Cargando....
Mantén pulsado para arrastrar. |
|||
Haz clic aquí para cerrar |
Pregunta 2 Informe
Which of the following terms is not a feature of distributed database?
Detalles de la respuesta
The term "Single server" is not a feature of a distributed database. A distributed database is a database that is spread across multiple servers or nodes, with each node having its own portion of data. This allows for greater scalability and improved performance, as well as increased availability and reliability in the event of a single node failure. In contrast, a single server database is stored on a single, centralized server and does not have the benefits of a distributed database.
Pregunta 3 Informe
The function of the SQL statement SELECT Student ID, Surname, House Name FROM Student, is that it
Detalles de la respuesta
The SQL statement SELECT Student ID, Surname, House Name FROM Student is used to retrieve information from the "Student" table in a database. It selects and displays the "Student ID," "Surname," and "House Name" fields/columns for all the rows/records in the "Student" table. Therefore, the correct option is "retrieves the listed fields from student table".
Pregunta 4 Informe
Figure 4 shows CorelDraw tool bar. The part labeled I is used to
Detalles de la respuesta
The part labeled "I" in the CorelDraw tool bar is used to select objects. In CorelDraw and other graphic design software, the selection tool is used to select and manipulate objects within the design. This is an essential tool for making edits and changes to the design, as it allows you to select objects and move, resize, or modify them as needed. When you click on an object in the design with the selection tool, the object will become surrounded by selection handles, which indicate that the object is selected and can be edited. Additionally, the selection tool can be used to select multiple objects at once, making it easy to manipulate multiple elements in the design at the same time. It is important to note that the selection tool is just one of many tools available in CorelDraw and other graphic design software, and each tool has a specific purpose and function. Understanding the different tools and their uses is an important part of working with graphic design software.
Pregunta 5 Informe
The term Garbage-In-Garbage-Out is used to explain the characteristics of the computer in terms of
Detalles de la respuesta
Pregunta 6 Informe
One precautionary measure taken when cleaning a monitor is
Detalles de la respuesta
One precautionary measure taken when cleaning a monitor is to unplug the power supply cable. This means disconnecting the cable that provides electricity to the monitor so that it is no longer receiving power. This is important because cleaning a monitor while it is turned on or receiving power can cause damage to the screen or other components, and it can also pose a safety hazard if you accidentally touch the wrong part of the monitor while it is still powered. By unplugging the power supply cable, you ensure that the monitor is safe to clean and that you won't cause any damage to the screen or other components.
Pregunta 7 Informe
An operating systemthat enables more than one user to access the same data is called
Detalles de la respuesta
A multi-user operating system is one that allows multiple users to access the same data at the same time. This type of OS enables different users to log into the system and access files, folders, and programs that are shared across the network. Each user can have their own account with individual permissions, which controls what they can and can't access. For example, in a multi-user operating system, a user can save a file on a shared folder, and other users can access and modify that file if they have permission. This allows multiple users to collaborate and work together on the same documents, databases, or projects. In contrast, a single-user operating system only allows one user to access the data at a time, while a multi-tasking operating system allows one user to run multiple programs simultaneously. Virtual memory is a technology that allows the computer to use a portion of the hard drive as additional RAM, enabling the computer to run more programs than it could with physical RAM alone.
Pregunta 8 Informe
Use Figure 1 to answer question 16
To visit the previous page using the interface in Figure 1, the user will click on the part labeled
Detalles de la respuesta
Pregunta 9 Informe
The erratic movement of the mouse pointer is usually caused by
Detalles de la respuesta
Pregunta 10 Informe
To prevent the loss of data in the computer, it is better to implement file
Detalles de la respuesta
To prevent the loss of data in a computer, it is better to implement a "backup" system. A backup is a copy of important data that can be used to restore the original data in case it is lost or damaged. By regularly backing up your data, you can protect against accidental deletion, hardware failure, viruses, and other potential risks that could cause data loss. There are various methods for backing up data, such as using an external hard drive, cloud storage services, or specialized backup software. It is important to make sure that backups are done regularly and stored securely in a different location from the original data to ensure that they are accessible and not affected by the same risks that could affect the original data.
