Loading....
Press & Hold to Drag Around |
|||
Click Here to Close |
Question 1 Report
The number 28 in binary is?
Answer Details
The binary number system uses only two digits, 0 and 1, to represent all values. To convert a decimal number, such as 28, to binary, we can repeatedly divide the decimal number by 2 and keep track of the remainders. The binary representation of 28 is 11100. Here's how the conversion works: 28 ÷ 2 = 14 with a remainder of 0 14 ÷ 2 = 7 with a remainder of 0 7 ÷ 2 = 3 with a remainder of 1 3 ÷ 2 = 1 with a remainder of 1 1 ÷ 2 = 0 with a remainder of 1 So, the binary representation of 28 is 11100, with the rightmost digit being the least significant bit.
Question 2 Report
Which of the following computer files can be used for updating the master file?
Answer Details
Question 3 Report
Which of the following options is not a data type?
Answer Details
"Valid data" is not a data type. Data types are categories of data that define what type of values a variable can hold, such as alphabetic characters, numbers, or a combination of both (alphanumeric). The term "valid data" refers to data that meets certain criteria, such as being within a specified range, having a certain format, or being free of errors. But it is not a type of data in the same sense as alphabetic, alphanumeric, or numeric data.
Question 4 Report
A row in a database table is referred to as?
Answer Details
A row in a database table is commonly referred to as a "record". A record represents a single instance of data within the table, and contains all the information related to a specific item or entity. For example, in a database table for a library, a record might represent a single book and its attributes, such as title, author, ISBN number, and publication date. Each attribute in the record is typically stored in a separate "field".
Question 6 Report
The command line prompt of MS-DOS operating system is represented as?
Answer Details
Question 7 Report
A site engineer intends to acquire a computer system. What factors Will he consider if he must choose a notebook computer over a desktop computer?
Answer Details
Question 8 Report
Which of the following charts does not display the X and Y axes?
Answer Details
The Doughnut chart does not display the X and Y axes. A Doughnut chart is a circular chart that is used to represent proportions and ratios. It is divided into segments that each represent a proportion of the whole. Unlike bar charts and X, Y graphs, doughnut charts do not have X and Y axes. The data is represented by the size and color of the segments in the chart.
Question 10 Report
The process of testing the logic of programs to ensure they give correct result is known as?
Answer Details
Question 11 Report
The major components of a computer system are?
Answer Details
The major components of a computer system are hardware and software. Hardware refers to the physical components of a computer, such as the motherboard, central processing unit (CPU), memory (RAM), hard drive, and others. These components work together to perform the basic functions of a computer. Software, on the other hand, refers to the programs and applications that run on a computer. This includes the operating system (such as Windows or macOS), as well as other applications like word processors, web browsers, and games. Firmware is a type of software that is stored on a hardware device, such as a computer's BIOS or a device's firmware. It provides low-level control for the hardware components and is typically not user-accessible or modifiable. In summary, a computer system is made up of both hardware and software components, with firmware serving as a type of software that is closely tied to the computer's hardware.
Question 12 Report
The file that contains historical record is called a?
Answer Details
The file that contains a historical record is called a "data file." This is because a data file stores information in a structured manner, often in rows and columns, and it can include historical data as well as current data. A data file can be used for various purposes such as record-keeping, analysis, and reporting. For example, a company might use a data file to store historical sales data for analysis and forecasting purposes. Similarly, a researcher might use a data file to store historical data related to a particular topic for analysis and interpretation. Therefore, the term "data file" accurately reflects the function and purpose of a file that contains historical records.
Question 15 Report
The process of restarting the computer system is known as?
Answer Details
The process of restarting a computer system is commonly referred to as a "reboot" or a "restart." This involves shutting down the system and then starting it up again. There are two types of reboots: "cold boot" and "warm boot." A cold boot is when the computer is completely powered off and then started again. This is typically done by pressing the power button or shutting down the computer through the operating system and then restarting it. A warm boot, on the other hand, is when the computer is restarted without being powered off. This can be done by pressing the reset button on the computer or by using a keyboard shortcut, such as "Ctrl + Alt + Delete." "Hard booting" and "hot bathing" are not common terms used to describe the process of restarting a computer system.
Question 16 Report
The following programs are general purposotion software except?
