Nkojọpọ....
Tẹ mọ́ & Dì mú láti fà yíká. |
|||
Tẹ ibi lati pa |
Ibeere 1 Ìròyìn
Which of the following items is not located on the MS Word menu bar?
Awọn alaye Idahun
Ibeere 2 Ìròyìn
A modern and a telephone connection are provided. Other things needed to be able to connect a computer to the internet are _______
Awọn alaye Idahun
Ibeere 3 Ìròyìn
Fig 1 is a logic gate. Use it to answer the question below
In Fig. 1, X, Y, and Z respectively represent_______?
Awọn alaye Idahun
In Fig. 1, the circle represents the NOT gate, which means it has only one input and one output. Since there are two NOT gates, it means there are two input signals (X and Y) and one output signal (Z). Therefore, the answer is: Input, Input and Output signals.
Ibeere 4 Ìròyìn
The Instruction fetched into the CPU is decoded by the___________
Awọn alaye Idahun
In a computer's central processing unit (CPU), the instruction fetched from the memory is decoded by the control unit. The control unit is responsible for controlling the flow of data within the CPU, including retrieving instructions from memory, decoding them, and executing them. It manages the sequence of operations that the CPU performs to carry out instructions, and it communicates with other components of the CPU, such as the arithmetic logic unit (ALU) and the program counter, to ensure that the correct operation is performed. Therefore, the correct answer is the control unit.
Ibeere 5 Ìròyìn
Use Table 3 to answer the questions below
A | B | C | D | E | |
1 | BOOK SUPPLIED TO SENIOR HIGH SCHOOLS | ||||
2 | MATHS | ICT | ENGLISH | ||
3 | SHS1 | 3450 | 4500 | 5678 | |
4 | SHS11 | 8765 | 6580 | 9000 | |
5 | SHS111 | 2456 | 4009 | 4400 |
Which cells in table 3 contain numeric data with the least value?
Awọn alaye Idahun
Ibeere 7 Ìròyìn
The acronym HTTP stands for________
Awọn alaye Idahun
The acronym HTTP stands for "Hyper Text Transfer Protocol". It is a protocol or set of rules used for transferring and receiving web pages, documents, and other resources on the World Wide Web. This protocol is responsible for facilitating communication between web servers and clients, such as web browsers. The client sends an HTTP request message to the server, and the server responds with an HTTP response message containing the requested resource. The HTTP protocol is an essential part of the Internet, and it is the foundation upon which the World Wide Web is built.
Ibeere 8 Ìròyìn
Evaluate the BASIC statement:
LET Z = 4*W^2 + 2*Y
Given that W = 5 and Y = 10
Awọn alaye Idahun
The BASIC statement LET Z = 4*W^2 + 2*Y can be evaluated by replacing the variables W and Y with their respective values, which are given as W = 5 and Y = 10. Substituting these values, we get: Z = 4*(5)^2 + 2*(10) Z = 4*25 + 20 Z = 100 + 20 Z = 120 Therefore, the value of Z is 120. The correct option is (d).
Ibeere 9 Ìròyìn
The property of a disk that determines the amount of data it may contain is?
Awọn alaye Idahun
The property of a disk that determines the amount of data it may contain is the "storage capacity". Storage capacity refers to the amount of data that can be stored on a disk or any other digital storage medium. It is usually measured in bytes (such as gigabytes or terabytes) and is determined by the physical size of the storage device and the technology used to store the data. The larger the storage capacity of a disk, the more data it can hold.
Ibeere 11 Ìròyìn
Fig.2 is a system development cycle. Use it to answer the question below
The path labelled III is the _________?
Awọn alaye Idahun
Ibeere 12 Ìròyìn
Which of the following methods is not suitable for securing files?
Awọn alaye Idahun
Saving documents without a password is not a suitable method for securing files. When files are saved without a password, anyone with access to the computer or storage device can open and modify them. This means that sensitive or confidential information can be accessed and tampered with by unauthorized persons. Therefore, it is important to use passwords or other security measures to protect files from unauthorized access or modification. The other options mentioned - use of backup, use of antivirus, and proper labelling of storage devices - are all suitable methods for securing files, as they help to prevent data loss, protect against malware or viruses, and ensure that storage devices are properly identified and managed.
