Cargando....
Mantén pulsado para arrastrar. |
|||
Haz clic aquí para cerrar |
Pregunta 1 Informe
After several 'save' and 'delete' operations, the too small be used productively. This describes?
Detalles de la respuesta
Pregunta 2 Informe
In MS Excel, the cell that contains the pointer or cursor is called?
Detalles de la respuesta
The cell that contains the pointer or cursor in Microsoft Excel is referred to as the "Active Cell". An active cell is the cell that is selected and ready to accept data or a formula. You can tell which cell is active because its border is highlighted with a different color or pattern. When you start typing, the data will be entered into the active cell.
Pregunta 3 Informe
The following symbols are used in flowcharting except the?
Detalles de la respuesta
The answer is "close symbol." Flowcharts are diagrams that are used to represent the flow of a process or system. They use different symbols to represent different elements of the process, such as starting points, decision points, and actions. Terminal symbols, also known as start/end symbols, are used to indicate the beginning or end of a process or flowchart. Process symbols are used to represent actions or steps in the process, while input/output symbols are used to represent data inputs or outputs. However, there is no such thing as a "close symbol" in flowcharting. There are, however, symbols such as the decision symbol, which is used to indicate a point in the process where a decision needs to be made based on a condition or set of conditions. In summary, the correct answer is "close symbol" because there is no such symbol used in flowcharting.
Pregunta 4 Informe
The hexadecimal number 13, expressed as a binary here is?
Detalles de la respuesta
Pregunta 5 Informe
Modern computers compared to earlier computers are?
Detalles de la respuesta
Modern computers are faster and smaller compared to earlier computers. They can perform many tasks much faster and have more storage capacity for things like music, videos, and photos. They also often come in compact designs that make them more portable. However, it is important to note that technology is constantly evolving, so it's possible for there to be newer computers that are even faster and smaller than current ones.
Pregunta 6 Informe
In Microsoft PowerPoint, two kinds of sound effect files that can be added to a presentation are?
Detalles de la respuesta
The two kinds of sound effect files that can be added to a presentation in Microsoft PowerPoint are .wav files and .mid files. .wav files are audio files that contain sound recordings, such as music or voice recordings. They are widely used for sound effects and background music in presentations. .mid files are musical instrument digital interface files that contain musical notes and instructions for playing them. They are used to add background music or sound effects to a presentation that are specifically composed or synthesized for the presentation.
Pregunta 7 Informe
A personnel who deals with the computer and its management is called?
Detalles de la respuesta
Pregunta 8 Informe
A computer program that gathers information about a person or organization without their knowledge or consent is known as?
Detalles de la respuesta
Pregunta 9 Informe
The disk operating system will label three hard drives as?
Detalles de la respuesta
The labeling of hard drives depends on the specific operating system being used. However, it is common for disk operating systems to label hard drives as letters starting from "C". This is because the first two letters, "A" and "B", are reserved for floppy drives. So, the most common labeling of hard drives is "C, D, and E".
Pregunta 10 Informe
One major difference between paper spreadsheet and electronic spreadsheet is?
Detalles de la respuesta
Pregunta 11 Informe
Machine Language instructions are expressed in?
Detalles de la respuesta
Machine language instructions are expressed in binary. Binary is a system of representing numbers using only two digits, 0 and 1. Computers understand and process data in binary form, making it the most basic and fundamental language for computers. Machine language instructions are written using binary code, which the computer can directly execute without any further translation.
Pregunta 12 Informe
The output of a NAND gate is 1 when?
Detalles de la respuesta
A NAND gate is a logic gate that produces an output of 0 only when all its inputs are 1. In all other cases, the output is 1. So, if any of the inputs is 0, the output will be 1. If all the inputs are 1, the output will be 0. To put it another way, the NAND gate behaves like an "inverted AND" gate. It produces an output of 1 when any of the inputs is 0, and only produces an output of 0 when all the inputs are 1. This behavior makes the NAND gate a very useful building block in digital circuits, as it can be used to implement any other logical function.
Pregunta 14 Informe
Three major types of language translators are?
