Loading....
Press & Hold to Drag Around |
|||
Click Here to Close |
Question 1 Report
S/N | A | B | C | D | E | F | G | H |
1 | STAFF | DAYS | ITEMS SALES (N) | ITEMS SALES (N) | ITEMS SALES (N) | ITEMS SALES (N) | ITEMS SALES (N) | ITEMS SALES (N) |
2 | JOY | MON | 208 | 300 | 500 | 400 | 300 | 158 |
3 | AKIN | TUE | 300 | 200 | 500 | 400 | 200 | 200 |
4 | KEN | WED | 400 | 300 | 400 | 500 | 100 | 300 |
Figure 3
The highest sale by Joy is recorded in cell
Answer Details
The highest sale by Joy is recorded in cell "E2". This is because the "ITEMS SALES (N)" column represents the sales for each staff member, and "JOY" is located under the "STAFF" column. The sales data for Joy are listed in row 2, and the highest value in that row is found in column "E", which corresponds to the "ITEMS SALES (N)" for Thursday. Therefore, the highest sale by Joy is recorded in cell "E2", which contains the value "400".
Question 3 Report
To show the whole presentation in Microsoft PowerPoint 2007, select slide show from the
Answer Details
Question 4 Report
The field in a database which uniquely identifies each record is called a
Answer Details
A primary key is a field in a database that uniquely identifies each record. It acts as a unique identifier for each record in a table and ensures that no two records are the same. The primary key is used to connect related information stored in different tables in a database, and is essential for ensuring the accuracy and integrity of the data stored in a database. Simply put, it's like a fingerprint for each record in a table that helps distinguish it from other records.
Question 5 Report
The protocol for transferring files from one machine to another is
Answer Details
The protocol for transferring files from one machine to another is FTP (File Transfer Protocol). FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the Internet. It is often used to upload or download files to or from a server, such as a web server or a file server. When using FTP, you typically connect to a server using a client software, such as FileZilla or WinSCP. Then, you can browse the server's file system, select the files you want to transfer, and either upload or download them. FTP is one of the oldest and most widely used file transfer protocols, and it is still widely used today due to its simplicity and versatility. However, it is important to note that FTP transfers are not secure, and it is recommended to use a secure file transfer protocol, such as SFTP (Secure File Transfer Protocol), if security is a concern.
Question 6 Report
The joystick is mainly used for
Answer Details
The joystick is mainly used for playing computer games. A joystick is a handheld device that allows users to control the movement of an object on a screen, such as a character in a game. The joystick usually has a stick that can be moved in different directions and buttons that can be pressed to perform different actions. Joysticks are popular among gamers because they provide a more immersive and intuitive way to interact with games than using a keyboard or mouse. While joysticks can also be used for other purposes, such as controlling airplanes or robotics, their primary use is for gaming.
Question 7 Report
Figure 2 shows a dialog box from Microsoft Word application. Use it to answer question 19
Which of the following command shortcuts can be used to display the dialog bax in Figure when the application is running?
Answer Details
Question 8 Report
Figure 4 shows CorelDraw tool bar. The part labeled I is used to
Answer Details
The part labeled "I" in the CorelDraw tool bar is used to select objects. In CorelDraw and other graphic design software, the selection tool is used to select and manipulate objects within the design. This is an essential tool for making edits and changes to the design, as it allows you to select objects and move, resize, or modify them as needed. When you click on an object in the design with the selection tool, the object will become surrounded by selection handles, which indicate that the object is selected and can be edited. Additionally, the selection tool can be used to select multiple objects at once, making it easy to manipulate multiple elements in the design at the same time. It is important to note that the selection tool is just one of many tools available in CorelDraw and other graphic design software, and each tool has a specific purpose and function. Understanding the different tools and their uses is an important part of working with graphic design software.
Question 9 Report
The best arrangement that gives the correct order of magnitude of the database element is
Answer Details
Question 10 Report
The function of the SQL statement SELECT Student ID, Surname, House Name FROM Student, is that it
Answer Details
The SQL statement SELECT Student ID, Surname, House Name FROM Student is used to retrieve information from the "Student" table in a database. It selects and displays the "Student ID," "Surname," and "House Name" fields/columns for all the rows/records in the "Student" table. Therefore, the correct option is "retrieves the listed fields from student table".
