Inapakia....
Bonyeza na Ushikilie kuvuta kuzunguka |
|||
Bonyeza Hapa Kufunga |
Swali 1 Ripoti
Which of these measures would not secure data in database?
Maelezo ya Majibu
Data integration, as it is not a security measure. Data integration refers to the process of combining data from different sources and presenting it as a unified view. Encryption, Personal Identification Number, and username and passwords are all security measures used to protect data in a database. Encryption is the process of converting data into a code to prevent unauthorized access, while Personal Identification Number and username and passwords are used for authentication and access control.
Swali 2 Ripoti
A program developed to protect the computer from malicious software is referred to as
Maelezo ya Majibu
A program developed to protect the computer from malicious software is referred to as an "antivirus". Antivirus software is designed to detect, prevent, and remove malware infections on a computer system. It can scan the computer's files, programs, and memory for signs of viruses, worms, Trojans, and other forms of malware, and can also provide real-time protection by monitoring incoming data for malware threats. Antivirus software is an important tool in keeping a computer system secure and protected from cyber threats.
Swali 3 Ripoti
In a relational database management system, files are organized as relations and
Maelezo ya Majibu
Swali 4 Ripoti
In spreadsheets, data would not be accepted into a cell by pressing the.
Maelezo ya Majibu
Swali 5 Ripoti
Which of the following are the basic components of a computer network? I. A minimum of two computers II. Printers III. Network interface card.
Maelezo ya Majibu
Swali 6 Ripoti
Which of the following is not a safety equipment in a computer laboratory?
Maelezo ya Majibu
The option that is not a safety equipment in a computer laboratory is "metal detector". A metal detector is not directly related to the safety of the computer laboratory or its equipment. A metal detector is used to detect metal objects and is commonly used in security screening at places like airports, schools or public events. However, surge protectors, smoke detectors, and fire extinguishers are all important safety equipment that should be present in a computer laboratory. Surge protectors are used to protect electronic devices from power surges, while smoke detectors and fire extinguishers are used to detect and prevent fires in the laboratory.
Swali 7 Ripoti
The diagram illustrates the relationship between two tables in a database.
What type of relationship exists between Tables I and II?
Maelezo ya Majibu
Swali 9 Ripoti
The diagram illustrates the relationship between two tables in a database.
The student ID in Tables II is referred to as
Maelezo ya Majibu
Swali 11 Ripoti
The spreadsheet symbol used to convert a number to a label is
Maelezo ya Majibu
The spreadsheet symbol used to convert a number to a label is the apostrophe sign ('), also known as a single quote. When a number is preceded by an apostrophe in a cell, the cell format is automatically changed to text format, and the number is displayed as a label. This is useful when working with numbers that should not be used in calculations, such as phone numbers or product codes, and you want to make sure they are not accidentally modified by the spreadsheet program.
Swali 12 Ripoti
Planning and creating websites are stages in?
Maelezo ya Majibu
Planning and creating websites are stages in web design. Web design involves the process of designing and creating websites, including layout, color schemes, typography, and other design elements. The planning stage involves defining the website's purpose, target audience, and goals, as well as outlining the website's structure and content. The creation stage involves using various design tools and technologies to develop the website's look and feel, such as graphic design software, HTML, and CSS. Overall, web design plays a crucial role in creating a visually appealing and functional website that meets the needs of its users.
Swali 16 Ripoti
In MS Powerpoint, the action of holding down the left mouse key and moving the mouse around the slide would
Maelezo ya Majibu
Swali 17 Ripoti
The study of the effect of interaction between the computer and human users is referred to as computer
Maelezo ya Majibu
The study of the effect of interaction between the computer and human users is referred to as computer ergonomics. It involves designing computer systems and devices that are comfortable, efficient, and safe for humans to use. This field of study focuses on the relationship between people and technology and how to create computer systems that are user-friendly and promote productivity while minimizing the risk of injury and strain caused by prolonged use.
Swali 18 Ripoti
Which of the following is true about digital computers.
