Loading....
Press & Hold to Drag Around |
|||
Click Here to Close |
Question 1 Report
A computer that requests the services of another computer on a network is called a?
Answer Details
A computer that requests the services of another computer on a network is called a "client". In a client-server network architecture, the client computer is the one that initiates a request to the server computer, which responds by providing the requested services or resources. The client computer can be any device on the network, such as a laptop, desktop, smartphone, or tablet, while the server computer is usually a powerful computer or a group of computers that manage the network resources and services. The client sends requests to the server for services such as file sharing, printing, or database access, and the server responds by providing these services to the client.
Question 2 Report
Which of the following statements can be used for looping in BASIC?
Answer Details
The statement that can be used for looping in BASIC is "FOR ... NEXT". The FOR loop is used to execute a set of statements a specified number of times, while the NEXT statement is used to terminate the FOR loop. The general format for the FOR loop is:
FOR variable = start_value TO end_value [STEP step_value]
[statements]
NEXT variable
The variable is set to the start value, and the loop executes until it reaches the end value, incrementing by the step value (if provided) each time. The statements inside the loop are executed for each iteration of the loop. The NEXT statement is used to indicate the end of the loop and to specify the variable that is being incremented.
Question 6 Report
Which of the following views is used to create data base objects in Microsoft Access?
Answer Details
The view used to create database objects in Microsoft Access is the Design view. This view allows the user to create and modify tables, forms, queries, and reports by specifying their structures and properties. In the Design view, the user can define the fields or columns of a table, set their data types, specify primary keys, and establish relationships between tables. The Design view provides a graphical interface that allows the user to drag and drop fields, add new fields, and modify existing ones. It also allows the user to set validation rules, input masks, default values, and other properties for the fields. Overall, the Design view is a powerful tool that enables the user to create and customize database objects to meet specific requirements.
Question 7 Report
A high level language program translator which converts a source code to machine readable format and compile executes it one line at a time is?
Answer Details
Question 8 Report
Us the table below to answer this question
Character | Decimal Code | ASCII Code |
N | 78 | 1001110 |
O | 1 | 1001111 |
T | 84 | II |
The cell labelled ll in the table represents?
Answer Details
Without the table or any additional information provided, it is not possible to determine which cell is labelled "ll" and what value it represents. Please provide more context or information to help answer your question.
Question 9 Report
The available page orientation in Microsoft Word are?
Answer Details
Page orientation in Microsoft Word refers to the direction in which content is printed on the page. There are two main page orientations available: portrait and landscape. Portrait orientation is the default setting, in which the page is taller than it is wide. This is the most common orientation for documents such as letters, essays, and reports. Landscape orientation, on the other hand, is where the page is wider than it is tall. This orientation is useful for documents such as spreadsheets, tables, and presentations. Therefore, the correct answer to the question is "portrait and landscape".
Question 10 Report
Which of the following function keys can be used to run slide show in a PowerPoint presentation?
Answer Details
Question 11 Report
A set of programs, routines and procedures that are used to operate the computer hardware is called?
Answer Details
The correct answer is "software". Software is a set of programs, routines, and procedures that are used to operate the computer hardware. It is the non-tangible part of a computer system that provides instructions to the hardware on what tasks to perform. There are different types of software including system software (such as operating systems and device drivers) and application software (such as word processors, spreadsheets, and multimedia players). Firmware is a type of software that is stored in non-volatile memory and is responsible for controlling low-level operations of hardware components. Shareware is a type of software that is distributed for free initially but requires payment after a trial period. Utility software is a type of software that provides specific tools to perform tasks such as system optimization, data backup, and virus scanning.
Question 12 Report
Which of the following factors limits access to computerized file system? it
Answer Details
The correct answer is "requires regular supply of power". A computerized file system is an electronic system that stores and organizes data on a computer. One of the key requirements for a computerized file system to function properly is a regular supply of power. Without power, the computer and its file system cannot operate, and access to the files is limited. The other options listed do not directly relate to limiting access to a computerized file system. For example, the amount of space occupied by the file system does not necessarily limit access, and a highly efficient processing system may actually enhance access to information.
Question 13 Report
Which of the following is not a method of accessing file?
Answer Details
The method of accessing a file determines the order in which data is read or written to a file. "Circular," "random," "serial," and "sequential" are all valid methods of accessing a file. Therefore, none of the options listed is not a method of accessing a file.
Question 14 Report
The expression DEPOSIT (1, 10) stands for an array with?
Answer Details
The expression DEPOSIT(1,10) stands for an array with 10 elements. The first number in the parentheses represents the starting index of the array, which in this case is 1. The second number represents the ending index of the array, which in this case is 10. Therefore, there are 10 elements in the array, with index numbers ranging from 1 to 10.