Detalles de la respuesta
The three major types of language translators are: Assembler, Compiler, and Interpreter. An Assembler is a translator that converts assembly language code, which is a low-level programming language, into machine language code that a computer can understand and execute. Assembly language is specific to a particular computer architecture, so an assembler is also specific to that architecture. A Compiler is a translator that converts high-level programming language code, which is more human-readable, into machine language code that a computer can understand and execute. The process of compilation involves several stages, including lexical analysis, syntax analysis, semantic analysis, code generation, and optimization. Once compiled, the resulting machine code can be run repeatedly without needing to recompile the source code. An Interpreter is a translator that works by executing high-level programming language code directly, without the need to first compile it into machine language code. Interpreters translate code line-by-line, executing each line immediately before moving on to the next one. This process is slower than compilation, but it allows for greater flexibility and interactivity during development, as changes to the source code can be tested immediately without needing to recompile.
Pregunta 17 Informe
The following actions are sources of breaches in computing except?
Detalles de la respuesta
Pregunta 18 Informe
Which of the following is true when data maintained in MS Excel workbook is linked to a word document? The word document
Detalles de la respuesta
Pregunta 20 Informe
Which of the file organization methods can be accessed both randomly and sequentially?
Detalles de la respuesta
The file organization method that can be accessed both randomly and sequentially is the Indexed Sequential Files. Indexed Sequential Files use an index to organize data records, allowing for both sequential and random access. The records are stored in sequence based on a primary key field, and the index keeps track of the location of each record. This allows for sequential access by reading the records in order, or random access by searching for a specific record based on its key value. For example, imagine a library catalog that is organized using an Indexed Sequential File. The books in the library are stored in order by their call numbers (i.e., the primary key field), and an index is kept that maps each call number to its location in the library. A patron could browse the catalog sequentially by looking at each book in order, or they could search for a specific book by using the index to find its location. Overall, Indexed Sequential Files provide the flexibility of both sequential and random access, making them a popular choice for applications that require both types of access.
Pregunta 22 Informe
. Translate 2m\(^2\) + 3n- 9 as a BASIC arithmetic expression.
Detalles de la respuesta
Pregunta 23 Informe
A bit as used in computing in digital communication is?
Detalles de la respuesta
Pregunta 24 Informe
The Windows PC and the Apple Macintosh are examples of two different?
Detalles de la respuesta
Pregunta 26 Informe
Spreadsheet packages can be used for? .
Detalles de la respuesta
Spreadsheet packages are software programs that allow users to create, manipulate and analyze data in the form of tables, charts and graphs. They are mainly used for budgeting and inventory management because they offer powerful tools for financial analysis and data organization. With a spreadsheet package, you can create and format tables with columns and rows to track expenses, sales, and other important data. You can also use formulas and functions to automatically calculate totals, averages, and other important metrics. In addition to budgeting and inventory, spreadsheet packages can also be used for a wide range of other tasks, such as analyzing data trends, creating charts and graphs to visualize data, and performing mathematical calculations. Some spreadsheet packages even offer features for collaborating on documents and sharing data with others in real-time. However, spreadsheet packages are not designed for database management, word processing, drawing, or painting. For those tasks, you would need to use other software programs designed specifically for those purposes.
Pregunta 27 Informe
The scanner and the floppy disk are?
Detalles de la respuesta
A scanner and a floppy disk are respectively an input device and a storage device. A scanner is a device used to convert a physical document or image into a digital format. It works by using a light source to capture an image and then digitize it. This means that it takes information from the physical world and converts it into a form that a computer can understand and process, making it an input device. On the other hand, a floppy disk is a type of removable storage device used to store and transfer data. It works by using magnetic storage to store data on a disk that can be easily removed and used in another computer. This means that it takes information from the computer and stores it in a physical form that can be accessed later, making it a storage device.
Pregunta 28 Informe
A cell with a red triangle in the top-right comer in a spreadsheet application signifies?
Detalles de la respuesta
Pregunta 29 Informe
A suite of software that controls and manages the basic operation of a computer is?
Detalles de la respuesta
The suite of software that controls and manages the basic operation of a computer is called system software. It includes programs that provide essential functionalities like managing hardware resources, running other software applications, and providing a user interface for interacting with the computer. Examples of system software include operating systems like Windows, macOS, and Linux, device drivers, system utilities, and firmware. System software is different from application software, which is designed to perform specific tasks like word processing, spreadsheet management, or video editing.
