Waec Physics Specimen May/June 2019
QUESTION 1
1. Pendulum Bob;
2. Retort stand and clamp;
3. Thread;
4. Stopwatch/clock;
5. Metre rule.
6. Split cork
www.waeclesson.blogspot.com
www.waeclesson.blogspot.com
QUESTION 2
1. Ray box with illuminated object(cross wire);
2. Convex lens(f = 15cm)
3. Screen;
4. Metre rule;
5. Lens holder. www.waeclesson.blogspot.com
QUESTION 3
1. Battery
2. Dry cells(1 pair = 2×1.5v);
3. Voltmeter www.waeclesson.blogspot.com
4. Resistance box R
5. Resistor R = 2 ohms
6. Key
7. Seven connecting wires.
Waec Past Questions And Answers
WAEC Past Questions And Answers . WAEC e-learning . WAEC News . WAEC lessons . WAEC timetable . WAEC results. JAMB Past Questions And Answers . JAMB lessons
2019-04-14
2019-04-11
Waec Data Processing Part 2,Essay May/June 2014 Answers
Waec Data Processing Part 2,Essay May/June 2014 Answers
1.
a.
i.computer virus is a software/program that duplicates itself and interferes with the normal functioning of the computer system. ii.sources of computer viruses :
- Infected removable storage devices, opening/downloading infected webpages/links from the internet and connecting the computer to an infected network.
iii.ways of preventing computer virus infection :
use of anti-virus, run anti virus scan on removable media and not opening unknown or suspicious files.
b.
i. function of the input unit:
for entering/capturing/feeding data/information into the computer.
ii.function of the memory unit :
serving as the medium for the storage of data/information in the computer system.
.
c.
i. example of an input unit is the keyboard,mouse,joystick,light pen
ii. example of the memory unit is the Random Access Memory (RAM),ROM,hard disk
2.
a.
i. word processing applications :
Microsoft Word, Word Perfect, Open Office writer, Libra Office Writer and Word Stare.
ii. difference between save as and save :
while the Save command is used to save an already existing document, the Save AS command was used to save a new document. It was also used to rename a saved file or duplicate a saved file in another location.
b.
i. ctrl + shift + +
will change characters to superscripts and superscripts to normal characters.
ii. ctrl + E
will centre align/centralize text or would remove centre alignment on text.
c.
i. measures that the secretary should take in order not have medicalproblem:
– covering the monitor with anti-glae screen protector, raising the monitor to her eye level and stretching her legs by walking round at intervals.
ii.health related challenges that the secretary is likely to face :
– back ache, neck ache
3.a.
S/N COMPUTER PROFESSIONAL COMPUTER USER
1 Has undergone a course of study/training and is certificated
Not certificated
2 Is a member of a Computer Professional organization
Is not a member of any professional Organization
3b.
S/N COMPUTER PROFESSIONAL Function
1 Database Administrator
Creates, updates and manages databases
Controls and implements database security, database recovery and control
2 Systems Analyst
Carries out feasibility studies on systems and systems design
Recommends systems specification to the Programmer.
Liaise between the user and the Programmer
3 Programmer
Writes codes/instructions for the computer
3 Network Administrator
Sets up, oversees and coordinates the smooth functioning of the computer Network.
Provides network support services to the users
4 Website Developers/Designers/Administrator
Designs, develops, updates and maintain Websites. He is also responsible for website security
5 Computer Engineer
Provides Hardware specifications
Designs and develop systems programs
Computer troubleshooting
6 Computer Hardware Technician
Maintenance/repair of computers
Upgrading of computers
Setting up/installations of computers
7 Data Processing Manager
Plans, organizes, coordinates and reviews the activities of data processing staff
3c.
safety measures to be taken when working in a computer laboratory:
use of soft and dry cleaning materials, maintaining proper sitting position, provision of adequate ventilation, proper shut down of the computer system, avoiding eating and drinking in the Laboratory and maintaining a dust free environment.
4.
(a)(i), Database Management Systems :
Microsoft Access, SQL Server, My SQL, Dbase and Oracle.
(ii) ways of ensuring unauthorized access to the stored data :
use of passwords and Data coding/encryption.
