2019-04-10

Waec Data Processing Paper 2, Essay May/June 2015 Answers


Waec Data Processing Paper 2, Essay May/June 2015 Answers


1.
(a)
(i) Operating system is a suite/set(collection) of programs/software that
controls and coordinates/manages the hardware and software of a computer system.
OR
A set of programs that act as interface between the user and the computer (Hardware & Software)
OR
A set of programs that controls and manages computer resources/components and provides other useful services.
[Candidate’s response must include programs/software and any other keyword]


(ii) functions of operating system
1. File management
2. Storage management
3. Input-Output/peripheral management
4. Serves as an interface between the user and the computer/Hardware & Software
1. Protects the system from errors and failures
2. Access control/Security
3. Processor Management
4. Booting/starting up the computer
5. File Management
6. Resource Management
7. Task/Process Management
8. Provides virtual machine

(iii) Differences between operating system and application software include:

S/N    Operating system                         Application software
1. Controls the functioning of the computer/management of computer resources/system software                     
                                                                   Performs specific task(s)
2.It is independent of Application Software/Does not depend on the application software
                                                                   Depends on the operating system to operate
3. Can boot the computer
                                                                   Cannot boot the computer
4. Provides services to computer
                                                                    Provides services to the user

(b) steps involved in passwording a document in a word processing package

1. From the Save As dialog box, click on Tools
2. Click on General/Security option
3. Type in the password and click ok , Retype the password and click ok

OR

1. Click on file, click on Info
2. Click on Protect document, Encrypt with password
3. Type in the password and click ok , Retype the password and click ok


2.
(a)
i. Database is an organized, collection of related data.
OR
A set of data organized in a structured manner
OR
An organized, collection of similar/related data/information for easy search and retrieval

ii. Database management system is a set of programs that enables the user to
store , modify and extract information from a database.
OR
A software that manages the database.
OR
Program that provides users with the tools to add, delete , access, modify and
analyse stored data in one location.
OR
Software to create , manipulate control and retrieve data stored in database

(b) Functions of a database management system are:

1. Redundancy control/Minimizes Data Repetition
2. Easy access and retrieval of data
3. Provision for backup and recovery
4. Maintenance of data integrity
5. Create database
6. User access control/security/protection of data
7. Data manipulation
8. Data Storage Management
9. Concurrence/ Multi user Access control
10. Data transformation/ modification/editing
11. Provision of Data Access Language and Application programming interface
12. Transaction Management
13. Data Dictionary Management
14. Provides Database Communication interface
15. Report generation/presentation/output/formatting

(c) ways through which data can be destroyed

1. Overwriting an existing file
2. Hardware failure
3. Virus attack/Spyware/Malware/Malicious Software
4. Fire outbreak
5. Power failure
6. Software malfunction
7. Accidental/mistaken/unintentional deletion by user/Human error
8. Intentional deletion by user
9. Natural disaster
10. Exposure to Magnetic field
11. Physical/Mechanical damages to hard drive
12. Theft of Computer

(d) precautionary measures to prevent data loss.

1. Power backup
2. Data backup/safe data
3. Proper shut down of computer
4. Use of anti-virus software and network firewalls/anti-spyware/anti-malware
5. Regular defragmentation
6. Encryption
7. User education
8. Avoid physical/mechanical contact
9. Alert/warning before deletion
10. Labelling of storage devices
11. Avoid water/liquid spillage
12. Physical access control/restriction to computer
13. Access control mechanism/PIN/Password
14. Keep storage devices from magnetic substances/objects
15. Avoid removing storage devices while in use
16. Avoid movement of desktop computers while in operation/use



3.
(a) i) Application package is a program/software designed to perform tasks
(General/Specific)
OR
A complete computer/ program for solving problems .
OR
A computer program/software pre-packaged for sale/ on the shell software

(ii) use each of any four application packages:

Application     Function/Uses:

MS Word, WordPad, Note Pad, WordPerfect, Writer
Used for word processing

MS Excel, Calc, Lotus 1-2-3, Quatro Pro
Used for spreadsheet, calculation and analysis

CorelDraw, Paint, Photoshop, PageMaker, Corel Graphics
Used for graphic works

FrontPage, Publisher, Dreamweaver, Cold fusion
Used for web design

MS Access, Oracle, Postgresql , Fox pro, Base, Dbase(Db) i-iv, Ingress, Sybase, My SQL
Used for database management

MS Outlook, Outlook express, MS Exchange, Sendmail
Used for email management

MS PowerPoint, Impress, Prezi, Harvard Graphics.
Used for presentation of seminar and lecture.