Ibeere 13 Ìròyìn
Given that 26 \(_10\) = X \(_2\), X is _________
Awọn alaye Idahun
The subscript "10" indicates that 26 is a number written in base 10 (decimal), which means that it uses 10 digits (0-9) to represent all possible values. The subscript "2" indicates that X is a number written in base 2 (binary), which means that it uses only 2 digits (0 and 1) to represent all possible values. To convert 26 from base 10 to base 2, we can use the repeated division-by-2 algorithm: - Divide 26 by 2: 26 ÷ 2 = 13 with a remainder of 0 (LSB) - Divide 13 by 2: 13 ÷ 2 = 6 with a remainder of 1 - Divide 6 by 2: 6 ÷ 2 = 3 with a remainder of 0 - Divide 3 by 2: 3 ÷ 2 = 1 with a remainder of 1 - Divide 1 by 2: 1 ÷ 2 = 0 with a remainder of 1 (MSB) The remainders, read from bottom to top, give the binary representation of 26: 11010. Therefore, the answer is option (B) 11010.
Ibeere 14 Ìròyìn
Fig.3 is a flowchart. Use it to answer the question below
The part labelled II represents______
Awọn alaye Idahun
In Fig.3, the part labelled II represents the process symbol. In a flowchart, process symbols represent actions or operations performed on data, such as calculations or transformations. Therefore, in this flowchart, the process symbol II represents the action or operation being performed on the input data.
Ibeere 15 Ìròyìn
Fig.2 is a system development cycle. Use it to answer the question below
The path labelled II is the __________?
Awọn alaye Idahun
Ibeere 16 Ìròyìn
In hexadecimal number system, B, D, E represent_________
Awọn alaye Idahun
In the hexadecimal number system, each digit represents a value from 0 to 15. The first ten digits represent their respective values, and the next six are represented by the letters A to F, which represent values from 10 to 15. Therefore, B represents the value 11, D represents the value 13, and E represents the value 14. So, the correct option is: B, D, E represent 12, 14, 15 respectively.
Ibeere 17 Ìròyìn
Which of the following is employed in the transfer of data between computers and a network?
Awọn alaye Idahun
Ibeere 18 Ìròyìn
Which of the following programming languages needs no translator for it to run?
Awọn alaye Idahun
Machine language does not need a translator for it to run. This is because machine language is written in binary code, which is the language that computers use to process instructions. Unlike other programming languages, machine language can be executed directly by the computer's CPU without the need for any translation. Therefore, the correct answer is machine language.
Ibeere 19 Ìròyìn
Fig.2 is a system development cycle. Use it to answer the question below
The path labelled I is the __________?
Awọn alaye Idahun
The path labelled I in Fig.2 is the Feasibility Study. This is the initial stage in the System Development Cycle where the feasibility of the proposed system is evaluated. The feasibility study examines the economic, technical, operational, schedule, and legal feasibility of the system. In this stage, the project's goals, objectives, and constraints are identified, and alternative solutions are evaluated. A feasibility study helps the development team to determine whether the proposed system is worth developing, and if so, what resources will be required to develop the system.
Ibeere 20 Ìròyìn
Use Table 3 to answer the questions below
A | B | C | D | E | |
1 | BOOK SUPPLIED TO SENIOR HIGH SCHOOLS | ||||
2 | MATHS | ICT | ENGLISH | ||
3 | SHS1 | 3450 | 4500 | 5678 | |
4 | SHS11 | 8765 | 6580 | 9000 | |
5 | SHS111 | 2456 | 4009 | 4400 |
The number of cells that contain data in row 1 is_________
Awọn alaye Idahun
The number of cells that contain data in row 1 is 5. This is because each cell in row 1 (from column A to column E) contains data. The data in row 1 represents the book supplied to senior high schools and the subjects for which the book was supplied. Therefore, there are 5 cells in row 1 that contain data.
Ibeere 21 Ìròyìn
Which of the following statements is true about registers?
Awọn alaye Idahun
The statement that is true about registers is: "It is a special high speed storage area within the CPU." Registers are a small, fast storage area within the central processing unit (CPU) that temporarily holds data and instructions that the CPU is currently processing. Registers are very fast compared to other forms of computer memory, such as RAM, because they are located directly within the CPU and are designed to be quickly accessible. Registers are used to hold data that the CPU is currently working on, such as numbers, characters, and memory addresses, as well as instructions that tell the CPU what to do with that data.
Ibeere 22 Ìròyìn
Which of the following devices is not a micro computer?
Awọn alaye Idahun
The EDVAC is not a microcomputer. EDVAC stands for Electronic Discrete Variable Automatic Computer, which was one of the earliest electronic computers. It was designed and built during the 1940s and was a large-scale computer that was not small or inexpensive enough to be considered a microcomputer. On the other hand, notebook, laptop, and desktop computers are all examples of microcomputers or personal computers that are small enough to be used by an individual.