Maelezo ya Majibu
The correct option is "they represent numbers through a string of binary digits". Digital computers are electronic devices that operate on digital data, which is represented as a string of binary digits (bits), each of which can take one of two values, 0 or 1. These bits are processed by the computer's central processing unit (CPU) using logical operations, and the resulting output is also in digital form. This makes digital computers suitable for a wide range of applications, from simple calculations to complex data processing and storage. The other options mentioned are not true for all digital computers. While some older computers used magnetic core memory, modern computers use other types of memory such as solid-state drives. Digital computers can process both continuous and discrete data, but they represent all data as a string of binary digits. Finally, while digital computers are used extensively in scientific applications, they are also used in many other areas such as business, entertainment, and education.
Swali 19 Ripoti
The type of data entered into a table in database follow a set of rules known as?
Maelezo ya Majibu
Swali 20 Ripoti
The property of a system software that enables it to execute more than one program at a time is referred to as
Maelezo ya Majibu
The property of a system software that enables it to execute more than one program at a time is referred to as "multitasking". Multitasking is a feature of the operating system that allows multiple programs to run simultaneously on a computer system, sharing the resources of the system such as CPU time, memory, and input/output devices. This enables users to perform multiple tasks at the same time without the need to wait for one task to finish before starting another. In multitasking, the operating system schedules the execution of the programs in such a way that each program gets a fair share of the resources and the overall performance of the system is optimized.
Swali 22 Ripoti
A file kept in case of an accident or natural disaster is called
Maelezo ya Majibu
A file kept in case of an accident or natural disaster is called a "back-up." A backup is a copy of important data or information that is stored separately from the original. This copy is used to restore the original in the event of a loss, such as due to a system crash, data corruption, or accidental deletion. Having a backup ensures that data can be recovered quickly and efficiently, reducing the impact of any disruption to normal operations.
Swali 23 Ripoti
Information transmission by television is classified as
Maelezo ya Majibu
Information transmission by television is classified as multimedia transmission. This is because television provides transmission of various types of media such as audio, video, and text simultaneously. It allows for the transmission of information in multiple formats through a single channel or medium. The multimedia nature of television enables the broadcasting of news, entertainment, education, and other types of content, making it a versatile and widely used medium for information transmission.
Swali 24 Ripoti
Which of these operations would not close MS word application?
Maelezo ya Majibu
Selecting the close option from the file menu drop-down dialogue box would not close the MS Word application. When a user selects the close option from the file menu drop-down dialogue box, it only closes the current document that is open in the application but leaves the MS Word application itself still running in the background. On the other hand, pressing the Alt + F4 keys or clicking the X button on the title bar or choosing exit from the file menu drop-down box, all of these options close both the current document and the MS Word application itself.
Swali 25 Ripoti
Companies that provide internet access are referred to as
Maelezo ya Majibu
Companies that provide internet access are referred to as internet service providers (ISPs). They offer different types of internet connections, such as broadband, fiber optic, cable, and satellite, to customers in exchange for a monthly fee. ISPs maintain the infrastructure that allows users to connect to the internet, providing a gateway to the World Wide Web and other online services. Some ISPs are also responsible for managing the network infrastructure and may be referred to as network service providers (NSPs) or internet network operators (INOs), while fixed network operators typically refer to companies that own and maintain the physical infrastructure, such as phone lines or fiber optic cables.
Swali 26 Ripoti
Which of the following drawing tools would create special effects for texts?
Maelezo ya Majibu
The drawing tool that would create special effects for texts is "Word Art". Word Art allows users to create stylized text with special effects such as shadows, reflections, beveling, and 3D rotation. It is often used to make titles, headings, or logos stand out in a document or presentation.
Swali 27 Ripoti
The exchange of information over a network follows a set of rules called
Maelezo ya Majibu
The set of rules that govern the exchange of information over a network is called protocols. These protocols define how data is transmitted, received, and processed across the network. They also ensure that the data is transmitted in a reliable, secure, and efficient manner. Different types of protocols are used for different purposes, such as routing data over the network, establishing and terminating connections, and controlling data flow. Some examples of network protocols include TCP/IP, HTTP, FTP, and SMTP.