(iii), advantages of networking all the computers in the various departments of the hospital :
– to promote file sharing and information distribution within the hospital, to enhance easy access to patients’ records, to enhance easy update of patients’ records, to ensure the overall efficiency of the hospital’s management.
b.The network type that can be implemented in the hospital is :
Local Area Network(LAN).
c.differences between Graphical User Interface and Command Line Interface :
S/N GRAPHICAL USER INTERFACE COMMAND LINE INTERFACE
1 Makes use of Windows, Icons, Menus, Pointer (WIMP)
Makes use of commands
2 It is user friendly and interactive
It requires the user to memorize the commands
3. Makes use of other input devices
Makes use of only the keyboard
2019-04-10
Waec Data Processing Paper 2, Essay May/June 2014 Questions
Waec Data Processing Paper 2, Essay May/June 2014 Questions
1.
a.
i. What is a computer virus?
ii.Mention three sources of computer viruses
iii. List two ways of preventing computer virus infection.
b. State one function each of the following units of a computer:
i. input unit;
ii. memory unit.
c. Give one example each of the following:
i. Input unit;
ii. Memory unit.
2.
a.
i. Give two examples of a word processing application.
ii. Distinguish between the “Save” and “Save As” commands
b. State the function of the following key combination:
i. Ctrl + shift + +
ii. Ctrl + E
c. A college secretary who is typing the school’s examination questions sits all day in front of a Cathode ray Tube (CRT) monitor which is positioned below her eye level.
i. Mention two measures that the secretary should take in order not to have a medical problem.
ii. Identify two health related challenges that the secretary is likely to face.
3.
a. State one difference between a computer professional and a computer user.
b. (i) List four Computer Professionals.
(ii) State one function each of the professionals listed in 3(b) (i) above.
c. Mention four safety measures to be taken when working in a computer laboratory.
4.
a. A general hospital decides to computerize the records in all its departments.
i.State one database management system that can be used for this project
ii.List two ways of preventing unauthorized access to the stored data
ii. List two advantages of networking all the computers in the various departments of the hospital.
b. State the type of network that can be implemented in such a hospital.
c. State one difference between a graphical user interface and a command line interface.
Waec Data Processing Paper 2, Essay May/June 2015 Answers
Waec Data Processing Paper 2, Essay May/June 2015 Answers
1.
(a)
(i) Operating system is a suite/set(collection) of programs/software that
controls and coordinates/manages the hardware and software of a computer system.
OR
A set of programs that act as interface between the user and the computer (Hardware & Software)
OR
A set of programs that controls and manages computer resources/components and provides other useful services.
[Candidate’s response must include programs/software and any other keyword]
(ii) functions of operating system
1. File management
2. Storage management
3. Input-Output/peripheral management
4. Serves as an interface between the user and the computer/Hardware & Software
1. Protects the system from errors and failures
2. Access control/Security
3. Processor Management
4. Booting/starting up the computer
5. File Management
6. Resource Management
7. Task/Process Management
8. Provides virtual machine
(iii) Differences between operating system and application software include:
S/N Operating system Application software
1. Controls the functioning of the computer/management of computer resources/system software
Performs specific task(s)
2.It is independent of Application Software/Does not depend on the application software
Depends on the operating system to operate
3. Can boot the computer
Cannot boot the computer
4. Provides services to computer
Provides services to the user
(b) steps involved in passwording a document in a word processing package
1. From the Save As dialog box, click on Tools
2. Click on General/Security option
3. Type in the password and click ok , Retype the password and click ok
OR
1. Click on file, click on Info
2. Click on Protect document, Encrypt with password
3. Type in the password and click ok , Retype the password and click ok
2.
(a)
i. Database is an organized, collection of related data.
OR
A set of data organized in a structured manner
OR
An organized, collection of similar/related data/information for easy search and retrieval
ii. Database management system is a set of programs that enables the user to
store , modify and extract information from a database.
OR
A software that manages the database.
OR
Program that provides users with the tools to add, delete , access, modify and
analyse stored data in one location.
OR
Software to create , manipulate control and retrieve data stored in database
(b) Functions of a database management system are:
1. Redundancy control/Minimizes Data Repetition
2. Easy access and retrieval of data
3. Provision for backup and recovery
4. Maintenance of data integrity
5. Create database
6. User access control/security/protection of data
7. Data manipulation
8. Data Storage Management
9. Concurrence/ Multi user Access control
10. Data transformation/ modification/editing
11. Provision of Data Access Language and Application programming interface
12. Transaction Management
13. Data Dictionary Management
14. Provides Database Communication interface
15. Report generation/presentation/output/formatting
(c) ways through which data can be destroyed
1. Overwriting an existing file
2. Hardware failure
3. Virus attack/Spyware/Malware/Malicious Software
4. Fire outbreak
5. Power failure
6. Software malfunction
7. Accidental/mistaken/unintentional deletion by user/Human error
8. Intentional deletion by user
9. Natural disaster
10. Exposure to Magnetic field
11. Physical/Mechanical damages to hard drive
12. Theft of Computer
(d) precautionary measures to prevent data loss.
