Ana loda....
Latsa & Riƙe don Ja Shi Gabaɗaya |
|||
Danna nan don rufewa |
Tambaya 1 Rahoto
The available page orientation in Microsoft Word are?
Bayanin Amsa
Page orientation in Microsoft Word refers to the direction in which content is printed on the page. There are two main page orientations available: portrait and landscape. Portrait orientation is the default setting, in which the page is taller than it is wide. This is the most common orientation for documents such as letters, essays, and reports. Landscape orientation, on the other hand, is where the page is wider than it is tall. This orientation is useful for documents such as spreadsheets, tables, and presentations. Therefore, the correct answer to the question is "portrait and landscape".
Tambaya 2 Rahoto
The following are features of web browsers except?
Bayanin Amsa
The features of a web browser are the tools, functions or options that enable users to interact with web pages and navigate the internet. The title bar, address bar and menu bar are some of the common features of web browsers. However, the formula bar is not a feature of web browsers. The formula bar is a feature of spreadsheet applications like Microsoft Excel, and it is used to enter and view formulas or functions used in calculating data. Therefore, option B (Formula bar) is the correct answer.
Tambaya 3 Rahoto
A graph plotter is most suited for use in a/an?
Tambaya 4 Rahoto
The absolute address of cell G5 in a spreadsheet application is represented by?
Bayanin Amsa
Tambaya 5 Rahoto
Which of the following is not a method of accessing file?
Bayanin Amsa
The method of accessing a file determines the order in which data is read or written to a file. "Circular," "random," "serial," and "sequential" are all valid methods of accessing a file. Therefore, none of the options listed is not a method of accessing a file.
Tambaya 7 Rahoto
Which of the following statements can be used for looping in BASIC?
Bayanin Amsa
The statement that can be used for looping in BASIC is "FOR ... NEXT". The FOR loop is used to execute a set of statements a specified number of times, while the NEXT statement is used to terminate the FOR loop. The general format for the FOR loop is:
FOR variable = start_value TO end_value [STEP step_value]
[statements]
NEXT variable
The variable is set to the start value, and the loop executes until it reaches the end value, incrementing by the step value (if provided) each time. The statements inside the loop are executed for each iteration of the loop. The NEXT statement is used to indicate the end of the loop and to specify the variable that is being incremented.
Tambaya 9 Rahoto
The census machine was invented by?
Bayanin Amsa
The census machine was invented by Herman Hollerith. Herman Hollerith was an American inventor who developed a punched card tabulating machine based on the Jacquard loom principles. He invented the machine in the late 19th century to help process and analyze data from the US census, which had grown too large and complex to be handled manually. The machine used punched cards to store and process data, and it was able to process information much faster than human operators. This invention laid the foundation for modern data processing and is considered a major milestone in the history of computing.
Tambaya 10 Rahoto
The hardware component that is responsible for fetching, decoding and execution of program instruction is?
Bayanin Amsa
Tambaya 11 Rahoto
Which of the following views is used to create data base objects in Microsoft Access?
Bayanin Amsa
The view used to create database objects in Microsoft Access is the Design view. This view allows the user to create and modify tables, forms, queries, and reports by specifying their structures and properties. In the Design view, the user can define the fields or columns of a table, set their data types, specify primary keys, and establish relationships between tables. The Design view provides a graphical interface that allows the user to drag and drop fields, add new fields, and modify existing ones. It also allows the user to set validation rules, input masks, default values, and other properties for the fields. Overall, the Design view is a powerful tool that enables the user to create and customize database objects to meet specific requirements.
Tambaya 12 Rahoto
Soft boot is initiated by pressing?
Bayanin Amsa
Soft boot is initiated by pressing Ctrl + Alt + Del keys simultaneously. This key combination sends a signal to the computer's operating system to restart the system, without shutting down the computer entirely. Soft booting allows the computer to reboot quickly and is often used when troubleshooting software or hardware issues that require a system restart.
Tambaya 13 Rahoto
Which of the following statements is not true about secondary storage media? They
Bayanin Amsa
Tambaya 15 Rahoto
A field chosen to uniquely identify every record in a database is?