Ibeere 24 Ìròyìn
An advantage of sequential access over serial access is that_______
Awọn alaye Idahun
Ibeere 25 Ìròyìn
The conversion of 11001 \(_2\) to base 10 equals_______
Awọn alaye Idahun
To convert a binary number to base 10, we start by writing down the binary digits of the number and assigning a place value to each digit, based on its position. The rightmost digit has a place value of 1, the next digit to the left has a place value of 2, then 4, 8, and so on, doubling each time. We then multiply each binary digit by its corresponding place value and add up the products. For the given binary number 11001, we can assign the following place values: 1 1 0 0 1 16 8 4 2 1 Multiplying each digit by its corresponding place value and adding up the products, we get: 1×16 + 1×8 + 0×4 + 0×2 + 1×1 = 16 + 8 + 1 = 25 Therefore, the conversion of 11001 \(_2\) to base 10 equals 25.
Ibeere 26 Ìròyìn
The transaction file can also be described as _______
Awọn alaye Idahun
The transaction file is a type of file used in computer systems to store records of individual transactions. These transactions can be of various types, such as financial transactions, inventory transactions, or customer transactions. Each record in the transaction file typically includes information such as the date and time of the transaction, the transaction amount, and any other relevant details. Unlike a master file, which contains the current state of a set of records, a transaction file contains information about changes that have been made to those records over time. For example, a transaction file for a bank might contain records of all deposits, withdrawals, and transfers made by customers over a given period of time. Therefore, the answer to the question is "Movement file".
Ibeere 27 Ìròyìn
Which of the following ideals is protected by copyright?
Awọn alaye Idahun
Copyright protects the expression of ideas, not the ideas themselves. In other words, if someone comes up with an idea, such as a new invention or a story, they cannot copyright the idea itself. However, if they express that idea in a tangible form, such as by writing it down or recording it, then that expression is protected by copyright. Therefore, the option that is protected by copyright is "Expression of ideas".
Ibeere 28 Ìròyìn
Which of the following items best describes the term hardcopy?
Awọn alaye Idahun
The term hardcopy refers to a printout of information or data that has been produced by a printer or other output device. It is a physical, tangible copy of information that can be held and stored, unlike digital copies of data that are stored on electronic devices. Therefore, the best item that describes the term hardcopy is "Print out."
Ibeere 29 Ìròyìn
The computing devices invented by Charles Babbage are?
Awọn alaye Idahun
Charles Babbage is best known for designing two mechanical computing devices, the Difference Engine and the Analytical Engine. The Difference Engine was designed to compute tables of numbers, while the Analytical Engine was designed to be a general-purpose computer capable of performing any computation that could be carried out by a human computer. Therefore, the correct answer is "Difference Engine and Analytical Engine."
Ibeere 30 Ìròyìn
Which of the following is not an output device?
Awọn alaye Idahun
A webcam is not an output device. It is a device that captures video and audio and sends it to another device or computer. The other options, plotters, speakers, and projectors are all output devices. Plotters are used to produce high-quality graphics, while speakers are used to produce sound, and projectors are used to display visual images on a screen or surface.
Ibeere 31 Ìròyìn
The computer hardware can be classified into
Awọn alaye Idahun
Computer hardware refers to the physical components of a computer system. It can be broadly classified into two categories: system unit and peripherals. The system unit includes the Central Processing Unit (CPU), which is responsible for processing data, and other components such as motherboard, memory, and storage devices. The peripherals include input devices such as keyboard and mouse, output devices such as monitor and printer, and other devices such as scanners and speakers. Therefore, the correct answer is "System Unit and Peripheral".
Ibeere 33 Ìròyìn
An advantage of Graphical User Interface (GUI) over Disk Operating System (DOS) is that it allows the use of __________?
Awọn alaye Idahun
An advantage of Graphical User Interface (GUI) over Disk Operating System (DOS) is that it allows the use of a mouse. In a DOS environment, users typically have to rely on keyboard commands to navigate and operate the system. On the other hand, a GUI interface uses graphical elements such as icons, menus, and windows that can be easily manipulated with a mouse. This makes the interface more intuitive and user-friendly, especially for those who are not familiar with command-line interfaces. The mouse allows users to point and click on icons or other visual elements, which can trigger actions or open files and applications. This makes it easier to interact with the computer and perform various tasks.
Ibeere 34 Ìròyìn
In ring topology, the computer that is allowed to transmit data possesses the ________
Awọn alaye Idahun
In ring topology, the computer that is allowed to transmit data possesses the "Token". A token is a small data packet that circulates around the network in a specific order. When a computer wants to transmit data, it must wait until it receives the token. Once the computer receives the token, it can transmit data onto the network, and the token will move on to the next computer in the ring. In this way, the token acts as a way to control access to the network and prevent multiple computers from transmitting data at the same time, which could cause collisions and data loss.