1. Power backup
2. Data backup/safe data
3. Proper shut down of computer
4. Use of anti-virus software and network firewalls/anti-spyware/anti-malware
5. Regular defragmentation
6. Encryption
7. User education
8. Avoid physical/mechanical contact
9. Alert/warning before deletion
10. Labelling of storage devices
11. Avoid water/liquid spillage
12. Physical access control/restriction to computer
13. Access control mechanism/PIN/Password
14. Keep storage devices from magnetic substances/objects
15. Avoid removing storage devices while in use
16. Avoid movement of desktop computers while in operation/use
3.
(a) i) Application package is a program/software designed to perform tasks
(General/Specific)
OR
A complete computer/ program for solving problems .
OR
A computer program/software pre-packaged for sale/ on the shell software
(ii) use each of any four application packages:
Application Function/Uses:
MS Word, WordPad, Note Pad, WordPerfect, Writer
Used for word processing
MS Excel, Calc, Lotus 1-2-3, Quatro Pro
Used for spreadsheet, calculation and analysis
CorelDraw, Paint, Photoshop, PageMaker, Corel Graphics
Used for graphic works
FrontPage, Publisher, Dreamweaver, Cold fusion
Used for web design
MS Access, Oracle, Postgresql , Fox pro, Base, Dbase(Db) i-iv, Ingress, Sybase, My SQL
Used for database management
MS Outlook, Outlook express, MS Exchange, Sendmail
Used for email management
MS PowerPoint, Impress, Prezi, Harvard Graphics.
Used for presentation of seminar and lecture.
Maths, MATLAB,SPSS, Mintab,
Create and edit mathematical formulae/statistical Analysis
Internet Explorer, Mozilla Firefox, Opera Mini, Chrome, UCB, Netscape, Mozaic, Netsurf, Safari
Internet/Web browsers
(b) benefits of a presentation package:
Easy to create colourful and attractive design/presentation
Easy to convey messages to the audience
Easy to present and maintain eye contact with large audience
Enhances the assimilation of information
It makes the presentation interesting
It supports multimedia
To add/ create slides effects
Useful for developing speaker interaction
It supports Object Linking and Embedding (OLE)
It engages multiple learning styles
It improves audience focus
It summarizes complex topics and ideas into briefs and highlights
It supports easy way to organize ideas and information
Presentation in the absence of the speaker
(c) guidelines for creating a good MS PowerPoint presentation:
Font size should be such that the text is readable from the back of the room/by all
viewers
Message/Points should be brief/concise and precise/ straight to the point
Maintain consistent use of colour on all slides
Avoid too many texts on a slide
Contrast text colour and backgrounds
Transitions and animations/sound should be used sparingly and consistently to
avoid distractions
Add images to compliment messages and not to decorate slides
Use font size and type consistently on all slides
Always express a take home message for your audience
Create an outline for the presentation
4.
(a)
(i) Data security is the protection /safety of data from destruction , corruption or
unauthorized access.
(ii) Data risk assessment is the process of determining/identifying the level of security of stored data
OR
Data risk assessment is the process of determining the safety of stored data
OR
The process of evaluating/measuring the potential risks of data
(b)
(i) Access control is a mechanism put in place to allow users have different levels of access to the database. OR
Access control is a process that allows users to have resources that they are authorised to use. OR
Access control is a mechanism to control data that is accessible to given users
(ii) access control methods in database security:
Username and Password
Role based Access control
Mandatory Access Control
Rule Based Access Control
Discretionary Access Control
Organisation Based Access Control
Responsibility Based Access Control
Identity Based Access Control
Authentication
Biometric verification/Facial Recognition/Voice Recognition/Eyes/Iris/Retina Recognition/Finger Print Recognition
Physical control/Use of Lock/Burglary Proof/Metal Protector
Personal Identification number (PIN)
(c) roles of a database administrator:
Maintaining users
Backup database
Managing data security and privacy
Modifying/editing/updating the database structure
Managing data integrity
Monitoring and optimizing the performance of the database
Database recovery
Generation of reports/outputs
Installs, Configures and Create Database
Creating Users/ ID (Credentials)
Deleting Users
5.