Bayanin Amsa
A primary key is a field in a database table that is used to uniquely identify each record in the table. It must have a unique value for each record and cannot be null or empty. The primary key is used to link related tables in a database and is essential for maintaining data integrity and accuracy.
Tambaya 16 Rahoto
The copyright law is used to protect?
Bayanin Amsa
The copyright law is used to protect intellectual property. Intellectual property refers to the creations of the human mind, such as inventions, literary and artistic works, designs, symbols, and names. Copyright law gives the creator of a work the exclusive right to use and distribute their work, which can include things like books, music, and movies. It helps ensure that creators are compensated for their work and that others cannot use or profit from their creations without permission.
Tambaya 17 Rahoto
Which of the following symbols is not a relational operator in BASIC programming language?
Bayanin Amsa
The symbol that is not a relational operator in BASIC programming language is "^". Relational operators are symbols used in programming to compare values and determine whether one value is greater than, less than, equal to, or not equal to another value. In BASIC programming language, the relational operators are "<" (less than), ">" (greater than), "<=" (less than or equal to), ">=" (greater than or equal to), "=" (equal to), and "<>" (not equal to). The symbol "^" is not a relational operator in BASIC programming language. It is actually an arithmetic operator used to represent exponentiation, which means raising a number to a power. For example, in BASIC, the expression "2^3" would evaluate to 8, because 2 raised to the power of 3 equals 8. So, to summarize, the symbol "^" is not a relational operator in BASIC programming language, but rather an arithmetic operator used for exponentiation.
Tambaya 18 Rahoto
The "collection of the unorganized facts and figures" is called?
Bayanin Amsa
The term that best describes a set of unorganized facts and figures is "data". Data can be defined as raw, unprocessed information that is collected and stored for later use. This information can be in any form, such as numbers, text, images, or audio. Data becomes useful when it is processed and organized into meaningful information. So, in summary, when we refer to a collection of unorganized facts and figures, we are talking about "data".
Tambaya 19 Rahoto
Arrange in hierarchical order by date the following inventions:
I. - Census machine; Il. - Abacus; lll. - Slide rule; IV.- Difference engine.
Bayanin Amsa
Tambaya 20 Rahoto
Which of the following factors limits access to computerized file system? it
Bayanin Amsa
The correct answer is "requires regular supply of power". A computerized file system is an electronic system that stores and organizes data on a computer. One of the key requirements for a computerized file system to function properly is a regular supply of power. Without power, the computer and its file system cannot operate, and access to the files is limited. The other options listed do not directly relate to limiting access to a computerized file system. For example, the amount of space occupied by the file system does not necessarily limit access, and a highly efficient processing system may actually enhance access to information.
Tambaya 21 Rahoto
A student mistakenly pressed the F5 key on keyboard while browsing on the internet. This will lead to?
Tambaya 22 Rahoto
Which of the file formats is supported in all windows operating systems?
Bayanin Amsa
Tambaya 24 Rahoto
The input device best used to capture finger print is?
Bayanin Amsa
The input device that is best used to capture fingerprints is option III, a fingerprint scanner. A fingerprint scanner is a device that captures the unique pattern of ridges and valleys on the surface of a person's fingertip. It works by illuminating the finger with a light source and capturing the reflection of the light through a sensor that reads the pattern of the ridges and valleys. Fingerprint scanners are widely used for security purposes, such as in biometric authentication systems for access control or identity verification. They are very accurate and reliable, and the captured fingerprints can be stored in a database for later comparison and identification. In contrast, the other options listed (I, II, and IV) are not specifically designed to capture fingerprints. Option I, a keyboard, is used for typing text, option II, a mouse, is used for pointing and clicking on a computer screen, and option IV, a microphone, is used for recording sound. While these input devices may have some limited capacity to capture fingerprints (e.g. if someone types with dirty fingers), they are not optimized for this purpose and are not as reliable or accurate as a dedicated fingerprint scanner.
Tambaya 25 Rahoto
Us the table below to answer this question
Character | Decimal Code | ASCII Code |
N | 78 | 1001110 |
O | 1 | 1001111 |
T | 84 | II |
The cell labelled ll in the table represents?
