Loading....
Press & Hold to Drag Around |
|||
Click Here to Close |
Question 2 Report
The property of a system software that enables it to execute more than one program at a time is referred to as
Answer Details
The property of a system software that enables it to execute more than one program at a time is referred to as "multitasking". Multitasking is a feature of the operating system that allows multiple programs to run simultaneously on a computer system, sharing the resources of the system such as CPU time, memory, and input/output devices. This enables users to perform multiple tasks at the same time without the need to wait for one task to finish before starting another. In multitasking, the operating system schedules the execution of the programs in such a way that each program gets a fair share of the resources and the overall performance of the system is optimized.
Question 3 Report
Planning and creating websites are stages in?
Answer Details
Planning and creating websites are stages in web design. Web design involves the process of designing and creating websites, including layout, color schemes, typography, and other design elements. The planning stage involves defining the website's purpose, target audience, and goals, as well as outlining the website's structure and content. The creation stage involves using various design tools and technologies to develop the website's look and feel, such as graphic design software, HTML, and CSS. Overall, web design plays a crucial role in creating a visually appealing and functional website that meets the needs of its users.
Question 5 Report
Which of the following is not a safety equipment in a computer laboratory?
Answer Details
The option that is not a safety equipment in a computer laboratory is "metal detector". A metal detector is not directly related to the safety of the computer laboratory or its equipment. A metal detector is used to detect metal objects and is commonly used in security screening at places like airports, schools or public events. However, surge protectors, smoke detectors, and fire extinguishers are all important safety equipment that should be present in a computer laboratory. Surge protectors are used to protect electronic devices from power surges, while smoke detectors and fire extinguishers are used to detect and prevent fires in the laboratory.
Question 6 Report
Which of the following is true about digital computers.
Answer Details
The correct option is "they represent numbers through a string of binary digits". Digital computers are electronic devices that operate on digital data, which is represented as a string of binary digits (bits), each of which can take one of two values, 0 or 1. These bits are processed by the computer's central processing unit (CPU) using logical operations, and the resulting output is also in digital form. This makes digital computers suitable for a wide range of applications, from simple calculations to complex data processing and storage. The other options mentioned are not true for all digital computers. While some older computers used magnetic core memory, modern computers use other types of memory such as solid-state drives. Digital computers can process both continuous and discrete data, but they represent all data as a string of binary digits. Finally, while digital computers are used extensively in scientific applications, they are also used in many other areas such as business, entertainment, and education.
Question 7 Report
A file kept in case of an accident or natural disaster is called
Answer Details
A file kept in case of an accident or natural disaster is called a "back-up." A backup is a copy of important data or information that is stored separately from the original. This copy is used to restore the original in the event of a loss, such as due to a system crash, data corruption, or accidental deletion. Having a backup ensures that data can be recovered quickly and efficiently, reducing the impact of any disruption to normal operations.
Question 8 Report
The diagram illustrates the relationship between two tables in a database.
What type of relationship exists between Tables I and II?
Answer Details
Question 9 Report
Information transmission by television is classified as
Answer Details
Information transmission by television is classified as multimedia transmission. This is because television provides transmission of various types of media such as audio, video, and text simultaneously. It allows for the transmission of information in multiple formats through a single channel or medium. The multimedia nature of television enables the broadcasting of news, entertainment, education, and other types of content, making it a versatile and widely used medium for information transmission.
Question 10 Report
Companies that provide internet access are referred to as
Answer Details
Companies that provide internet access are referred to as internet service providers (ISPs). They offer different types of internet connections, such as broadband, fiber optic, cable, and satellite, to customers in exchange for a monthly fee. ISPs maintain the infrastructure that allows users to connect to the internet, providing a gateway to the World Wide Web and other online services. Some ISPs are also responsible for managing the network infrastructure and may be referred to as network service providers (NSPs) or internet network operators (INOs), while fixed network operators typically refer to companies that own and maintain the physical infrastructure, such as phone lines or fiber optic cables.
Question 11 Report
While typing a MS word document, Akin inserted footer in the document in order to
Answer Details
Question 12 Report
The spreadsheet symbol used to convert a number to a label is
Answer Details
The spreadsheet symbol used to convert a number to a label is the apostrophe sign ('), also known as a single quote. When a number is preceded by an apostrophe in a cell, the cell format is automatically changed to text format, and the number is displayed as a label. This is useful when working with numbers that should not be used in calculations, such as phone numbers or product codes, and you want to make sure they are not accidentally modified by the spreadsheet program.
Question 13 Report
The study of the effect of interaction between the computer and human users is referred to as computer
Answer Details
The study of the effect of interaction between the computer and human users is referred to as computer ergonomics. It involves designing computer systems and devices that are comfortable, efficient, and safe for humans to use. This field of study focuses on the relationship between people and technology and how to create computer systems that are user-friendly and promote productivity while minimizing the risk of injury and strain caused by prolonged use.
Question 15 Report
The type of data entered into a table in database follow a set of rules known as?