Pregunta 11 Informe
The malware which is programmed to initiate at a specific date or when a specific event occurs is called
Detalles de la respuesta
The malware which is programmed to initiate at a specific date or when a specific event occurs is called a "logic bomb". A logic bomb is a type of malware that is intentionally inserted into a system or software application by a malicious actor with the intention of causing damage or disruption at a predetermined time or when a specific trigger event occurs. A logic bomb is similar to a time bomb in that it is designed to lie dormant until a specific date or event occurs, at which point it is triggered to execute its malicious code. For example, a logic bomb could be programmed to erase critical files or data from a system on a certain date or when a particular employee's username is deleted from the system. Unlike other types of malware, a logic bomb may not necessarily be designed to spread or replicate itself to other systems. Instead, its sole purpose is to cause damage or disruption to the targeted system at a specific time or under certain circumstances.
Pregunta 12 Informe
The number 101100101\(2\) in denary is
Detalles de la respuesta
To convert the binary number 101100101 to decimal (denary), we can use the positional notation system. Each digit in a binary number represents a power of 2, starting from the rightmost digit with 2^0, then increasing by a power of 2 for each subsequent digit (i.e., 2^1, 2^2, 2^3, etc.). Starting from the rightmost digit in 101100101, we have: 1 × 2^0 = 1 0 × 2^1 = 0 1 × 2^2 = 4 0 × 2^3 = 0 0 × 2^4 = 0 1 × 2^5 = 32 1 × 2^6 = 64 0 × 2^7 = 0 1 × 2^8 = 256 Adding up the results, we get: 1 + 0 + 4 + 0 + 0 + 32 + 64 + 0 + 256 = 357 Therefore, the decimal (denary) equivalent of the binary number 101100101 is 357.
Pregunta 13 Informe
Web design packages includes the following except
Detalles de la respuesta
The term "Adobe PageMaker" is not typically included in web design packages. Web design packages typically include software tools for designing, creating, and publishing websites. Macromedia Dreamweaver, iWeb, and Front Page are all examples of web design software that are commonly used for this purpose. Adobe PageMaker, on the other hand, is a desktop publishing software that is used for creating printed materials such as brochures, flyers, and magazines. It is not specifically designed for web design and does not have the features and functionality needed for creating and publishing websites.
Pregunta 14 Informe
Figure 2 shows a dialog box from Microsoft Word application. Use it to answer question 19
Which of the following command shortcuts can be used to display the dialog bax in Figure when the application is running?
Detalles de la respuesta
Pregunta 15 Informe
When information is conveyed from one space to another, it is referred to as information
Detalles de la respuesta
When information is conveyed from one space to another, it is referred to as "transmission." Transmission refers to the process of sending data or information from one location to another through a communication channel, such as a wired or wireless network, cable, or satellite. This process involves encoding the information into a form that can be transmitted, sending it through the communication channel, and then decoding it back into its original form at the destination. Examples of transmission include sending an email, making a phone call, or streaming a video over the internet.
Pregunta 16 Informe
The following software are web browsers except
Detalles de la respuesta
Among the given options, Linux is not a web browser. Firefox, Google Chrome, and Opera are all examples of web browsers. A web browser is a software application that allows you to access and view websites on the internet. It retrieves web pages from servers, displays them on your computer screen, and allows you to interact with them. Firefox, Google Chrome, and Opera are all popular web browsers that are used to browse the internet. Linux, on the other hand, is an operating system that is used to run software applications, including web browsers like Firefox and Google Chrome.
Pregunta 17 Informe
Which of the following actions is not a source of computer virus?