Pregunta 32 Informe
The set of instructions written by computer experts to solve specific task of the user is called?
Detalles de la respuesta
The set of instructions written by computer experts to solve a specific task of the user is called application software. Application software is a type of computer software that is designed to perform specific tasks, such as word processing, spreadsheet management, and media editing. It is created by developers to meet the needs of users, and it is installed onto a computer to help the user perform a certain task. Examples of application software include Microsoft Word, Excel, and Adobe Photoshop. Operating systems, system software, and utility software are different types of software. The operating system is the primary software that manages all of the hardware and software resources of a computer, while system software includes programs that help manage and maintain the computer, such as device drivers, security software, and system utilities. Utility software refers to programs that are designed to perform specific tasks, such as disk cleanup, backup, and optimization.
Pregunta 34 Informe
Which of the following statements are true about computer?
I.Constructed from electronic components. II. It has self regeneration capability.
III. It has facility for storage of data and programs. IV.It has provision tor input and output of data.
Detalles de la respuesta
The true statements about a computer are: I. Constructed from electronic components: A computer is an electronic device that is constructed using various electronic components such as transistors, capacitors, resistors, etc. III. It has facility for storage of data and programs: A computer has a storage device, such as a hard disk, that allows it to store data and programs for later use. IV. It has provision for input and output of data: A computer has various input devices such as a keyboard and mouse, which allow users to input data, and output devices such as a monitor or printer, which allow users to receive information from the computer. II. It has self-regeneration capability: This statement is not true. While computers are designed to detect and correct errors, they do not have the ability to regenerate or repair themselves without human intervention. Therefore, the statements that are true about computers are I, III, and IV.
Pregunta 35 Informe
Data transfer can be initiated through the following media except?
Figure 1 28. The topology
Detalles de la respuesta
Data transfer cannot be initiated through trunking pipe. Trunking pipes are used to protect and route cables, but they are not capable of initiating data transfer themselves. On the other hand, coaxial cable, fibre cable, and twisted pair cable are all examples of media that can be used to initiate data transfer. Coaxial cable uses a central conductor surrounded by insulation and a grounded shield to transmit signals, while fibre cable uses thin strands of glass or plastic to transmit light signals, and twisted pair cable uses pairs of copper wires twisted together to transmit electrical signals. Each of these media has its own advantages and disadvantages, and the choice of which one to use will depend on factors such as distance, bandwidth requirements, and cost.
Pregunta 36 Informe
Computers are classified using the following criteria except?
Detalles de la respuesta
Pregunta 37 Informe
To hold row and column titles in places so that they do not scroll when the user scrolls a worksheet, click the?
Detalles de la respuesta
To hold row and column titles in place so that they do not scroll when the user scrolls a worksheet in Microsoft Excel, you can use the Freeze Panes command on the Windows menu. This command allows you to select a row or column that you want to keep in place, and then freeze that row or column so that it remains visible when you scroll through the rest of the worksheet. This feature is helpful when you have a large spreadsheet with many rows and columns, and you want to keep the headers or labels in view as you work with the data. The other options listed in the question (Hold Titles, Split, and Show Grid) do not have the same function as Freeze Panes and will not allow you to hold row and column titles in place.
Pregunta 38 Informe
A Collection of software that allows the computer to operate is called?
Detalles de la respuesta
The collection of software that allows a computer to operate is called an Operating System (OS). An Operating System is a software that manages computer hardware and provides common services for computer programs. It acts as an interface between the hardware components of the computer and the applications that run on it. The operating system is responsible for managing resources such as memory, CPU time, and input/output operations. It also provides a user interface that enables users to interact with the computer and run applications. General-purpose software and specific software are not appropriate terms to describe the collection of software that allows a computer to operate. General-purpose software refers to software that can perform a variety of functions, such as word processing, spreadsheet management, and email communication. Specific software, on the other hand, is designed to perform a particular task, such as graphic design or accounting. Utility software, on the other hand, refers to software that performs specific tasks to maintain the performance and functionality of a computer system, such as virus scanners, disk defragmenters, and backup tools. However, utility software alone cannot allow a computer to operate; it needs an operating system to function. Therefore, the collection of software that allows a computer to operate is called an Operating System.