Question 15 Report
Use the following QBASIC statement to answer questions 14 and 15.
DIM DEPOSIT (1, 10) 14.
The keyword DIM in the statement stands for?
Answer Details
The keyword DIM in the QBASIC statement stands for "dimension". In programming, the DIM statement is used to declare the size of an array, which is a collection of variables of the same data type. In this case, the array is called DEPOSIT and has two dimensions: one dimension has a size of 2, and the other dimension has a size of 10. This means that the array can hold up to 20 values. So, the keyword DIM is used to specify the dimensions of an array in QBASIC, allowing the program to allocate the necessary amount of memory to store the data.
Question 17 Report
Which of the following components is directly located inside the computer processor?
Answer Details
The component directly located inside the computer processor is the Arithmetic Logic Unit (ALU). The ALU is responsible for performing arithmetic and logical operations on data that is passed to it from the computer's memory. This component is essential for carrying out the basic operations of a computer, such as addition, subtraction, and comparison of values. The BIOS, RAM, and ROM are not located inside the processor but are instead separate components that interact with the processor to carry out various functions.
Question 18 Report
The first three steps to open an email account include:
I. - Click on create my account; II. - Go to home page; llI - Click create new account.
Answer Details
The correct answer is "II, I and ll". The first step is to go to the homepage of the email service provider. The second step is to click on the "create new account" button. This will take you to the account creation page where you will be prompted to enter your personal information such as name, date of birth, and contact information. Finally, you will create a username and password and click on the "create my account" button to complete the process.
Question 20 Report
Use the MS Excel table below to answer questions 42 and43
The formula used to compute the TOTAL VALUE in cell D7 is?
S/N | A | B | C | D |
1 | STOCK LIST OF TAYO OKEKE AS AT MAY 2014 | |||
2 | QUOTED STOCK | SHARE UNIT IN THOUSAND | CURRENT UNIT(#) | VALUE |
3 | TANZEL PLC | 44 | 50 | 2,200.000 |
4 | KAPTOL | 125 | 80 | #### |
5 | BANK KLM | 75 | 140 | #### |
6 | ARIX OIL | 10 | 250 | 2,500.00 |
7 | TOTAL VALUE |
Answer Details
Question 21 Report
The input device best used to capture finger print is?
Answer Details
The input device that is best used to capture fingerprints is option III, a fingerprint scanner. A fingerprint scanner is a device that captures the unique pattern of ridges and valleys on the surface of a person's fingertip. It works by illuminating the finger with a light source and capturing the reflection of the light through a sensor that reads the pattern of the ridges and valleys. Fingerprint scanners are widely used for security purposes, such as in biometric authentication systems for access control or identity verification. They are very accurate and reliable, and the captured fingerprints can be stored in a database for later comparison and identification. In contrast, the other options listed (I, II, and IV) are not specifically designed to capture fingerprints. Option I, a keyboard, is used for typing text, option II, a mouse, is used for pointing and clicking on a computer screen, and option IV, a microphone, is used for recording sound. While these input devices may have some limited capacity to capture fingerprints (e.g. if someone types with dirty fingers), they are not optimized for this purpose and are not as reliable or accurate as a dedicated fingerprint scanner.
Question 22 Report
Which of the following tasks is accomplished by using bookmarks? To
Answer Details
Bookmarks are used to quickly jump to a specific location in a document. When working on a large document, it may be helpful to bookmark certain pages or sections so that you can easily return to them later without having to scroll through the entire document. By setting a bookmark, you can quickly jump to that specific location by clicking on the bookmark option, which saves you time and effort. Therefore, the correct option is: "quickly jump to a specific location in a document".
Question 23 Report
The advantages of a computer include that they?
I. operate at high speeds; II. think for the user; Ill. are accurate; IV. are credible.
Answer Details
The correct option is "I, III and IV only". Computers have several advantages, but they do not "think for the user" as stated in option II. Instead, computers are designed to process and execute commands and instructions that are provided to them by users or programs. The advantages of computers include that they operate at high speeds (I), which means that they can process large amounts of data and perform complex calculations in a short period of time. They are also accurate (III), which means that they can perform tasks with a high degree of precision and consistency. Additionally, computers are credible (IV), meaning that they can provide reliable and verifiable information, which is particularly useful in fields such as scientific research and data analysis.
Question 24 Report
A field chosen to uniquely identify every record in a database is?
Answer Details
A primary key is a field in a database table that is used to uniquely identify each record in the table. It must have a unique value for each record and cannot be null or empty. The primary key is used to link related tables in a database and is essential for maintaining data integrity and accuracy.
Question 25 Report
The census machine was invented by?