Answer Details
Out of the four options given, CorelDraw, MS Access, and MS Word are general-purpose software, while "Editor" is not a specific software application. It could refer to a generic term for any software that allows users to edit or modify text, graphics, or other types of data. CorelDraw is a vector graphics editor that allows users to create and edit vector images and designs. It is widely used by graphic designers, illustrators, and artists to create logos, brochures, web graphics, and other types of visual content. MS Access is a database management system that allows users to store, organize, and manage large amounts of data. It provides a graphical user interface for creating tables, forms, reports, and queries, and is often used by businesses and organizations to manage customer data, sales records, and other types of information. MS Word is a word processing program that allows users to create, edit, and format text documents. It is widely used for creating letters, reports, resumes, and other types of written content. In summary, three out of the four programs mentioned (CorelDraw, MS Access, and MS Word) are general-purpose software, while "Editor" is not a specific application and could refer to any software that allows users to edit or modify data.
Question 17 Report
A logic gate contains three input variables. The total possible combination of the input variables is?
Answer Details
Question 18 Report
Which of the following output devices was common among the computing devices of the 19th century?
Answer Details
Question 19 Report
Which of the following options is not an advantage of linear bus topology?
Answer Details
Question 20 Report
An icon, a graphic or a text in a document or a webpage that connects to another file or object is called a?
Answer Details
The correct answer is a hyperlink. A hyperlink is an icon, graphic, or text in a document or webpage that when clicked on, takes you to another file or object, such as another webpage or a specific location in the same webpage. It acts as a bridge between different web pages and allows you to move from one page to another with a simple click. You can recognize a hyperlink by its underlined blue color and when you hover your mouse over it, the cursor turns into a hand symbol.
Question 22 Report
The most important system software in a computer system is the?
Answer Details
The most important system software in a computer system is the Operating System (OS). The operating system acts as the intermediary between the computer hardware and the applications you use. It manages the resources of the computer such as memory and processing power, and it provides a platform for you to run your applications on. It also provides a user interface, such as a graphical desktop, to interact with the computer. In a very simple way, you can think of the operating system as the "brain" of the computer that controls all the important functions and makes sure everything runs smoothly.
Question 23 Report
The MS-Windows shortcut keys to initiate warm booting is?
Answer Details
The MS-Windows shortcut key to initiate warm booting is Ctrl+Alt+Del. This combination of keys is also known as the three-finger salute. When you press these keys together, it brings up the Windows Security screen, which gives you options to lock the computer, switch users, sign out, change a password, or open the Task Manager. In addition, this key combination can also be used to restart the computer. After pressing Ctrl+Alt+Del, click on the power icon in the lower right corner of the screen and select "Restart" from the menu. This will initiate a warm boot, which means the computer is restarted without going through a complete power cycle. Warm booting is useful when you want to restart your computer quickly without shutting it down completely. It is also helpful when you are experiencing some performance issues or errors that can be resolved by restarting the computer.
Question 24 Report
The common features of formula and function in spread- sheet are:
-Entry is preceded by = or + symbol I.
- They have fixed formats
- They operate with cell addresses
- Their results are displayed.
Which of the following options is/are true?
Answer Details
Question 25 Report
The system unit houses the following components except?
Answer Details
The system unit is the main part of a desktop computer that contains all the essential components needed for the computer to work. These components include the motherboard, central processing unit (CPU), and various other storage devices like hard drives or SSDs. Out of the options listed, the component that is not housed in the system unit is the plotter. A plotter is a printing device that is used to produce high-quality graphics and drawings, typically used in engineering and architectural designs. It is a separate device that connects to the computer and is not a part of the system unit. In summary, the system unit contains important components like the motherboard and CPU, but a plotter is not housed inside the system unit.
Question 26 Report
One megabyte is equivalent to?
Answer Details
One megabyte (MB) is equivalent to 1024 kilobytes (KB). To understand this, we first need to know that a byte is a unit of digital information that is made up of 8 bits. A bit is the smallest unit of digital information that can be stored or transmitted, and it can have a value of either 0 or 1. Now, a kilobyte (KB) is equal to 1024 bytes, and a megabyte (MB) is equal to 1024 kilobytes. So, one megabyte is equal to 1024 x 1024 = 1,048,576 bytes. It's important to note that there are two common interpretations of "mega" in the context of digital storage: the binary interpretation (2^20, or 1,048,576), and the decimal interpretation (10^6, or 1,000,000). The binary interpretation is used in most cases, including for measuring RAM and hard drive space. However, the decimal interpretation is sometimes used for measuring network data transfer rates. So, in short, one megabyte is equivalent to 1,048,576 bytes or 1024 kilobytes.