Question 11 Report
One precautionary measure taken when cleaning a monitor is
Answer Details
One precautionary measure taken when cleaning a monitor is to unplug the power supply cable. This means disconnecting the cable that provides electricity to the monitor so that it is no longer receiving power. This is important because cleaning a monitor while it is turned on or receiving power can cause damage to the screen or other components, and it can also pose a safety hazard if you accidentally touch the wrong part of the monitor while it is still powered. By unplugging the power supply cable, you ensure that the monitor is safe to clean and that you won't cause any damage to the screen or other components.
Question 12 Report
An operating systemthat enables more than one user to access the same data is called
Answer Details
A multi-user operating system is one that allows multiple users to access the same data at the same time. This type of OS enables different users to log into the system and access files, folders, and programs that are shared across the network. Each user can have their own account with individual permissions, which controls what they can and can't access. For example, in a multi-user operating system, a user can save a file on a shared folder, and other users can access and modify that file if they have permission. This allows multiple users to collaborate and work together on the same documents, databases, or projects. In contrast, a single-user operating system only allows one user to access the data at a time, while a multi-tasking operating system allows one user to run multiple programs simultaneously. Virtual memory is a technology that allows the computer to use a portion of the hard drive as additional RAM, enabling the computer to run more programs than it could with physical RAM alone.
Question 14 Report
The feature of a word document that shows the page, number of words and errors found in a document is the
Answer Details
Question 15 Report
The use of the internet to perform illegal activities is generally called
Answer Details
The use of the internet to perform illegal activities is generally called "cybercrime". This includes various types of criminal activities such as hacking, identity theft, online fraud, spreading malware or viruses, online harassment, and more. Cybercriminals use the internet and various online platforms to target individuals, organizations, and even governments to steal personal information, money, or sensitive data. Cybercrime poses a significant threat to cybersecurity and can cause serious financial, reputational, and legal consequences for victims.
Question 16 Report
Mr Francis has an office complex with 20 rooms. What type of network is suitable for connecting all the computers in their various rooms into a single network?
Answer Details
The most suitable type of network for connecting all the computers in the 20 rooms of Mr Francis' office complex into a single network is a Local Area Network (LAN). A LAN is a network that connects computers and devices in a relatively small geographical area, such as a building, a floor, or a group of nearby buildings. Since Mr Francis' office complex has 20 rooms, a LAN would be suitable for connecting all the computers in these rooms into a single network. LANs are designed to provide high-speed connectivity within a limited area, making them ideal for office complexes, schools, and small businesses. They allow for easy sharing of resources such as files, printers, and internet access, as well as efficient communication between users on the same network. In addition, LANs are relatively easy to set up and maintain, making them a cost-effective option for small-scale networking needs. In summary, a LAN would be the best option for Mr Francis to connect all the computers in his office complex into a single network, providing high-speed connectivity, easy resource sharing, and efficient communication between users.
Question 17 Report
A file organization that contains a reference number is called
Answer Details
A file organization that contains a reference number is called "indexed access". In this type of file organization, each record in the file is assigned a unique reference number, also known as an index. The reference number acts as a pointer to the location of the actual data in the file, making it easier and faster to retrieve specific records. Think of it like an index in a book. Just like how you can use the index in a book to quickly find information on a specific topic, you can use the reference numbers in an indexed access file to quickly find the data you need.
Question 18 Report
The main component of the first generation computer was
Answer Details
Question 19 Report
Which of the following file organizations requires primary Key?
Answer Details
A file organization that requires a primary key is the Indexed file organization. In this type of file organization, records are stored in an index, which is a separate data structure that allows for fast access to the records based on the value of the primary key. The primary key is a unique identifier for each record, and it is used to look up the record in the index. This allows for efficient and quick retrieval of records, which is important in many applications. So, having a primary key is essential in indexed file organization.