Answer Details
The census machine was invented by Herman Hollerith. Herman Hollerith was an American inventor who developed a punched card tabulating machine based on the Jacquard loom principles. He invented the machine in the late 19th century to help process and analyze data from the US census, which had grown too large and complex to be handled manually. The machine used punched cards to store and process data, and it was able to process information much faster than human operators. This invention laid the foundation for modern data processing and is considered a major milestone in the history of computing.
Question 26 Report
A graph plotter is most suited for use in a/an?
Question 27 Report
INPUT | OUTPUT | |
P | O | R |
0 | 0 | 1 |
0 | 1 | 0 |
1 | 0 | 0 |
1 | 1 | 0 |
The table above represents the Truth Table for?
Answer Details
The table above represents the Truth Table for the NAND (Not AND) logic gate. In digital electronics, a NAND gate is a logic gate which produces a high output (1) only when all inputs are low (0). It operates like an AND gate, followed by a NOT gate. The output of the NAND gate is the inverse of the AND gate. The NAND gate is widely used in digital circuits as it is a universal gate, meaning that any other logic gate can be realized using NAND gates only.
Question 28 Report
The following are features of web browsers except?
Answer Details
The features of a web browser are the tools, functions or options that enable users to interact with web pages and navigate the internet. The title bar, address bar and menu bar are some of the common features of web browsers. However, the formula bar is not a feature of web browsers. The formula bar is a feature of spreadsheet applications like Microsoft Excel, and it is used to enter and view formulas or functions used in calculating data. Therefore, option B (Formula bar) is the correct answer.
Question 30 Report
Which of the following symbols is not a relational operator in BASIC programming language?
Answer Details
The symbol that is not a relational operator in BASIC programming language is "^". Relational operators are symbols used in programming to compare values and determine whether one value is greater than, less than, equal to, or not equal to another value. In BASIC programming language, the relational operators are "<" (less than), ">" (greater than), "<=" (less than or equal to), ">=" (greater than or equal to), "=" (equal to), and "<>" (not equal to). The symbol "^" is not a relational operator in BASIC programming language. It is actually an arithmetic operator used to represent exponentiation, which means raising a number to a power. For example, in BASIC, the expression "2^3" would evaluate to 8, because 2 raised to the power of 3 equals 8. So, to summarize, the symbol "^" is not a relational operator in BASIC programming language, but rather an arithmetic operator used for exponentiation.
Question 31 Report
Soft boot is initiated by pressing?
Answer Details
Soft boot is initiated by pressing Ctrl + Alt + Del keys simultaneously. This key combination sends a signal to the computer's operating system to restart the system, without shutting down the computer entirely. Soft booting allows the computer to reboot quickly and is often used when troubleshooting software or hardware issues that require a system restart.
Question 32 Report
Arrange in hierarchical order by date the following inventions:
I. - Census machine; Il. - Abacus; lll. - Slide rule; IV.- Difference engine.
Answer Details
Question 33 Report
Which of the file formats is supported in all windows operating systems?
Answer Details
Question 34 Report
Character | Decimal code | ASCII CODE |
N | 78 | 1001110 |
O | 1 | 1001111 |
T | 84 | 11 |
The cell labelled I in the table represents?
Answer Details
The given table shows the decimal code and ASCII code for characters N, O, and T. The cell labelled I in the table represents the ASCII code for character "O", which is 1001111 in binary and 79 in decimal. The ASCII code is a standard code used to represent characters in computers and communication devices. In this case, the ASCII code for character "O" is represented in binary as 1001111 and in decimal as 79. Therefore, the correct answer is option D, which is 79.
Question 37 Report
A student mistakenly pressed the F5 key on keyboard while browsing on the internet. This will lead to?
Question 38 Report
The absolute address of cell G5 in a spreadsheet application is represented by?
Answer Details
Question 39 Report
Use the infomation below to answer questions 35 and 36
I-Mouse Il. -Keyboard III-Scanner IV. -Joystick.
The input devices used to capture date of birth on an Online form are?
Question 40 Report
Which of the following can be used to write a high level program source code?
Answer Details
Lotus 1-2-3 and MS Access are spreadsheet and database management software, respectively, and Opera is a web browser. These software cannot be used to write a high-level program source code. Text Editor, on the other hand, is a simple software application that allows users to create and edit plain text files. It can be used to write source code for a high-level programming language such as Python, Java, or C++. Therefore, Text Editor is the correct option for writing a high-level program source code.
Question 41 Report
Opening an already existing sequential file in output (O) mode will lead to?
Answer Details
Question 42 Report
Which of the following statements is not true about secondary storage media? They
Answer Details
Question 44 Report
The copyright law is used to protect?