Bayanin Amsa
Without the table or any additional information provided, it is not possible to determine which cell is labelled "ll" and what value it represents. Please provide more context or information to help answer your question.
Tambaya 26 Rahoto
Which of the following components is directly located inside the computer processor?
Bayanin Amsa
The component directly located inside the computer processor is the Arithmetic Logic Unit (ALU). The ALU is responsible for performing arithmetic and logical operations on data that is passed to it from the computer's memory. This component is essential for carrying out the basic operations of a computer, such as addition, subtraction, and comparison of values. The BIOS, RAM, and ROM are not located inside the processor but are instead separate components that interact with the processor to carry out various functions.
Tambaya 29 Rahoto
Use the infomation below to answer questions 35 and 36
I-Mouse Il. -Keyboard III-Scanner IV. -Joystick.
The input devices used to capture date of birth on an Online form are?
Tambaya 30 Rahoto
Which of the following statements is true for a circuit Switching communication system?
Bayanin Amsa
A dedicated channel must be established between two parties through the period of communication. In a circuit switching communication system, a dedicated physical communication path is established between the sender and the receiver for the duration of the communication session. During this time, the entire capacity of the channel is reserved for the transmission of the message, which results in a highly reliable and efficient mode of communication. However, this method of communication is not ideal for real-time communication, as the dedicated channel may remain idle during periods of silence, resulting in inefficient use of bandwidth. Therefore, this statement is false. In contrast, packet switching is more suited for real-time communication and involves breaking the message into packets that are transmitted independently and reassembled at the receiver.
Tambaya 31 Rahoto
The expression DEPOSIT (1, 10) stands for an array with?
Bayanin Amsa
The expression DEPOSIT(1,10) stands for an array with 10 elements. The first number in the parentheses represents the starting index of the array, which in this case is 1. The second number represents the ending index of the array, which in this case is 10. Therefore, there are 10 elements in the array, with index numbers ranging from 1 to 10.
Tambaya 32 Rahoto
INPUT | OUTPUT | |
P | O | R |
0 | 0 | 1 |
0 | 1 | 0 |
1 | 0 | 0 |
1 | 1 | 0 |
The table above represents the Truth Table for?
Bayanin Amsa
The table above represents the Truth Table for the NAND (Not AND) logic gate. In digital electronics, a NAND gate is a logic gate which produces a high output (1) only when all inputs are low (0). It operates like an AND gate, followed by a NOT gate. The output of the NAND gate is the inverse of the AND gate. The NAND gate is widely used in digital circuits as it is a universal gate, meaning that any other logic gate can be realized using NAND gates only.
Tambaya 33 Rahoto
A high level language program translator which converts a source code to machine readable format and compile executes it one line at a time is?
Bayanin Amsa
Tambaya 34 Rahoto
Opening an already existing sequential file in output (O) mode will lead to?
Bayanin Amsa
Tambaya 35 Rahoto
A computer that requests the services of another computer on a network is called a?
Bayanin Amsa
A computer that requests the services of another computer on a network is called a "client". In a client-server network architecture, the client computer is the one that initiates a request to the server computer, which responds by providing the requested services or resources. The client computer can be any device on the network, such as a laptop, desktop, smartphone, or tablet, while the server computer is usually a powerful computer or a group of computers that manage the network resources and services. The client sends requests to the server for services such as file sharing, printing, or database access, and the server responds by providing these services to the client.
Tambaya 36 Rahoto
The advantages of a computer include that they?
I. operate at high speeds; II. think for the user; Ill. are accurate; IV. are credible.
Bayanin Amsa
The correct option is "I, III and IV only". Computers have several advantages, but they do not "think for the user" as stated in option II. Instead, computers are designed to process and execute commands and instructions that are provided to them by users or programs. The advantages of computers include that they operate at high speeds (I), which means that they can process large amounts of data and perform complex calculations in a short period of time. They are also accurate (III), which means that they can perform tasks with a high degree of precision and consistency. Additionally, computers are credible (IV), meaning that they can provide reliable and verifiable information, which is particularly useful in fields such as scientific research and data analysis.