Ibeere 35 Ìròyìn
Use Table 3 to answer the questions below
A | B | C | D | E | |
1 | BOOK SUPPLIED TO SENIOR HIGH SCHOOLS | ||||
2 | MATHS | ICT | ENGLISH | ||
3 | SHS1 | 3450 | 4500 | 5678 | |
4 | SHS11 | 8765 | 6580 | 9000 | |
5 | SHS111 | 2456 | 4009 | 4400 |
In table 3, the content of cell C5________
Awọn alaye Idahun
Ibeere 36 Ìròyìn
Which of the following signifies the correct association between a hardware component and its functions?
Awọn alaye Idahun
The correct association between a hardware component and its function is: - Mouse to input: A mouse is an input device that allows users to interact with the computer by moving the cursor on the screen and clicking on icons, buttons, or other graphical elements. - Monitor to display: A monitor is an output device that displays text, images, and video on the screen. - CPU to processing: The Central Processing Unit (CPU) is the brain of the computer and performs most of the processing tasks. It executes instructions, performs calculations, and manages data flow between other components. - Hard disk to storage: A hard disk is a non-volatile storage device that stores data on spinning disks coated with magnetic material. It provides long-term storage for files, programs, and operating systems. Therefore, the correct association between a hardware component and its function is: Mouse to input, Monitor to display, CPU to processing, and Hard disk to storage.
Ibeere 37 Ìròyìn
Fig.3 is a flowchart. Use it to answer the question below
The part labelled III represents________
Awọn alaye Idahun
The part labelled III in Fig.3 flowchart represents a decision symbol. A decision symbol is used in a flowchart to represent a point where a decision has to be made, which can lead to different paths or outcomes depending on the result of the decision. In this case, the decision symbol labelled III represents a decision that asks whether a particular condition is true or false, and the outcome of this decision will determine which path the flowchart follows next.
Ibeere 38 Ìròyìn
Which of the following software is best suitable for keeping records during national population census?
Awọn alaye Idahun
The best software for keeping records during national population census is a database. This is because a database is specifically designed for managing large amounts of structured data and provides powerful tools for data input, storage, retrieval, and analysis. With a database, census data can be organized in a systematic and meaningful way, making it easier to manage, update and extract relevant information when needed. Word processing software is primarily used for creating and editing text-based documents, while spreadsheets are used for numerical calculations and data analysis. Graphics software is used for creating visual content such as images and charts. While all of these software types may be used in the census process, a database is the most suitable option for managing large and complex datasets.
Ibeere 39 Ìròyìn
Fig.3 is a flowchart. Use it to answer the question below
The part labelled I represents_________
Awọn alaye Idahun
Ibeere 40 Ìròyìn
Which of the following statements is not true about a computer file?
Awọn alaye Idahun
The statement that is not true about a computer file is: "Initial setup is inexpensive". Explanation: - "It is very fast to access any record within a file": This statement is true as accessing data within a computer file is much faster than accessing data from physical documents. - "It is created electronically": This statement is also true as computer files are created and stored in digital format. - "File creation and access are less laborious": This statement is true because creating and accessing files is much easier and less time-consuming than managing physical documents. However, the statement "Initial setup is inexpensive" is not always true. While creating a file may not require significant expenses, the initial setup of a system to manage and store files (such as a computer, software, or cloud storage service) can be costly.
Ibeere 42 Ìròyìn
In a computer, the sets of instruction that direct it in performing a particular task is called?
Awọn alaye Idahun
The sets of instruction that direct a computer in performing a particular task is called a "program". A program is a collection of instructions that are written in a specific programming language to tell a computer what to do. Programs can perform a wide range of tasks such as word processing, image editing, web browsing, playing games, and much more. Programs are executed by the computer's CPU (Central Processing Unit) in a sequential order to perform a specific task.
Ibeere 43 Ìròyìn
In changing the storage location of a file, the command to use is_______
Awọn alaye Idahun
The command to use in changing the storage location of a file is the 'save as' command. This command allows the user to save a copy of the file with a new name or in a new location while preserving the original file in its current location. The 'save' command simply saves changes made to the current file in its current location without offering the option to change the file name or location. The key combination 'ctrl + S' is a shortcut for the 'save' command, and 'alt + F, then save' is a sequence of keys that accesses the 'save' command through the file menu. Therefore, the correct option is 'save as' command.
