Waec Data Processing Paper 2, Essay May/June 2017 Answers
1.
(a) Classes of computer based on size:
(i) Super computers
(ii) Mainframe computers
(iii) Mini computers
(iv) Micro computers
(b) Information and Communication Technology (ICT) is a diverse means of
collecting, processing, storing and transmitting information using modern equipment/gadgets/devices.
OR
Information and Communication Technology refers to all the technologies used to handle telecommunications and information transmission systems.
OR
Information and Communication Technology (ICT) is a world of encompassing /combining computers together with communication devices to generate, process and transmit information
(c) Impacts of ICT on the society:
1. enhanced communication speed .
2. lower communication cost.
3. reliable mode of communication.
4. effective sharing of information.
5. paperless environment.
6. borderless communication.
7. health problems.
8. social problems(cyber crime, hackers’ threat)
9. Improved Quality of Instruction (Education)
10. Entertainment and Sports
11. Security & Control
12. Military
13. Physical & Mental Stress
14. Unemployment
15. Back Pain
16. Improved Service Delivery
2.
(a) (i) Computer ethics is defined as the set of moral principles/values that
regulate the use of computers .
OR
Computer Ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct .
OR
Computer Ethics can be defined as a set of acceptable behavior exhibited within a computer environment to ensure safety of users, computer devices, software and the computer environment.
(ii) Computer room management ethics include:
maintaining dust-free environment.
appropriate ventilation/air conditioning .
appropriate lighting system(illumination).
setting computers before students come in.
avoidance of liquids.
avoidance of explosion.
switching off apparatus after use.
proper sitting arrangement. (Free flow of movement)
no visitors.
Observing copyrights
Avoid stealing/cheating with computers
Avoid unauthorized access
Avoiding use of devices from un-trusted sources
(b) Laboratory rules and regulations:
pupils are prohibited to enter the laboratory unless authorized by the teacher.
scan disks/diskettes before using them.
report all problems related to the system to the teacher.
do not attempt to repair laboratory equipment.
do not move any equipment from its original position.
do not load or remove any software from the system.
do not change the settings in the computer.
save all work in external storage device and not in the computer.
turn off the computer after use.
do not bring in bags, food and drinks into the laboratory.
Internet facility is strictly for educational purposes only.
teachers should record the use of computer laboratory in the computer log book.
all users should record the use of computers in the log book.
the laboratory should be kept clean and tidy at all times.
switch off all power supplies before leaving the laboratory.
be responsible when using equipment, software and facility in the laboratory.
Proper shut down of computers
3.
(a) Through the company’s website
(b) Web/Website developer (programmer) OR Web/Website designer OR Webmaster OR System analyst OR Programmer
(c) Website design packages:
Adobe Dreamweaver
Adobe Muse
Amaya
Antenna Web
Bluefish
BlueGriffon
Coda
Coffee Cup
Design Studio
Galaxy Web
GoDaddy
Google Web Design
RapidWeaver
H5P
HTML
iWeb
Microsoft Expression web 3.0 & studio
Microsoft FrontPage
MySQl
Net objects fusion
Odoo Website
Photon fx Easy
Sandfox
Vb-Net
Web plus x4
Web.Com
Website Pro
Webydo
Weebly
(d) (i) Local Area Network (LAN)/ Intranet
(ii) Importance of computer network:
file sharing
printer sharing
sharing of media
media centre server
security
communication
preservation/Storage
Sharing of Resources
Reduced cost
Improved customer service
Better performance
Ease of setup
(e)
UTP
STP
Coaxial/Copper
Fibre Optics
Bluetooth
Infrared
Radio
Wifi
Hot-Spots
Satellite
4.
(a) Software maintenance is the modification of a software product after delivery to correct faults, improve performance or other attributes. OR Software maintenance is the fixing of defects in software
(b) Types of software maintenance:
1. Corrective Maintenance
2. Perfective Maintenance
3. Adaptive Maintenance
4. Preventive Maintenance
(c) Importance of software maintenance:
1. To correct faults.(e.g. scanning and virus removal, Defragmentation)
2. To improve performance. (e.g. software upgrading/updating)
3. To adapt to a changing environment.
4. To prevent faults. (e.g. installation of Anti-Virus)
5. To proffer solutions to identified software problems
6. To predict software expenses (predictive cash flow)
5.
