Waec Physics Specimen May/June 2019
QUESTION 1
1. Pendulum Bob;
2. Retort stand and clamp;
3. Thread;
4. Stopwatch/clock;
5. Metre rule.
6. Split cork
www.waeclesson.blogspot.com
www.waeclesson.blogspot.com
QUESTION 2
1. Ray box with illuminated object(cross wire);
2. Convex lens(f = 15cm)
3. Screen;
4. Metre rule;
5. Lens holder. www.waeclesson.blogspot.com
QUESTION 3
1. Battery
2. Dry cells(1 pair = 2×1.5v);
3. Voltmeter www.waeclesson.blogspot.com
4. Resistance box R
5. Resistor R = 2 ohms
6. Key
7. Seven connecting wires.
WAEC Past Questions And Answers . WAEC e-learning . WAEC News . WAEC lessons . WAEC timetable . WAEC results. JAMB Past Questions And Answers . JAMB lessons
2019-04-14
2019-04-11
Waec Data Processing Part 2,Essay May/June 2014 Answers
Waec Data Processing Part 2,Essay May/June 2014 Answers
1.
a.
i.computer virus is a software/program that duplicates itself and interferes with the normal functioning of the computer system. ii.sources of computer viruses :
- Infected removable storage devices, opening/downloading infected webpages/links from the internet and connecting the computer to an infected network.
iii.ways of preventing computer virus infection :
use of anti-virus, run anti virus scan on removable media and not opening unknown or suspicious files.
b.
i. function of the input unit:
for entering/capturing/feeding data/information into the computer.
ii.function of the memory unit :
serving as the medium for the storage of data/information in the computer system.
.
c.
i. example of an input unit is the keyboard,mouse,joystick,light pen
ii. example of the memory unit is the Random Access Memory (RAM),ROM,hard disk
2.
a.
i. word processing applications :
Microsoft Word, Word Perfect, Open Office writer, Libra Office Writer and Word Stare.
ii. difference between save as and save :
while the Save command is used to save an already existing document, the Save AS command was used to save a new document. It was also used to rename a saved file or duplicate a saved file in another location.
b.
i. ctrl + shift + +
will change characters to superscripts and superscripts to normal characters.
ii. ctrl + E
will centre align/centralize text or would remove centre alignment on text.
c.
i. measures that the secretary should take in order not have medicalproblem:
– covering the monitor with anti-glae screen protector, raising the monitor to her eye level and stretching her legs by walking round at intervals.
ii.health related challenges that the secretary is likely to face :
– back ache, neck ache
3.a.
S/N COMPUTER PROFESSIONAL COMPUTER USER
1 Has undergone a course of study/training and is certificated
Not certificated
2 Is a member of a Computer Professional organization
Is not a member of any professional Organization
3b.
S/N COMPUTER PROFESSIONAL Function
1 Database Administrator
Creates, updates and manages databases
Controls and implements database security, database recovery and control
2 Systems Analyst
Carries out feasibility studies on systems and systems design
Recommends systems specification to the Programmer.
Liaise between the user and the Programmer
3 Programmer
Writes codes/instructions for the computer
3 Network Administrator
Sets up, oversees and coordinates the smooth functioning of the computer Network.
Provides network support services to the users
4 Website Developers/Designers/Administrator
Designs, develops, updates and maintain Websites. He is also responsible for website security
5 Computer Engineer
Provides Hardware specifications
Designs and develop systems programs
Computer troubleshooting
6 Computer Hardware Technician
Maintenance/repair of computers
Upgrading of computers
Setting up/installations of computers
7 Data Processing Manager
Plans, organizes, coordinates and reviews the activities of data processing staff
3c.
safety measures to be taken when working in a computer laboratory:
use of soft and dry cleaning materials, maintaining proper sitting position, provision of adequate ventilation, proper shut down of the computer system, avoiding eating and drinking in the Laboratory and maintaining a dust free environment.
4.
(a)(i), Database Management Systems :
Microsoft Access, SQL Server, My SQL, Dbase and Oracle.
(ii) ways of ensuring unauthorized access to the stored data :
use of passwords and Data coding/encryption.
(iii), advantages of networking all the computers in the various departments of the hospital :
– to promote file sharing and information distribution within the hospital, to enhance easy access to patients’ records, to enhance easy update of patients’ records, to ensure the overall efficiency of the hospital’s management.
b.The network type that can be implemented in the hospital is :
Local Area Network(LAN).
c.differences between Graphical User Interface and Command Line Interface :
S/N GRAPHICAL USER INTERFACE COMMAND LINE INTERFACE
1 Makes use of Windows, Icons, Menus, Pointer (WIMP)
Makes use of commands
2 It is user friendly and interactive
It requires the user to memorize the commands
3. Makes use of other input devices
Makes use of only the keyboard
2019-04-10
Waec Data Processing Paper 2, Essay May/June 2014 Questions
Waec Data Processing Paper 2, Essay May/June 2014 Questions
1.
a.
i. What is a computer virus?
ii.Mention three sources of computer viruses
iii. List two ways of preventing computer virus infection.
b. State one function each of the following units of a computer:
i. input unit;
ii. memory unit.
c. Give one example each of the following:
i. Input unit;
ii. Memory unit.
2.
a.
i. Give two examples of a word processing application.
ii. Distinguish between the “Save” and “Save As” commands
b. State the function of the following key combination:
i. Ctrl + shift + +
ii. Ctrl + E
c. A college secretary who is typing the school’s examination questions sits all day in front of a Cathode ray Tube (CRT) monitor which is positioned below her eye level.
i. Mention two measures that the secretary should take in order not to have a medical problem.
ii. Identify two health related challenges that the secretary is likely to face.
3.
a. State one difference between a computer professional and a computer user.
b. (i) List four Computer Professionals.
(ii) State one function each of the professionals listed in 3(b) (i) above.
c. Mention four safety measures to be taken when working in a computer laboratory.
4.
a. A general hospital decides to computerize the records in all its departments.
i.State one database management system that can be used for this project
ii.List two ways of preventing unauthorized access to the stored data
ii. List two advantages of networking all the computers in the various departments of the hospital.
b. State the type of network that can be implemented in such a hospital.
c. State one difference between a graphical user interface and a command line interface.
Waec Data Processing Paper 2, Essay May/June 2015 Answers
Waec Data Processing Paper 2, Essay May/June 2015 Answers
1.
(a)
(i) Operating system is a suite/set(collection) of programs/software that
controls and coordinates/manages the hardware and software of a computer system.
OR
A set of programs that act as interface between the user and the computer (Hardware & Software)
OR
A set of programs that controls and manages computer resources/components and provides other useful services.
[Candidate’s response must include programs/software and any other keyword]
(ii) functions of operating system
1. File management
2. Storage management
3. Input-Output/peripheral management
4. Serves as an interface between the user and the computer/Hardware & Software
1. Protects the system from errors and failures
2. Access control/Security
3. Processor Management
4. Booting/starting up the computer
5. File Management
6. Resource Management
7. Task/Process Management
8. Provides virtual machine
(iii) Differences between operating system and application software include:
S/N Operating system Application software
1. Controls the functioning of the computer/management of computer resources/system software
Performs specific task(s)
2.It is independent of Application Software/Does not depend on the application software
Depends on the operating system to operate
3. Can boot the computer
Cannot boot the computer
4. Provides services to computer
Provides services to the user
(b) steps involved in passwording a document in a word processing package
1. From the Save As dialog box, click on Tools
2. Click on General/Security option
3. Type in the password and click ok , Retype the password and click ok
OR
1. Click on file, click on Info
2. Click on Protect document, Encrypt with password
3. Type in the password and click ok , Retype the password and click ok
2.
(a)
i. Database is an organized, collection of related data.
OR
A set of data organized in a structured manner
OR
An organized, collection of similar/related data/information for easy search and retrieval
ii. Database management system is a set of programs that enables the user to
store , modify and extract information from a database.
OR
A software that manages the database.
OR
Program that provides users with the tools to add, delete , access, modify and
analyse stored data in one location.