Question 27 Report
The speed of data transfer in the computer can be determined in terms of?
Answer Details
The speed of data transfer in a computer can be determined by two factors: bus speed and storage media. Bus speed refers to how fast data can travel between different components within a computer. It's like the speed limit on a highway; the higher the bus speed, the faster data can travel. Bus width, on the other hand, refers to how many bits of data can be transferred at once. It's like the number of lanes on a highway; the wider the bus, the more data can be transferred at once. Storage media, such as hard drives and solid-state drives, also play a role in data transfer speed. These devices have different read and write speeds, which determine how quickly data can be accessed and transferred. Protocols are also important for data transfer, as they dictate how data is transmitted and received. Different protocols have different speeds and efficiencies, and can impact the overall speed of data transfer. In summary, the speed of data transfer in a computer depends on both the bus speed and width, as well as the speed of the storage media and the protocols being used.
Question 28 Report
The following are the guidelines for drawing flowcharts except that it?
Answer Details
Question 29 Report
Use the logic truth table in figure 3 to answer question
X | Y | Z |
0 | 0 | 1 |
0 | 1 | 1 |
1 | 0 | 1 |
1 | 1 | 0 |
Given that X and Y are input variables while Z is the output. The truth table in figure 3 represents?
Answer Details
Question 30 Report
Data can be defined as?
Answer Details
Data refers to raw facts or figures that are collected through various means such as observations, experiments, surveys, and measurements. It can be any type of information that can be stored and processed, including numbers, text, images, and sound. Raw data is unprocessed and lacks any structure or organization. It needs to be processed and analyzed to extract meaningful insights and useful information. For example, a list of sales figures is data, but the total revenue and average sales figures derived from it are processed information. Therefore, out of the given options, data can be defined as raw facts.
Question 32 Report
If you are given the contract, what would be your first step of action?
Answer Details
Question 33 Report
The pre-computing age device which made use of beads and frames is?
Answer Details
The device that made use of beads and frames is called an Abacus. An abacus is a simple counting tool that consists of a wooden frame with parallel rods or wires running along its length. Beads or stones are strung on these rods or wires, and they can be moved back and forth to perform calculations. Abacuses were used in many ancient cultures, including China, Japan, and Egypt, and they are still used in some parts of the world today. They were particularly useful for merchants and traders who needed to perform quick calculations, and they were also used by scholars to teach mathematical concepts. To use an abacus, you move the beads along the rods to represent numbers. For example, if you wanted to represent the number 23, you would move two beads on the top row and three beads on the bottom row. You can then add, subtract, multiply, and divide by moving the beads in different ways. Overall, the abacus was a simple but effective device that played an important role in the development of mathematics and computing.
Question 34 Report
The ASCII chart control characters using numeric codes ranging from?
Answer Details
The ASCII chart control characters use numeric codes ranging from 0 to 127. ASCII stands for American Standard Code for Information Interchange and is a system for representing characters (letters, numbers, symbols, etc.) as numbers. Control characters are special characters in the ASCII chart that are used to control the format or flow of data. These characters include things like line breaks, tabs, and other non-printing characters. The ASCII chart assigns a unique number to each character, and the control characters are assigned numbers between 0 and 127.
Question 35 Report
The uses of spreadsheet packages include:
1. -Preparing organisation's logo; II. - Performing sensitivity analysis; III, - Preparing reports for senior manage- ment; IV. - Preparation of profit forecasts.
Which of the following options is true?
Answer Details
Question 37 Report
Use the infomation belowto answer questions 42 and 43.
As a computer professional, you have just been con- tracted by a school to help them solve the problem they are facing in computing students' results.
The school currently runs a manual system. Time and accuracy of the result are the major concerns.
What would you advise the school to do?
Answer Details
As a computer professional, my advice to the school would be to automate the system. Automating the system involves using computer software to process and compute the students' results. This would eliminate the need for manual calculations and reduce the time required to produce accurate results. With automation, the school can also easily store and retrieve student records, generate reports, and analyze data. It is a cost-effective and efficient solution that will help the school to produce reliable results in a timely manner. Closing down the school or increasing the number of staff or buying more calculators for staff would not solve the problem of time and accuracy of the result, and would only lead to more expenses without solving the underlying issue.
Question 38 Report
The system unit houses the following components except?