Maths, MATLAB,SPSS, Mintab,
Create and edit mathematical formulae/statistical Analysis

Internet Explorer, Mozilla Firefox, Opera Mini, Chrome, UCB, Netscape, Mozaic, Netsurf, Safari
Internet/Web browsers

(b) benefits of a presentation package:

Easy to create colourful and attractive design/presentation
Easy to convey messages to the audience
Easy to present and maintain eye contact with large audience
Enhances the assimilation of information
It makes the presentation interesting
It supports multimedia
To add/ create slides effects
Useful for developing speaker interaction
It supports Object Linking and Embedding (OLE)
It engages multiple learning styles
It improves audience focus
It summarizes complex topics and ideas into briefs and highlights
It supports easy way to organize ideas and information
Presentation in the absence of the speaker

(c) guidelines for creating a good MS PowerPoint presentation:

Font size should be such that the text is readable from the back of the room/by all
viewers
Message/Points should be brief/concise and precise/ straight to the point
Maintain consistent use of colour on all slides
Avoid too many texts on a slide
Contrast text colour and backgrounds
Transitions and animations/sound should be used sparingly and consistently to
avoid distractions
Add images to compliment messages and not to decorate slides
Use font size and type consistently on all slides
Always express a take home message for your audience
Create an outline for the presentation

4.
(a)
 (i) Data security is the protection /safety of data from destruction , corruption or
unauthorized access.

(ii) Data risk assessment is the process of determining/identifying the level of security of stored data
OR
Data risk assessment is the process of determining the safety of stored data
OR
The process of evaluating/measuring the potential risks of data

(b)
(i) Access control is a mechanism put in place to allow users have different levels of access to the database. OR
Access control is a process that allows users to have resources that they are authorised to use. OR
Access control is a mechanism to control data that is accessible to given users

(ii) access control methods in database security:

Username and Password
Role based Access control
Mandatory Access Control
Rule Based Access Control
Discretionary Access Control
Organisation Based Access Control
Responsibility Based Access Control
Identity Based Access Control
Authentication
Biometric verification/Facial Recognition/Voice Recognition/Eyes/Iris/Retina Recognition/Finger Print Recognition
Physical control/Use of Lock/Burglary Proof/Metal Protector
Personal Identification number (PIN)

(c) roles of a database administrator:

Maintaining users
Backup database
Managing data security and privacy
Modifying/editing/updating the database structure
Managing data integrity
Monitoring and optimizing the performance of the database
Database recovery
Generation of reports/outputs
Installs, Configures and Create Database
Creating Users/ ID (Credentials)
Deleting Users

5.
(a) Step 1- Launch the internet browser and Type www.mybooks.com in the address bar.
Step 2 - Click on “go” or press the “Enter” key.
Step 3 - Type Price of W,X,Y, Z, and M respectively in the search box to search for the books and their prices
OR
Scroll through lists of books and their prices
OR
Click on icon that shows list of books and prices

(b)
Steps:
Launch MS Excel
Enter “Name of Book” “ Book Price $”, “Book Price N” in any row respectively

Enter/Type the book names in cells under the “Name of Book”

Enter/Type prices in dollars in cells under “ Book Price $”,

Click on the cell under “Book Price N”
Type the formula to multiply dollar price with 120.
[ e.g. “=C2*120” OR
“=Price of Books in $ *120” and press the “Enter” key.]
Copy the formula to other cells under “Book Price N”/ Repeat step (v) for all books/ Press the fill handle of the cell in (v) above, and drag down to other books.
Click on File, Save As/Ctrl+ S /F12,
Type “Prices of Books” as File Name
Press Enter/Click on Save.