(a) Step 1- Launch the internet browser and Type www.mybooks.com in the address bar.
Step 2 - Click on “go” or press the “Enter” key.
Step 3 - Type Price of W,X,Y, Z, and M respectively in the search box to search for the books and their prices
OR
Scroll through lists of books and their prices
OR
Click on icon that shows list of books and prices
(b)
Steps:
Launch MS Excel
Enter “Name of Book” “ Book Price $”, “Book Price N” in any row respectively
Enter/Type the book names in cells under the “Name of Book”
Enter/Type prices in dollars in cells under “ Book Price $”,
Click on the cell under “Book Price N”
Type the formula to multiply dollar price with 120.
[ e.g. “=C2*120” OR
“=Price of Books in $ *120” and press the “Enter” key.]
Copy the formula to other cells under “Book Price N”/ Repeat step (v) for all books/ Press the fill handle of the cell in (v) above, and drag down to other books.
Click on File, Save As/Ctrl+ S /F12,
Type “Prices of Books” as File Name
Press Enter/Click on Save.
(c) Steps:
Launch email / Open email account and Click on “Compose/New message
In the “To” bar/box/field, type myfather@yahoo.com .”
In the “Subject” bar/box/field, type “Prices of books”
Click on “attach files/ attachment” to attach
Browse for the saved file “prices of books.xls”
Click on “attach files” to attach the file
Click on “Send” to send your mail.
OR
Click on File -
Select share -
Click on E-Mail -
Select send as attachment -
Type myfather@yahoo.com -
Click on send -
OR
Right click on the file icon -
Select send to -
Click on mail recipient -
Type myfather@yahoo.com -
Click on send -
OR
Click in File -
Select save & send -
Click on send using E-Mail -
Click send as attachment -
Type myfather@yahoo.com -
Click on send -
6.
(a)
Step1 - Click on the start button, “All Programs/Programs.”, Click on Microsoft Word/ Launch Ms Word/ Type WinWord in Run Dialog box on the Start-up Menu and Click on “Blank/New document.
Step 2- On Page Layout, click on Orientation , click on Portrait
OR
File, click on Page Setup click on Margin click on Orientation click on Portrait
Step 3 - On Page Layout, click on Size click on A4
OR
File, click on Page Setup click on Paper click on Paper Size click on A4
Step 4 - Type the report as provided using the keyboard.
bi) Begin the second and third sentences in new paragraphs:
Step 1- Place the cursor at the end of the first sentence and press the enter key.
Step 2- Place the cursor at the end of the second sentence and press the enter key
bii) Write the first sentence in capital letters, underline it and bold it;
Step 1- Highlight the first sentence ,
Step 2 - On the “Home Tab”, Select UPPER CASE on “change case” icon/ Press
Shift+F3 (Twice )
Step 3 - click on “underline” (Ctrl + U),
Step 4 - Click on “bold” (Ctrl + B)
biii) Begin the first letter of a sentence with capital letters:
At the beginning of the sentence, press shift + the first letter
OR
Press “Caps Lock”, type the first letter and press Caps Lock again” and continue typing
OR
Highlight the first letter of the sentence. On the menu bar, select “change case”
OR
The first letter will be changed automatically/by default after pressing the space bar.
OR
Press shift + the letter or press “Caps Lock” + the letter and press Caps Lock again”
biv) Represent the student’s observation in a table with three columns under the headings: Serial Number, Type of Vehicle, Number of vehicle:
On the “Insert” Tab, click on “Table” / Insert Table , Specify 3 columns.
In the first row, Type “Serial Number”, “Type of Vehicle” and “Number of Vehicle” accordingly in consecutive cells
OR
On the “Insert” Tab, click on “Table” ,Draw Table ,Draw table with 3 columns.
In the first row, Type “Serial Number”, “Type of Vehicle” and “Number of Vehicle” accordingly in consecutive cells
OR
Click on the table menu à“Insert” / click onTable ,Specify 3 columns.
