Home ยป Past Questions ยป Computer-studies ยป Waec
1

a – A principal asked the secretary to typeset a document containing some confidential information in Microsoft Word. The principal wants the document to be typed in such a way that when it is opened, the confidential information will be hidden from other users.

Highlight the steps the secretary would take to hide the confidential information in the document.

 

b – A principal asked the secretary to typeset a document containing some confidential information in Microsoft Word. The principal wants the document to be typed in such a way that when it is opened, the confidential information will be hidden from other users.
Outline the steps the principal would take to display the hidden text in 3(a) for viewing.

View Answer & Discuss WAEC 2023
2

a – Table 1 shows the specification of two laptop computers. Use the table to answer questions 2(a) and 2c .
 

A journalist makes long trips by train as part of official assignments. The journalist also needs to make live communication with editors.

Which of the two laptop computers is more suitable for this journalist?

 

b – A journalist makes long trips by train as part of official assignments. The journalist also needs to make live communication with editors.
State three features of the chosen laptop in 2(a) that makes it better.

 

c – A journalist makes long trips by train as part of official assignments. The journalist also needs to make live communication with editors.
Give one reason for choosing each of the features stated in 2(b)

 

View Answer & Discuss WAEC 2023
3

(i) The home network of a family has internet access. A server configured to control user access to the network.

State two problems that will likely happen if the children in the family have uncontrolled access to the internet

 

(ii) The home network of a family has internet access. A server configured to control user access to the network.
Suggest how the problems in 1(a)(i) can be prevented.

 

1(b) The home network of a family has internet access.

      A server configured to control user access to the network.

     Give one reason for the user control access

 

c(i) To have access to the network, each user logs in with a username and password. The flowchart in Figure 1 illustrates the authentication process required to log in. Use the information below to complete the flowchart by placing the letters A to E in the appropriate flowchart symbol numbered (i) to (v) :
 

A – “Please, enter password to log in”
B – Is the username found?
C – Search the username in the database.
D – Check the password.
E – Enter the username.

(i) ___________________________________________

 

c(ii) A – “Please, enter password to log in”

      B – Is the username found?

      C – Search the username in the database.
      D – Check the password.
      E – Enter the username.

(ii) ___________________________________________

 

 

c(iii) A – “Please, enter password to log in”
       B – Is the username found?
       C – Search the username in the database.
       D – Check the password.
       E – Enter the username.

(iii)___________________________________________

 

c(iv)  A – “Please, enter password to log in”
        B – Is the username found?
        C – Search the username in the database.
        D – Check the password.
        E – Enter the username.

(iv) ___________________________________________

c(v) A – “Please, enter password to log in”
      B – Is the username found?
      C – Search the username in the database.
      D – Check the password.
      E – Enter the username.

(v) ___________________________________________

 

 

 

 

 

View Answer & Discuss WAEC 2023
4

The process of making copies of files which can be used to restore the original copy in the event of data loss is called file

  • A. restoration.
  • B. retrieval.
  • C. organization
  • D. backup
View Answer & Discuss WAEC 2023
5

Stored instructions and data in digital computer consist of

  • A. bits.
  • B. numerals.
  • C. alphabets
  • D. characters.
View Answer & Discuss WAEC 2023
6

A program that converts source code instructions in high-level programming language to object codes line by line is known as

  • A. interpreter.
  • B. compiler.
  • C. editor
  • D. assembler.
View Answer & Discuss WAEC 2023
7

Datatypes in QBASIC programming language include the following except

  • A. double
  • B. short
  • C. float.
  • D. long.
View Answer & Discuss WAEC 2023
8

The database model that uses tables with columns and rows is called

  • A. hierarchical database.
  • B. relational database.
  • C. network database.
  • D. linear database.
View Answer & Discuss WAEC 2023
9

Which of the following actions is not an animation in Microsoft PowerPoint?

  • A. Entrance
  • B. Emphasis
  • C. Motion paths
  • D. Dancing
View Answer & Discuss WAEC 2023
10

Viruses, worms and Trojan horses are regarded as

  • A. system software.
  • B. malicious software.
  • C. application software.
  • D. utility software.
View Answer & Discuss WAEC 2023
11

Input devices are computer devices that can

  • A. send data and instructions into the computer memory.
  • B. be used to get data from the computer.
  • C. send results to the memory of the computer.
  • D. receive data and instructions from the computer memory.
View Answer & Discuss WAEC 2023
12

The following are functions of database management system except

  • A. format operation.
  • B. rule enforcement.
  • C. security of data.
  • D. backup and replication.
View Answer & Discuss WAEC 2023
13

The process of transferring a file from a server to a computer is called

  • A. pinging
  • B. browsing.
  • C. downloading.
  • D. uploading.
View Answer & Discuss WAEC 2023
14

The https in the web address, https://waec.org.ng, is called a

  • A. web page.
  • B. protocol.
  • C. hostname.
  • D. file path.
View Answer & Discuss WAEC 2023
15

The act of translating data into a secret code is known as

  • A. piracy.
  • B. encryption.
  • C. authentication.
  • D. authorization.
View Answer & Discuss WAEC 2023
16

If today’s date is 02/02/2008, what will be the result of typing “=today() – 1” in a cell of a spreadsheet?

  • A. 02/01/2008
  • B. 01/02/2009
  • C. 01/02/2008
  • D. 02/02/2007
View Answer & Discuss WAEC 2023
17

Headers and footers are used in Microsoft Word documents to

  • A. enhance the overall appearance of the document.
  • B. allow text to appear at the top and bottom of every page.
  • C. make large document more readable.
  • D. allow test to appear at the top of the first page.
View Answer & Discuss WAEC 2023
18

An opening on the motherboard of a system unit where expansion cards can be inserted is known as

  • A. expansion port.
  • B. extension box.
  • C. extension board.
  • D. expansion slot.
View Answer & Discuss WAEC 2023
19

The unit of the computer system that directs and supervises other units is called the

  • A. memory unit.
  • B. control unit.
  • C. arithmetic logic unit.
  • D. accumulator
View Answer & Discuss WAEC 2023
20

Which of the following data is alpha-numeric?

  • A. 568
  • B. 10.00
  • C. SS3
  • D. Twenty-five
View Answer & Discuss WAEC 2023
21

The speed of data transfer can be affected by the following factors except

  • A. address bus width.
  • B. broadband status.
  • C. data bus width.
  • D. clock speed.
View Answer & Discuss WAEC 2023