Question 20 Report
When information is conveyed from one space to another, it is referred to as information
Answer Details
When information is conveyed from one space to another, it is referred to as "transmission." Transmission refers to the process of sending data or information from one location to another through a communication channel, such as a wired or wireless network, cable, or satellite. This process involves encoding the information into a form that can be transmitted, sending it through the communication channel, and then decoding it back into its original form at the destination. Examples of transmission include sending an email, making a phone call, or streaming a video over the internet.
Question 21 Report
The following software are web browsers except
Answer Details
Among the given options, Linux is not a web browser. Firefox, Google Chrome, and Opera are all examples of web browsers. A web browser is a software application that allows you to access and view websites on the internet. It retrieves web pages from servers, displays them on your computer screen, and allows you to interact with them. Firefox, Google Chrome, and Opera are all popular web browsers that are used to browse the internet. Linux, on the other hand, is an operating system that is used to run software applications, including web browsers like Firefox and Google Chrome.
Question 22 Report
The malware which is programmed to initiate at a specific date or when a specific event occurs is called
Answer Details
The malware which is programmed to initiate at a specific date or when a specific event occurs is called a "logic bomb". A logic bomb is a type of malware that is intentionally inserted into a system or software application by a malicious actor with the intention of causing damage or disruption at a predetermined time or when a specific trigger event occurs. A logic bomb is similar to a time bomb in that it is designed to lie dormant until a specific date or event occurs, at which point it is triggered to execute its malicious code. For example, a logic bomb could be programmed to erase critical files or data from a system on a certain date or when a particular employee's username is deleted from the system. Unlike other types of malware, a logic bomb may not necessarily be designed to spread or replicate itself to other systems. Instead, its sole purpose is to cause damage or disruption to the targeted system at a specific time or under certain circumstances.
Question 23 Report
Which of the following terms is not a feature of distributed database?
Answer Details
The term "Single server" is not a feature of a distributed database. A distributed database is a database that is spread across multiple servers or nodes, with each node having its own portion of data. This allows for greater scalability and improved performance, as well as increased availability and reliability in the event of a single node failure. In contrast, a single server database is stored on a single, centralized server and does not have the benefits of a distributed database.
Question 25 Report
The type of computer that counts in discrete form only is referred to as
Answer Details
A digital computer is the type of computer that counts in discrete form only. This means that it operates using a series of binary digits, or "bits," which can represent either a zero or a one. These bits are combined to form numbers, letters, and other symbols that can be processed by the computer. Digital computers are designed to perform specific tasks by following a set of instructions, or a "program." They are used in a wide range of applications, from simple calculations to complex simulations and data analysis. Digital computers are generally considered to be more accurate, reliable, and versatile than analog computers, which represent information in a continuous form.
Question 26 Report
To prevent the loss of data in the computer, it is better to implement file
Answer Details
To prevent the loss of data in a computer, it is better to implement a "backup" system. A backup is a copy of important data that can be used to restore the original data in case it is lost or damaged. By regularly backing up your data, you can protect against accidental deletion, hardware failure, viruses, and other potential risks that could cause data loss. There are various methods for backing up data, such as using an external hard drive, cloud storage services, or specialized backup software. It is important to make sure that backups are done regularly and stored securely in a different location from the original data to ensure that they are accessible and not affected by the same risks that could affect the original data.
Question 27 Report
The following ,media are used for information transmission except
Answer Details
The media are channels or platforms that are used to transmit information from one person or group to another. Out of the options provided, a diary is not a medium for information transmission. A diary is a personal journal where individuals record their thoughts, feelings, experiences, and events that happen in their lives. It is a private document that is not intended for communication or information transmission to others. On the other hand, magazines, radio, and television are all media that are designed to disseminate information to a wide audience. Magazines are typically published periodically and contain articles, stories, and other content on various topics. Radio and television broadcast news, entertainment, educational programs, and other forms of content to audiences through audio or visual transmission.
Question 28 Report
Use Figure 1 to answer question 16
To visit the previous page using the interface in Figure 1, the user will click on the part labeled
Answer Details
Question 29 Report
Which of the following media involves point-to-point communication?