OR
Software to create , manipulate control and retrieve data stored in database
(b) Functions of a database management system are:
1. Redundancy control/Minimizes Data Repetition
2. Easy access and retrieval of data
3. Provision for backup and recovery
4. Maintenance of data integrity
5. Create database
6. User access control/security/protection of data
7. Data manipulation
8. Data Storage Management
9. Concurrence/ Multi user Access control
10. Data transformation/ modification/editing
11. Provision of Data Access Language and Application programming interface
12. Transaction Management
13. Data Dictionary Management
14. Provides Database Communication interface
15. Report generation/presentation/output/formatting
(c) ways through which data can be destroyed
1. Overwriting an existing file
2. Hardware failure
3. Virus attack/Spyware/Malware/Malicious Software
4. Fire outbreak
5. Power failure
6. Software malfunction
7. Accidental/mistaken/unintentional deletion by user/Human error
8. Intentional deletion by user
9. Natural disaster
10. Exposure to Magnetic field
11. Physical/Mechanical damages to hard drive
12. Theft of Computer
(d) precautionary measures to prevent data loss.
1. Power backup
2. Data backup/safe data
3. Proper shut down of computer
4. Use of anti-virus software and network firewalls/anti-spyware/anti-malware
5. Regular defragmentation
6. Encryption
7. User education
8. Avoid physical/mechanical contact
9. Alert/warning before deletion
10. Labelling of storage devices
11. Avoid water/liquid spillage
12. Physical access control/restriction to computer
13. Access control mechanism/PIN/Password
14. Keep storage devices from magnetic substances/objects
15. Avoid removing storage devices while in use
16. Avoid movement of desktop computers while in operation/use
3.
(a) i) Application package is a program/software designed to perform tasks
(General/Specific)
OR
A complete computer/ program for solving problems .
OR
A computer program/software pre-packaged for sale/ on the shell software
(ii) use each of any four application packages:
Application Function/Uses:
MS Word, WordPad, Note Pad, WordPerfect, Writer
Used for word processing
MS Excel, Calc, Lotus 1-2-3, Quatro Pro
Used for spreadsheet, calculation and analysis
CorelDraw, Paint, Photoshop, PageMaker, Corel Graphics
Used for graphic works
FrontPage, Publisher, Dreamweaver, Cold fusion
Used for web design
MS Access, Oracle, Postgresql , Fox pro, Base, Dbase(Db) i-iv, Ingress, Sybase, My SQL
Used for database management
MS Outlook, Outlook express, MS Exchange, Sendmail
Used for email management
MS PowerPoint, Impress, Prezi, Harvard Graphics.
Used for presentation of seminar and lecture.
Maths, MATLAB,SPSS, Mintab,
Create and edit mathematical formulae/statistical Analysis
Internet Explorer, Mozilla Firefox, Opera Mini, Chrome, UCB, Netscape, Mozaic, Netsurf, Safari
Internet/Web browsers
(b) benefits of a presentation package:
Easy to create colourful and attractive design/presentation
Easy to convey messages to the audience
Easy to present and maintain eye contact with large audience
Enhances the assimilation of information
It makes the presentation interesting
It supports multimedia
To add/ create slides effects
Useful for developing speaker interaction
It supports Object Linking and Embedding (OLE)
It engages multiple learning styles
It improves audience focus
It summarizes complex topics and ideas into briefs and highlights
It supports easy way to organize ideas and information
Presentation in the absence of the speaker
(c) guidelines for creating a good MS PowerPoint presentation:
Font size should be such that the text is readable from the back of the room/by all
viewers
Message/Points should be brief/concise and precise/ straight to the point
Maintain consistent use of colour on all slides
Avoid too many texts on a slide
Contrast text colour and backgrounds
Transitions and animations/sound should be used sparingly and consistently to
avoid distractions
Add images to compliment messages and not to decorate slides
Use font size and type consistently on all slides
Always express a take home message for your audience
Create an outline for the presentation
4.
(a)
(i) Data security is the protection /safety of data from destruction , corruption or
unauthorized access.
(ii) Data risk assessment is the process of determining/identifying the level of security of stored data
OR
Data risk assessment is the process of determining the safety of stored data
OR
The process of evaluating/measuring the potential risks of data
(b)
(i) Access control is a mechanism put in place to allow users have different levels of access to the database. OR
Access control is a process that allows users to have resources that they are authorised to use. OR
Access control is a mechanism to control data that is accessible to given users
(ii) access control methods in database security:
Username and Password
Role based Access control
Mandatory Access Control
Rule Based Access Control
Discretionary Access Control
Organisation Based Access Control
Responsibility Based Access Control
Identity Based Access Control
Authentication
Biometric verification/Facial Recognition/Voice Recognition/Eyes/Iris/Retina Recognition/Finger Print Recognition
Physical control/Use of Lock/Burglary Proof/Metal Protector
Personal Identification number (PIN)
(c) roles of a database administrator:
Maintaining users
Backup database
Managing data security and privacy
Modifying/editing/updating the database structure
Managing data integrity
Monitoring and optimizing the performance of the database
Database recovery
Generation of reports/outputs
Installs, Configures and Create Database
Creating Users/ ID (Credentials)
Deleting Users
5.
(a) Step 1- Launch the internet browser and Type www.mybooks.com in the address bar.
Step 2 - Click on “go” or press the “Enter” key.
Step 3 - Type Price of W,X,Y, Z, and M respectively in the search box to search for the books and their prices
OR
Scroll through lists of books and their prices
OR
Click on icon that shows list of books and prices
(b)
Steps:
Launch MS Excel
Enter “Name of Book” “ Book Price $”, “Book Price N” in any row respectively
Enter/Type the book names in cells under the “Name of Book”
Enter/Type prices in dollars in cells under “ Book Price $”,
Click on the cell under “Book Price N”
Type the formula to multiply dollar price with 120.
[ e.g. “=C2*120” OR
“=Price of Books in $ *120” and press the “Enter” key.]
Copy the formula to other cells under “Book Price N”/ Repeat step (v) for all books/ Press the fill handle of the cell in (v) above, and drag down to other books.
Click on File, Save As/Ctrl+ S /F12,
Type “Prices of Books” as File Name
Press Enter/Click on Save.
(c) Steps:
Launch email / Open email account and Click on “Compose/New message
In the “To” bar/box/field, type myfather@yahoo.com .”
In the “Subject” bar/box/field, type “Prices of books”
Click on “attach files/ attachment” to attach
Browse for the saved file “prices of books.xls”
Click on “attach files” to attach the file
Click on “Send” to send your mail.
OR
Click on File -
Select share -
Click on E-Mail -
Select send as attachment -
Type myfather@yahoo.com -
Click on send -
OR
Right click on the file icon -
Select send to -
Click on mail recipient -
Type myfather@yahoo.com -
Click on send -
OR
Click in File -
Select save & send -
Click on send using E-Mail -
Click send as attachment -
Type myfather@yahoo.com -
Click on send -
6.
(a)
Step1 - Click on the start button, “All Programs/Programs.”, Click on Microsoft Word/ Launch Ms Word/ Type WinWord in Run Dialog box on the Start-up Menu and Click on “Blank/New document.
Step 2- On Page Layout, click on Orientation , click on Portrait
OR
File, click on Page Setup click on Margin click on Orientation click on Portrait
Step 3 - On Page Layout, click on Size click on A4
OR
File, click on Page Setup click on Paper click on Paper Size click on A4
Step 4 - Type the report as provided using the keyboard.
bi) Begin the second and third sentences in new paragraphs:
Step 1- Place the cursor at the end of the first sentence and press the enter key.
Step 2- Place the cursor at the end of the second sentence and press the enter key
bii) Write the first sentence in capital letters, underline it and bold it;
Step 1- Highlight the first sentence ,
Step 2 - On the “Home Tab”, Select UPPER CASE on “change case” icon/ Press
Shift+F3 (Twice )
Step 3 - click on “underline” (Ctrl + U),
Step 4 - Click on “bold” (Ctrl + B)
biii) Begin the first letter of a sentence with capital letters:
At the beginning of the sentence, press shift + the first letter
OR
Press “Caps Lock”, type the first letter and press Caps Lock again” and continue typing
OR
Highlight the first letter of the sentence. On the menu bar, select “change case”
OR
The first letter will be changed automatically/by default after pressing the space bar.