In the first row, Type “Serial Number”, “Type of Vehicle” and “Number of Vehicle” accordingly in consecutive cells
bv) Merge the first two cells of the last row of the table, type “Total” and give the total number of vehicles observed in the column for number of vehicles:
Highlight the first two cells of the last row , Right-click on the highlighted cells , select “merge cells” from the pop-up menu. Type “Total”.
OR
Highlight the first two cells of the last row , Click on Table Tools Tab, Layout ,
select “merge cells” icon ,Type “Total”.
OR
Click on table tools , Design Tab ,Click on Eraser and erase the horizontal line to merge the cells .
OR
Select Eraser Tool from Tables and Borders bar , and click on the line joining the two cells.
bvi bvii) Save the document with the name “vehicular traffic”:
File click “Save As ” dialog box ,Type the filename “vehicular traffic” and press “Save ” or “enter ”
OR
Ctrl+ S or F12 , Type the filename “vehicular traffic” and press “Save” or “enter”
bviii) Print the document with the name “vehicular traffic” :
File -- Click on Print/Ctrl+ P -- and select the appropriate printer, then press “enter” or “OK”.
Waec Data Processing Paper 2,Essay May/June 2015 Questions
Waec Data Processing Paper 2,Essay May/June 2015 Questions
1.
a.
(i) Define an operating system
(ii) State two functions of an operating system
(iii) List two differences between an operating system and application software
b. Starting from the Save As dialogue box, outline the steps involved in passwording a document in a word processing package.
2.
a. Define the following
(i)Database (ii)Database Management System
b. Mention three functions of a database management system
c. Mention two ways through which data can be destroyed
d. State three precautionary measures to prevent data loss.
3.
a.
(i) Define application package
(ii) State one use each of any four application packages
b. List two benefits of a presentation package.
c. Outline three guidelines for creating a good MS PowerPoint presentation
4.
a. Define:
(i) Data security (ii)Data risk assessment
b. (i) Explain the term access control in database security
(ii) List two access control methods in database security
c. State three roles of a database administrator.
5.
Given an internet connected computer, outline a step by step procedure for carrying out the following operations:
a. how to log on to www.mybooks.com and obtain the prices of books W, X, Y, Z and M.
b. how to tabulate the prices in a worksheet, showing the prices in dollars and the naira equivalent, for each book and save the workbook as “Prices of Books”.
Assume that the prices of the books are given in dollars, [use $1.00 = N120.00]
c. how to send the workbook in 5(b) as an attachment to your father’s email address ( myfather@yahoo.com ) with the subject “Prices of Books”.
6.
A student was asked to record the type of vehicles that entered the school compound through the school’s main gate on a Monday morning. The passage below is an excerpt from the student’s report on the assignment.
“Report on the vehicular traffic at the gate on Monday. 1. Introduction: I was directed by the school principal to sit at the main gate and record the type and number of vehicles that passed through the gate on Monday morning. 2. Observation: I arrived the gate at about 8.00 am and left at 12 noon. During this period, I made the following observations: car, bus, bus, car, car, lorry, motorcycle, bus, bus, car, car, car, lorry, motorcycle, tricycle, motorcycle, car, tricycle, motorcycle, bus, bus” .
a.
Beginning from the desktop, outline a step by step procedure of how to type the passage in MS Word using A4 paper size and portrait orientation.
b. State the procedure for carrying out the following operations in the passage:
i) Begin the second and third sentences in new paragraphs;
ii) Write the first sentence in capital letters, underline it and bold it;
iii) Begin the first letter of a sentence with capital letters;
iv) Represent the student’s observation in a table with three columns under the headings: Serial Number, Type of Vehicle, Number of vehicle.
v) Merge the first two cells of the last row of the table, type “Total” and give the total number of vehicles observed in the column for number of vehicles.
vi) Save the document
vii) Merge the first two cells of the last row of the table, type “Total” and give the total number of vehicles observed in the column for number of vehicles.
viii)Save the document with the name “vehicular traffic”;
ix)Print the document with the name “vehicular traffic”;
x)Print the document.
Waec Data Processing Paper 2,Essay May/June 2016 Answers
Waec Data Processing Paper 2,Essay May/June 2016 Answers
1.
(a) Data handling is the process/way of ensuring that data is obtained, stored, archived or disposed in a manner that retains its integrity/in a secured manner .