Tambaya 37 Rahoto
The first three steps to open an email account include:
I. - Click on create my account; II. - Go to home page; llI - Click create new account.
Bayanin Amsa
The correct answer is "II, I and ll". The first step is to go to the homepage of the email service provider. The second step is to click on the "create new account" button. This will take you to the account creation page where you will be prompted to enter your personal information such as name, date of birth, and contact information. Finally, you will create a username and password and click on the "create my account" button to complete the process.
Tambaya 38 Rahoto
Which of the following can be used to write a high level program source code?
Bayanin Amsa
Lotus 1-2-3 and MS Access are spreadsheet and database management software, respectively, and Opera is a web browser. These software cannot be used to write a high-level program source code. Text Editor, on the other hand, is a simple software application that allows users to create and edit plain text files. It can be used to write source code for a high-level programming language such as Python, Java, or C++. Therefore, Text Editor is the correct option for writing a high-level program source code.
Tambaya 39 Rahoto
To hibernate windows operating system means?
Tambaya 40 Rahoto
Use the following QBASIC statement to answer questions 14 and 15.
DIM DEPOSIT (1, 10) 14.
The keyword DIM in the statement stands for?
Bayanin Amsa
The keyword DIM in the QBASIC statement stands for "dimension". In programming, the DIM statement is used to declare the size of an array, which is a collection of variables of the same data type. In this case, the array is called DEPOSIT and has two dimensions: one dimension has a size of 2, and the other dimension has a size of 10. This means that the array can hold up to 20 values. So, the keyword DIM is used to specify the dimensions of an array in QBASIC, allowing the program to allocate the necessary amount of memory to store the data.
Tambaya 42 Rahoto
Which of the columns needs to be adjusted to accommodate the cells contents?
Bayanin Amsa
Tambaya 43 Rahoto
Use the MS Excel table below to answer questions 42 and43
The formula used to compute the TOTAL VALUE in cell D7 is?
S/N | A | B | C | D |
1 | STOCK LIST OF TAYO OKEKE AS AT MAY 2014 | |||
2 | QUOTED STOCK | SHARE UNIT IN THOUSAND | CURRENT UNIT(#) | VALUE |
3 | TANZEL PLC | 44 | 50 | 2,200.000 |
4 | KAPTOL | 125 | 80 | #### |
5 | BANK KLM | 75 | 140 | #### |
6 | ARIX OIL | 10 | 250 | 2,500.00 |
7 | TOTAL VALUE |
Bayanin Amsa
Tambaya 45 Rahoto
Which of the following is not a good ICT security policy?
Bayanin Amsa
The ICT security policy that is not good is "Re-use of old password". Reusing old passwords is not a good practice because it increases the chances of someone accessing your accounts without your permission. Hackers can obtain your old password from a previous breach and use it to gain access to your other accounts. It is essential to use strong and unique passwords for each account and not reuse old passwords. Using a password manager can help you generate and store complex passwords for each account.
Tambaya 47 Rahoto
A set of programs, routines and procedures that are used to operate the computer hardware is called?
Bayanin Amsa
The correct answer is "software". Software is a set of programs, routines, and procedures that are used to operate the computer hardware. It is the non-tangible part of a computer system that provides instructions to the hardware on what tasks to perform. There are different types of software including system software (such as operating systems and device drivers) and application software (such as word processors, spreadsheets, and multimedia players). Firmware is a type of software that is stored in non-volatile memory and is responsible for controlling low-level operations of hardware components. Shareware is a type of software that is distributed for free initially but requires payment after a trial period. Utility software is a type of software that provides specific tools to perform tasks such as system optimization, data backup, and virus scanning.
Tambaya 48 Rahoto
Which of the following function keys can be used to run slide show in a PowerPoint presentation?
Bayanin Amsa
Tambaya 49 Rahoto
Which of the following tasks is accomplished by using bookmarks? To
Bayanin Amsa
Bookmarks are used to quickly jump to a specific location in a document. When working on a large document, it may be helpful to bookmark certain pages or sections so that you can easily return to them later without having to scroll through the entire document. By setting a bookmark, you can quickly jump to that specific location by clicking on the bookmark option, which saves you time and effort. Therefore, the correct option is: "quickly jump to a specific location in a document".
