
|||
Click Here to Close |
Question 1 Report
In word processing applications, the symbol B, I and U are commonly used buttons found on the
Answer Details
The symbols B, I, and U are commonly used buttons found on the formatting bar in word processing applications. These buttons allow users to apply various formatting styles to selected text, such as bold, italic, and underline. The formatting bar is usually located at the top of the document window and provides quick access to commonly used formatting options.
Question 2 Report
Which of the following is not an effect of computer virus?
Answer Details
The option that is not an effect of a computer virus is "It distorts the computer screen". Computer viruses are malicious software programs that can infect a computer and cause various negative effects. These effects include interfering with computer operation, damaging the computer, and corrupting data. However, distorting the computer screen is not a common effect of computer viruses. This type of effect is more likely caused by hardware problems or issues with the graphics card or display settings.
Question 4 Report
Planning and creating of website is called web
Answer Details
The correct answer is "design". When creating a website, the planning and creation phase is called web design. During this process, designers use various software tools to plan and create the website's layout, structure, and user interface. The design phase also includes selecting fonts, colors, and images to create a visually appealing website. Once the design is complete, the website can be built, published, and maintained.
Question 5 Report
Safety measures to be observed when using the computer include all of the following except
Answer Details
Dropping liquids in the computer room is not a safety measure to be observed when using the computer. This is because liquids can cause damage to the computer's internal components and can also pose a safety risk, such as the risk of electrical shock. On the other hand, the other options listed are safety measures to be observed when using the computer. Using an anti-glare protector can help reduce eye strain and fatigue, maintaining a proper sitting posture can help prevent back and neck pain, and keeping the environment dust-free can prevent damage to the computer's internal components.
Question 6 Report
Data processed into its useful form is referred to as
Answer Details
Data that has been processed, organized, or structured into a form that is meaningful and useful is referred to as information. This implies that raw data has been transformed into a more meaningful form through processing, analysis, and interpretation. Information can be used for decision-making, problem-solving, and knowledge acquisition, making it an essential resource for individuals and organizations. Therefore, the correct answer is "information."
Question 7 Report
Information transmission medium from location P to location Q in space is called
Answer Details
Information transmission medium from location P to location Q in space is called wireless transmission. This refers to the process of transmitting information between two or more points that are not connected by any physical medium, such as cables or wires. Instead, information is transmitted through the air using electromagnetic waves. Examples of wireless transmission include Wi-Fi, Bluetooth, and cellular networks. In contrast, wired transmission involves using physical cables or wires to transmit information between locations. Cabled transmission and asynchronous transmission are specific types of wired transmission.
Question 8 Report
The following software programs coordinates and control all other computer progra, programs, hardware and users' action except
Answer Details
Question 9 Report
Bola intends to evoke the synonyms of a certain word during Word processing. What is the most appropriate tool to use?
Answer Details
The most appropriate tool to use for evoking synonyms of a certain word during word processing is a Thesaurus. A Thesaurus is a tool that helps users find synonyms (words with similar meanings) and antonyms (words with opposite meanings) of a particular word. It is especially useful for improving the vocabulary of a document or finding a more appropriate word to use in a sentence.
Question 10 Report
Which of the following measures are used to secure data on-line? I. Password II. Encryption III. Personal Identification Number (PIN)
Answer Details
To secure data online, all of the following measures can be used: Password, Encryption, and Personal Identification Number (PIN). These measures help to protect sensitive information from unauthorized access, theft or hacking. - Passwords are commonly used to restrict access to online accounts, devices or networks by allowing only those who have the correct password to gain access. Passwords are usually a combination of letters, numbers and symbols that are difficult to guess. - Encryption is the process of converting plain text into a code that is difficult to decipher without the correct key or password. Encrypted data is protected from unauthorized access or tampering. - Personal Identification Number (PIN) is a numeric password that is commonly used to access bank accounts, credit/debit cards or mobile devices. PINs provide an additional layer of security and make it more difficult for someone to gain access to personal information. Therefore, the correct option is (D) I, II, and III.