Answer Details
The copyright law is used to protect intellectual property. Intellectual property refers to the creations of the human mind, such as inventions, literary and artistic works, designs, symbols, and names. Copyright law gives the creator of a work the exclusive right to use and distribute their work, which can include things like books, music, and movies. It helps ensure that creators are compensated for their work and that others cannot use or profit from their creations without permission.
Question 45 Report
Which of the following statements is true for a circuit Switching communication system?
Answer Details
A dedicated channel must be established between two parties through the period of communication. In a circuit switching communication system, a dedicated physical communication path is established between the sender and the receiver for the duration of the communication session. During this time, the entire capacity of the channel is reserved for the transmission of the message, which results in a highly reliable and efficient mode of communication. However, this method of communication is not ideal for real-time communication, as the dedicated channel may remain idle during periods of silence, resulting in inefficient use of bandwidth. Therefore, this statement is false. In contrast, packet switching is more suited for real-time communication and involves breaking the message into packets that are transmitted independently and reassembled at the receiver.
Question 46 Report
Which of the columns needs to be adjusted to accommodate the cells contents?
Answer Details
Question 47 Report
The "collection of the unorganized facts and figures" is called?
Answer Details
The term that best describes a set of unorganized facts and figures is "data". Data can be defined as raw, unprocessed information that is collected and stored for later use. This information can be in any form, such as numbers, text, images, or audio. Data becomes useful when it is processed and organized into meaningful information. So, in summary, when we refer to a collection of unorganized facts and figures, we are talking about "data".
Question 48 Report
The hardware component that is responsible for fetching, decoding and execution of program instruction is?
Answer Details
Question 50 Report
Which of the following is not a good ICT security policy?
Answer Details
The ICT security policy that is not good is "Re-use of old password". Reusing old passwords is not a good practice because it increases the chances of someone accessing your accounts without your permission. Hackers can obtain your old password from a previous breach and use it to gain access to your other accounts. It is essential to use strong and unique passwords for each account and not reuse old passwords. Using a password manager can help you generate and store complex passwords for each account.
Question 51 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
Using a word processing package, create a college time table format titled "COLLEGE TIME TABLE" for 7 subjects (English, Maths, Biology, Chemistry, Physics, Civic Education and Computer Studies), for 5 days with minimum of 45minutes duration. Lunchtime is 40minutes, lesson in the college have a minimum of 5 periods/week.
(a) Format the "COLLEGE TIME TABLE" using the following:
(i) The title of the table should be aligned centre, bold and underline;
(ii) Use table design style of any type
(iii) Days of the week should be bold
(b) Save your work with your full name in the folder created.
(c) print and submit your work
Question 52 Report
(a) What are input devices?
(b) list two input devices
(c) State two uses of logic gates
(d) Draw and label the logic gate symbol for;
(i) OR gate (ii) AND gate
None
Answer Details
None
Question 53 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
As the account clerk of an organisation, you are to prepare the table as shown below using a spreadsheet application:
Worker | Wage/day(#) |
Edeh | 1500 |
Usman | 1750 |
Steven | 1200 |
Ololade | 650 |
Comfort | 897 |
Joe | 2371 |
(a) Copy and paste table title "Workers' Wages" on the same sheet. Format this new table as follows:
(i) Title the new table as SALARIES
(ii) Sort the table in alphabetical order
(iii) Calculate average wage of workers per day
(iv) Calculate the max and min wages paid to the workers from the SALARIES
(b) Insert a bar chart for data in 2a
(c) Save workbook with your full name in the folder created
(d) Print and submit
Answer Details
None
Question 54 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
using a graphic application software, create a student identity card with the heading as "CITY COMPUTER COLLEGE - NIGERIA"
(a) Size of the card is 31/2" x 11/2"
(b) Insert "flyer pagoda" or any other graphic from the template as logo beside the heading.
(c) Format the card using the following:
background fill - 20% black; heading font type - Bernard MT Condensed, size 14 (ii) pt, colour white
(iii) write the statement, "this card identities" below the heading using Bookman Old style, 8 pt and in italics;
(iv) write the statements below under name:
Name
Admission Number - Font: Times New Roman
Year of Admission Size: 11 pt
Signature
Line - Hairline
(d) Print and submit. (e) Save file with your full name in the folder created der Name:
Question 55 Report
(a) Convert 1011011\(_2\) to its hexadecimal equivalent
(b) State one difference a hacker and a scammer
(c) identify the parts labeled A, B, C and D on the keyboard shown below
Question 56 Report
(a) In a tabular form, state two differences between random access memory and read only memory
(b) State four characteristics of windows operating system environment.
(c) list two examples of utility programs
Answer Details
None
Would you like to proceed with this action?