OR
Data handling is basically the process/way of imputing and storing data in a computer. The Data is then processed into information
(b) There are two ways of handling data which are:
(i) Electronic method : This is the use of electronic systems such as Computers, storage media like video tape, CD, DVD, Memory Cards and other electronic devices to obtain, store, archive, share or dispose data.
(ii) Non-electronic/Manual method : This involves the use of paper files, journals, laboratory notebooks, human effects and other non-electronic means to store or share data.
(c) Factors to be considered when handling data electronically
1. Data Integrity
2. Regular update of data
3. Validation of data
4. Security of data/Encryption
5. Type of Data
6. Type of storage to be used
7. Data volume/Size
8. Access Control
9. Regular Anti-Virus Update
10. Limit Physical access to storage media
11. Regular Backups
12. Ensure Data Recoverability
13. Login/Password
14. Record Date and Time
15. Power Supply
2.
(a) Information processing is the process of acquiring/obtaining/collecting/gathering/retrieving , manipulating/handling/analysing , recording/storing and
presenting/display/dissemination of information.
OR
Information processing refers to the manipulation of digitized Information by Computers and other digital electronic equipment.
(b) Steps involved in Information processing are:
(i) Collation of Information
(ii) Organization of Information
(iii) Analysis of Information
(iv) Interpretation of Information
(c) Advantages of using Computer for Information processing are:
1. Efficiency
2. Automation
3. Reliability
4. Volume/Storage
5. High speed
6. Accuracy
7. Security
8. Sharing of Information/Sharing of Resources
9. Economical
10. Lower overall cost
11. Versatility
12. Service Improvement
13. Easy retrieval
(d) Disadvantages of using Computers for Information processing
1. High initial investment cost
2. Loss of jobs due to Computerization
3. Requires specialized personnel
4. Extra cost of retraining of staff
5. Virus/Hackers susceptibility
6. Face-to-Face Interaction among staff may be reduced
7. Prone to unauthorized access
8. Overwriting/Loss of Data
9. Power dependent
10. System failure/ system malfunctioning
3.
(a)
(i)
Information transmission is the process of sending Information from one point to another through a channel.
(ii) Example: Printing of document; classroom instruction, receiving radio signals; DSTV signals, Telegraph, GSM, Photography, Facsimile, Town Crying, Smoke Message, Use of Birds, Story Telling, Signs/Signals, Internet, Satellite signals, Blowing Horns, Drum Beating, Fire Lighting etc.
(b)
(i) DOS, OS 2, PC-DOS, Palm-OS.
(ii) MS Windows, Mac-OS, Linux
(iii) Xenix, Zenix, Unix, Linux, Mac OS, VMS, Mainframe OS
(c) Features of a Graphical User Interface (GUI)
(i) Windows
(ii) Icons
(iii) Menus
(iv) Pointing device (mouse)
4.
(a) Qualities of good Computer professional:
1. Multitasking ability
2. Adaptability
3. Analytical skills
4. Attention to detail/Accuracy
5. Commitment to learning/ Abreast with current trends
6. Communication skills
7. Problem-solving/Troubleshooting capabilities
8. Competence
9. Technical Writing Skills
10. Aptitude for Mathematics
11. Ability to Memorise
12. Certification
13. Reliability
14. Disciplined
15. Trustworthy
(b) Computer Professional Bodies in Nigeria:
1. Computer Professionals Registration Council of Nigeria (CPN)
2. Nigeria Computer Society (NCS)
3. The Institute of Software Practitioners of Nigeria (ISPON)
4. Information Technology Industry Association of Nigeria (ITAN)
5. Nigeria Internet Group (NIG)
6. Internet Service Providers Association of Nigeria (ISPAN)
(c) (i) Wi-Fi - Wireless Fidelity
(ii) GUI - Graphical User Interface.
5.
(a)
(i)
=SUM(D2,D3,D4,D5,D6,D7,D8,D9,D10,D11)
OR
=(D2+D3+D4+D5+D6+D7+D8+D9+D10+D11)
OR
=SUM (D2:D11)
OR
=SUM (D11:D2)
(ii)
=AVERAGE (D4:G4)
OR
= (D4+E4+F4+G4)/4
OR
=AVERAGE (D4, E4,F4,G4)
OR
=SUM (D4:G4)/4
OR
=SUM(D4,E4,F4,G4)/4
(iii)
Max Function.