OR
Press shift + the letter or press “Caps Lock” + the letter and press Caps Lock again”
biv) Represent the student’s observation in a table with three columns under the headings: Serial Number, Type of Vehicle, Number of vehicle:
On the “Insert” Tab, click on “Table” / Insert Table , Specify 3 columns.
In the first row, Type “Serial Number”, “Type of Vehicle” and “Number of Vehicle” accordingly in consecutive cells
OR
On the “Insert” Tab, click on “Table” ,Draw Table ,Draw table with 3 columns.
In the first row, Type “Serial Number”, “Type of Vehicle” and “Number of Vehicle” accordingly in consecutive cells
OR
Click on the table menu à“Insert” / click onTable ,Specify 3 columns.
In the first row, Type “Serial Number”, “Type of Vehicle” and “Number of Vehicle” accordingly in consecutive cells
bv) Merge the first two cells of the last row of the table, type “Total” and give the total number of vehicles observed in the column for number of vehicles:
Highlight the first two cells of the last row , Right-click on the highlighted cells , select “merge cells” from the pop-up menu. Type “Total”.
OR
Highlight the first two cells of the last row , Click on Table Tools Tab, Layout ,
select “merge cells” icon ,Type “Total”.
OR
Click on table tools , Design Tab ,Click on Eraser and erase the horizontal line to merge the cells .
OR
Select Eraser Tool from Tables and Borders bar , and click on the line joining the two cells.
bvi bvii) Save the document with the name “vehicular traffic”:
File click “Save As ” dialog box ,Type the filename “vehicular traffic” and press “Save ” or “enter ”
OR
Ctrl+ S or F12 , Type the filename “vehicular traffic” and press “Save” or “enter”
bviii) Print the document with the name “vehicular traffic” :
File -- Click on Print/Ctrl+ P -- and select the appropriate printer, then press “enter” or “OK”.
Waec Data Processing Paper 2,Essay May/June 2015 Questions
Waec Data Processing Paper 2,Essay May/June 2015 Questions
1.
a.
(i) Define an operating system
(ii) State two functions of an operating system
(iii) List two differences between an operating system and application software
b. Starting from the Save As dialogue box, outline the steps involved in passwording a document in a word processing package.
2.
a. Define the following
(i)Database (ii)Database Management System
b. Mention three functions of a database management system
c. Mention two ways through which data can be destroyed
d. State three precautionary measures to prevent data loss.
3.
a.
(i) Define application package
(ii) State one use each of any four application packages
b. List two benefits of a presentation package.
c. Outline three guidelines for creating a good MS PowerPoint presentation
4.
a. Define:
(i) Data security (ii)Data risk assessment
b. (i) Explain the term access control in database security
(ii) List two access control methods in database security
c. State three roles of a database administrator.
5.
Given an internet connected computer, outline a step by step procedure for carrying out the following operations:
a. how to log on to www.mybooks.com and obtain the prices of books W, X, Y, Z and M.
b. how to tabulate the prices in a worksheet, showing the prices in dollars and the naira equivalent, for each book and save the workbook as “Prices of Books”.
Assume that the prices of the books are given in dollars, [use $1.00 = N120.00]
c. how to send the workbook in 5(b) as an attachment to your father’s email address ( myfather@yahoo.com ) with the subject “Prices of Books”.
6.
A student was asked to record the type of vehicles that entered the school compound through the school’s main gate on a Monday morning. The passage below is an excerpt from the student’s report on the assignment.
“Report on the vehicular traffic at the gate on Monday. 1. Introduction: I was directed by the school principal to sit at the main gate and record the type and number of vehicles that passed through the gate on Monday morning. 2. Observation: I arrived the gate at about 8.00 am and left at 12 noon. During this period, I made the following observations: car, bus, bus, car, car, lorry, motorcycle, bus, bus, car, car, car, lorry, motorcycle, tricycle, motorcycle, car, tricycle, motorcycle, bus, bus” .
a.
Beginning from the desktop, outline a step by step procedure of how to type the passage in MS Word using A4 paper size and portrait orientation.
b. State the procedure for carrying out the following operations in the passage:
i) Begin the second and third sentences in new paragraphs;
ii) Write the first sentence in capital letters, underline it and bold it;
iii) Begin the first letter of a sentence with capital letters;
iv) Represent the student’s observation in a table with three columns under the headings: Serial Number, Type of Vehicle, Number of vehicle.
v) Merge the first two cells of the last row of the table, type “Total” and give the total number of vehicles observed in the column for number of vehicles.
vi) Save the document
vii) Merge the first two cells of the last row of the table, type “Total” and give the total number of vehicles observed in the column for number of vehicles.
viii)Save the document with the name “vehicular traffic”;
ix)Print the document with the name “vehicular traffic”;
x)Print the document.
Waec Data Processing Paper 2,Essay May/June 2016 Answers
Waec Data Processing Paper 2,Essay May/June 2016 Answers
1.
(a) Data handling is the process/way of ensuring that data is obtained, stored, archived or disposed in a manner that retains its integrity/in a secured manner .
OR
Data handling is basically the process/way of imputing and storing data in a computer. The Data is then processed into information
(b) There are two ways of handling data which are:
(i) Electronic method : This is the use of electronic systems such as Computers, storage media like video tape, CD, DVD, Memory Cards and other electronic devices to obtain, store, archive, share or dispose data.
(ii) Non-electronic/Manual method : This involves the use of paper files, journals, laboratory notebooks, human effects and other non-electronic means to store or share data.
(c) Factors to be considered when handling data electronically
1. Data Integrity
2. Regular update of data
3. Validation of data
4. Security of data/Encryption
5. Type of Data
6. Type of storage to be used
7. Data volume/Size
8. Access Control
9. Regular Anti-Virus Update
10. Limit Physical access to storage media
11. Regular Backups
12. Ensure Data Recoverability
13. Login/Password
14. Record Date and Time
15. Power Supply
2.
(a) Information processing is the process of acquiring/obtaining/collecting/gathering/retrieving , manipulating/handling/analysing , recording/storing and
presenting/display/dissemination of information.
OR
Information processing refers to the manipulation of digitized Information by Computers and other digital electronic equipment.
(b) Steps involved in Information processing are:
(i) Collation of Information
(ii) Organization of Information
(iii) Analysis of Information
(iv) Interpretation of Information
(c) Advantages of using Computer for Information processing are:
1. Efficiency
2. Automation
3. Reliability
4. Volume/Storage
5. High speed
6. Accuracy
7. Security
8. Sharing of Information/Sharing of Resources
9. Economical
10. Lower overall cost
11. Versatility
12. Service Improvement
13. Easy retrieval
(d) Disadvantages of using Computers for Information processing
1. High initial investment cost
2. Loss of jobs due to Computerization
3. Requires specialized personnel
4. Extra cost of retraining of staff
5. Virus/Hackers susceptibility
6. Face-to-Face Interaction among staff may be reduced
7. Prone to unauthorized access
8. Overwriting/Loss of Data
9. Power dependent
10. System failure/ system malfunctioning
3.
(a)
(i)
Information transmission is the process of sending Information from one point to another through a channel.
(ii) Example: Printing of document; classroom instruction, receiving radio signals; DSTV signals, Telegraph, GSM, Photography, Facsimile, Town Crying, Smoke Message, Use of Birds, Story Telling, Signs/Signals, Internet, Satellite signals, Blowing Horns, Drum Beating, Fire Lighting etc.
(b)
(i) DOS, OS 2, PC-DOS, Palm-OS.
(ii) MS Windows, Mac-OS, Linux
(iii) Xenix, Zenix, Unix, Linux, Mac OS, VMS, Mainframe OS
(c) Features of a Graphical User Interface (GUI)
(i) Windows
(ii) Icons
(iii) Menus
(iv) Pointing device (mouse)
4.