Answer Details
Question 16 Report
Which of these measures would not secure data in database?
Answer Details
Data integration, as it is not a security measure. Data integration refers to the process of combining data from different sources and presenting it as a unified view. Encryption, Personal Identification Number, and username and passwords are all security measures used to protect data in a database. Encryption is the process of converting data into a code to prevent unauthorized access, while Personal Identification Number and username and passwords are used for authentication and access control.
Question 17 Report
Which of the following drawing tools would create special effects for texts?
Answer Details
The drawing tool that would create special effects for texts is "Word Art". Word Art allows users to create stylized text with special effects such as shadows, reflections, beveling, and 3D rotation. It is often used to make titles, headings, or logos stand out in a document or presentation.
Question 18 Report
Which of the following is not an application of computers?
Answer Details
The correct answer is: "bank notes counter." A bank notes counter is a mechanical device used to count paper currency, and it does not involve the use of computers. The other options listed are all applications of computers. Point of sale terminals and ATMs rely on computers to process transactions and manage account information, while traffic lights control systems use computer algorithms to manage the timing and coordination of traffic signals.
Question 19 Report
Which of the following is not a source of data collection.
Answer Details
"Classification" is not a source of data collection. Observation involves the gathering of data by observing a phenomenon or behavior, while interviews involve asking questions to individuals or groups to collect information. Questionnaires involve the use of written or printed questions to collect data from individuals, while classification is the process of arranging objects, people, or data into categories based on their common characteristics. Therefore, classification is not a source of data collection but rather a technique used to organize collected data.
Question 21 Report
The diagram illustrates the relationship between two tables in a database.
The student ID in Tables II is referred to as
Answer Details
Question 23 Report
The exchange of information over a network follows a set of rules called
Answer Details
The set of rules that govern the exchange of information over a network is called protocols. These protocols define how data is transmitted, received, and processed across the network. They also ensure that the data is transmitted in a reliable, secure, and efficient manner. Different types of protocols are used for different purposes, such as routing data over the network, establishing and terminating connections, and controlling data flow. Some examples of network protocols include TCP/IP, HTTP, FTP, and SMTP.
Question 24 Report
Which of the following is not a preventive maintenance measure?
Answer Details
Among the options provided, "data recovery" is not a preventive maintenance measure. Preventive maintenance measures are steps taken to prevent or minimize the occurrence of faults or problems in a system. Regular update of the operating system ensures that the system is up to date with the latest security patches and bug fixes, which helps prevent security vulnerabilities and system crashes. Proper shutdown of the system helps prevent data corruption and hardware failure. The use of uninterrupted power supply (UPS) helps protect the system from power surges and sudden power outages, which can cause data loss or hardware damage. Data recovery, on the other hand, is a corrective measure taken after data loss has already occurred. It involves recovering lost or damaged data from backup or other recovery methods. While important, data recovery is not a preventive maintenance measure, as it does not prevent the loss of data in the first place.
Question 26 Report
In MS Powerpoint, the action of holding down the left mouse key and moving the mouse around the slide would
Answer Details
Question 27 Report
Facebook, Twitter and WhatsApp are examples of
Answer Details
Facebook, Twitter and WhatsApp are examples of social media. Social media is an online platform that allows users to create, share or exchange information, ideas, and content with others who have similar interests, hobbies, or experiences. Social media platforms provide various features such as messaging, posting, commenting, sharing, and liking, which allow users to engage with each other and create social connections.
Question 28 Report
Which of the following persons invented the punch card machine?
Answer Details
Dr. Herman Hollerith invented the punch card machine. He was an American inventor who created the first automatic tabulating machine in 1890, which used punched cards to quickly and accurately process data. The machine was used for the US Census, and its success led to the founding of the Tabulating Machine Company, which eventually became IBM.
Question 29 Report
One of the advantages of a parallel database is
Question 30 Report
In spreadsheets, data would not be accepted into a cell by pressing the.
Answer Details
Question 31 Report
The following are desturctive software except
Answer Details
The term "destructive software" generally refers to software designed to harm or damage computer systems or data. Among the options listed, all except "drivers" are examples of destructive software. Drivers are software components that facilitate communication between the operating system and hardware devices. Worms, trojan horses, and logic bombs, on the other hand, are all types of malicious software that can cause various forms of damage to a computer system or its data. Worms are self-replicating programs that spread across networks and can consume resources or carry out other malicious actions. Trojan horses are programs that appear to be harmless but actually contain malicious code. Logic bombs are code segments that are triggered to execute specific actions when a certain condition is met, often causing damage or destruction to data.
Question 32 Report
A program developed to protect the computer from malicious software is referred to as
Answer Details
A program developed to protect the computer from malicious software is referred to as an "antivirus". Antivirus software is designed to detect, prevent, and remove malware infections on a computer system. It can scan the computer's files, programs, and memory for signs of viruses, worms, Trojans, and other forms of malware, and can also provide real-time protection by monitoring incoming data for malware threats. Antivirus software is an important tool in keeping a computer system secure and protected from cyber threats.