Pregunta 39 Informe
Effects of file insecurity include the following except?
Detalles de la respuesta
The effects of file insecurity include virus infection, file corruption, and data loss. However, encrypted data is not an effect of file insecurity. When files are insecure, they can be easily infected by viruses and malware, which can cause harm to the computer and compromise sensitive data. File corruption can occur due to various reasons such as hardware failure, software errors, or virus attacks. This can lead to files becoming unreadable or unusable, which can cause significant inconvenience and loss of important information. Data loss is also a common effect of file insecurity, which can occur due to accidental deletion, system failure, or hardware damage. Encrypted data, on the other hand, is a security measure that is used to protect files and data from unauthorized access. It is not an effect of file insecurity, but rather a way to prevent file insecurity from happening. Encryption involves converting the original data into a code that is unreadable without a specific decryption key. This helps to ensure that sensitive data is kept safe and secure, even if the files themselves are compromised.
Pregunta 40 Informe
The type of printer which works on the same principle as a photocopier is?
Detalles de la respuesta
Pregunta 41 Informe
identify the memory module with the largest physical Size?
Detalles de la respuesta
Pregunta 42 Informe
Which of the options labeled I to IV give two stages involved in booting?
I. Power On self test II. Loading of Operating System IIl. Loading of email IV. Power On Safe Mode
Detalles de la respuesta
Pregunta 43 Informe
Data that is copied from an application is store the?
Detalles de la respuesta
Data that is copied from an application is stored in the clipboard. The clipboard is a temporary storage location that allows you to copy and paste information between different applications or within the same application. When you copy data, it is stored in the clipboard, which is a type of memory that holds the data until you paste it elsewhere. Once you paste the data, it is removed from the clipboard, and the clipboard is ready to store new data. Therefore, the clipboard acts as a buffer that allows you to move information from one place to another, making it a useful tool for working with multiple applications or files.
Pregunta 46 Informe
An input device that converts an image into text is known as?
Detalles de la respuesta
The input device that converts an image into text is known as an Optical Character Reader (OCR). OCR is a technology that uses specialized software to recognize text characters within an image and then converts them into a digital format that can be edited, searched, and processed like any other text data. OCR technology can be used for a variety of applications such as digitizing printed documents, translating languages, and recognizing handwritten text. In summary, an OCR is a tool that helps to convert an image of printed or handwritten text into digital text that can be easily edited and manipulated.
Pregunta 47 Informe
A company known as CIBITO has the following memory modules in four of its computers as shown in Table 1 Use the information in Table 1 to answer questions 11 to 13.
MEMORY MODULE |
MEMORY TYPE | NUMBER OF PINS |
P | SIMM | 30 |
Q | SIMM | 72 |
R | SO DIMM | 72 |
S | DIMM | 168 |
Table 1
Which of the memory modules is appropriate for a notebook computer?
Detalles de la respuesta
Pregunta 48 Informe
The map of Nigeria is an example of ?
Detalles de la respuesta
The map of Nigeria is an example of graphic data. Graphic data refers to any visual representation of information or data, such as graphs, charts, diagrams, and maps. In this case, the map of Nigeria is a visual representation of the geographic features and boundaries of the country. It shows the different regions, states, and cities within Nigeria, as well as its neighboring countries and bodies of water. The map uses a combination of colors, symbols, and labels to convey information about Nigeria's geography in a clear and easily understandable way.
Pregunta 49 Informe
In BCD encoding system, 25, will be represented as?
Detalles de la respuesta
In BCD (Binary Coded Decimal) encoding system, 25 will be represented as 00100101. BCD is a system that represents each digit of a decimal number with its equivalent binary code. In BCD, each decimal digit is represented by a four-bit binary code. Therefore, the decimal number 25 is represented in BCD as follows: The binary representation of 2 is 0010, and the binary representation of 5 is 0101. So, combining the binary codes for both digits, we get 0010 0101, which is equivalent to the decimal number 25 in BCD representation. Therefore, the correct option is 00100101.
Pregunta 50 Informe
To send a created MS PowerPoint document using email to a use the document can be added as?