(c) Steps:

Launch email / Open email account and Click on “Compose/New message
In the “To” bar/box/field, type myfather@yahoo.com .”
In the “Subject” bar/box/field, type “Prices of books”
Click on “attach files/ attachment” to attach
Browse for the saved file “prices of books.xls”
Click on “attach files” to attach the file
Click on “Send” to send your mail.
OR
Click on File -
Select share -
Click on E-Mail -
Select send as attachment -
Type myfather@yahoo.com -
Click on send -
OR
Right click on the file icon -
Select send to -
Click on mail recipient -
Type myfather@yahoo.com -
Click on send -
OR
Click in File -
Select save & send -
Click on send using E-Mail -
Click send as attachment -
Type myfather@yahoo.com -
Click on send -

6.
(a)
Step1 - Click on the start button, “All Programs/Programs.”, Click on Microsoft Word/ Launch Ms Word/ Type WinWord in Run Dialog box on the Start-up Menu and Click on “Blank/New document.
Step 2- On Page Layout, click on Orientation , click on Portrait
 OR
File, click on Page Setup click on Margin click on Orientation click on Portrait
Step 3 - On Page Layout, click on Size click on A4
 OR
File, click on Page Setup click on Paper click on Paper Size click on A4
Step 4 - Type the report as provided using the keyboard.

bi) Begin the second and third sentences in new paragraphs:

Step 1- Place the cursor at the end of the first sentence and press the enter key.
Step 2- Place the cursor at the end of the second sentence and press the enter key

bii) Write the first sentence in capital letters, underline it and bold it;

Step 1- Highlight the first sentence ,
Step 2 - On the “Home Tab”, Select UPPER CASE on “change case” icon/ Press
Shift+F3 (Twice )
Step 3 - click on “underline” (Ctrl + U),
Step 4 - Click on “bold” (Ctrl + B)

biii) Begin the first letter of a sentence with capital letters:

At the beginning of the sentence, press shift + the first letter
OR
Press “Caps Lock”, type the first letter and press Caps Lock again” and continue typing
OR
Highlight the first letter of the sentence. On the menu bar, select “change case”
OR
The first letter will be changed automatically/by default after pressing the space bar.
OR
Press shift + the letter or press “Caps Lock” + the letter and press Caps Lock again”

biv) Represent the student’s observation in a table with three columns under the headings: Serial Number, Type of Vehicle, Number of vehicle:

On the “Insert” Tab, click on “Table” / Insert Table , Specify 3 columns.
In the first row, Type “Serial Number”, “Type of Vehicle” and “Number of Vehicle” accordingly in consecutive cells
OR
On the “Insert” Tab, click on “Table” ,Draw Table ,Draw table with 3 columns.
In the first row, Type “Serial Number”, “Type of Vehicle” and “Number of Vehicle” accordingly in consecutive cells
OR
Click on the table menu à“Insert” / click onTable ,Specify 3 columns.
In the first row, Type “Serial Number”, “Type of Vehicle” and “Number of Vehicle” accordingly in consecutive cells

bv) Merge the first two cells of the last row of the table, type “Total” and give the total number of vehicles observed in the column for number of vehicles:

Highlight the first two cells of the last row , Right-click on the highlighted cells , select “merge cells” from the pop-up menu. Type “Total”.
OR
Highlight the first two cells of the last row , Click on Table Tools Tab, Layout ,
select “merge cells” icon ,Type “Total”.

OR

Click on table tools , Design Tab ,Click on Eraser and erase the horizontal line to merge the cells .

OR
Select Eraser Tool from Tables and Borders bar , and click on the line joining the two cells.

bvi bvii)  Save the document with the name “vehicular traffic”:
File click  “Save As ” dialog box ,Type the filename “vehicular traffic” and press “Save ” or “enter ”
OR
Ctrl+ S or F12 , Type the filename “vehicular traffic” and press “Save” or “enter”

bviii) Print the document with the name “vehicular traffic” :

File -- Click on Print/Ctrl+ P -- and select the appropriate printer, then press “enter” or “OK”.




No comments:

Post a Comment

Waec Physics Specimen May/June 2019

Waec Physics Specimen May/June 2019 QUESTION 1 1. Pendulum Bob; 2. Retort stand and clamp; 3. Thread; 4. Stopwatch/clock; 5. Metre ru...