Question 11 Report
Magazines and brochures can be produced using a
Answer Details
Magazines and brochures are typically produced using graphics software. Graphics software allows designers to create and manipulate images, typography, and layout to produce visually appealing documents such as magazines and brochures. The software provides a range of tools for editing and creating graphics, including drawing tools, image editing tools, and text tools. It also allows designers to work with multiple layers, which can help them create complex designs. Overall, graphics software is an essential tool for producing high-quality, visually appealing print materials such as magazines and brochures.
Question 12 Report
One of the characteristic feature of the second generation computer is the presence of
Answer Details
One of the characteristic features of the second generation computer is the presence of transistors. Second generation computers were developed in the late 1950s to the mid-1960s and were an improvement over the first generation computers. The second generation computers used transistors instead of vacuum tubes, which were used in the first generation computers. The transistor is a semiconductor device that can amplify electronic signals and switch them on and off, and is smaller, more efficient, and more reliable than vacuum tubes. The use of transistors made computers faster, smaller, more reliable, and more affordable, leading to the development of more powerful and versatile computers.
Question 13 Report
the device that sends information to the CPU is the
Answer Details
The device that sends information to the CPU is the input device. Input devices are used to send data and commands to the computer system. Examples of input devices include the keyboard, mouse, scanner, microphone, and camera. They allow the user to interact with the computer and send information to the CPU for processing.
Question 14 Report
A computer professional who studies an existing system with a view to evolving a computer-based system from it is called?
Answer Details
A computer professional who studies an existing system with a view to evolving a computer-based system from it is called a system analyst. The system analyst is responsible for analyzing an existing system, identifying its strengths and weaknesses, and developing solutions to improve its functionality. They work with end-users, stakeholders, and developers to design and implement computer-based systems that meet the needs of the organization. The system analyst must have a deep understanding of both the business processes and the technical aspects of the system to ensure that the new system meets the requirements of the organization.
Question 15 Report
MS Access is an example of a
Answer Details
MS Access is an example of a relational model database management system (DBMS). In a relational model, data is organized into tables, with each table consisting of rows (records) and columns (fields). Relationships between tables are defined based on common fields, and data can be queried, sorted, and filtered using Structured Query Language (SQL) commands. MS Access allows users to create and manipulate relational databases through a graphical user interface, making it easier to design, maintain, and query databases.
Question 16 Report
Which of the following is not a type of wireless transmission
Answer Details
The correct answer is "Fiire optics". Fire optics is not a type of wireless transmission, as it involves transmitting data using light through fiber optic cables, which is a wired transmission method. The other options, Bluetooth, Infrared, and WiFi, are all types of wireless transmission methods that allow communication between devices without the need for physical cables. Bluetooth uses short-range radio waves, infrared uses infrared light waves, and WiFi uses radio waves to transmit data wirelessly.
Question 17 Report
Which of the following is not a good computer maintenance practice?
Answer Details
Cleaning the screen with a wet cloth is not a good computer maintenance practice. Using a wet cloth can damage the screen and lead to permanent marks or even cause a short circuit. It is recommended to use a dry or slightly damp microfiber cloth to clean the screen. The other options listed are good maintenance practices that help to prevent damage and improve the performance of the computer.
Question 18 Report
Which of the following is not an anti-virus?
Answer Details
Compaq is not an antivirus software, it is a brand of computer hardware. Therefore, Compaq is the option that is not an antivirus.
Question 19 Report
During presentation, slide transition can be activated by
Answer Details
During presentation, slide transition can be activated by a mouse click. When giving a presentation in PowerPoint, you can set up slide transitions to occur automatically after a certain period of time or on mouse click. By default, slide transitions occur on mouse click, which means that the next slide in the presentation is shown when the presenter clicks the mouse button. This allows the presenter to control the pace of the presentation and move to the next slide when they are ready. Other options like right-click, mouse drag, or double-click may have specific functions, but they are not used to activate slide transitions during presentation.
Question 20 Report
Which of these methods would delete a relationship defined between two tables in MS Access?