Detalles de la respuesta
Pregunta 18 Informe
The use of the internet to perform illegal activities is generally called
Detalles de la respuesta
The use of the internet to perform illegal activities is generally called "cybercrime". This includes various types of criminal activities such as hacking, identity theft, online fraud, spreading malware or viruses, online harassment, and more. Cybercriminals use the internet and various online platforms to target individuals, organizations, and even governments to steal personal information, money, or sensitive data. Cybercrime poses a significant threat to cybersecurity and can cause serious financial, reputational, and legal consequences for victims.
Pregunta 19 Informe
The manipulation of digitalized information by computer by computer or other electronic equipment is known as
Detalles de la respuesta
The manipulation of digitalized information by a computer or other electronic equipment is known as "data manipulation." This refers to the process of changing, organizing, or analyzing data using computer software or hardware. Data manipulation can involve a wide range of activities, such as sorting, filtering, merging, transforming, or calculating data in order to produce meaningful information or insights. For example, data manipulation might involve sorting a list of customer names alphabetically, calculating the average sales revenue for a particular product, or merging two databases to create a more comprehensive view of a business. Overall, data manipulation is an essential part of information processing, which involves the collection, organization, analysis, and communication of data. By manipulating digital information using computer technology, organizations can better understand and utilize their data, which can lead to improved decision-making and better business outcomes.
Pregunta 20 Informe
Security breaches in computing cannot be prevented through the use of
Detalles de la respuesta
Pregunta 21 Informe
To show the whole presentation in Microsoft PowerPoint 2007, select slide show from the
Detalles de la respuesta
Pregunta 22 Informe
The formula to calculate the average of a given range of data from cell B2 to cell D4 in a Microsoft Excel worksheet is
Detalles de la respuesta
The formula to calculate the average of a given range of data from cell B2 to cell D4 in a Microsoft Excel worksheet is "=AVERAGE(B2:D4)". This formula uses the "AVERAGE" function in Excel, which calculates the average of a range of values. The range of values is specified by the parameters inside the parentheses, which in this case are "B2:D4". The colon (:) between B2 and D4 indicates that the range includes all the cells between and including B2 and D4. By using this formula, Excel will calculate the average of all the values within the specified range and display the result in the cell where the formula is entered.
Pregunta 23 Informe
Which of the following media involves point-to-point communication?
Detalles de la respuesta
Pregunta 24 Informe
The best arrangement that gives the correct order of magnitude of the database element is
Detalles de la respuesta
Pregunta 25 Informe
Fourth generation computer application can execute the following operations except
Detalles de la respuesta
Fourth-generation computer applications cannot execute the operation of "digging of drainages". This is because fourth-generation computers are software-based and designed for specific applications that focus on data manipulation, report generation, and analysis. Fourth-generation applications are known for their ability to process large volumes of data and provide high-level programming languages that make it easy to develop and customize applications for specific business needs. Some common applications of fourth-generation computers include database management, payroll management, financial analysis, inventory control, and other similar functions. However, digging of drainages is a physical operation that requires heavy machinery and human labor, which cannot be executed by a fourth-generation computer application.
Pregunta 26 Informe
S/N | A | B | C | D | E | F | G | H |
1 | STAFF | DAYS | ITEMS SALES (N) | ITEMS SALES (N) | ITEMS SALES (N) | ITEMS SALES (N) | ITEMS SALES (N) | ITEMS SALES (N) |
2 | JOY | MON | 208 | 300 | 500 | 400 | 300 | 158 |
3 | AKIN | TUE | 300 | 200 | 500 | 400 | 200 | 200 |
4 | KEN | WED | 400 | 300 | 400 | 500 | 100 | 300 |
Figure 3
The highest sale by Joy is recorded in cell
Detalles de la respuesta
The highest sale by Joy is recorded in cell "E2". This is because the "ITEMS SALES (N)" column represents the sales for each staff member, and "JOY" is located under the "STAFF" column. The sales data for Joy are listed in row 2, and the highest value in that row is found in column "E", which corresponds to the "ITEMS SALES (N)" for Thursday. Therefore, the highest sale by Joy is recorded in cell "E2", which contains the value "400".