Detalles de la respuesta
Pregunta 51 Informe
TEST OF PRACTICAL KNOWLEDGE QUESTION
As a database administrator for a company, create a table named tbl-Employee in a database application package containing the fields:
"Employee Name", "Department", "Assumption Date", Address and "Designation".
(a) Enter the data as shown in the table tbl-Employee
tbl-Employee
Employee Name |
Department | Assumption Date | Address | Designation |
Kate Willikie |
General Office | 03/08/18 | 3 Lagos Crescent | Secretary |
James Elliot |
Security | 27/11/10 | 2 Cocoa House Villa. | CSO |
Paul Akinson |
Admin | 03/11/12 | 12 Millo Avenue | HRM |
Abdul Kaduna |
Registry | 05/06/16 | 2 Park Lane Rd | Clerk |
David Madu |
Management | 22/03/94 | 34 Lakeside | MD |
(b)Sort the data using the Assumption date from oldest to newest.
(c) Create a report in tabular, landscape using the tbl-Employee table.
(d) Insert your full name and index number as a label on the report.
(e) Save the report as rpt-Employee.
(f) Print your work and submit to the supervisor.
To create a table named "tbl-Employee" in a database application package, you would need to use a database management system and write a SQL (Structured Query Language) script to create the table and specify the fields. The fields you need to include are: "Employee Name", "Department", "Assumption Date", "Address", and "Designation".
Here's an example of the SQL script to create the table:
CREATE TABLE tbl-Employee (
EmployeeName varchar(50),
Department varchar(50),
AssumptionDate date,
Address varchar(100),
Designation varchar(50)
);
Next, you can insert the data into the table using the following SQL script:
INSERT INTO tbl-Employee (EmployeeName, Department, AssumptionDate, Address, Designation)
VALUES
('Kate Willikie', 'General Office', '03/08/18', '3 Lagos Crescent', 'Secretary'),
('James Elliot', 'Security', '27/11/10', '2 Cocoa House Villa.', 'CSO'),
('Paul Akinson', 'Admin', '03/11/12', '12 Millo Avenue', 'HRM'),
('Abdul Kaduna', 'Registry', '05/06/16', '2 Park Lane Rd', 'Clerk'),
('David Madu', 'Management', '22/03/94', '34 Lakeside', 'MD');
To sort the data by the "Assumption Date" field from oldest to newest, you can use the following SQL script:
SELECT * FROM tbl-Employee
ORDER BY AssumptionDate ASC;
For the report, you can use a reporting tool or generate a SQL script to format the data into a tabular, landscape report. You can add your full name and index number as a label on the report by including it as a header or footer in the report.
Finally, you can save the report as "rpt-Employee" and print it for submission to your supervisor.
Detalles de la respuesta
To create a table named "tbl-Employee" in a database application package, you would need to use a database management system and write a SQL (Structured Query Language) script to create the table and specify the fields. The fields you need to include are: "Employee Name", "Department", "Assumption Date", "Address", and "Designation".
Here's an example of the SQL script to create the table:
CREATE TABLE tbl-Employee (
EmployeeName varchar(50),
Department varchar(50),
AssumptionDate date,
Address varchar(100),
Designation varchar(50)
);
Next, you can insert the data into the table using the following SQL script:
INSERT INTO tbl-Employee (EmployeeName, Department, AssumptionDate, Address, Designation)
VALUES
('Kate Willikie', 'General Office', '03/08/18', '3 Lagos Crescent', 'Secretary'),
('James Elliot', 'Security', '27/11/10', '2 Cocoa House Villa.', 'CSO'),
('Paul Akinson', 'Admin', '03/11/12', '12 Millo Avenue', 'HRM'),
('Abdul Kaduna', 'Registry', '05/06/16', '2 Park Lane Rd', 'Clerk'),
('David Madu', 'Management', '22/03/94', '34 Lakeside', 'MD');
To sort the data by the "Assumption Date" field from oldest to newest, you can use the following SQL script:
SELECT * FROM tbl-Employee
ORDER BY AssumptionDate ASC;
For the report, you can use a reporting tool or generate a SQL script to format the data into a tabular, landscape report. You can add your full name and index number as a label on the report by including it as a header or footer in the report.
Finally, you can save the report as "rpt-Employee" and print it for submission to your supervisor.
