Home ยป Past Questions ยป Data-processing ยป Waec ยป 2018
1

Information that stimulates both the senses of hearing and sight is called 

  • A. audio information
  • B. audio-visual
  • C. video information
  • D. visual information
View Answer & Discuss WAEC 2018
2

(a) Figure 3 is created using a Word processor. Use the figure to answer question 6(a)

Open Photo

                                     Figure 3

(a)(i) What is the name given to the feature on the first character in the document in figure 3?

(ii) Highlight the step to;

I. Achieve the feature on the first character in 6(a)(i)

II. Obtain the two columns as shown in figure 3.

(b) Give two objects that can be placed on a document using the “insert menu” on MS Word application.

(c) Outline the steps to perform the following actions in CorelDraw application;

(i) inserting a circular shape

(ii) adding the caption “Happy Birthday”

(iiI) changing the colour of the caption to Red

(iv) fitting the caption around the circular object. 
 

View Answer & Discuss WAEC 2018
3

(a) Itoro was tasked with the responsibility of producing the report of hi group project He is to submit both the soft and hard copies of the report to his form teacher. The soft copy must be submitted to the email; form teacher@school.edu.ng

(i) List two;

I. Applications required to carry out the task

II. Hardware required to carry out the task

(ii) Identify two conditions to be satisfied by Itoro to submit the electronic copy of the report.

(iii) On the first attemot to send the soft copy of the report, Itoro observed a “spinning wait cursor”/”spinning disc pointer” on the screen for a long time.

Identify three possible reasons for this observation.

(iv) State one output device that can be used to produce the hard copy report.

Figure 2 is an interface of an application software. Use the figure to answer question 5(b)

Open Photo

                                Figure 2

(b)(i) Name the type of application software represented in figure 2.

(ii) List three examples of the application in 5(b)(i)

(iii) Given that the application in figure 2 is running on a computer that has internet access, outline the steps to follow in creating an email address/account.

 

View Answer & Discuss WAEC 2018
4

(a) Outline the steps involved in creating the Query By Example (QBE) in figure 1 assuming the table customer exist already.

 Open Photo

                                                 Figure 1

(b) Write the steps to generate the SQL statement for the action in 4 (a).

View Answer & Discuss WAEC 2018
5

(a) Outline the steps involved in printing the first five pages of a word document from the print dialog box on a computer with two printers installed.

(b) Sadiq complained that a pop-up usually appears on the screen of his personal computer thereby disturbing him while using the computer;

(i) What is the possible cause of the pop-up?

(ii) State a possible cause of the element causing the pop-up.

(iii) What measure would be necessary to stop the pop-up from reoccurring?

(c) Mr Aneke is billed to address audience in an auditorium.

(i) What computer application package is suitable to prepare and deliver his speech?

(ii) State the output device that can be used to transmit Mr Aneke’s speech note from his computer to a large screen in the auditorium.

(d) Give two types of computer network.

 

View Answer & Discuss WAEC 2018
6

(a) Vera a secretary to the manager of her organization is saddled with the responsibility of typing a confidential report. She is also instructed to insert the word “CONFIDENTIAL” diagonally in the background of every page of the report.

(i) State the most suitable application software needed by Vera to produce the report.

(ii) What feature of the application software can be used to insert the word “CONFIDENTIAL” as instructed?

(iii) Mention one measure that can be taken to ensure the confidentiality of the soft copy of the report in the computer.

(b) Explain the following terms;

(i) Icon

(ii) Browser

 

View Answer & Discuss WAEC 2018
7

(a)(i) What is data model?

(ii)State three types of data model

(b)(i) List three approaches to data modeling.

(ii) Explain any one approach listed in1(b)(i)

View Answer & Discuss WAEC 2018
8

Which of the following is a characteristic of parallel databases?

  • A. there can be shared-memory or shared disk
  • B. they are connected using public purpose network
  • C. machines in this environment are in different locations
  • D. it has local autonomy
View Answer & Discuss WAEC 2018
9

The protection of database against compromise is known as 

  • A. data passwording
  • B. data protection
  • C. database encoding
  • D. database security
View Answer & Discuss WAEC 2018
10

One advantage of indexed sequential file organization is that  

  • A. index tables are small and can be searched quickly
  • B. it is cost effective
  • C. it is suitable for dynamically changing files
  • D. it requires less storage space
View Answer & Discuss WAEC 2018
11

Arranging records in a file according to a particular order is referred to as 

  • A. matching
  • B. merging
  • C. sorting
  • D. updating
View Answer & Discuss WAEC 2018
12

Which of the foolowing statements about relational model is not correct?

  • A. A file is a sequence of related records
  • B. A record consist of a row of data containing single value from each column
  • C. Data in the column of a table are of the same data type
  • D. Data in the rows of a table are of the same data type
View Answer & Discuss WAEC 2018
13

A relational database model is designed according to set of rules known as 

  • A. Normalization
  • B. Isolation
  • C. Grouping
  • D. Enumeration
View Answer & Discuss WAEC 2018
14

The following are attributes of computer virus except the ability to

  • A. modify other files
  • B. replicate itself in order to spread to other files and system
  • C. execute without the user's approval
  • D. warn the user before execution
View Answer & Discuss WAEC 2018
15

Computer virus is not transmitted through

  • A. formatting of documents
  • B. email
  • C. external storage device
  • D. internet
View Answer & Discuss WAEC 2018
16

The computer professional responsible for designing and maintaining a database is called database 

  • A. programmer
  • B. operator
  • C. instructor
  • D. administrator
View Answer & Discuss WAEC 2018
17

Precautionary measures on computer do not include 

  • A. handling all files with care
  • B. giving access to unauthorized persons into the computer room
  • C. avoiding smoking in the computer room
  • D. avoiding dirts and dust in the computer room
View Answer & Discuss WAEC 2018
18

Which of the following programs is a computer virus 

  • A. Kaspersky
  • B. NOD 32
  • C. Norton
  • D. Tuareg
View Answer & Discuss WAEC 2018
19

Set of moral principles that regulate the ise of computers and concerns professional and social conduct is known as

  • A. computer ethics
  • B. computer misuse act
  • C. computer use act
  • D. safety measure
View Answer & Discuss WAEC 2018
20

A good computer maintenance practice entails 

  • A. washing the dusty computer parts with soap and water
  • B. keeping computer exposed to sunlight to dry the body
  • C. cleaning the display unit with methylated spirit
  • D. blowing the system unit with blower
View Answer & Discuss WAEC 2018
21

The proactive maintenance of computer equipment before a fault or failure occurs is called 

  • A. corrective maintenance
  • B. predictive maintenance
  • C. preventive maintenance
  • D. preservative maintenance
View Answer & Discuss WAEC 2018