Pregunta 27 Informe
The main component of the first generation computer was
Detalles de la respuesta
Pregunta 28 Informe
Which of the following file organizations requires primary Key?
Detalles de la respuesta
A file organization that requires a primary key is the Indexed file organization. In this type of file organization, records are stored in an index, which is a separate data structure that allows for fast access to the records based on the value of the primary key. The primary key is a unique identifier for each record, and it is used to look up the record in the index. This allows for efficient and quick retrieval of records, which is important in many applications. So, having a primary key is essential in indexed file organization.
Pregunta 30 Informe
A file organization that contains a reference number is called
Detalles de la respuesta
A file organization that contains a reference number is called "indexed access". In this type of file organization, each record in the file is assigned a unique reference number, also known as an index. The reference number acts as a pointer to the location of the actual data in the file, making it easier and faster to retrieve specific records. Think of it like an index in a book. Just like how you can use the index in a book to quickly find information on a specific topic, you can use the reference numbers in an indexed access file to quickly find the data you need.
Pregunta 31 Informe
The following ,media are used for information transmission except
Detalles de la respuesta
The media are channels or platforms that are used to transmit information from one person or group to another. Out of the options provided, a diary is not a medium for information transmission. A diary is a personal journal where individuals record their thoughts, feelings, experiences, and events that happen in their lives. It is a private document that is not intended for communication or information transmission to others. On the other hand, magazines, radio, and television are all media that are designed to disseminate information to a wide audience. Magazines are typically published periodically and contain articles, stories, and other content on various topics. Radio and television broadcast news, entertainment, educational programs, and other forms of content to audiences through audio or visual transmission.
Pregunta 32 Informe
The field in a database which uniquely identifies each record is called a
Detalles de la respuesta
A primary key is a field in a database that uniquely identifies each record. It acts as a unique identifier for each record in a table and ensures that no two records are the same. The primary key is used to connect related information stored in different tables in a database, and is essential for ensuring the accuracy and integrity of the data stored in a database. Simply put, it's like a fingerprint for each record in a table that helps distinguish it from other records.
Pregunta 33 Informe
Which of the following statements is true?
Detalles de la respuesta
The statement "Data leads to information and information leads to knowledge" is true. Data refers to raw facts and figures, and can come from a variety of sources such as experiments, surveys, and observations. Information is created when data is processed, organized, and analyzed in a way that gives it meaning. This information can then be used to answer questions, make decisions, or solve problems. Knowledge is an understanding and awareness of information that has been acquired through experience and education. It's the ability to apply information to different situations and make informed decisions. So, data is the starting point, which is processed to create information, and that information is then used to build knowledge.
Pregunta 34 Informe
The protocol for transferring files from one machine to another is
Detalles de la respuesta
The protocol for transferring files from one machine to another is FTP (File Transfer Protocol). FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the Internet. It is often used to upload or download files to or from a server, such as a web server or a file server. When using FTP, you typically connect to a server using a client software, such as FileZilla or WinSCP. Then, you can browse the server's file system, select the files you want to transfer, and either upload or download them. FTP is one of the oldest and most widely used file transfer protocols, and it is still widely used today due to its simplicity and versatility. However, it is important to note that FTP transfers are not secure, and it is recommended to use a secure file transfer protocol, such as SFTP (Secure File Transfer Protocol), if security is a concern.
Pregunta 35 Informe
The feature of a word document that shows the page, number of words and errors found in a document is the
Detalles de la respuesta
Pregunta 36 Informe
The correct order of the steps taken in creating a database from the database template in MS Access 2007 is
Detalles de la respuesta
Pregunta 37 Informe
Mr Francis has an office complex with 20 rooms. What type of network is suitable for connecting all the computers in their various rooms into a single network?