(a) Qualities of good Computer professional:
1. Multitasking ability
2. Adaptability
3. Analytical skills
4. Attention to detail/Accuracy
5. Commitment to learning/ Abreast with current trends
6. Communication skills
7. Problem-solving/Troubleshooting capabilities
8. Competence
9. Technical Writing Skills
10. Aptitude for Mathematics
11. Ability to Memorise
12. Certification
13. Reliability
14. Disciplined
15. Trustworthy
(b) Computer Professional Bodies in Nigeria:
1. Computer Professionals Registration Council of Nigeria (CPN)
2. Nigeria Computer Society (NCS)
3. The Institute of Software Practitioners of Nigeria (ISPON)
4. Information Technology Industry Association of Nigeria (ITAN)
5. Nigeria Internet Group (NIG)
6. Internet Service Providers Association of Nigeria (ISPAN)
(c) (i) Wi-Fi - Wireless Fidelity
(ii) GUI - Graphical User Interface.
5.
(a)
(i)
=SUM(D2,D3,D4,D5,D6,D7,D8,D9,D10,D11)
OR
=(D2+D3+D4+D5+D6+D7+D8+D9+D10+D11)
OR
=SUM (D2:D11)
OR
=SUM (D11:D2)
(ii)
=AVERAGE (D4:G4)
OR
= (D4+E4+F4+G4)/4
OR
=AVERAGE (D4, E4,F4,G4)
OR
=SUM (D4:G4)/4
OR
=SUM(D4,E4,F4,G4)/4
(iii)
Max Function.
OR
=MAX(E2:E11)
(iv)
Click on cell H8
Type “=SUM(D8:G8)”
Press “Enter”
OR
Click on D8
Hold down the Mouse and stop at H8/ Highlight D8 to H8
Click on Summation icon on the Menu Bar
OR
Click on H8
Type “=SUM (D8, E8,F8,G8)
Press “Enter”
OR
Click on H8
Type =SUM (D8:G8)
Press Enter
(v)
=IF(I11> 59, “PASSED”, “FAILED”)
OR
=IF(I11>= 60, “PASSED”, “FAILED”)
(b)
(i) MS PowerPoint
(ii) Presentation
(iii) Double-click on the icon
OR
Right-click on the icon
Select open
(iv) Title Slide
(v) Slide Show View Icon/Slide Show Icon/ Slide Show
(vi) F5
(vii)
-Insert Shapes
-Insert Textbox
-Insert WordArt
-Insert Comment
-Insert Video
-Insert Symbols
-Sound
Table
Clipart
Equation
New Slide
Pictures
Header/Footer
Date & Time
Text Box
Smileys etc.
6.
(a)
(i) To Create a folder on the desktop
-Right-click on the desktop and select “New”
-Select “Folder”
(ii) Naming the folder
-Click on the default name of the new folder
-Type-in the name, Press enter or click elsewhere on the desktop
OR
Right-click on the folder icon and select “Rename”
-Type-in the New Name
OR
Select the folder, Click on the Default Name/New Folder,
Type New Name, Press Enter.
(iii) Sending a file to the new folder
-Double-click on “My Documents” folder icon
-Right-click on the desired file icon and select “copy”
-Open the folder created
-Paste the copied file
OR
Select the file in My Documents Folder,
Drag it to the created Folder on the Desktop,
Drop/Release the Mouse button
OR
Open the File in My Document ,
Click on File, Save As,
Select Desktop, Select Target Folder,
Click on Save.
(iv) Renaming the folder
-Right-click on the folder icon and select “Rename”
-Type-in the new name “RESULTS”
OR
Select the folder, Click on the Default Name/New Folder,
Type “RESULTS” as the New Name, Press Enter.
(b)
(i)
(I) Date of Birth---Date/Time
(II) Fees-------------Currency
(ii)
(I) –create a blank database and give it a name
-click on the “create” tab on the menu bar and select “table design/design
view”
-Type the field names and set the data types as required. Save the file
(II) –select the Mat.No field
-Right-click on the field and select primary key
OR
-Select the Mat.No field
-click on the primary key icon on the menu bar
(III) -click on the FullName field
-set the field size to 50
OR
Click on the FullName Field, Go to the Field Properties,
Change the Field Size from 255 to 50
Waec Data Processing Paper 2, Essay May/June 2016 Questions
Waec Data Processing Paper 2, Essay May/June 2016 Questions
1.
a) Describe datahandling .
b) Explain two ways of handling data.
c) State four factors to consider when handling data electronically.
d) Starting from the Save As dialogue box, outline the steps involved in passwording a document in a word processing package
2.
a. Define information processing.
b. State four steps involved in information processing.
c. Mention three advantages of using computers for information processing.
d. Highlight three disadvantages of using computers for information processing
3.
(a)
(i) With the aid of a simple diagram, explain information processing.
(ii) Give one example of information transmission.
(b) Give one example of each of the following:
(i) single user, single tasking operating system;
(ii) single user, multitasking operating system;
(iii) multi user operating system.
(c) List four features of a Graphical User Interface
4.
a. Mention four qualities of a good computer professional.
b. List four computer professional bodies in Nigeria.
c. Write the full meaning of the following:
(i) WiFi
(ii) GUI
5.
(a) Use the information in the spreadsheet below to answer questions 5(a) i-v
(i) Write the formula to calculate the total score in Mathematics.
(ii) Write two spreadsheet formulas to calculate Paul’s average score in the four
subjects.
(iii) What spreadsheet function can be used to determine the highest score in English?
(iv) Outline the procedure for calculating Vera’s total score in all the subjects and give the result in cell H8.
(v) If the minimum pass mark is an average score of 60, write a formula to determine if Etta passed or failed.
(b)Use the diagram below to answer questions 5(b) i-vii
(i) What is the name of the application shown in the diagram?
(ii) State one use of the application mentioned in 5 (b) (i).
(iii) Outline the procedure to launch the application from its shortcut on the desktop.
(iv) After launching the application, what is the name of the slide that appears by default?
(v) Identify the part labeled I.
(vi) Write the keyboard shortcut that would also perform the function of the part labeled I.
(vii) Mention three functions that can be performed by the insert button
6.
(a)Folders are used for storing files in the computer. List the steps for carrying out the following operations:
(i) creating a folder on the desktop;
(ii) giving name to the folder;
(iii) sending a file from “My Documents” folder into the folder created in 6(a)(i)
(iv) changing the name of the folder in 6 (a) (ii) to “RESULTS”.
The table below shows selected fields and DataTypes in MS Access. Use it to answer questions 6 (b) (i)and 6 (b) (ii).
Field DataTypes
FulName Text
Mat.No Text
Date of Birth *
Fees *
Address Memo
(i) What is the appropriate data type for:
I. Date of Birth Field;
II.Fees Field?
(ii) If MS Access is running, describe the procedure to:
I. create a table with the fields as given above using design view;
II. set the Mat.No Field as the primary key;
III. set the FullName Field to a maximum of 50 characters.
1.
a) Describe datahandling .
b) Explain two ways of handling data.
c) State four factors to consider when handling data electronically.
d) Starting from the Save As dialogue box, outline the steps involved in passwording a document in a word processing package
2.
a. Define information processing.
b. State four steps involved in information processing.
c. Mention three advantages of using computers for information processing.
d. Highlight three disadvantages of using computers for information processing
3.
(a)
(i) With the aid of a simple diagram, explain information processing.
(ii) Give one example of information transmission.
(b) Give one example of each of the following:
(i) single user, single tasking operating system;
(ii) single user, multitasking operating system;
(iii) multi user operating system.
(c) List four features of a Graphical User Interface
4.
a. Mention four qualities of a good computer professional.
b. List four computer professional bodies in Nigeria.
c. Write the full meaning of the following:
(i) WiFi
(ii) GUI
5.
(a) Use the information in the spreadsheet below to answer questions 5(a) i-v
(i) Write the formula to calculate the total score in Mathematics.
(ii) Write two spreadsheet formulas to calculate Paul’s average score in the four
subjects.
(iii) What spreadsheet function can be used to determine the highest score in English?
(iv) Outline the procedure for calculating Vera’s total score in all the subjects and give the result in cell H8.
(v) If the minimum pass mark is an average score of 60, write a formula to determine if Etta passed or failed.
(b)Use the diagram below to answer questions 5(b) i-vii
(i) What is the name of the application shown in the diagram?