Swali 29 Ripoti
Facebook, Twitter and WhatsApp are examples of
Maelezo ya Majibu
Facebook, Twitter and WhatsApp are examples of social media. Social media is an online platform that allows users to create, share or exchange information, ideas, and content with others who have similar interests, hobbies, or experiences. Social media platforms provide various features such as messaging, posting, commenting, sharing, and liking, which allow users to engage with each other and create social connections.
Swali 30 Ripoti
The following are desturctive software except
Maelezo ya Majibu
The term "destructive software" generally refers to software designed to harm or damage computer systems or data. Among the options listed, all except "drivers" are examples of destructive software. Drivers are software components that facilitate communication between the operating system and hardware devices. Worms, trojan horses, and logic bombs, on the other hand, are all types of malicious software that can cause various forms of damage to a computer system or its data. Worms are self-replicating programs that spread across networks and can consume resources or carry out other malicious actions. Trojan horses are programs that appear to be harmless but actually contain malicious code. Logic bombs are code segments that are triggered to execute specific actions when a certain condition is met, often causing damage or destruction to data.
Swali 31 Ripoti
Which of the following persons invented the punch card machine?
Maelezo ya Majibu
Dr. Herman Hollerith invented the punch card machine. He was an American inventor who created the first automatic tabulating machine in 1890, which used punched cards to quickly and accurately process data. The machine was used for the US Census, and its success led to the founding of the Tabulating Machine Company, which eventually became IBM.
Swali 32 Ripoti
The advantages of electronic data processing includes the following except
Maelezo ya Majibu
Electronic data processing (EDP) is the use of computers to store, process, and analyze data. The advantages of EDP are numerous and varied, but one disadvantage is hacking. Hacking can be defined as gaining unauthorized access to a computer system for the purpose of stealing, altering, or destroying data. The advantages of EDP include automatic processing, which reduces the need for manual labor and reduces the chance of errors, fast and reliable processing, which allows for quick and accurate analysis of large amounts of data, and storage capacity, which enables large amounts of data to be stored in a relatively small space. Therefore, the correct answer is (B) hacking, which is not an advantage of EDP but rather a disadvantage.
Swali 33 Ripoti
Which of the following is not a source of data collection.
Maelezo ya Majibu
"Classification" is not a source of data collection. Observation involves the gathering of data by observing a phenomenon or behavior, while interviews involve asking questions to individuals or groups to collect information. Questionnaires involve the use of written or printed questions to collect data from individuals, while classification is the process of arranging objects, people, or data into categories based on their common characteristics. Therefore, classification is not a source of data collection but rather a technique used to organize collected data.
Swali 35 Ripoti
Which of the following is not a transmission medium?
Maelezo ya Majibu
A transmission medium is a path through which data is transmitted from one device to another. Among the given options, modem is not a transmission medium. A modem is a device that modulates and demodulates signals for transmitting data over communication lines. The other options, twisted pair cables, coaxial cables, and wireless, are all examples of transmission media used in computer networking.
Swali 36 Ripoti
While typing a MS word document, Akin inserted footer in the document in order to
Maelezo ya Majibu
Swali 37 Ripoti
The feature in a database application that acts as an interface between the user and the database is called a?
Maelezo ya Majibu
Swali 38 Ripoti
Which of the following is not an application of computers?
Maelezo ya Majibu
The correct answer is: "bank notes counter." A bank notes counter is a mechanical device used to count paper currency, and it does not involve the use of computers. The other options listed are all applications of computers. Point of sale terminals and ATMs rely on computers to process transactions and manage account information, while traffic lights control systems use computer algorithms to manage the timing and coordination of traffic signals.
Swali 39 Ripoti
Which of the following is not a preventive maintenance measure?