OR
=MAX(E2:E11)
(iv)
Click on cell H8
Type “=SUM(D8:G8)”
Press “Enter”
OR
Click on D8
Hold down the Mouse and stop at H8/ Highlight D8 to H8
Click on Summation icon on the Menu Bar
OR
Click on H8
Type “=SUM (D8, E8,F8,G8)
Press “Enter”
OR
Click on H8
Type =SUM (D8:G8)
Press Enter
(v)
=IF(I11> 59, “PASSED”, “FAILED”)
OR
=IF(I11>= 60, “PASSED”, “FAILED”)
(b)
(i) MS PowerPoint
(ii) Presentation
(iii) Double-click on the icon
OR
Right-click on the icon
Select open
(iv) Title Slide
(v) Slide Show View Icon/Slide Show Icon/ Slide Show
(vi) F5
(vii)
-Insert Shapes
-Insert Textbox
-Insert WordArt
-Insert Comment
-Insert Video
-Insert Symbols
-Sound
Table
Clipart
Equation
New Slide
Pictures
Header/Footer
Date & Time
Text Box
Smileys etc.
6.
(a)
(i) To Create a folder on the desktop
-Right-click on the desktop and select “New”
-Select “Folder”
(ii) Naming the folder
-Click on the default name of the new folder
-Type-in the name, Press enter or click elsewhere on the desktop
OR
Right-click on the folder icon and select “Rename”
-Type-in the New Name
OR
Select the folder, Click on the Default Name/New Folder,
Type New Name, Press Enter.
(iii) Sending a file to the new folder
-Double-click on “My Documents” folder icon
-Right-click on the desired file icon and select “copy”
-Open the folder created
-Paste the copied file
OR
Select the file in My Documents Folder,
Drag it to the created Folder on the Desktop,
Drop/Release the Mouse button
OR
Open the File in My Document ,
Click on File, Save As,
Select Desktop, Select Target Folder,
Click on Save.
(iv) Renaming the folder
-Right-click on the folder icon and select “Rename”
-Type-in the new name “RESULTS”
OR
Select the folder, Click on the Default Name/New Folder,
Type “RESULTS” as the New Name, Press Enter.
(b)
(i)
(I) Date of Birth---Date/Time
(II) Fees-------------Currency
(ii)
(I) –create a blank database and give it a name
-click on the “create” tab on the menu bar and select “table design/design
view”
-Type the field names and set the data types as required. Save the file
(II) –select the Mat.No field
-Right-click on the field and select primary key
OR
-Select the Mat.No field
-click on the primary key icon on the menu bar
(III) -click on the FullName field
-set the field size to 50
OR
Click on the FullName Field, Go to the Field Properties,
Change the Field Size from 255 to 50
Waec Data Processing Paper 2, Essay May/June 2016 Questions
Waec Data Processing Paper 2, Essay May/June 2016 Questions
1.
a) Describe datahandling .
b) Explain two ways of handling data.
c) State four factors to consider when handling data electronically.
d) Starting from the Save As dialogue box, outline the steps involved in passwording a document in a word processing package
2.
a. Define information processing.
b. State four steps involved in information processing.
c. Mention three advantages of using computers for information processing.
d. Highlight three disadvantages of using computers for information processing
3.
(a)
(i) With the aid of a simple diagram, explain information processing.
(ii) Give one example of information transmission.
(b) Give one example of each of the following:
(i) single user, single tasking operating system;
(ii) single user, multitasking operating system;
(iii) multi user operating system.
(c) List four features of a Graphical User Interface
4.
a. Mention four qualities of a good computer professional.
b. List four computer professional bodies in Nigeria.
c. Write the full meaning of the following:
(i) WiFi
(ii) GUI
5.
(a) Use the information in the spreadsheet below to answer questions 5(a) i-v
(i) Write the formula to calculate the total score in Mathematics.
(ii) Write two spreadsheet formulas to calculate Paul’s average score in the four
subjects.
(iii) What spreadsheet function can be used to determine the highest score in English?
(iv) Outline the procedure for calculating Vera’s total score in all the subjects and give the result in cell H8.
(v) If the minimum pass mark is an average score of 60, write a formula to determine if Etta passed or failed.
(b)Use the diagram below to answer questions 5(b) i-vii
(i) What is the name of the application shown in the diagram?
(ii) State one use of the application mentioned in 5 (b) (i).
(iii) Outline the procedure to launch the application from its shortcut on the desktop.
(iv) After launching the application, what is the name of the slide that appears by default?