Detalles de la respuesta
The most suitable type of network for connecting all the computers in the 20 rooms of Mr Francis' office complex into a single network is a Local Area Network (LAN). A LAN is a network that connects computers and devices in a relatively small geographical area, such as a building, a floor, or a group of nearby buildings. Since Mr Francis' office complex has 20 rooms, a LAN would be suitable for connecting all the computers in these rooms into a single network. LANs are designed to provide high-speed connectivity within a limited area, making them ideal for office complexes, schools, and small businesses. They allow for easy sharing of resources such as files, printers, and internet access, as well as efficient communication between users on the same network. In addition, LANs are relatively easy to set up and maintain, making them a cost-effective option for small-scale networking needs. In summary, a LAN would be the best option for Mr Francis to connect all the computers in his office complex into a single network, providing high-speed connectivity, easy resource sharing, and efficient communication between users.
Pregunta 38 Informe
The type of computer that counts in discrete form only is referred to as
Detalles de la respuesta
A digital computer is the type of computer that counts in discrete form only. This means that it operates using a series of binary digits, or "bits," which can represent either a zero or a one. These bits are combined to form numbers, letters, and other symbols that can be processed by the computer. Digital computers are designed to perform specific tasks by following a set of instructions, or a "program." They are used in a wide range of applications, from simple calculations to complex simulations and data analysis. Digital computers are generally considered to be more accurate, reliable, and versatile than analog computers, which represent information in a continuous form.
Pregunta 40 Informe
The joystick is mainly used for
Detalles de la respuesta
The joystick is mainly used for playing computer games. A joystick is a handheld device that allows users to control the movement of an object on a screen, such as a character in a game. The joystick usually has a stick that can be moved in different directions and buttons that can be pressed to perform different actions. Joysticks are popular among gamers because they provide a more immersive and intuitive way to interact with games than using a keyboard or mouse. While joysticks can also be used for other purposes, such as controlling airplanes or robotics, their primary use is for gaming.
Pregunta 41 Informe
(a) Complete Table 1 wih the appropriate criteria for each medium.
Table 1
Criteria/Medium | DVD-ROM | Hard Disk | Magnetic Tape |
Location of storage media | External | (i) _________ _________ |
(ii) __________ __________ |
Removability | (iii) __________ __________ |
(iv) __________ ___________ |
(v) ___________ ____________ |
Method file Access | (vi) __________ __________ |
Random/Direct Access | (vii) ___________ ___________ |
(b) List three examples of spreadsheet application.
(a) Completed Table 1:
Criteria/Medium | DVD-ROM | Hard Disk | Magnetic Tape |
---|---|---|---|
Location of storage | External | (i) Inside computer case | (ii) Inside tape drive |
Removability | (iii) Non-removable | (iv) Removable | (v) Removable |
Method file Access | (vi) Sequential Access | Random/Direct Access | (vii) Sequential Access |
(b) Three examples of spreadsheet applications are:
Detalles de la respuesta
(a) Completed Table 1:
Criteria/Medium | DVD-ROM | Hard Disk | Magnetic Tape |
---|---|---|---|
Location of storage | External | (i) Inside computer case | (ii) Inside tape drive |
Removability | (iii) Non-removable | (iv) Removable | (v) Removable |
Method file Access | (vi) Sequential Access | Random/Direct Access | (vii) Sequential Access |
(b) Three examples of spreadsheet applications are:
Pregunta 42 Informe
TEST OF PRACTICAL KNOWLEDGE QUESTION
A student was given an assignment which involved typesetting a passage at home using a laptop computer. The student was required to bring the soft copy of the assignment in a flash drive with volume label STUDENT ASSIGNMENT to the school. Highlight the steps the student would take to: (a) save the typeset work in the flash drive (b) create a folder named ASSIGNMENTS on the desktop of computer in the school's computer laboratory and save the typeset assignment in the folder (c) prit the assignment from the folder created in 5(b).