Answer Details
The system unit houses components that are essential to the functioning of a computer. However, it does not include a plotter. A plotter is a type of large-format printer that is used to print high-quality images or technical drawings. It is not a component that is typically found inside a system unit. The other options listed (motherboard, floppy disk, and central processing unit) are all commonly found inside a system unit.
Question 39 Report
The three levels of programming language?
Answer Details
The three levels of programming languages are: low-level language, high-level language, and assembly language. A low-level language is a type of programming language that provides little or no abstraction from the computer's instruction set architecture. This means that the code written in a low-level language is closer to the machine language that a computer can understand. Examples of low-level languages include machine language and assembly language. A high-level language is a type of programming language that provides a higher level of abstraction from the computer's instruction set architecture. This means that the code written in a high-level language is further away from the machine language that a computer can understand, but is closer to the natural language that humans use. High-level languages are easier for humans to read, write, and understand. Examples of high-level languages include Java, C, and Pascal. Assembly language is a type of low-level programming language that provides a level of abstraction between machine language and high-level languages. Assembly language uses mnemonics (symbols) to represent the instructions that a computer can understand. The code written in assembly language is still close to the machine language, but is easier for humans to read and write than machine language.
Question 40 Report
During program execution in the central processing unit, the instruction is interpreted by the?
Answer Details
Question 41 Report
The largest computer system in terms of processing power is A?
Answer Details
The largest computer system in terms of processing power is a supercomputer. A supercomputer is a type of computer that is specifically designed to perform incredibly complex and demanding computational tasks faster and more efficiently than any other type of computer. Supercomputers use many processors working in parallel, as well as large amounts of high-speed memory and specialized hardware, to perform their tasks at incredibly high speeds. They are used for tasks such as weather forecasting, scientific simulations, and military applications, where the ability to process vast amounts of data and perform complex calculations is critical.
Question 42 Report
QBASIC keywords do not include?
Answer Details
The QBASIC keywords that do not include are "FIND B". This is because "FIND B" is not a valid QBASIC keyword. On the other hand, "LET C", "REM D", and "STOP" are valid QBASIC keywords. "LET" is used to assign a value to a variable, "REM" is used to add a comment in the code, and "STOP" is used to halt the execution of the program. It's important to note that QBASIC keywords are specific words that have a predefined meaning in the QBASIC programming language. Understanding these keywords is essential for writing correct and functional QBASIC programs.
Question 43 Report
which of the following network cables offers highest data transmission?
Answer Details
Question 44 Report
The conversion of readable data to unreadable codes in order to prevent unauthorised access is known as?
Answer Details
The term used for the conversion of readable data to unreadable codes in order to prevent unauthorized access is called encryption. Encryption is a process of converting plain text into a coded form called ciphertext that can only be deciphered with the right key. The idea behind encryption is to make it difficult for unauthorized individuals to access or understand the data. This helps to ensure the confidentiality and security of the information. In simple terms, encryption helps to protect sensitive information from being seen by anyone other than those who are authorized to view it.
Question 45 Report
The statement in QBASIC that is used to add data at the end of existing sequential file is?
Answer Details
The statement in QBASIC that is used to add data at the end of an existing sequential file is "APPEND".
When you open a sequential file for writing, by default, it starts writing from the beginning of the file and overwrites any existing data. However, if you want to add data to the end of the file, without deleting or overwriting the existing data, you can use the "APPEND" statement.
The "APPEND" statement opens the file for writing, but instead of overwriting the existing data, it positions the write pointer at the end of the file, allowing you to add new data to the file without affecting the existing data.
Here's an example of how to use the "APPEND" statement in QBASIC:
OPEN "my_file.txt" FOR APPEND AS #1
PRINT #1, "This is some new data added to the end of the file."
CLOSE #1
In this example, the "OPEN" statement opens the file "my_file.txt" for appending. The "PRINT" statement writes the new data to the end of the file, and the "CLOSE" statement closes the file.
Question 46 Report
The algebraic equation for the AND gate with input variables A and B is?
Answer Details
Question 48 Report
Arrange the following spreadsheet window parts in a hierarchial order by size:
I. worksheet
II. cell
III. workshop
IV. range
Answer Details
Question 50 Report
Which of the following components are data communication equipment?
