Information that stimulates both the senses of hearing and sight is called
(a) Figure 3 is created using a Word processor. Use the figure to answer question 6(a)
Figure 3
(a)(i) What is the name given to the feature on the first character in the document in figure 3?
(ii) Highlight the step to;
I. Achieve the feature on the first character in 6(a)(i)
II. Obtain the two columns as shown in figure 3.
(b) Give two objects that can be placed on a document using the “insert menu” on MS Word application.
(c) Outline the steps to perform the following actions in CorelDraw application;
(i) inserting a circular shape
(ii) adding the caption “Happy Birthday”
(iiI) changing the colour of the caption to Red
(iv) fitting the caption around the circular object.
(a) Itoro was tasked with the responsibility of producing the report of hi group project He is to submit both the soft and hard copies of the report to his form teacher. The soft copy must be submitted to the email; form teacher@school.edu.ng
(i) List two;
I. Applications required to carry out the task
II. Hardware required to carry out the task
(ii) Identify two conditions to be satisfied by Itoro to submit the electronic copy of the report.
(iii) On the first attemot to send the soft copy of the report, Itoro observed a “spinning wait cursor”/”spinning disc pointer” on the screen for a long time.
Identify three possible reasons for this observation.
(iv) State one output device that can be used to produce the hard copy report.
Figure 2 is an interface of an application software. Use the figure to answer question 5(b)
Figure 2
(b)(i) Name the type of application software represented in figure 2.
(ii) List three examples of the application in 5(b)(i)
(iii) Given that the application in figure 2 is running on a computer that has internet access, outline the steps to follow in creating an email address/account.
(a) Outline the steps involved in creating the Query By Example (QBE) in figure 1 assuming the table customer exist already.
Figure 1
(b) Write the steps to generate the SQL statement for the action in 4 (a).
(a) Outline the steps involved in printing the first five pages of a word document from the print dialog box on a computer with two printers installed.
(b) Sadiq complained that a pop-up usually appears on the screen of his personal computer thereby disturbing him while using the computer;
(i) What is the possible cause of the pop-up?
(ii) State a possible cause of the element causing the pop-up.
(iii) What measure would be necessary to stop the pop-up from reoccurring?
(c) Mr Aneke is billed to address audience in an auditorium.
(i) What computer application package is suitable to prepare and deliver his speech?
(ii) State the output device that can be used to transmit Mr Aneke’s speech note from his computer to a large screen in the auditorium.
(d) Give two types of computer network.
(a) Vera a secretary to the manager of her organization is saddled with the responsibility of typing a confidential report. She is also instructed to insert the word “CONFIDENTIAL” diagonally in the background of every page of the report.
(i) State the most suitable application software needed by Vera to produce the report.
(ii) What feature of the application software can be used to insert the word “CONFIDENTIAL” as instructed?
(iii) Mention one measure that can be taken to ensure the confidentiality of the soft copy of the report in the computer.
(b) Explain the following terms;
(i) Icon
(ii) Browser
(a)(i) What is data model?
(ii)State three types of data model
(b)(i) List three approaches to data modeling.
(ii) Explain any one approach listed in1(b)(i)
Which of the following is a characteristic of parallel databases?
The protection of database against compromise is known as
One advantage of indexed sequential file organization is that
Arranging records in a file according to a particular order is referred to as
Which of the foolowing statements about relational model is not correct?
A relational database model is designed according to set of rules known as
The following are attributes of computer virus except the ability to
Computer virus is not transmitted through
The computer professional responsible for designing and maintaining a database is called database
Precautionary measures on computer do not include
Which of the following programs is a computer virus
Set of moral principles that regulate the ise of computers and concerns professional and social conduct is known as
A good computer maintenance practice entails
The proactive maintenance of computer equipment before a fault or failure occurs is called