To save the typeset work in the flash drive:
To create a folder named ASSIGNMENTS on the desktop of the school's computer laboratory and save the typeset assignment in the folder:
To print the assignment from the folder created in 5(b):
Detalles de la respuesta
To save the typeset work in the flash drive:
To create a folder named ASSIGNMENTS on the desktop of the school's computer laboratory and save the typeset assignment in the folder:
To print the assignment from the folder created in 5(b):
Pregunta 43 Informe
(a) Define the following terms; (i) Disk formatting (ii) Data backup (iii) Virus scan
(b) State four uses of the Automated Teller Machine (ATM)
(a)
(i) Disk formatting: Disk formatting is the process of preparing a storage device, such as a hard drive, for use by organizing it into sections called partitions and setting up a file system on it to manage the data stored on the device. This process erases all the data on the disk and makes it ready for use.
(ii) Data backup: Data backup is the process of creating a copy of important data and storing it separately from the original data, typically in a different location or on a different storage device. The purpose of data backup is to have a copy of the data that can be used to restore the original data in the event of data loss, such as due to hardware failure or data corruption.
(iii) Virus scan: Virus scan is the process of checking a computer or device for malicious software, commonly known as viruses, and removing them if found. This process is typically performed using antivirus software and is an important step in protecting a computer from potential harm.
(b)
(i) Withdraw cash: One of the main uses of ATMs is to withdraw cash. Customers can use their debit or credit cards to withdraw money from their bank accounts at ATMs.
(ii) Check account balance: Another use of ATMs is to check the balance of a customer's bank account. Customers can use their debit or credit cards to access their account information and see how much money they have in their account.
(iii) Transfer funds: ATMs also allow customers to transfer funds between their accounts. For example, a customer can transfer money from their savings account to their checking account.
(iv) Pay bills: Some ATMs also allow customers to pay their bills. Customers can use their debit or credit cards to make payments on their utility bills, credit card bills, and other types of bills.
Detalles de la respuesta
(a)
(i) Disk formatting: Disk formatting is the process of preparing a storage device, such as a hard drive, for use by organizing it into sections called partitions and setting up a file system on it to manage the data stored on the device. This process erases all the data on the disk and makes it ready for use.
(ii) Data backup: Data backup is the process of creating a copy of important data and storing it separately from the original data, typically in a different location or on a different storage device. The purpose of data backup is to have a copy of the data that can be used to restore the original data in the event of data loss, such as due to hardware failure or data corruption.
(iii) Virus scan: Virus scan is the process of checking a computer or device for malicious software, commonly known as viruses, and removing them if found. This process is typically performed using antivirus software and is an important step in protecting a computer from potential harm.
(b)
(i) Withdraw cash: One of the main uses of ATMs is to withdraw cash. Customers can use their debit or credit cards to withdraw money from their bank accounts at ATMs.
(ii) Check account balance: Another use of ATMs is to check the balance of a customer's bank account. Customers can use their debit or credit cards to access their account information and see how much money they have in their account.
(iii) Transfer funds: ATMs also allow customers to transfer funds between their accounts. For example, a customer can transfer money from their savings account to their checking account.
(iv) Pay bills: Some ATMs also allow customers to pay their bills. Customers can use their debit or credit cards to make payments on their utility bills, credit card bills, and other types of bills.
Pregunta 44 Informe
(a) (i) State three ways of classifying computers.
(ii) Differentiate between digital and analog computers.
(b) List three positive impacts of ICT on the society.
(c) Give two types of information transmission medium.
(a)
(i) Three ways of classifying computers are:
(ii) Digital computers use discrete values (usually binary digits) to represent data and perform calculations, while analog computers use continuous physical quantities (such as voltage or current) to represent data and perform calculations.
(b)
Three positive impacts of ICT (Information and Communication Technology) on society are:
(c)
Two types of information transmission medium are:
Detalles de la respuesta
(a)
(i) Three ways of classifying computers are:
(ii) Digital computers use discrete values (usually binary digits) to represent data and perform calculations, while analog computers use continuous physical quantities (such as voltage or current) to represent data and perform calculations.
(b)
Three positive impacts of ICT (Information and Communication Technology) on society are:
(c)
Two types of information transmission medium are:
¿Te gustaría proceder con esta acción?