Answer Details
Question 21 Report
Commonly accepted practices, rules or methods in computing are called
Answer Details
Commonly accepted practices, rules or methods in computing are called "standards". Standards are established to ensure compatibility, interoperability, and quality of hardware, software, and data. They can cover a wide range of areas, such as programming languages, file formats, network protocols, security measures, and accessibility guidelines. Standards are often developed and maintained by industry organizations or government agencies, and they may be voluntary or mandatory depending on the context. Adhering to standards can help promote efficiency, consistency, and reliability in computing systems and applications.
Question 22 Report
Magnetic Ink Character Recognition (MICR) are used to read codes on
Answer Details
MICR is used to read codes on bank cheques. The Magnetic Ink Character Recognition (MICR) technology is a specialized form of optical character recognition (OCR) used to read information printed with magnetic ink. The ink used in MICR characters is specially designed to be read by machines that use magnetic fields to detect and decipher the characters, such as those found on bank cheques. This technology allows for faster and more accurate processing of cheque information, reducing errors and fraud.
Question 23 Report
Convert 4\(_2\) to a number in base two
Answer Details
To convert a number in base 4 to base 2, we first need to convert it to base 10, and then from base 10 to base 2. To convert 4\(_2\) to base 10, we start from the rightmost digit and multiply each digit by the corresponding power of 4 and then add the results. 4\(_2\) = 4 x 2\(^0\) = 4 Now that we have converted 4\(_2\) to base 10 and found that it equals 4, we can convert it to base 2. To do this, we divide 4 by 2 and keep track of the remainders until we get a quotient of 0. Then we write the remainders in reverse order to get the base 2 equivalent. 4 / 2 = 2 remainder 0 2 / 2 = 1 remainder 0 1 / 2 = 0 remainder 1 The remainders in reverse order are 1 0 0, which gives us the base 2 equivalent of 4\(_2\): 4\(_2\) = 100\(_2\) Therefore, the answer is 100.
Question 24 Report
When a database recovery manager is invoked after a crash, restart proceeds in the following three phases; I. Undo II. Redo III. Analysis. Arrange these phases in the right order.
Answer Details
The correct order of the phases when a database recovery manager is invoked after a crash is: I. Analysis - where the recovery manager examines the log to determine which transactions were incomplete at the time of the crash and which updates were made by these transactions before the crash. II. Redo - where the recovery manager applies the updates that were made by incomplete transactions before the crash and updates the database to reflect these changes. III. Undo - where the recovery manager rolls back transactions that were incomplete at the time of the crash and undoes the updates made by these transactions. Therefore, the correct order is III, II, I.
Question 25 Report
The assembling of data according to a predetermined order is known as
Answer Details
Question 26 Report
Which of these operations would not improve the performance of a parallel database system?
Answer Details
Storing data across several sites would not improve the performance of a parallel database system. Parallel database systems use multiple processors to handle large amounts of data simultaneously, and typically have multiple nodes or sites where data can be stored. Building indexes, deleting unwanted data, and evaluating queries are all operations that can help improve the performance of a parallel database system. However, storing data across several sites could potentially introduce more communication overhead and slow down the system, unless proper distributed database techniques are used to manage the data effectively. Therefore, storing data across several sites would not necessarily improve the performance of a parallel database system.
Question 27 Report
What file organization would require that all the five (5) records be read before the 6th record is written?
Answer Details
The file organization that would require that all the five (5) records be read before the 6th record is written is "Sequential access file". In a sequential access file, the records are arranged in a sequential order, and the access to the records is done sequentially one after the other, starting from the first record. Therefore, to write the 6th record, all the previous records must be read first, and the write operation can only be performed at the end of the file. This makes it time-consuming and inefficient for applications that require frequent insertions and deletions. On the other hand, in a direct-access file, random access file, and index sequential file, the records can be accessed randomly, allowing for faster read and write operations.
Question 28 Report
Which of the following is safety measure in the computer laboratory?