(ii) State one use of the application mentioned in 5 (b) (i).
(iii) Outline the procedure to launch the application from its shortcut on the desktop.
(iv) After launching the application, what is the name of the slide that appears by default?
(v) Identify the part labeled I.
(vi) Write the keyboard shortcut that would also perform the function of the part labeled I.
(vii) Mention three functions that can be performed by the insert button
6.
(a)Folders are used for storing files in the computer. List the steps for carrying out the following operations:
(i) creating a folder on the desktop;
(ii) giving name to the folder;
(iii) sending a file from “My Documents” folder into the folder created in 6(a)(i)
(iv) changing the name of the folder in 6 (a) (ii) to “RESULTS”.
The table below shows selected fields and DataTypes in MS Access. Use it to answer questions 6 (b) (i)and 6 (b) (ii).
Field DataTypes
FulName Text
Mat.No Text
Date of Birth *
Fees *
Address Memo
(i) What is the appropriate data type for:
I. Date of Birth Field;
II.Fees Field?
(ii) If MS Access is running, describe the procedure to:
I. create a table with the fields as given above using design view;
II. set the Mat.No Field as the primary key;
III. set the FullName Field to a maximum of 50 characters.
Waec Data Processing Paper 2, Essay May/June 2017 Answers
Waec Data Processing Paper 2, Essay May/June 2017 Answers
1.
(a) Classes of computer based on size:
(i) Super computers
(ii) Mainframe computers
(iii) Mini computers
(iv) Micro computers
(b) Information and Communication Technology (ICT) is a diverse means of
collecting, processing, storing and transmitting information using modern equipment/gadgets/devices.
OR
Information and Communication Technology refers to all the technologies used to handle telecommunications and information transmission systems.
OR
Information and Communication Technology (ICT) is a world of encompassing /combining computers together with communication devices to generate, process and transmit information
(c) Impacts of ICT on the society:
1. enhanced communication speed .
2. lower communication cost.
3. reliable mode of communication.
4. effective sharing of information.
5. paperless environment.
6. borderless communication.
7. health problems.
8. social problems(cyber crime, hackers’ threat)
9. Improved Quality of Instruction (Education)
10. Entertainment and Sports
11. Security & Control
12. Military
13. Physical & Mental Stress
14. Unemployment
15. Back Pain
16. Improved Service Delivery
2.
(a) (i) Computer ethics is defined as the set of moral principles/values that
regulate the use of computers .
OR
Computer Ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct .
OR
Computer Ethics can be defined as a set of acceptable behavior exhibited within a computer environment to ensure safety of users, computer devices, software and the computer environment.
(ii) Computer room management ethics include:
maintaining dust-free environment.
appropriate ventilation/air conditioning .
appropriate lighting system(illumination).
setting computers before students come in.
avoidance of liquids.
avoidance of explosion.
switching off apparatus after use.
proper sitting arrangement. (Free flow of movement)
no visitors.
Observing copyrights
Avoid stealing/cheating with computers
Avoid unauthorized access
Avoiding use of devices from un-trusted sources
(b) Laboratory rules and regulations:
pupils are prohibited to enter the laboratory unless authorized by the teacher.
scan disks/diskettes before using them.
report all problems related to the system to the teacher.
do not attempt to repair laboratory equipment.
do not move any equipment from its original position.
do not load or remove any software from the system.
do not change the settings in the computer.
save all work in external storage device and not in the computer.
turn off the computer after use.
do not bring in bags, food and drinks into the laboratory.
Internet facility is strictly for educational purposes only.
teachers should record the use of computer laboratory in the computer log book.
all users should record the use of computers in the log book.
the laboratory should be kept clean and tidy at all times.
switch off all power supplies before leaving the laboratory.
be responsible when using equipment, software and facility in the laboratory.
Proper shut down of computers
3.
(a) Through the company’s website
(b) Web/Website developer (programmer) OR Web/Website designer OR Webmaster OR System analyst OR Programmer
(c) Website design packages:
Adobe Dreamweaver
Adobe Muse
Amaya
Antenna Web
Bluefish
BlueGriffon
Coda
Coffee Cup
Design Studio
Galaxy Web
GoDaddy
Google Web Design
RapidWeaver
H5P
HTML
iWeb
Microsoft Expression web 3.0 & studio
Microsoft FrontPage
MySQl
Net objects fusion
Odoo Website
Photon fx Easy
Sandfox
Vb-Net
Web plus x4
Web.Com
Website Pro
Webydo
Weebly
(d) (i) Local Area Network (LAN)/ Intranet
(ii) Importance of computer network:
file sharing
printer sharing
sharing of media
media centre server
security
communication
preservation/Storage
Sharing of Resources
Reduced cost
Improved customer service
Better performance
Ease of setup
(e)
UTP
STP
Coaxial/Copper
Fibre Optics
Bluetooth
Infrared
Radio
Wifi
Hot-Spots
Satellite
4.
(a) Software maintenance is the modification of a software product after delivery to correct faults, improve performance or other attributes. OR Software maintenance is the fixing of defects in software
(b) Types of software maintenance:
1. Corrective Maintenance
2. Perfective Maintenance
3. Adaptive Maintenance
4. Preventive Maintenance
(c) Importance of software maintenance:
1. To correct faults.(e.g. scanning and virus removal, Defragmentation)
2. To improve performance. (e.g. software upgrading/updating)
3. To adapt to a changing environment.
4. To prevent faults. (e.g. installation of Anti-Virus)
5. To proffer solutions to identified software problems
6. To predict software expenses (predictive cash flow)
5.
(a) (i)
I : Print Screen (PrtSc) OR Ctrl + PrtSc OR Alt + PrtSc
II : Ctrl + V
III : Ctrl + P
(ii) Step 1: In Microsoft PowerPoint, press “Print Screen (PrtSc)” OR Ctrl + PrtSc
OR Alt + PrtSc
Step 2: Launch Microsoft Word/ Open blank document,
Step 3: press “Ctrl + V ” / Paste
Step 4: Press “Ctrl + P”
(b) (i) Hardware devices
monitor
keyboard
mouse
speaker
printer
scanner
inverter
photocopier
UPS
system unit
Network Devices
Router
Hubs
Back Up Devices
Power Stabilizers
Modem
Surge Protector
Switches
(ii) Database applications
MySQL
MS Access
SQL server
Oracle
Fox Pro
Dbase
Ingress
Informix
Sabre
Sybase
Postgress
Dbase2
OR DbaseII
Teradata
FileMaker
ADABAS
System 2000
DbaseIII
DbaseIV
Mongo DB
RBase
InterBase
Raima
Clipper
Paradox
(iii) Word Processing Packages
Ami Pro
Applix Word
Atlantis Word Processor
Corel Word Perfect
emacs
Google Docs
IA Writer
Kingsoft writer
Locoscript
Lotus WordPro
Microsoft write
Ms Edit
MS Word
Nisus Writer
Open Office Word
Polaris Office
Quick Office
Quick word
TechWriter
TextMaker
Word Craft
Word perfect
WordPad/Notepad
Wordperfect
Wordstar
Zoho Writer
S/N KEYSTROKE ACTION
(i) Ctrl + Enter/Return Page Break
(ii) Ctrl + F Find
(iii) F1 Help
(iv) Ctrl + F2 Print Preview
(c)
(i) Ctrl + Enter OR Ctrl + Return key
(ii) Find
(iii) Help
(iv) Print Preview
6.
(a) (i) Computer set-up/Computer Connections/ Computer Systems
(ii) I - Monitor
IV - Speaker
VIII - Printer
(iii) III - system unit
VI - Power supply/ Socket
VII - Internet/ Cloud
(iv) Use of AVR, UPS, Inverter, Power Stabilizer, Surge Protector
(v) II - Keyboard
V - Mouse
(vi) MODEM, VSAT, MOBILE PHONES
(b) (i) Fig 2: CD-ROM OR DVD-ROM
Fig 3: Magnetic tape/ Cassette (Audio, Videotape)
(ii) Magnetic tape
(iii) CD-ROM OR DVD-ROM
(iv) Fig 2: Direct, Random Access
Fig 3: Serial Access/ Sequential Access
(C) (i) 300MB = 300,000KB
Number of images = 300,000KB/300KB = 1000 images OR
1024 images
(ii) Remove the storage device and replace it with a new one
OR
Backup the storage device and format it.