Ibeere 44 Ìròyìn
The most cost-effective and secure way of transmitting confidential messages among the employees of an organization is the ___________
Awọn alaye Idahun
The most cost-effective and secure way of transmitting confidential messages among the employees of an organization is the use of email. Email is a method of exchanging digital messages between people using electronic devices, which can be used to transmit confidential messages among employees of an organization in a secure and cost-effective manner. Confidential email messages can be encrypted to ensure that they can only be read by the intended recipient, making it a secure means of communication. Electronic notice boards, teleconferencing, and social networks are not as secure or reliable as email for transmitting confidential messages among employees.
Ibeere 45 Ìròyìn
The process of restarting a computer is known as ________
Awọn alaye Idahun
The process of restarting a computer is known as "Warm booting". Warm booting means restarting a computer while it is already turned on, without turning off the power. During a warm boot, the system goes through a process called "reset" which shuts down and restarts the operating system and all the software programs that are running. This is usually done when the computer is not responding properly, or when a software installation requires a restart. It is called "warm" because the computer components are not completely powered off and the system does not have to perform a complete power-on self-test (POST) as in a cold boot.
Ibeere 46 Ìròyìn
Which of the following software can be used for graphic production?
Awọn alaye Idahun
Coreldraw is the software used for graphic production. It is a vector graphics editor developed and marketed by Corel Corporation. It is used to create illustrations, logos, brochures, and other design-related tasks. Coreldraw provides tools for drawing lines and shapes, editing images, and creating text. It is widely used in the graphic design industry due to its versatility, user-friendly interface, and powerful tools for creating high-quality graphics. On the other hand, DOS Editor, PC Writer, and Acrobat Reader are not specifically designed for graphic production, but they have other functions.
Ibeere 47 Ìròyìn
The application software which allows information available on the internet to be obtained is called _________
Awọn alaye Idahun
The application software which allows information available on the internet to be obtained is called a "browser". A browser is a software application used to access and view websites, web pages, and other content available on the internet. It allows users to navigate the web by entering URLs or search terms to find information, and presents the content in a user-friendly way, including text, images, videos, and other media. Popular browsers include Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari.
Ibeere 48 Ìròyìn
The Use of electronic systems to send an unsolicited e-mail to someone's address is known as ______
Ibeere 49 Ìròyìn
Which of the following computing devices did not exist in the pre-computing age to the 19th century?
Awọn alaye Idahun
The ENIAC was the first electronic general-purpose computer that was built in the mid-1940s, long after the pre-computing age and the 19th century. Therefore, the answer is ENIAC. - Napier's bone: A manual calculating device invented by John Napier in the early 17th century. - Abacus: A manual calculating device that has been used for thousands of years, dating back to ancient times. - Slide rule: A mechanical analog computer used for multiplication, division and other mathematical calculations. It was widely used from the 17th to the late 20th century. So, the computing device that did not exist in the pre-computing age to the 19th century is ENIAC.
Ibeere 51 Ìròyìn
(a) (i) Define Information and Communication Technology. (ii) State three uses of Information and Communication Technology in the banking sector.
(b) State the full meaning of the following: i) LAN; (ii) GPS; (iii) IP
Awọn alaye Idahun
None
Ibeere 52 Ìròyìn
(a) List: (i) three application areas of a word processing program;
(ii) three types of data item.
(b) identify program; the four data types available in Table 2.
Table 2
Student I.D. |
Name | Date of Birth | Score in Computer Studies | Gender |
A 00022 |
Odi, G. A | 13/10/97 | 38 | M |
C 00021 |
Zakari, M. | 15/05/98 | 71 | M |
B 00023 |
Ngozi Tella | 16/09/96 | 62 | F |
Awọn alaye Idahun
None
Ibeere 53 Ìròyìn
(a) Define programming language.
(b) Write the 5 following mathematical expressions in BASIC notation:
(i) x (w + y)\(^2\) (ii) ab/cd (ii) p = 2 (1+b).
(c) Write a simple BASIC program to calculate the area (A) of a rectangle with length (l) and breath (b).
(d) List two levels of programming language.
Awọn alaye Idahun
None
Ibeere 55 Ìròyìn
(a) Match each type of ICT in Table 1 with its relevant 1.
ICT Type |
communication sector. |
Satellite communication |
Radio |
Broadcasting |
Internet |
Data network |
GSM |
Telecommunication |
video conferencing |
(b) List three computing devices that belong to each of (i) 19th; and (ii) 20th century periods.
None
Awọn alaye Idahun
None
Ṣe o fẹ tẹsiwaju pẹlu iṣe yii?