Answer Details
The safety measure in the computer laboratory is illumination. Adequate illumination in the computer laboratory helps to reduce eye strain and fatigue, as well as prevent accidents and errors that can be caused by poor visibility. It also helps to create a more comfortable and productive environment for users. Eating in the computer laboratory is not allowed as it can lead to spillage of food or drinks on the computer systems, which can damage them. Opening the monitor by unauthorized persons is also not allowed as it can lead to electrocution or damage to the monitor. Poor ventilation in the computer laboratory can also be dangerous as it can cause overheating of the computer systems, which can damage them or even cause a fire.
Question 29 Report
An internet-based system that allows people different geographical locations to have in-personmeeting is known as
Answer Details
An internet-based system that allows people from different geographical locations to have in-person meetings is called a "voice conferencing system." It allows participants to communicate with each other through audio and video channels in real-time, enabling remote collaboration and decision-making. Participants can see and hear each other as if they were in the same room, making it an effective tool for businesses, education, and personal communication. It requires an internet connection and a compatible device like a computer or a smartphone with a microphone and a camera.
Question 30 Report
In e-mail context, bcc stands for
Answer Details
In e-mail context, bcc stands for "blind carbon copy." When sending an email, the "To" field is where you put the primary recipients, while the "Cc" (carbon copy) field is where you put the secondary recipients who are being copied on the message. The "Bcc" (blind carbon copy) field is used for recipients who should receive the message, but whose identities should be kept hidden from other recipients in the "To" and "Cc" fields. This is commonly used when sending an email to a large group of people where you want to protect the privacy of everyone's email address.
Question 31 Report
Which of the following is one of the tools used to maintain the computer
Answer Details
Blower is one of the tools used to maintain the computer. A blower is a device that is used to blow away dust or dirt from the computer components. It is essential to remove dust and dirt from the computer, as it can cause overheating, which can lead to hardware damage and failure. The blower can be used to blow out the dust and dirt from the computer's keyboard, vents, ports, and other components.
Question 32 Report
Which of the following is not a procedure for information processing?
Answer Details
The procedure that is not for information processing is segregation. Segregation refers to the act of separating or dividing information into different groups or categories based on certain criteria. This can be a part of the organization process, which involves arranging information in a logical and systematic manner. On the other hand, organization, interpretation, and collation are all important procedures in information processing. Organization involves arranging data in a logical order or structure, which makes it easier to access and analyze. Interpretation involves making sense of the data by analyzing, explaining or drawing conclusions from it. Collation involves bringing together data from different sources and combining them into a single unified document or report. Therefore, segregation is not a procedure for information processing, while organization, interpretation, and collation are all important parts of the process.
Question 33 Report
The gap between ownership, access, and benefits from computer and it's application is termed degital
Answer Details
The gap between ownership, access, and benefits from computer and its applications is termed digital divide. This refers to the unequal distribution of technological resources, skills, and opportunities among different groups of people, such as those living in developed and developing countries, or those from different socioeconomic backgrounds. The digital divide can lead to disparities in education, employment, and economic opportunities, and can contribute to the marginalization of certain groups in society. Efforts are being made to bridge the digital divide through initiatives such as improving access to technology, providing digital skills training, and promoting digital inclusion policies.
Question 34 Report
Maintaining the value nd content of data is part of data
Answer Details
Maintaining the value and content of data refers to the data integrity. Data integrity is the accuracy, completeness, and consistency of data over its entire lifecycle. It ensures that the data remains intact and unchanged from its original form throughout its storage, processing, and transmission. Any alteration or modification in the data should be authorized and tracked to maintain data integrity. Data integrity is critical in ensuring the reliability and usefulness of data for decision-making, analysis, and other purposes. It is an essential aspect of data management and security. Therefore, the correct label for the question is "integrity."
Question 35 Report
The basic criterion for classifying a network is
Answer Details
The basic criterion for classifying a network is the geographical scope. Geographical scope refers to the geographical area covered by the network. Networks can be classified into four categories based on their geographical scope: Local Area Networks (LAN), Metropolitan Area Networks (MAN), Wide Area Networks (WAN), and Global Area Networks (GAN). - LAN covers a small geographical area like a home, office, or building. - MAN covers a larger area like a city or a town. - WAN covers a wide area like a country or multiple countries. - GAN covers a global area like the internet. Therefore, the geographical scope of a network is the most basic criterion for its classification.