OR
Save in the Cloud
1.
(a) Classes of computer based on size:
(i) Super computers
(ii) Mainframe computers
(iii) Mini computers
(iv) Micro computers
(b) Information and Communication Technology (ICT) is a diverse means of
collecting, processing, storing and transmitting information using modern equipment/gadgets/devices.
OR
Information and Communication Technology refers to all the technologies used to handle telecommunications and information transmission systems.
OR
Information and Communication Technology (ICT) is a world of encompassing /combining computers together with communication devices to generate, process and transmit information
(c) Impacts of ICT on the society:
1. enhanced communication speed .
2. lower communication cost.
3. reliable mode of communication.
4. effective sharing of information.
5. paperless environment.
6. borderless communication.
7. health problems.
8. social problems(cyber crime, hackers’ threat)
9. Improved Quality of Instruction (Education)
10. Entertainment and Sports
11. Security & Control
12. Military
13. Physical & Mental Stress
14. Unemployment
15. Back Pain
16. Improved Service Delivery
2.
(a) (i) Computer ethics is defined as the set of moral principles/values that
regulate the use of computers .
OR
Computer Ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct .
OR
Computer Ethics can be defined as a set of acceptable behavior exhibited within a computer environment to ensure safety of users, computer devices, software and the computer environment.
(ii) Computer room management ethics include:
maintaining dust-free environment.
appropriate ventilation/air conditioning .
appropriate lighting system(illumination).
setting computers before students come in.
avoidance of liquids.
avoidance of explosion.
switching off apparatus after use.
proper sitting arrangement. (Free flow of movement)
no visitors.
Observing copyrights
Avoid stealing/cheating with computers
Avoid unauthorized access
Avoiding use of devices from un-trusted sources
(b) Laboratory rules and regulations:
pupils are prohibited to enter the laboratory unless authorized by the teacher.
scan disks/diskettes before using them.
report all problems related to the system to the teacher.
do not attempt to repair laboratory equipment.
do not move any equipment from its original position.
do not load or remove any software from the system.
do not change the settings in the computer.
save all work in external storage device and not in the computer.
turn off the computer after use.
do not bring in bags, food and drinks into the laboratory.
Internet facility is strictly for educational purposes only.
teachers should record the use of computer laboratory in the computer log book.
all users should record the use of computers in the log book.
the laboratory should be kept clean and tidy at all times.
switch off all power supplies before leaving the laboratory.
be responsible when using equipment, software and facility in the laboratory.
Proper shut down of computers
3.
(a) Through the company’s website
(b) Web/Website developer (programmer) OR Web/Website designer OR Webmaster OR System analyst OR Programmer
(c) Website design packages:
Adobe Dreamweaver
Adobe Muse
Amaya
Antenna Web
Bluefish
BlueGriffon
Coda
Coffee Cup
Design Studio
Galaxy Web
GoDaddy
Google Web Design
RapidWeaver
H5P
HTML
iWeb
Microsoft Expression web 3.0 & studio
Microsoft FrontPage
MySQl
Net objects fusion
Odoo Website
Photon fx Easy
Sandfox
Vb-Net
Web plus x4
Web.Com
Website Pro
Webydo
Weebly
(d) (i) Local Area Network (LAN)/ Intranet
(ii) Importance of computer network:
file sharing
printer sharing
sharing of media
media centre server
security
communication
preservation/Storage
Sharing of Resources
Reduced cost
Improved customer service
Better performance
Ease of setup
(e)
UTP
STP
Coaxial/Copper
Fibre Optics
Bluetooth
Infrared
Radio
Wifi
Hot-Spots
Satellite
4.
(a) Software maintenance is the modification of a software product after delivery to correct faults, improve performance or other attributes. OR Software maintenance is the fixing of defects in software
(b) Types of software maintenance:
1. Corrective Maintenance
2. Perfective Maintenance
3. Adaptive Maintenance
4. Preventive Maintenance
(c) Importance of software maintenance:
1. To correct faults.(e.g. scanning and virus removal, Defragmentation)
2. To improve performance. (e.g. software upgrading/updating)
3. To adapt to a changing environment.
4. To prevent faults. (e.g. installation of Anti-Virus)
5. To proffer solutions to identified software problems
6. To predict software expenses (predictive cash flow)
5.
(a) (i)
I : Print Screen (PrtSc) OR Ctrl + PrtSc OR Alt + PrtSc
II : Ctrl + V
III : Ctrl + P
(ii) Step 1: In Microsoft PowerPoint, press “Print Screen (PrtSc)” OR Ctrl + PrtSc
OR Alt + PrtSc
Step 2: Launch Microsoft Word/ Open blank document,
Step 3: press “Ctrl + V ” / Paste
Step 4: Press “Ctrl + P”
(b) (i) Hardware devices
monitor
keyboard
mouse
speaker
printer
scanner
inverter
photocopier
UPS
system unit
Network Devices
Router
Hubs
Back Up Devices
Power Stabilizers
Modem
Surge Protector
Switches
(ii) Database applications
MySQL
MS Access
SQL server
Oracle
Fox Pro
Dbase
Ingress
Informix
Sabre
Sybase
Postgress
Dbase2
OR DbaseII
Teradata
FileMaker
ADABAS
System 2000
DbaseIII
DbaseIV
Mongo DB
RBase
InterBase
Raima
Clipper
Paradox
(iii) Word Processing Packages
Ami Pro
Applix Word
Atlantis Word Processor
Corel Word Perfect
emacs
Google Docs
IA Writer
Kingsoft writer
Locoscript
Lotus WordPro
Microsoft write
Ms Edit
MS Word
Nisus Writer
Open Office Word
Polaris Office
Quick Office
Quick word
TechWriter
TextMaker
Word Craft
Word perfect
WordPad/Notepad
Wordperfect
Wordstar
Zoho Writer
S/N KEYSTROKE ACTION
(i) Ctrl + Enter/Return Page Break
(ii) Ctrl + F Find
(iii) F1 Help
(iv) Ctrl + F2 Print Preview
(c)
(i) Ctrl + Enter OR Ctrl + Return key
(ii) Find
(iii) Help
(iv) Print Preview
6.
(a) (i) Computer set-up/Computer Connections/ Computer Systems
(ii) I - Monitor
IV - Speaker
VIII - Printer
(iii) III - system unit
VI - Power supply/ Socket
VII - Internet/ Cloud
(iv) Use of AVR, UPS, Inverter, Power Stabilizer, Surge Protector
(v) II - Keyboard
V - Mouse
(vi) MODEM, VSAT, MOBILE PHONES
(b) (i) Fig 2: CD-ROM OR DVD-ROM
Fig 3: Magnetic tape/ Cassette (Audio, Videotape)
(ii) Magnetic tape
(iii) CD-ROM OR DVD-ROM
(iv) Fig 2: Direct, Random Access
Fig 3: Serial Access/ Sequential Access
(C) (i) 300MB = 300,000KB
Number of images = 300,000KB/300KB = 1000 images OR
1024 images
(ii) Remove the storage device and replace it with a new one
OR
Backup the storage device and format it.
OR
Save in the Cloud
Waec Data Processing May/June Paper 2 Essay 2017 Questions
Waec May/June Paper 2 Essay 2017 Data Processing Questions
1.
(a) State four classes of computer based on size
(b) Define the term Information and Communication Technology (ICT)
(c)Highlight three ways ICT has impacted on the society
2.
(a) (i) What is Computer Ethics?
(ii) State three computer room management ethics
(b) List five laboratory rules and regulations
3.
Mr. Okafor has a company that specializes in the production of beverages with headquarters in Abuja. He intends to monitor the sales and transactions in the company’s branches across Nigeria as well as interact with his customers.
(a) Through what platform can Mr. Okafor achieve his intentions?
(b) Which computer professional should Mr. Okafor hire to design the platform in 3(a)?
(c) State two software packages to create the platform for Mr. Okafor.
