2019-04-11

Waec Data Processing Part 2,Essay May/June 2014 Answers



Waec Data Processing Part 2,Essay May/June 2014 Answers

1.
a.
i.computer virus is a software/program that duplicates itself and interferes with the normal functioning of the computer system.  ii.sources of computer viruses :
- Infected removable storage devices, opening/downloading infected webpages/links from the internet and connecting the computer to an infected network.
iii.ways of preventing computer virus infection :
 use of anti-virus, run anti virus scan on removable media and not opening unknown or suspicious files.

 b.
i. function of the input unit:
 for entering/capturing/feeding data/information into the computer.

 ii.function of the memory unit :
serving as the medium for the storage of data/information in the computer system.
 .
c.
i. example of an input unit is the keyboard,mouse,joystick,light pen
ii. example of the memory unit is the Random Access Memory (RAM),ROM,hard disk


2.
a.
i. word processing applications :
 Microsoft Word, Word Perfect, Open Office writer, Libra Office Writer and Word Stare.
ii. difference between save as and save :
 while the Save command is used to save an already existing document, the Save AS command was used to save a new document. It was also used to rename a saved file or duplicate a saved file in another location.
b.
 i. ctrl + shift + +
will change characters to superscripts and superscripts to normal characters.
ii. ctrl + E
 will centre align/centralize text or would remove centre alignment on text.
c.
i. measures that the secretary should take in order not have medicalproblem:
 – covering the monitor with anti-glae screen protector, raising the monitor to her eye level and stretching her legs by walking round at intervals.
ii.health related challenges that the secretary is likely to face :
 – back ache, neck ache

3.a.   

S/N       COMPUTER PROFESSIONAL              COMPUTER USER
1            Has undergone a course of study/training and is certificated
                                                                                         Not certificated
2             Is a member of a Computer Professional organization
                                                                                        Is not a member of any professional Organization
3b.

S/N     COMPUTER PROFESSIONAL       Function
1       Database Administrator
                   Creates, updates and manages databases 
                   Controls and implements database security, database recovery and control
2      Systems Analyst
                   Carries out feasibility studies on systems and systems design
                   Recommends systems specification to the Programmer.
                   Liaise between the user and the Programmer
3      Programmer
                   Writes codes/instructions for the computer
3      Network Administrator
                   Sets up, oversees and coordinates the smooth functioning of the computer Network.
                    Provides network support services to the users
4      Website Developers/Designers/Administrator
                     Designs, develops, updates and maintain Websites. He is also responsible for website security
5      Computer Engineer
                      Provides Hardware specifications
                      Designs and develop systems programs
                      Computer troubleshooting
6       Computer Hardware Technician
                      Maintenance/repair of computers
                      Upgrading of computers
                      Setting up/installations of computers
7       Data Processing Manager
                      Plans, organizes, coordinates and reviews the activities of data processing staff

3c.
safety measures to be taken when working in a computer laboratory: 
use of soft and dry cleaning materials, maintaining proper sitting position, provision of adequate ventilation, proper shut down of the computer system, avoiding eating and drinking in the Laboratory and maintaining a dust free environment.


4.
(a)(i), Database Management Systems :
 Microsoft Access, SQL Server, My SQL, Dbase and Oracle.
(ii) ways of ensuring unauthorized access to the stored data :
 use of passwords and Data coding/encryption.
(iii),  advantages of networking all the computers in the various departments of the hospital :
– to promote file sharing and information distribution within the hospital, to enhance easy access to patients’ records, to enhance easy update of patients’ records, to ensure the overall efficiency of the hospital’s management.

b.The network type that can be implemented in the hospital is :
 Local Area Network(LAN).

c.differences between Graphical User Interface and Command Line Interface :
S/N      GRAPHICAL USER INTERFACE          COMMAND LINE INTERFACE
1             Makes use of Windows, Icons, Menus, Pointer (WIMP)
                                                                                        Makes use of commands
2              It is user friendly and interactive
                                                                                        It requires the user to memorize the commands
3.             Makes use of other input devices
                                                                                        Makes use of only the keyboard

No comments:

Post a Comment

Waec Physics Specimen May/June 2019

Waec Physics Specimen May/June 2019 QUESTION 1 1. Pendulum Bob; 2. Retort stand and clamp; 3. Thread; 4. Stopwatch/clock; 5. Metre ru...