Question 31 Report
Web design packages includes the following except
Answer Details
The term "Adobe PageMaker" is not typically included in web design packages. Web design packages typically include software tools for designing, creating, and publishing websites. Macromedia Dreamweaver, iWeb, and Front Page are all examples of web design software that are commonly used for this purpose. Adobe PageMaker, on the other hand, is a desktop publishing software that is used for creating printed materials such as brochures, flyers, and magazines. It is not specifically designed for web design and does not have the features and functionality needed for creating and publishing websites.
Question 32 Report
Fourth generation computer application can execute the following operations except
Answer Details
Fourth-generation computer applications cannot execute the operation of "digging of drainages". This is because fourth-generation computers are software-based and designed for specific applications that focus on data manipulation, report generation, and analysis. Fourth-generation applications are known for their ability to process large volumes of data and provide high-level programming languages that make it easy to develop and customize applications for specific business needs. Some common applications of fourth-generation computers include database management, payroll management, financial analysis, inventory control, and other similar functions. However, digging of drainages is a physical operation that requires heavy machinery and human labor, which cannot be executed by a fourth-generation computer application.
Question 33 Report
Security breaches in computing cannot be prevented through the use of
Answer Details
Question 34 Report
The formula to calculate the average of a given range of data from cell B2 to cell D4 in a Microsoft Excel worksheet is
Answer Details
The formula to calculate the average of a given range of data from cell B2 to cell D4 in a Microsoft Excel worksheet is "=AVERAGE(B2:D4)". This formula uses the "AVERAGE" function in Excel, which calculates the average of a range of values. The range of values is specified by the parameters inside the parentheses, which in this case are "B2:D4". The colon (:) between B2 and D4 indicates that the range includes all the cells between and including B2 and D4. By using this formula, Excel will calculate the average of all the values within the specified range and display the result in the cell where the formula is entered.
Question 35 Report
The manipulation of digitalized information by computer by computer or other electronic equipment is known as
Answer Details
The manipulation of digitalized information by a computer or other electronic equipment is known as "data manipulation." This refers to the process of changing, organizing, or analyzing data using computer software or hardware. Data manipulation can involve a wide range of activities, such as sorting, filtering, merging, transforming, or calculating data in order to produce meaningful information or insights. For example, data manipulation might involve sorting a list of customer names alphabetically, calculating the average sales revenue for a particular product, or merging two databases to create a more comprehensive view of a business. Overall, data manipulation is an essential part of information processing, which involves the collection, organization, analysis, and communication of data. By manipulating digital information using computer technology, organizations can better understand and utilize their data, which can lead to improved decision-making and better business outcomes.
Question 36 Report
The number 101100101\(2\) in denary is
Answer Details
To convert the binary number 101100101 to decimal (denary), we can use the positional notation system. Each digit in a binary number represents a power of 2, starting from the rightmost digit with 2^0, then increasing by a power of 2 for each subsequent digit (i.e., 2^1, 2^2, 2^3, etc.). Starting from the rightmost digit in 101100101, we have: 1 × 2^0 = 1 0 × 2^1 = 0 1 × 2^2 = 4 0 × 2^3 = 0 0 × 2^4 = 0 1 × 2^5 = 32 1 × 2^6 = 64 0 × 2^7 = 0 1 × 2^8 = 256 Adding up the results, we get: 1 + 0 + 4 + 0 + 0 + 32 + 64 + 0 + 256 = 357 Therefore, the decimal (denary) equivalent of the binary number 101100101 is 357.
Question 37 Report
The term Garbage-In-Garbage-Out is used to explain the characteristics of the computer in terms of
Answer Details
Question 38 Report
Which of the following statements is true?
Answer Details
The statement "Data leads to information and information leads to knowledge" is true. Data refers to raw facts and figures, and can come from a variety of sources such as experiments, surveys, and observations. Information is created when data is processed, organized, and analyzed in a way that gives it meaning. This information can then be used to answer questions, make decisions, or solve problems. Knowledge is an understanding and awareness of information that has been acquired through experience and education. It's the ability to apply information to different situations and make informed decisions. So, data is the starting point, which is processed to create information, and that information is then used to build knowledge.
Question 39 Report
The correct order of the steps taken in creating a database from the database template in MS Access 2007 is
Answer Details
Question 41 Report
A certain business center provides computer and internet services to the public. The owner is concerned that there is no restraint on consumption of food and drinks by the customers and also about possible health hazards to the computer users.