(d) If Mr. Okafor decides to connect all the offices within the headquarters in Abuja in a single network,
(i) what type of network is appropriate?
(ii) mention three reasons to support his decision.
(e) Mention two transmission media that can be used to implement the network in 3 (d) (i).
4.
(a) Define the term Software Maintenance
(b) List four types of software maintenance
(c) State four importance of software maintenance
5.
(a) A teacher asked a student to capture and print out one-slide presentation assignment using MS word, showing everything on the screen.
(i) What keys or combination of keys can be used to carry out this operation?
(ii) Describe the procedure to be followed b the students in carrying out this assignment using the keyboard.
(b) A system analyst was hired to set up a computer laboratory for Bofe International School.
(i) Mention three hardware devices the analyst would need to set up the laboratory.
(ii) List three database application packages likely to be recommended by the analyst.
(iii) State three Word processing packages likely to be installed.
(c) Complete Table 1 on keyboard shortcuts.
Table 1
S/N Keystroke Action
(i) Page break
(ii) Ctrl + F
(iii) F1
(iv) Ctrl + F2
6.
(a) Use Fig. 1 to answer questions (i) to (vi)
Fig. 1
1. What does Fig. 1 represent?
2. Identify two output components in Fig. 1.
3. Give the names for the parts labeled III, VI and VII.
4. State one precautionary measure that should be taken to protect the set-up from power fluctuations while in use.
5. Data entry into the system can be achieved through the parts labeled:
6. Mention one device that can be used to access the part labeled VII.
(b) Figures 2 and 3 represent mass storage media. Use the figures to answer questions (i) to (iv).
(i) Identify the media represented by: Fig. 2 and Fig. 3
(ii) The transaction files of a company are to be recorded and accessed in the order which they arrive. Which of the media is most suitable for the purpose?
(iii) In which media will the stored data be accessed faster?
(iv) State the file access method for each medium. Fig. 2 and Fig. 3.
(c) A CCTV camera system has a 300 MB storage device. Each image size is 300
kB.
(i) How many images can be stored by the CCTV?
(ii) If the storage device is full, mention one measure that should be taken to ensure that the system continues to capture and store images without losing the already stored images.
1.
(a) State four classes of computer based on size
(b) Define the term Information and Communication Technology (ICT)
(c)Highlight three ways ICT has impacted on the society
2.
(a) (i) What is Computer Ethics?
(ii) State three computer room management ethics
(b) List five laboratory rules and regulations
3.
Mr. Okafor has a company that specializes in the production of beverages with headquarters in Abuja. He intends to monitor the sales and transactions in the company’s branches across Nigeria as well as interact with his customers.
(a) Through what platform can Mr. Okafor achieve his intentions?
(b) Which computer professional should Mr. Okafor hire to design the platform in 3(a)?
(c) State two software packages to create the platform for Mr. Okafor.
(d) If Mr. Okafor decides to connect all the offices within the headquarters in Abuja in a single network,
(i) what type of network is appropriate?
(ii) mention three reasons to support his decision.
(e) Mention two transmission media that can be used to implement the network in 3 (d) (i).
4.
(a) Define the term Software Maintenance
(b) List four types of software maintenance
(c) State four importance of software maintenance
5.
(a) A teacher asked a student to capture and print out one-slide presentation assignment using MS word, showing everything on the screen.
(i) What keys or combination of keys can be used to carry out this operation?
(ii) Describe the procedure to be followed b the students in carrying out this assignment using the keyboard.
(b) A system analyst was hired to set up a computer laboratory for Bofe International School.
(i) Mention three hardware devices the analyst would need to set up the laboratory.
(ii) List three database application packages likely to be recommended by the analyst.
(iii) State three Word processing packages likely to be installed.
(c) Complete Table 1 on keyboard shortcuts.
Table 1
S/N Keystroke Action
(i) Page break
(ii) Ctrl + F
(iii) F1
(iv) Ctrl + F2
6.
(a) Use Fig. 1 to answer questions (i) to (vi)
Fig. 1
1. What does Fig. 1 represent?
2. Identify two output components in Fig. 1.
3. Give the names for the parts labeled III, VI and VII.
4. State one precautionary measure that should be taken to protect the set-up from power fluctuations while in use.
5. Data entry into the system can be achieved through the parts labeled:
6. Mention one device that can be used to access the part labeled VII.
(b) Figures 2 and 3 represent mass storage media. Use the figures to answer questions (i) to (iv).
(i) Identify the media represented by: Fig. 2 and Fig. 3
(ii) The transaction files of a company are to be recorded and accessed in the order which they arrive. Which of the media is most suitable for the purpose?
(iii) In which media will the stored data be accessed faster?
(iv) State the file access method for each medium. Fig. 2 and Fig. 3.
(c) A CCTV camera system has a 300 MB storage device. Each image size is 300
kB.
(i) How many images can be stored by the CCTV?
(ii) If the storage device is full, mention one measure that should be taken to ensure that the system continues to capture and store images without losing the already stored images.
2019-04-09
Data processing Waec May/June 2018 Essay Answers
Waec May/June 2018 Essay Answers Data Processing
1(a)(i)
Data model is the organization of data elements and standard on how the data elements relate to one another.
OR
Data model is the representation of the data structures that are required by the database.
OR
Data model is the representation of a real-world situation about which data is to be collected
OR
Data model is the structure and organization of data in database
OR
Data model is the diagram showing inter-relationships between data elements and how they are stored
(ii)
Types of data model
flat model
hierarchical model
network model
relational model
object-oriented model
entity relationship model
document model
entity-attribute-value model
star schema
object relational model
inverted file model
multi dimensional model
semi structured model
context model
associative model
NoSQL model
(b)(i) Approaches to data modelling
conceptual data model
enterprise data model
logical data model
physical data model
(ii) Conceptual data model
identifies objects, concepts, entities and relationships between them
represents the first/initial stage/base in the development of the design of data and data storage.
is the most abstract form/ highest level/ summary level of data modeling.
Enterprise data model
creates a graphical model/view of all data used in an organization/ company/ enterprise.
Logical data model
describes the data in detail as much as possible without regard to how they will be physically implemented in the database .
Physical data model
is a representation of data/ tables (Table Names, Primary key, Foreign keys, Column/Field Name & Data types) in a DBMS.
2.(a)(i) A word processing package / Word processor
Ami Pro
Applix Word
Atlantis Word Processor
Corel Word Perfect
emacs
Google Docs
IA Writer
Kword
Kingsoft writer
Libre Office
Locoscript
Lotus WordPro
Microsoft Write
Ms Edit
MS Word
Nisus Writer
Open Office Word
Polaris Office
Quick Office
Quick word
Star Office writer
TechWriter
TextMaker
Word Craft
Word Perfect
Wordperfect
Wordstar
Zoho Office
Zoho Writer
(ii) Water Mark
(iii) Measures to ensure confidentiality of files
use of password
use of encryption
access control
authentication
(b)(i) An icon is an image/ a graphical or pictorial representation of a command, program, file or folder on a computer screen for easy access.
(ii) A browser is a software/web client/ program/ application used for accessing / retrieving, presenting and traversing information resources on the World Wide Web/ internet/ web servers
3.(a) Steps involved in printing first five pages of a document
choose the printer from the list of printers displayed;
choose the page range (1-5 OR 1,2,3,4,5);
click on print/ok
(b)(i) Possible cause of the pop-up
Virus/Malware
unlicensed software
plugins
Pirated/Faked Software
Need for Software update
(ii) Sources of malware/virus
infected files/media
installed plugins
downloading
cracked/pirated software
email attachment
-use of CD/DVD or portable devices
visiting unreliable websites
outdated/expired software
(iii) Measures to prevent the pop-up
Use of antivirus/ anti-malware
popup blocker
use of licensed software
disable plugins
regular software update
(c)(i) Presentation Packages
Corel Presentation
Calligra
Magic point
OpenLP
Slide Dogs
Havard Graphics
PowerPoint
Prezi
Camtasia
Google Docs
(ii) Multimedia projector/ projector
(d) Types of computer network
Local Area network (LAN/WLAN)
Metropolitan Area Network (MAN)
Personal Area Network (PAN)
Wide Area Network (WAN)
4.(a) Steps involved in creating the query
In MS Access,
click on Create;
select Query Design;
add table tblCustomer to QBE interface;
select the field lastName from the grid;
select the field firstName from the grid;
select the field Town from the grid;
type ‘John’in the Criteria row under lastName field;
tick all the check boxes .in the Show row, under lastName, firstName and Town fields.