Question 33 Report
Which of the following is not a transmission medium?
Answer Details
A transmission medium is a path through which data is transmitted from one device to another. Among the given options, modem is not a transmission medium. A modem is a device that modulates and demodulates signals for transmitting data over communication lines. The other options, twisted pair cables, coaxial cables, and wireless, are all examples of transmission media used in computer networking.
Question 34 Report
The feature in a database application that acts as an interface between the user and the database is called a?
Answer Details
Question 35 Report
In a relational database management system, files are organized as relations and
Answer Details
Question 36 Report
Which of the following are the basic components of a computer network? I. A minimum of two computers II. Printers III. Network interface card.
Answer Details
Question 37 Report
The advantages of electronic data processing includes the following except
Answer Details
Electronic data processing (EDP) is the use of computers to store, process, and analyze data. The advantages of EDP are numerous and varied, but one disadvantage is hacking. Hacking can be defined as gaining unauthorized access to a computer system for the purpose of stealing, altering, or destroying data. The advantages of EDP include automatic processing, which reduces the need for manual labor and reduces the chance of errors, fast and reliable processing, which allows for quick and accurate analysis of large amounts of data, and storage capacity, which enables large amounts of data to be stored in a relatively small space. Therefore, the correct answer is (B) hacking, which is not an advantage of EDP but rather a disadvantage.
Question 39 Report
Which of these operations would not close MS word application?
Answer Details
Selecting the close option from the file menu drop-down dialogue box would not close the MS Word application. When a user selects the close option from the file menu drop-down dialogue box, it only closes the current document that is open in the application but leaves the MS Word application itself still running in the background. On the other hand, pressing the Alt + F4 keys or clicking the X button on the title bar or choosing exit from the file menu drop-down box, all of these options close both the current document and the MS Word application itself.
Question 40 Report
The operation of checking input data against specified criteria is referred to as.
Answer Details
The operation of checking input data against specified criteria is referred to as data validation. Data validation is an important step in data processing to ensure the accuracy and integrity of the data. This process involves checking the input data to make sure it meets certain criteria, such as range, format, and consistency, among others. Data validation helps to reduce errors and inconsistencies that may arise from incorrect or incomplete data.
Question 41 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
Given an internet connected computer, outline a step by step procedure for carrying out the following operations;
(a) How to log on to www.mybooks.com and obtain the prices of books W, X, Y, Z and M.
(b) How to tabulate the prices in a worksheet, showing the prices in dollars and the naira equivalent, for each book and save the workbook as "Prices of Books". Assume that the prices of the books are given in dollars, [use $1.00=N120.00].
(c) How to send the workbook in 5(b) as an attachment to your father's email address (myfather@yahoo.com) with the subject "Price of Books".
Question 42 Report
(a) Define the following
(i) Database
(ii) Database management system
(b) Mention three functions of a database management system.
(c) Mention two ways through which data can be destroyed.
(d) State three precautionary measure to prevent data loss.
Answer Details
None
Question 43 Report
a (i) Define an operating system.
(ii) State two functions of an operating system
(iii) List two differences between an operating system and application system software.
b Starting from the Save As dialogue box, outline the steps involved in passwording a document in a word processing package.
None
Answer Details
None
Question 44 Report
TEST OF PRACTICAL KNOWLEDGE QUESTION
A student was asked to record the type of vehicle that entered the school compound through the school's main gate on a Monday morning. The passage below is an excerpt from the student's report on the assignment. "Report on the vehicular traffics at the gate on Monday.
1. Introduction; I was directed by the school principal to sit at the main gate and record the type and number of vehicles that passed through the gate on Monday morning.
2. Observation; I arrived at the gate at about 8;00am and left at 12 noon. During this period, I made the following observation; Car, bus, bus, car, lorry, motorcycle, car, tricycle, motorcycle, bus, bus."
(a) Beginning from the desktop, outline a step by step procedure of how to type the passage in MS word, using A4 paper size and portrait orientation.
(b) State the procedure for carrying out the following operations in the passage;
(i) Begin the second and third sentences in new paragraphs; (ii) Write the first sentence in capital letter underline it and bold it. (iii) Begin the first letter of a sentence with capital letters (iv) Represent the student's observation in a table with three columns under the headings; Serial Number, Type of vehicle, Number of vehicle (v) Merge the first two cells of the ast row of the table and type "Total"and give the total number of vehicles observed in the column for number of vehicles (vi) Save the document with the name: "Vehicular traffic"(vii) Print the document.
Question 45 Report
(a)(i) Define application package.
(ii) State one use each of any four application packages
(b) List two benefits of a presently package
(c) Outlines three guidelines for creating a good MS PowerPoint Presentation
None
Answer Details
None
Question 46 Report
(a) Define;
(i) Data Security (i) Data risk assessment
(b)(i) What is Access Control
(ii) List the access control methods in database security.
(c) State three roles of a database administrator.
Answer Details
None
Would you like to proceed with this action?