Question 36 Report
Which of the following is used to retrieve specific information from database tables?
Answer Details
Question 37 Report
Ina worksheet, which of the following actions would select non-contiguous cells?
Answer Details
Holding down the Ctrl key would select non-contiguous cells in a worksheet. To select non-contiguous cells, you would click on one cell to start, hold down the Ctrl key, and then click on each additional cell that you want to select. This allows you to select multiple cells that are not adjacent to each other. Holding down the Shift key selects a range of cells that are adjacent to each other. Holding down the Alt key does not have any special selection function, and holding down the Ctrl+Shift key also selects a range of cells but includes non-adjacent cells in between the starting and ending cell.
Question 38 Report
Which of the following is not a characteristics of a personal computer
Answer Details
Question 41 Report
Mr Okafor has a company that specializes in the production of beverages with headquarters in Abuja. He intended to monitor the sales and transactions in the company's branches across Nigeria as well as interact with his customers.
(a) Through what platform can Mr Okafor achieve his intention?
(b) What computer professional should Mr Okafor hire to design the platform in 3(a)?
(c) State two software packages needed to create the platform for Mr Okafor.
(d) If Mr Okafor decides to connect all the offices within the headquarters in abuja in a single network;
(i) What type of network is appropriate?
(ii) Mention three reasons to support his decision.
(e) Mention two transmission media that can be used to implement the network in 3(d)(i).
None
Answer Details
None
Question 42 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
(a) A teacher asked a student to capture and print out a one-slide presentation assignment using, MS Word, showing everything on the screen.
(i) What keys or combination of keys can be used to carry out this operation?
(ii) Describe the procedure to be followed by the student in carrying out this assignment using the keyboard.
(b) A system analyst was hired to set up a computer laboratory for Bofe international School; (i) Mention three hardware devices the analyst would need to set up the laboratory.
(ii) List three database application packages likely to recommend by the analyst
(iii) State three Word processing packages likely to be installed
(c) Complete Table 1 on keyboard shortcuts.
Table 1
S/N | Keystroke | Action |
(i) | Page brake | |
(ii) | Ctrl+F | |
(iii) | F1 | |
(iv) | Ctrl+F2 |
Answer Details
None
Question 43 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
(a) Use the Fig 1 to answer questions (i) to (iv)
(i) What does Fig 1 represent?
(ii) Identify two output components in Fig 1.
(iii) Give the names of the parts labelled III, VI, VII.
(iv) State one precautionary measure that should be taken to protect the setup from power fluctuations while in use
(v) Data entry into system can be achieved through the parts labelled
(vi) Mention one device that can be used to access the part labelled VII.
(b) Figures 2 and 3 represent mass storage media. Use the figures to answer questions (i) to (iv)
(i) Identify the media represented by; Fig 2, Fig 3
(ii) The transaction files of a company are to be recorded and accessed in the order which they arrive. Which of the media is most suitable for the purpose?
(iii) In which media will the stored data be accessed faster?
(iv) State the file access method for each medium
Fig. 2
Fig 3
(c) A CCTV camera system has a 300 MB storage device. Each image size is 300 kB.
(i) How many images can be stored by the CCTV.
(ii) If the storage device is full, mention one one measures that should betaken to ensure that the system continues to capture and store image without loosing already stored images.
Question 44 Report
(a) Define the term Software Maintenance.
(b) List four types of Software Maintenance.
(c) State our importance of software maintenance.
Question 45 Report
(a) State four classes of computer based on size.
(b) Define the term Information and Communication Technology (ICT).
(c) Highlight three wys (ICT) has impacted on the society.
Answer Details
None
Question 46 Report
(a)(i) What is computer Ethics?
(ii) State three computer room management ethics.
(b) List five laboratory rules and regulations.
Would you like to proceed with this action?