WAEC - Data Processing (2017)

1
One of the characteristic feature of the second generation computer is the presence of
Answer
(B)
transistors
2
Convert 4\(_{10}\) to a number in base two
Answer
(C)
100
3
Data processed into its useful form is referred to as
Answer
(D)
information
4
Which of the following is an example of qualitative data?
Answer
(A)
Colour
5
Which of the following is not a characteristics of a personal computer
Answer
(B)
Complex
6
The gap between ownership, access, and benefits from computer and it's application is termed degital 
Answer
(B)
divide
7
Magnetic Ink Character Recognition (MICR) are used to read codes on 
Answer
(D)
bank cheques
8
the device that sends information to the CPU is the
Answer
(B)
input device
9
Which of the following is not a procedure for information processing?
Answer
(A)
segregation
10
The assembling of data according to a predetermined order is known as 
Answer
(C)
organization
11
Information transmission medium from location P to location Q in space is called 
Answer
(A)
wireless transmission
12
Which of the following is not a type of wireless transmission
Answer
(B)
Fiire optics
13
The basic criterion for classifying a network is 
Answer
(B)
geographical scope
14
Which of the following measures are used to secure data on-line? I. Password II. Encryption III. Personal Identification Number (PIN)
Answer
(D)
I, II, and III
15
In e-mail context, bcc stands for 
Answer
(C)
blind carbon copy
16
An internet-based system that allows people different geographical locations to have in-personmeeting is known as 
Answer
(B)
voice conferencing system
17
The following software programs coordinates and control all other computer progra, programs, hardware and users' action except
Answer
(D)
DBSM
18
In word processing applications, the symbol B, I and U are commonly used buttons found on the 
Answer
(C)
formatting bar
19
Bola intends to evoke the synonyms of a certain word during Word processing. What is the most appropriate tool to use?
Answer
(D)
Thesaurus
20
In a worksheet, which of the following actions would select non-contiguous cells?
Answer
(B)
Holding down the Ctrl key
21
Which of these formulas will not be executed in MS Excel?
Answer
(D)
=SUM(exam score)/8
22
MS Access is an example of a 
Answer
(A)
relational model
23
When a database recovery manager is invoked after a crash, restart proceeds in the following three phases; I. Undo II. Redo III. Analysis. Arrange these phases in the right order.
Answer
(C)
III, II, I
24
During presentation, slide transition can be activated by
Answer
(C)
mouse click
25
Planning and creating of website is called web
Answer
(B)
design
26
Magazines and brochures can be produced using a
Answer
(B)
graphics software
27
Which of the following is one of the tools used to maintain the computer
Answer
(A)
Blower
28
Which of the following is not a good computer maintenance practice?
Answer
(C)
Cleaning the screen with a wet cloth
29
Commonly accepted practices, rules or methods in computing are called 
Answer
(D)
Standards
30
Which of the following is safety measure in the computer laboratory?
Answer
(B)
Illumination in the computer laboratory
31
Safety measures to be observed when using the computer include all of the following except 
Answer
(D)
dropping liquids in the computer rooms
32
A computer professional who studies an existing system with a view to evolving a computer-based system from it is called?
Answer
(D)
system analyst
33
Which of the following is not an anti-virus?
Answer
(C)
Compaq
34
Which of the following is used to retrieve specific information from database tables?
Answer
(B)
Query
35
Which of these methods would delete a relationship defined between two tables in MS Access?
Answer
(B)
Selecting the relationship line and pressing Delete key