(a) (i)
I : Print Screen (PrtSc) OR Ctrl + PrtSc OR Alt + PrtSc
II : Ctrl + V
III : Ctrl + P
(ii) Step 1: In Microsoft PowerPoint, press “Print Screen (PrtSc)” OR Ctrl + PrtSc
OR Alt + PrtSc
Step 2: Launch Microsoft Word/ Open blank document,
Step 3: press “Ctrl + V ” / Paste
Step 4: Press “Ctrl + P”
(b) (i) Hardware devices
monitor
keyboard
mouse
speaker
printer
scanner
inverter
photocopier
UPS
system unit
Network Devices
Router
Hubs
Back Up Devices
Power Stabilizers
Modem
Surge Protector
Switches
(ii) Database applications
MySQL
MS Access
SQL server
Oracle
Fox Pro
Dbase
Ingress
Informix
Sabre
Sybase
Postgress
Dbase2
OR DbaseII
Teradata
FileMaker
ADABAS
System 2000
DbaseIII
DbaseIV
Mongo DB
RBase
InterBase
Raima
Clipper
Paradox
(iii) Word Processing Packages
Ami Pro
Applix Word
Atlantis Word Processor
Corel Word Perfect
emacs
Google Docs
IA Writer
Kingsoft writer
Locoscript
Lotus WordPro
Microsoft write
Ms Edit
MS Word
Nisus Writer
Open Office Word
Polaris Office
Quick Office
Quick word
TechWriter
TextMaker
Word Craft
Word perfect
WordPad/Notepad
Wordperfect
Wordstar
Zoho Writer
S/N KEYSTROKE ACTION
(i) Ctrl + Enter/Return Page Break
(ii) Ctrl + F Find
(iii) F1 Help
(iv) Ctrl + F2 Print Preview
(c)
(i) Ctrl + Enter OR Ctrl + Return key
(ii) Find
(iii) Help
(iv) Print Preview
6.
(a) (i) Computer set-up/Computer Connections/ Computer Systems
(ii) I - Monitor
IV - Speaker
VIII - Printer
(iii) III - system unit
VI - Power supply/ Socket
VII - Internet/ Cloud
(iv) Use of AVR, UPS, Inverter, Power Stabilizer, Surge Protector
(v) II - Keyboard
V - Mouse
(vi) MODEM, VSAT, MOBILE PHONES
(b) (i) Fig 2: CD-ROM OR DVD-ROM
Fig 3: Magnetic tape/ Cassette (Audio, Videotape)
(ii) Magnetic tape
(iii) CD-ROM OR DVD-ROM
(iv) Fig 2: Direct, Random Access
Fig 3: Serial Access/ Sequential Access
(C) (i) 300MB = 300,000KB
Number of images = 300,000KB/300KB = 1000 images OR
1024 images
(ii) Remove the storage device and replace it with a new one
OR
Backup the storage device and format it.
OR
Save in the Cloud
WAEC Past Questions And Answers . WAEC e-learning . WAEC News . WAEC lessons . WAEC timetable . WAEC results. JAMB Past Questions And Answers . JAMB lessons
Subscribe to:
Post Comments (Atom)
Waec Physics Specimen May/June 2019
Waec Physics Specimen May/June 2019 QUESTION 1 1. Pendulum Bob; 2. Retort stand and clamp; 3. Thread; 4. Stopwatch/clock; 5. Metre ru...
-
Waec Data Processing Paper 2, Essay May/June 2014 Questions 1. a. i. What is a computer virus? ii.Mention three sources of computer v...
-
1. The dimensions of momentum are A. MLT B. ML -1 T -1 C. MLT -1 D. ML -1 T http://www.waeclesson.blogspot....
-
Waec Data Processing Part 2,Essay May/June 2014 Answers 1. a. i.computer virus is a software/program that duplicates itself and interf...
No comments:
Post a Comment