(v) Identify the part labeled I.
(vi) Write the keyboard shortcut that would also perform the function of the part labeled I.
(vii) Mention three functions that can be performed by the insert button
6.
(a)Folders are used for storing files in the computer. List the steps for carrying out the following operations:
(i) creating a folder on the desktop;
(ii) giving name to the folder;
(iii) sending a file from “My Documents” folder into the folder created in 6(a)(i)
(iv) changing the name of the folder in 6 (a) (ii) to “RESULTS”.
The table below shows selected fields and DataTypes in MS Access. Use it to answer questions 6 (b) (i)and 6 (b) (ii).
Field DataTypes
FulName Text
Mat.No Text
Date of Birth *
Fees *
Address Memo
(i) What is the appropriate data type for:
I. Date of Birth Field;
II.Fees Field?
(ii) If MS Access is running, describe the procedure to:
I. create a table with the fields as given above using design view;
II. set the Mat.No Field as the primary key;
III. set the FullName Field to a maximum of 50 characters.
1.
a) Describe datahandling .
b) Explain two ways of handling data.
c) State four factors to consider when handling data electronically.
d) Starting from the Save As dialogue box, outline the steps involved in passwording a document in a word processing package
2.
a. Define information processing.
b. State four steps involved in information processing.
c. Mention three advantages of using computers for information processing.
d. Highlight three disadvantages of using computers for information processing
3.
(a)
(i) With the aid of a simple diagram, explain information processing.
(ii) Give one example of information transmission.
(b) Give one example of each of the following:
(i) single user, single tasking operating system;
(ii) single user, multitasking operating system;
(iii) multi user operating system.
(c) List four features of a Graphical User Interface
4.
a. Mention four qualities of a good computer professional.
b. List four computer professional bodies in Nigeria.
c. Write the full meaning of the following:
(i) WiFi
(ii) GUI
5.
(a) Use the information in the spreadsheet below to answer questions 5(a) i-v
(i) Write the formula to calculate the total score in Mathematics.
(ii) Write two spreadsheet formulas to calculate Paul’s average score in the four
subjects.
(iii) What spreadsheet function can be used to determine the highest score in English?
(iv) Outline the procedure for calculating Vera’s total score in all the subjects and give the result in cell H8.
(v) If the minimum pass mark is an average score of 60, write a formula to determine if Etta passed or failed.
(b)Use the diagram below to answer questions 5(b) i-vii
(i) What is the name of the application shown in the diagram?
(ii) State one use of the application mentioned in 5 (b) (i).
(iii) Outline the procedure to launch the application from its shortcut on the desktop.
(iv) After launching the application, what is the name of the slide that appears by default?
(v) Identify the part labeled I.
(vi) Write the keyboard shortcut that would also perform the function of the part labeled I.
(vii) Mention three functions that can be performed by the insert button
6.
(a)Folders are used for storing files in the computer. List the steps for carrying out the following operations:
(i) creating a folder on the desktop;
(ii) giving name to the folder;
(iii) sending a file from “My Documents” folder into the folder created in 6(a)(i)
(iv) changing the name of the folder in 6 (a) (ii) to “RESULTS”.
The table below shows selected fields and DataTypes in MS Access. Use it to answer questions 6 (b) (i)and 6 (b) (ii).
Field DataTypes
FulName Text
Mat.No Text
Date of Birth *
Fees *
Address Memo
(i) What is the appropriate data type for:
I. Date of Birth Field;
II.Fees Field?
(ii) If MS Access is running, describe the procedure to:
I. create a table with the fields as given above using design view;
II. set the Mat.No Field as the primary key;
III. set the FullName Field to a maximum of 50 characters.
Subscribe to:
Posts (Atom)
Waec Physics Specimen May/June 2019
Waec Physics Specimen May/June 2019 QUESTION 1 1. Pendulum Bob; 2. Retort stand and clamp; 3. Thread; 4. Stopwatch/clock; 5. Metre ru...
-
Waec Data Processing Paper 2, Essay May/June 2014 Questions 1. a. i. What is a computer virus? ii.Mention three sources of computer v...
-
1. The dimensions of momentum are A. MLT B. ML -1 T -1 C. MLT -1 D. ML -1 T http://www.waeclesson.blogspot....
-
Waec Data Processing Part 2,Essay May/June 2014 Answers 1. a. i.computer virus is a software/program that duplicates itself and interf...