Maelezo ya Majibu
Among the options provided, "data recovery" is not a preventive maintenance measure. Preventive maintenance measures are steps taken to prevent or minimize the occurrence of faults or problems in a system. Regular update of the operating system ensures that the system is up to date with the latest security patches and bug fixes, which helps prevent security vulnerabilities and system crashes. Proper shutdown of the system helps prevent data corruption and hardware failure. The use of uninterrupted power supply (UPS) helps protect the system from power surges and sudden power outages, which can cause data loss or hardware damage. Data recovery, on the other hand, is a corrective measure taken after data loss has already occurred. It involves recovering lost or damaged data from backup or other recovery methods. While important, data recovery is not a preventive maintenance measure, as it does not prevent the loss of data in the first place.
Swali 40 Ripoti
The operation of checking input data against specified criteria is referred to as.
Maelezo ya Majibu
The operation of checking input data against specified criteria is referred to as data validation. Data validation is an important step in data processing to ensure the accuracy and integrity of the data. This process involves checking the input data to make sure it meets certain criteria, such as range, format, and consistency, among others. Data validation helps to reduce errors and inconsistencies that may arise from incorrect or incomplete data.
Swali 41 Ripoti
(a) Define;
(i) Data Security (i) Data risk assessment
(b)(i) What is Access Control
(ii) List the access control methods in database security.
(c) State three roles of a database administrator.
Maelezo ya Majibu
None
Swali 42 Ripoti
(a) Define the following
(i) Database
(ii) Database management system
(b) Mention three functions of a database management system.
(c) Mention two ways through which data can be destroyed.
(d) State three precautionary measure to prevent data loss.
Maelezo ya Majibu
None
Swali 43 Ripoti
TEST OF PRACTICAL KNOWLEDGE QUESTION
A student was asked to record the type of vehicle that entered the school compound through the school's main gate on a Monday morning. The passage below is an excerpt from the student's report on the assignment. "Report on the vehicular traffics at the gate on Monday.
1. Introduction; I was directed by the school principal to sit at the main gate and record the type and number of vehicles that passed through the gate on Monday morning.
2. Observation; I arrived at the gate at about 8;00am and left at 12 noon. During this period, I made the following observation; Car, bus, bus, car, lorry, motorcycle, car, tricycle, motorcycle, bus, bus."
(a) Beginning from the desktop, outline a step by step procedure of how to type the passage in MS word, using A4 paper size and portrait orientation.
(b) State the procedure for carrying out the following operations in the passage;
(i) Begin the second and third sentences in new paragraphs; (ii) Write the first sentence in capital letter underline it and bold it. (iii) Begin the first letter of a sentence with capital letters (iv) Represent the student's observation in a table with three columns under the headings; Serial Number, Type of vehicle, Number of vehicle (v) Merge the first two cells of the ast row of the table and type "Total"and give the total number of vehicles observed in the column for number of vehicles (vi) Save the document with the name: "Vehicular traffic"(vii) Print the document.
Swali 44 Ripoti
a (i) Define an operating system.
(ii) State two functions of an operating system
(iii) List two differences between an operating system and application system software.
b Starting from the Save As dialogue box, outline the steps involved in passwording a document in a word processing package.
None
Maelezo ya Majibu
None
Swali 45 Ripoti
TEST OF PRACTICAL KNOWLEDGE QUESTION
Given an internet connected computer, outline a step by step procedure for carrying out the following operations;
(a) How to log on to www.mybooks.com and obtain the prices of books W, X, Y, Z and M.
(b) How to tabulate the prices in a worksheet, showing the prices in dollars and the naira equivalent, for each book and save the workbook as "Prices of Books". Assume that the prices of the books are given in dollars, [use $1.00=N120.00].
(c) How to send the workbook in 5(b) as an attachment to your father's email address (myfather@yahoo.com) with the subject "Price of Books".
Swali 46 Ripoti
(a)(i) Define application package.
(ii) State one use each of any four application packages
(b) List two benefits of a presently package
(c) Outlines three guidelines for creating a good MS PowerPoint Presentation
None
Maelezo ya Majibu
None
Je, ungependa kuendelea na hatua hii?