WAEC - Data Processing (2018)

1
The first generation computers made use of
Answer
(A)
low level programming
2
Microprocessor was used as the main electronic component of the 
Answer
(D)
fourth generation computers
3
The act of producing information from figures, text or images is called data 
Answer
(D)
processing
4
The following are primary sources of information except
Answer
(B)
publication
5
Which of the following is not considered when classifying computers
Answer
(C)
location
6
Which  of these channels would enable business transactions between a buyer from Nigeria and a seller from Ghana 
Answer
(C)
e-commerce
7
The ICT application which helps to resolve road congestion at junctions is 
Answer
(D)
traffic light
8
The main components of the central processing unit (CPU) of the computer are
Answer
(C)
control unit and ALU
9
Stages in data processing cycle includes the following except data
Answer
(C)
parsing
10
At what stage of information processing is data validtion carried out?
Answer
(A)
Data analysis
11
The media which enable electromagnetic signals to be transmitted through free space is known as 
Answer
(A)
unguided media
12
The following are advantages of networking except 
Answer
(A)
spamming
13
Which of the following devices would not transmit signals from one point to another?
Answer
(B)
modem
14
Another term for Uniform Resources Locator (URL) is
Answer
(A)
website address
15
The website "www.google.com" indicates that Google is 
Answer
(A)
a commercial organization
16
Identify an operating system from the following software
Answer
(D)
Linux
17
Which of the following command would undo the last operation carried out in Microsoft Word
Answer
(A)
Ctrl + Z
18
While typing, a series of letters were highlighted and the keyboard key combination "Ctrl + B" was executed, the highlighted letters would be 
Answer
(D)
bold
19

Table 1 is a part of MS Excel worksheet that shows the marks obtained by some students in an examination. Use the table to answer questions 20 and 21.

S/N A B C D E F
1 NAME OF STUDENT ENGLISH LANGUAGE MATHEMATICS DATA PROCESSING COMPUTER STUDIES CIVIC EDUCATION
2 ANENE LORRETA 65 90 70 85 65
3 BAKARE IMAN 60 65 75 80 75
4 ENEH GRACE 75 65 65 75 60
5 MOHEMMED DEJI 65 60 65 60 60
6 ONYEBUEKE DEBORAH 89 65 60 60 65

Which of the following formulas would calculate the average score of the students in Mathematics?

Answer
(A)
= Average (C2:C6)
20

Which of the following formulas would calculate the total score of ONYEBUEKE DEBORAH in the five subjects

S/N A B C D E F
1 NAME OF STUDENT ENGLISH LANGUAGE MATHEMATICS DATA PROCESSING COMPUTER STUDIES CIVIC EDUCATION
2 ANENE LORRETA 65 90 70 85 65
3 BAKARE IMAN 60 65 75 80 75
4 ENEH GRACE 75 65 65 75 60
5 MOHEMMED DEJI 65 60 65 60 60
6 ONYEBUEKE DEBORAH 89 65 60 60 65

 

Answer
(D)
=SUM(B6:F6)
21
The following are advantages of a Database Management System (DBSM)  except
Answer
(D)
compromise of data integrity
22
Extracting information in Database Management System (DCMS) involves 
Answer
(B)
querying
23
A special effect that controls the way slides appear in PowerPoint presentation is called
Answer
(B)
Transition
24
A reference to another page or resource on a website is done by 
Answer
(B)
Hyperlinks
25
The design output of a graphic package can be in the following file formats except
Answer
(A)
.rtf
26
The proactive maintenance of computer equipment before a fault or failure occurs is called 
Answer
(C)
preventive maintenance
27
A good computer maintenance practice entails 
Answer
(D)
blowing the system unit with blower
28
Set of moral principles that regulate the ise of computers and concerns professional and social conduct is known as
Answer
(A)
computer ethics
29
Which of the following programs is a computer virus 
Answer
(D)
Tuareg
30
Precautionary measures on computer do not include 
Answer
(B)
giving access to unauthorized persons into the computer room
31
The computer professional responsible for designing and maintaining a database is called database 
Answer
(D)
administrator
32
Computer virus is not transmitted through
Answer
(A)
formatting of documents
33
The following are attributes of computer virus except the ability to
Answer
(D)
warn the user before execution
34
A relational database model is designed according to set of rules known as 
Answer
(A)
Normalization
35
Which of the foolowing statements about relational model is not correct?
Answer
(D)
Data in the rows of a table are of the same data type