(a) Give two safety precautions that must be put in place to protect the workstations in the business center from foods and drinks.
Precautions I:
Precautions II:
(b) State two ways the computers can be maintained to ensure efficiency in serving the customer.
Maintenance I:
Maintenance II:
(c)(i) Name three possible health risks to the customers while using the computers in the center.
Risk I:
Risk II:
Risk III:
(ii) How can the risks in 4(c)(i) be reduced?
Solution I:
Solution II:
Solution III:
(a) Two safety precautions that can be put in place to protect workstations from foods and drinks are:
Precaution I: The business center can implement a strict no food or drink policy in the vicinity of the workstations. This can be communicated to customers through visible signs and reminders.
Precaution II: The business center can provide designated areas away from the workstations for customers to consume their food and drinks. This will help prevent spillage and other accidents that may damage the workstations.
(b) Two ways the computers can be maintained to ensure efficiency in serving customers are:
Maintenance I: Regular cleaning of computer hardware, such as keyboards and mice, to prevent the buildup of dust and debris that can affect performance.
Maintenance II: Ensuring that computer software is up to date with the latest updates and patches to fix any security vulnerabilities and improve performance.
(c)(i) Three possible health risks to customers while using computers in the center are:
(ii) Three ways the risks in (c)(i) can be reduced are:
Answer Details
(a) Two safety precautions that can be put in place to protect workstations from foods and drinks are:
Precaution I: The business center can implement a strict no food or drink policy in the vicinity of the workstations. This can be communicated to customers through visible signs and reminders.
Precaution II: The business center can provide designated areas away from the workstations for customers to consume their food and drinks. This will help prevent spillage and other accidents that may damage the workstations.
(b) Two ways the computers can be maintained to ensure efficiency in serving customers are:
Maintenance I: Regular cleaning of computer hardware, such as keyboards and mice, to prevent the buildup of dust and debris that can affect performance.
Maintenance II: Ensuring that computer software is up to date with the latest updates and patches to fix any security vulnerabilities and improve performance.
(c)(i) Three possible health risks to customers while using computers in the center are:
(ii) Three ways the risks in (c)(i) can be reduced are:
Question 42 Report
(a) Define the following terms; (i) Disk formatting (ii) Data backup (iii) Virus scan
(b) State four uses of the Automated Teller Machine (ATM)
(a)
(i) Disk formatting: Disk formatting is the process of preparing a storage device, such as a hard drive, for use by organizing it into sections called partitions and setting up a file system on it to manage the data stored on the device. This process erases all the data on the disk and makes it ready for use.
(ii) Data backup: Data backup is the process of creating a copy of important data and storing it separately from the original data, typically in a different location or on a different storage device. The purpose of data backup is to have a copy of the data that can be used to restore the original data in the event of data loss, such as due to hardware failure or data corruption.
(iii) Virus scan: Virus scan is the process of checking a computer or device for malicious software, commonly known as viruses, and removing them if found. This process is typically performed using antivirus software and is an important step in protecting a computer from potential harm.
(b)
(i) Withdraw cash: One of the main uses of ATMs is to withdraw cash. Customers can use their debit or credit cards to withdraw money from their bank accounts at ATMs.
(ii) Check account balance: Another use of ATMs is to check the balance of a customer's bank account. Customers can use their debit or credit cards to access their account information and see how much money they have in their account.
(iii) Transfer funds: ATMs also allow customers to transfer funds between their accounts. For example, a customer can transfer money from their savings account to their checking account.
(iv) Pay bills: Some ATMs also allow customers to pay their bills. Customers can use their debit or credit cards to make payments on their utility bills, credit card bills, and other types of bills.
Answer Details
(a)
(i) Disk formatting: Disk formatting is the process of preparing a storage device, such as a hard drive, for use by organizing it into sections called partitions and setting up a file system on it to manage the data stored on the device. This process erases all the data on the disk and makes it ready for use.
(ii) Data backup: Data backup is the process of creating a copy of important data and storing it separately from the original data, typically in a different location or on a different storage device. The purpose of data backup is to have a copy of the data that can be used to restore the original data in the event of data loss, such as due to hardware failure or data corruption.