Tambaya 50 Rahoto
Character | Decimal code | ASCII CODE |
N | 78 | 1001110 |
O | 1 | 1001111 |
T | 84 | 11 |
The cell labelled I in the table represents?
Bayanin Amsa
The given table shows the decimal code and ASCII code for characters N, O, and T. The cell labelled I in the table represents the ASCII code for character "O", which is 1001111 in binary and 79 in decimal. The ASCII code is a standard code used to represent characters in computers and communication devices. In this case, the ASCII code for character "O" is represented in binary as 1001111 and in decimal as 79. Therefore, the correct answer is option D, which is 79.
Tambaya 52 Rahoto
(a) In a tabular form, state two differences between random access memory and read only memory
(b) State four characteristics of windows operating system environment.
(c) list two examples of utility programs
Tambaya 53 Rahoto
(a) Convert 1011011\(_2\) to its hexadecimal equivalent
(b) State one difference a hacker and a scammer
(c) identify the parts labeled A, B, C and D on the keyboard shown below
Bayanin Amsa
None
Tambaya 54 Rahoto
State one difference between star and bus topologies
(b) List four common network devices.
(c) Write the acronyms below in full
HTML, HTTP, ISP, SMTP.
Bayanin Amsa
None
Tambaya 55 Rahoto
(a) Convert 1011011\(_2\) to its hexadecimal equivalent
(b) State one difference a hacker and a scammer
(c) identify the parts labeled A, B, C and D on the keyboard shown below
Tambaya 56 Rahoto
TEST OF PRACTICAL KNOWLEDGE QUESTION
using a graphic application software, create a student identity card with the heading as "CITY COMPUTER COLLEGE - NIGERIA"
(a) Size of the card is 31/2" x 11/2"
(b) Insert "flyer pagoda" or any other graphic from the template as logo beside the heading.
(c) Format the card using the following:
background fill - 20% black; heading font type - Bernard MT Condensed, size 14 (ii) pt, colour white
(iii) write the statement, "this card identities" below the heading using Bookman Old style, 8 pt and in italics;
(iv) write the statements below under name:
Name
Admission Number - Font: Times New Roman
Year of Admission Size: 11 pt
Signature
Line - Hairline
(d) Print and submit. (e) Save file with your full name in the folder created der Name:
Tambaya 57 Rahoto
TEST OF PRACTICAL KNOWLEDGE QUESTION
As the account clerk of an organisation, you are to prepare the table as shown below using a spreadsheet application:
Worker | Wage/day(#) |
Edeh | 1500 |
Usman | 1750 |
Steven | 1200 |
Ololade | 650 |
Comfort | 897 |
Joe | 2371 |
(a) Copy and paste table title "Workers' Wages" on the same sheet. Format this new table as follows:
(i) Title the new table as SALARIES
(ii) Sort the table in alphabetical order
(iii) Calculate average wage of workers per day
(iv) Calculate the max and min wages paid to the workers from the SALARIES
(b) Insert a bar chart for data in 2a
(c) Save workbook with your full name in the folder created
(d) Print and submit
Bayanin Amsa
None
Tambaya 58 Rahoto
(a) Match each of the following computing devices.
COMPUTER DEVICES |
USES |
EDVAC |
Electronic general-purpose computer programmed to perform complex sequences of operation. |
ENIAC |
Electronic digital stored-program computer intended for the bureau of census and later for presidential election. |
UNIVAC |
Electronic computer, binary in nature with automatic addition, subtraction multiplication and programmed division. |
Bayanin Amsa
None
Tambaya 59 Rahoto
TEST OF PRACTICAL KNOWLEDGE QUESTION
Using a word processing package, create a college time table format titled "COLLEGE TIME TABLE" for 7 subjects (English, Maths, Biology, Chemistry, Physics, Civic Education and Computer Studies), for 5 days with minimum of 45minutes duration. Lunchtime is 40minutes, lesson in the college have a minimum of 5 periods/week.
(a) Format the "COLLEGE TIME TABLE" using the following:
(i) The title of the table should be aligned centre, bold and underline;
(ii) Use table design style of any type
(iii) Days of the week should be bold
(b) Save your work with your full name in the folder created.
(c) print and submit your work
Za ka so ka ci gaba da wannan aikin?