(b) Steps to generate the SQL statement for the action in 4(a)
Right click on Query (QBE) Interface;
select SQL view.
OR
From Design view, click view;
select SQL view.
OR
Click on SQL at the bottom right corner
5.(a)(i) Application type 1
I-
Word processor
Ami Pro
Applix Word
Atlantis Word Processor
Corel Word Perfect
emacs
Google Docs
IA Writer
Kword
Kingsoft writer
Libre Office
Locoscript
Lotus WordPro
Microsoft write
Ms Edit
MS Word
Nisus Writer
Open Office Word
Polaris Office
Quick Office
Quick word
Star Office writer
TechWriter
TextMaker
Word Craft
Word Perfect
Wordperfect
Wordstar
Zoho Office
Zoho Writer
Application type 2
Web browser
opera mini
safari
UC browser
Msedge
Mozilla Firefox
Internet explorer
Google Chrome
Netscape
Application type 3
email clients
Outlook Express/MS Outlook
Gmail
Yahoomail
Hotmail
(ii) Hardware required to carry out the task
Computer system
Printer
Router
Modem
Telephone line
Dongle
VSAT
Smartphones
Power supply
(ii) Conditions to submit electronic copy of report
active email account/ address for recipient/sender
Internet connection/ access
(iii) Possible reasons for the observation
No Internet connection
poor/slow Internet connectivity/ network
file size is heavy to be attached
virus effect
processor speed
(iv) printer
(b)(i) web browser/ browser
(ii) Examples of the application
Google Chrome
FireFox
Safari
Opera
opera mini
UC browser
Ms edge
Mozilla Firefox
Internet explorer
Netscape
Vivaldi
Maxthon
Chromium
Slim browser
Slim Browser
Sea Monkey
Konqueror
Avant Browser
Flock
Torch
Lynx
Tamino
Pale Moon
OmniWeb
Lunascape
Waterfox
icab
Yandex Browser
Swiftfox
(iii) Steps to follow in creating an email address
On the Address bar of the web browser, type the URL of the email provider domain (eg. yahoo/ yahoo mail/ gmail).
click on “Sign Up”/ create account on the email home page
create user account/ username and password [ Complete the form displayed]
enter the information for password recovery
follow the instructions asking you to prove that you are a human/ review terms of reference and click next
click on “Create my account”/ continue to Gmail
6.(a)(i) Drop Cap
(ii) I. Steps to achieve Drop Cap
Select the letter and click on “Insert”
click on “Drop Cap”
click on “dropped”
OR
Select the letter, and click on format menu
click on “Drop Cap”
click on “dropped”
II. Steps to make two columns
highlight the text and click on “Page Layout”;
click on “more columns”;
click on “Two Columns” and line between;
click OK or press enter.
OR
highlight the text and click Format menu;
click “Columns”;
click on “Two Columns” and line between;
click OK or press enter.
(b) Objects that can be placed in a document using ‘Insert menu’
Add Ins
Blank page
chart
clip art
Comments
Cover page
Date & Time
equation
footer
header
Header & Footer
Link
Page break
page number
pictures
shapes
smart art
sound
symbol
-tables
Text
Text box
video
Word Art
(c) (i) Steps to insert a circular shape
click on the ellipse tool/ Press F7
click and drag on the page to the desired size pressing down the left Mouse button
(ii) Steps to add caption
click on Text tool/ Press F8
click on the page
type “Happy Birthday”
(iii) Steps to change colour
Select/click on the typed caption
select/click on “Red” on the colour palate
OR
select the caption
click on the fill tool box/ interactive fill tool
select red on the dialogue box, then click Ok/ Select red from the colour palate
(iv) Steps to fit caption around circular object
select the “Circular Shape” and the caption using the pick tool
click on text menu and select “Fit to Path”
OR
Select the caption using the pick tool, and click on text menu,
click on “Fit to Path” and lick on the circular shape
2019-04-04
WAEC Data Processing 2018 Essay Questions
Question 1
(a)
(i) What is data model?
(ii) State three types of data model.
(b)(i) List three approaches to data modeling.
(ii) Explain any one approach in 1 (b)(i)
Question 2
(a) Vera, a secretary to the manager of her organization is saddled with the responsibility of typing a confidential report. She is also instructed to insert the word “CONFIDENTIAL” diagonally in the background of every page of the report.
(i) State the most suitable application software needed by Vera to produce the report.
(ii) What feature of the application software can be used to insert the word “CONFIDENTIAL” as instructed?
(iii) Mention one measure that can be taken to ensure the confidentiality of the soft copy of the report in the computer.
(b) Explain the following terms:
(i) icon;
(ii) browser.
Question 3
(a) Outline the steps involved in printing the first five pages of a Word document from the print dialog box on a computer with two printers installed.
(b) Sadiq complained that a pop-up usually appears on the screen of his personal computer thereby disturbing him while using the computer.
(i) What is the possible cause of the pop-up?
(ii) State a possible source of the element causing the pop-up.
(iii) What measure would be necessary to stop the pop-up from reoccurring?
(c) Mr. Aneke is billed to address a large audience in an auditorium.
(i) What computer application package is suitable to prepare and deliver his speech?
(ii) State the output device that can be used to transmit Mr. Aneke’s speech note from his computer to a large screen in the auditorium.
(d) Give two types of computer network.
Question 4
(a). Outline the steps involved in creating the Query By Example ( QBE) in figure 1 assuming the table tblcustomer exists already
Figure 1
(b) Write the steps to generate the ISQL statement for the action in 4 (a)
Question 5
(a) Itoro was tasked with the responsibility of producing the report of his group project. He is to submit both the soft and hard copies of the report to his form teacher. The soft copy must be submitted to the email: formteacher@school.edu.ng
(i) List two:
I. applications required to carry out the task;
II. hardware required to carry out the task.
(ii) Identify two conditions to be satisfied by Itoro to submit the electronic copy of the report.
(iii) On the first attempt to send the sfot copy of the report, Itoro observed a “spinning wait cursor”/”spinning disc pointer’ on the screen for a long time.
Identify three possible reasons for the observation.
(iv) State one output device that can be used to produce the hard copy of the report.
Figure 2 is an interface of an application software. Use the figure to answer question 5(b)
Figure 2
(b) (i) Name the type of application software represented in figure 2.
(ii) List three examples of the application in question 5(b)(i).
(iii) Given that the application in figure 2 is running on a computer that has Internet access, outline the steps to follow in creating an email address/account.
Question 6
Figure 3 is created using a Word processor. Use the figure to answer question
6 (a).
Figure 3
(a) (i) What is the name given to the feature on the first character in the document in figure3 ?
(ii) Highlight the steps to:
1. achieve the feature on the first character in 6(a)(i);
2. obtain the two columns as shown in figure 3.
(b) Give two objects that can be placed on a document using the “insert menu” on
MS Word application.
(c) Outline the steps to perform the following actions in CorelDraw:
(i) inserting a circular shape;
(ii) adding the caption “Happy Birthday”;
(iii) changing the colour of the caption to Red;
(iv) fitting the caption around the circular object.
Subscribe to:
Posts (Atom)
Waec Physics Specimen May/June 2019
Waec Physics Specimen May/June 2019 QUESTION 1 1. Pendulum Bob; 2. Retort stand and clamp; 3. Thread; 4. Stopwatch/clock; 5. Metre ru...
-
Waec Data Processing Paper 2, Essay May/June 2014 Questions 1. a. i. What is a computer virus? ii.Mention three sources of computer v...
-
1. The dimensions of momentum are A. MLT B. ML -1 T -1 C. MLT -1 D. ML -1 T http://www.waeclesson.blogspot....
-
Waec Data Processing Part 2,Essay May/June 2014 Answers 1. a. i.computer virus is a software/program that duplicates itself and interf...