(iii) Virus scan: Virus scan is the process of checking a computer or device for malicious software, commonly known as viruses, and removing them if found. This process is typically performed using antivirus software and is an important step in protecting a computer from potential harm.
(b)
(i) Withdraw cash: One of the main uses of ATMs is to withdraw cash. Customers can use their debit or credit cards to withdraw money from their bank accounts at ATMs.
(ii) Check account balance: Another use of ATMs is to check the balance of a customer's bank account. Customers can use their debit or credit cards to access their account information and see how much money they have in their account.
(iii) Transfer funds: ATMs also allow customers to transfer funds between their accounts. For example, a customer can transfer money from their savings account to their checking account.
(iv) Pay bills: Some ATMs also allow customers to pay their bills. Customers can use their debit or credit cards to make payments on their utility bills, credit card bills, and other types of bills.
Question 43 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
A student was given an assignment which involved typesetting a passage at home using a laptop computer. The student was required to bring the soft copy of the assignment in a flash drive with volume label STUDENT ASSIGNMENT to the school. Highlight the steps the student would take to: (a) save the typeset work in the flash drive (b) create a folder named ASSIGNMENTS on the desktop of computer in the school's computer laboratory and save the typeset assignment in the folder (c) prit the assignment from the folder created in 5(b).
To save the typeset work in the flash drive:
To create a folder named ASSIGNMENTS on the desktop of the school's computer laboratory and save the typeset assignment in the folder:
To print the assignment from the folder created in 5(b):
Answer Details
To save the typeset work in the flash drive:
To create a folder named ASSIGNMENTS on the desktop of the school's computer laboratory and save the typeset assignment in the folder:
To print the assignment from the folder created in 5(b):
Question 44 Report
(a) (i) State three ways of classifying computers.
(ii) Differentiate between digital and analog computers.
(b) List three positive impacts of ICT on the society.
(c) Give two types of information transmission medium.
(a)
(i) Three ways of classifying computers are:
(ii) Digital computers use discrete values (usually binary digits) to represent data and perform calculations, while analog computers use continuous physical quantities (such as voltage or current) to represent data and perform calculations.
(b)
Three positive impacts of ICT (Information and Communication Technology) on society are:
(c)
Two types of information transmission medium are:
Answer Details
(a)
(i) Three ways of classifying computers are:
(ii) Digital computers use discrete values (usually binary digits) to represent data and perform calculations, while analog computers use continuous physical quantities (such as voltage or current) to represent data and perform calculations.
(b)
Three positive impacts of ICT (Information and Communication Technology) on society are:
(c)
Two types of information transmission medium are:
Question 45 Report
(a) Complete Table 1 wih the appropriate criteria for each medium.
Table 1
Criteria/Medium | DVD-ROM | Hard Disk | Magnetic Tape |
Location of storage media | External | (i) _________ _________ |
(ii) __________ __________ |
Removability | (iii) __________ __________ |
(iv) __________ ___________ |
(v) ___________ ____________ |
Method file Access | (vi) __________ __________ |
Random/Direct Access | (vii) ___________ ___________ |
(b) List three examples of spreadsheet application.
(a) Completed Table 1:
Criteria/Medium | DVD-ROM | Hard Disk | Magnetic Tape |
---|---|---|---|
Location of storage | External | (i) Inside computer case | (ii) Inside tape drive |
Removability | (iii) Non-removable | (iv) Removable | (v) Removable |
Method file Access | (vi) Sequential Access | Random/Direct Access | (vii) Sequential Access |
(b) Three examples of spreadsheet applications are:
Answer Details
(a) Completed Table 1:
Criteria/Medium | DVD-ROM | Hard Disk | Magnetic Tape |
---|---|---|---|
Location of storage | External | (i) Inside computer case | (ii) Inside tape drive |
Removability | (iii) Non-removable | (iv) Removable | (v) Removable |
Method file Access | (vi) Sequential Access | Random/Direct Access | (vii) Sequential Access |
(b) Three examples of spreadsheet applications are:
Would you like to proceed with this action?