The Difference Engine and the Analytical Engine were invented by
Answer
(D)
Charles Babbage
2
A type of file organization that stores data in the order of their arrival is called
Answer
(D)
sequential file organization
3
Which of the following computer types represents data as variable and continuous values?
Answer
(A)
Analogue computer
4
The following feature are found in the toolbox of CorelDraw application except
Answer
(C)
marque tool
5
The ruler feature in MS Word that is used to indent the second and subsequent lines of a paragraph is
Answer
(B)
hanging indent
6
Advantages of parallel database include the following except
Answer
(D)
huge resources
7
The volume of data that can be sent from one point to another in a given time period is called
Answer
(D)
bandwidth
8
One application of ICT in medicine is
Answer
(B)
computerized axial tomography
9
Figure 2 is an email application interface. Use it to answer questions 15 and 16.
New messages received are save in the part labelled
Answer
(A)
II
10
Figure 2 is an email application interface. Use it to answer questions 15 and 16.
To send an e-mail, the user must click on the part labelled
Answer
(B)
I
11
Computer malware is detected by
Answer
(C)
antivirus
12
When performing computer recovery operations after a system crash, the startup disk is used to
Answer
(D)
recover the system disk from an image file
13
The speed of access to files in a random access file compared to other file organization methods is
Answer
(C)
relatively fast.
14
Which of the following devices is needed by a technician for protection against electrostatic discharge?
Answer
(B)
Wrist strap
15
Figure 3 is a Microsoft Excel Worksheet. Use it to answer questions 20 and 21.
A
B
C
D
E
1
IDENTICATION NUMBER
BASIC SALARY (N)
TOTAL ALLOWANCE (N)
TOTAL DEDUCTION (N)
NET SALARY (N)
2
WASC/LPT/001
800000
60000
40000
820000
3
WASC/LPT/002
700000
40000
20000
720000
4
WASC/LPT/003
300000
10000
5000
305000
5
WASC/LPT/004
400000
20000
10000
410000
Figure 3
What formula will correctly display the total number of individuals involved in the computation as shown in Figure 3?
Answer
(C)
=COUNTA(A2:A5)
16
Figure 3 is a Microsoft Excel Worksheet. Use it to answer questions 20 and 21.
A
B
C
D
E
1
IDENTICATION NUMBER
BASIC SALARY (N)
TOTAL ALLOWANCE (N)
TOTAL DEDUCTION (N)
NET SALARY (N)
2
WASC/LPT/001
800000
60000
40000
820000
3
WASC/LPT/002
700000
40000
20000
720000
4
WASC/LPT/003
300000
10000
5000
305000
5
WASC/LPT/004
400000
20000
10000
410000
Figure 3
What formula will calculate the total number of individuals who earn less than ₦500,000 from the table as shown in Figure 3?
Answer
(D)
=COUNTIF(E2:E5,
17
Figure 4 is an entity relationship diagram in MS Access. Use it to answer questions 22 and 23.
How many entity are listed in Figure 4?
Answer
(D)
5
18
Figure 4 is an entity relationship diagram in MS Access. Use it to answer questions 22 and 23.
What kind of relationship exists between users and products as shown in Figure 4?
Answer
(A)
One-to-many
19
Database Administrator is a professional who
Answer
(B)
designs, implements and maintains a database
20
The aim of administering questionaire is to collect
Answer
(A)
data
21
A pointing device that controls cursor movement on the screen is
Answer
(A)
trackball
22
The information processing stage that produces detailed evaluation of data is
Answer
(C)
analysis
23
A digital platform for the delivery of public sector information and seminar to citizens is called
Answer
(D)
e-government
24
The following precautionary measures are taken against virus infection except
Answer
(A)
downloading e-mail and attachment before scanning it
25
Artificial intelligence is a feature of
Answer
(A)
fifth generation computers
26
Macromedia Dreamweaver application is used for
Answer
(D)
web design
27
People who use cathode ray tube monitor without antiglare screen are susceptible to
Answer
(A)
blurred vision
28
Figure 5 is an MS PowerPoint application interface. The part used to apply motion effect to different objects of a slide is labelled
Answer
(C)
II
29
Use Table 1 to answer questions 35 and 36.
Table 1: TableStudent
Reg No
House
Age
18/001
Yellow
14
18/002
Blue
15
18/003
Yellow
15
Columns 2 and 3 in Table 1 cannot be used as primary key because both fields contain
Answer
(B)
duplicate values
30
Use Table 1 to answer questions 35 and 36.
Table 1: TableStudent
Reg No
House
Age
18/001
Yellow
14
18/002
Blue
15
18/003
Yellow
15
The attributes in Table 1 are
Answer
(C)
Reg. No, House, Age
31
Computer ethical practises include the following except
Answer
(D)
use of other people’s computer without due permission
32
The process of drawing inference from a piece of information is called
Answer
(A)
interpretation
33
A computer system under use was found to be unusually slow, freezes often and very dusty. What is needed to correct this problem?
Answer
(D)
Perform maintenance procedure
34
The equipment shown in Figure 1 is used for
Answer
(D)
radio transmission
35
Use the information below to answer questions 13 and 14.
A student in the school hostel was able to upload some personal details on the school portal via the school's WiFi .
The ISP and the hostel are both domiciled in the school premises.