I. Scanner ll. Hub lIl. Modem
Answer Details
I and III are data communication equipment. A scanner is a device that captures images from photographs or documents and converts them into digital data that can be processed by a computer. A modem (short for modulator-demodulator) is a device that converts digital data into analog signals for transmission over analog networks (such as telephone lines) and vice versa. Modems are used to connect computers to the internet. A hub is a networking device that allows multiple devices to be connected together and share network resources. A hub does not modify the data being transmitted, but simply repeats the same data to all connected devices. So, a scanner is used to convert physical images into digital data and a modem is used to convert digital data into analog signals for transmission over analog networks.
Question 51 Report
The following components are network interconnecting devices EXCEPT?
Answer Details
Out of the four options listed, the component that is not a network interconnecting device is a webcam. A webcam is a device that captures video and sends it to a computer, where it can be transmitted over the internet. However, it is not a device that interconnects networks; it simply sends information from one device to another. Hubs, modems, and routers, on the other hand, are devices that help connect and manage multiple devices on a network.
Question 52 Report
(a)i) What is booting?
(i) State two differences between the types of booting.
(b) What is peripheral?
(c) Give one example each of (i) input device; (ii) output device; (iii) storage devices (iv) a component found inside the system unit.
Answer Details
None
Question 53 Report
(a) What is a register?
(b) List two types of register.
(c) State three functions of registers.
(d) Outline three differences between a register and main memory.
None
Answer Details
None
Question 54 Report
(a)i) Define the term computer system.
(i) List the major components of the computer system and give one example of each.
(b)(i) List two activities involved in transferring data into information. (i) Write the following acronyms in full:
(1) EDSAC (11) EDVAC
Answer Details
None
Question 55 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
Insert a:
(i) new column with the heading "Name" between the first and second columns;
(ii) title "Students' Scores in Computer Studies" above the table.
(c) Beginning from the first cell under column heading "Name" to the sixth cell, type the following: Adedigba Eze, Balango Ngozi, Agbelero Cynthia, Okeowo Sulkite, Okonia Ifedola and Umaru Edonk.
(d) If "W/score" stands for weighted score, calculate:
(i) weighted score for each term given that weighted score comprises 20%, 30% and 50% of raw scores for first, second and third terms respectively;
(ii) total weighted score for the three terms.
(e) Insert your full name and index number as a footer.
(f) Save with your index number in the folder created.
(g) Print and submit to the supervisor
None
Answer Details
None
Question 56 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
You have been tasked to give a presentation to an audience on the topic "Computer Networks".
Use the 2 layout below to create slides using Microsoft PowerPoint.
(a) SLIDE 1
LOCAL AREA NETWORK
A computer network located on user's premises
A network in which a set of devices are connected together for communication
SLIDE 2
WIDE AREA NETWORK
A network of geographically dispersed telecommunication devices
The network may be private or public-shared.
SLIDE 3
ADVANTAGES OF NETWORKS
(i) Resource sharing (ii) Enhanced connectivity (ii) Enhanced communication
SLIDE 4
DISADVANTAGES OF NETWORKS
(i) Security concerns (ii) Virus attacks (iii) Network failure
(b)
INSTRUCTIONS:
(i) The font size of the heading should be 36pt and bold, font style Calibri.
(ii) The font size of the text in the body should be 32pt, font style Calibri.
(iii) Apply bullet numbering where necessary.
(iv) Format the slides using any background of your choice
(v) Insert your full name and index number as footer.
(vi) Save your work as Networks and print all the sides on a single sheet.
(vii) Submit the printout to the supervisor.
Question 57 Report
(a) Define logic gate.
(b) Give one example each of: (i) standard logic gate; (ii) alternative logic gate.
(c) Using P and Q as inputs and R as output:
(i) draw the logic symbol for an XOR logic gate: (ii) construct the truth table for XOR logic gate.
(d) List two uses of a logic gate.
Question 58 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
INSTRUCTIONS: (a) Sort the table on SURNAME and FIRST NAME in ascending order.
(b) Delete the record for employee 279.
(c) Create a report from the table and name it SALARY. The header of the report should read "EMPLOYEE SALARY".
(d) Format:
(i) the column headings of the report with font size 14pt and bold;
(ii) the other inputs with, font size 12pt.
(e) Apply border line.
(f) Insert your full name and index number.
(g) Print and submit to the supervisor
Question 59 Report
(a) What is: (i) an array; (ii) a syntax error?
(b) Write QBASIC program that will input multiples of Three between 1 and 20 into a one-dimensional array and display the output on the screen.
(c) Convert D5FA,, to binary.
Answer Details
None
Would you like to proceed with this action?