Pregunta 52 Informe
TEST OF PRACTICAL KNOWLEDGE QUESTION
Using a word Processing application package, create a vising card for a system administrator of a software company using the following specifications:
(a) Size of the card is 3.5" x 2", (b) Office and Residential Address separated by a line; (C) the card should be copied m three places on the same page: (d) note that.
(i) the background colour must be grey scale: (ii) the card should be in shadow style, (iii) titlte "Visitor"
Uppercase
Highlight-gray-25%
Font size - 10 pt.
Font type - Georgia:
(iv) Office Address and Residential Address - 1.15 spacing
Font Type-Cambria
Font Size - 7 pt.
(e) Insert a tooter and type in your full name and index number.
(f) Save your work with your full name in the folder created on the desktop.
(g) Print your work and submit to the Supervisor.
To create a visiting card for a system administrator of a software company, we need to use a word processing application package. Follow the steps below:
By following these steps, we can create a visiting card for a system administrator of a software company using a word processing application package.
Detalles de la respuesta
To create a visiting card for a system administrator of a software company, we need to use a word processing application package. Follow the steps below:
By following these steps, we can create a visiting card for a system administrator of a software company using a word processing application package.
Pregunta 53 Informe
(a)(i) Define the term encryption. (ii) Tick two authentication techniques involved in security measure from Table 1.
Table 1
(ii) Outline two features of data encryption. (b) While exchanging data with a friend through your mobile phone, you observed that it took a longer time than usual. Outline four factors that may be responsible for the delay in the data transfer.
TECHNIQUE |
TICK() |
Firewall |
|
Biometric |
|
Password |
|
Intranet |
(a)(i) Encryption is the process of converting plain or readable data into a coded or unreadable format using an algorithm. This process helps to secure the confidentiality of sensitive information and prevents unauthorized access or interception of data.
(a)(ii) Two authentication techniques involved in security measure from Table 1 are:
(a)(iii) Two features of data encryption are:
(b) Four factors that may be responsible for the delay in data transfer through mobile phone are:
Detalles de la respuesta
(a)(i) Encryption is the process of converting plain or readable data into a coded or unreadable format using an algorithm. This process helps to secure the confidentiality of sensitive information and prevents unauthorized access or interception of data.
(a)(ii) Two authentication techniques involved in security measure from Table 1 are:
(a)(iii) Two features of data encryption are:
(b) Four factors that may be responsible for the delay in data transfer through mobile phone are:
Pregunta 54 Informe
TEST OF PRACTICAL KNOWLEDGE QUESTION
Use a spreadsheet application to do the following. (a) In cell A1, type "My One Week Expenses On Five items".
(b) In row 2, type column-by-column the following: "ITEM", 1ST DAY, "2ND DAY, "3RD DAY", *4TH DAY, "5THDAY", "6TH DAY" and "7TH DAY".
(c) In column A, starting from A3 to A7, List the items you spent money on.
(d) Enter the amount spent on each item for each day in their respective columns.
Note: select your own items and the amount spent.
(e) In cells 12 and A8. type "TOTAL N".
(f) Using formula/function compute the total expenses for each day and for each item.
(g) Create borders around the table.
(h) Insert a footer and type in your full name and index number. (i) Below the table, type in the formula that was used:
(i) in cell 18: (ii) for summing from B3 to H3.
Note: Enclose your formula in quotes ave your work with your full name in the folder created on the desktop.
(k) Print your work and submit to the supervisor.
To complete the task outlined in the question, you can follow these steps:
This will give you a complete table of your expenses for one week on five items, along with the total expenses for each day and for each item.
Detalles de la respuesta
To complete the task outlined in the question, you can follow these steps:
This will give you a complete table of your expenses for one week on five items, along with the total expenses for each day and for each item.
Pregunta 55 Informe
(a) (i) identify Figure 1. (ii) Name the parts labeled I, J, K and L in Figure 1
(b)(i) Define the documentation stage in Program Development Life Cycle. (ii) List three characteristics of a good computer program.
(a)
i)Flow chart diagram
ii) Name the parts
(b)
Detalles de la respuesta
(a)
i)Flow chart diagram
ii) Name the parts
(b)
¿Te gustaría proceder con esta acción?