- The
Stepped Reckoner was developed by A. Gottfied Leibnitz. B. Herman
Hollerith C. John Von Neumann
D. William Schickard
- The
binary number 100101 can be written in denary as
A. 25 B. 37 C. 45 D. 211 - The
first stage in computer data processing procedure is
A. collection of data B. communication of information C. conversion of data D. manipulation of data - One
advantage of electronic data processing is that it
A. involves special skill B. deals only with simple data C. is completely error-free D. handles complex data - The
type of computer that has the ability of counting in discrete form is
referred to as
A. analogue computer B. digital computer C. hybrid computer D. versatile computer - One
reason for using Computer Aided Design in manufacturing is that
A. it uses few system resources B. manufacturing time is reduced C. designers do not need training to use it D. 3D designs are easily produced with it - Which
one of the following statements is true about Voice Over IP? It
A. converts voice and video data into a digital signal and transfers it over the Internet
B. converts voice and video data into a digital signal and broadcasts it via a transmitter
C. is a voice over communication system which is cyber-attack proof
D. is a circuit-switched data communication system - Which
one of the following sets of devices can be used to store data during
processing?
A. Cache, RAM and Register B. Cache, Register and ROM C. Flash Drive, ROM and Hard Disk Drive D. RAM, Register and Zip Drive - The
process of inspecting, transforming and modeling data to get useful
information is known as
A. collation B. interpretation C. execution D. analysis - One
disadvantage of using computer for information processing is
A. need for staff retraining B. increased running cost in the long run C. the increase in storage space D. redundancy of computers in the long run - The
diagram in Figure 1 illustrates process called A. information processing B. information transmission C. modulation D. synchronization
- The
transmitter in communication is the component that
A. decodes sender's signal by interpretation B. encodes interpreted data by using machine language C. broadcasts synchronous signals D. launches signal into the air - Which
of the following resources is not usually shared in a network?
A. VGA projector B. Laserjet printer C. Folder D. File - Factors
to be considered when creating a backup system in a computer network
include
A. amount of RAM, amount of data and time of backup
B. amount of RAM, type of data and frequency of backup
C. media to use, amount of data and frequency of backup
D. media to use, type of data and time of backup - The
URL www.exams.edu.ng
represents the website of
A. an examination body B. a Nigerian-based learning institution C. an educational institution in Niger D. a research institution in Niger - The
Post Office Protocol (POP) is used to
A. interconnect devices on the Internet B. retrieve email from a mail server C. transfer file from a server to a client D. send email from one user to another - A
user working on a computer that is running on Windows 7 issued the command
Ctrl + Alt + Del while typing a document.
What interface is expected to be displayed on the screen?
A. Restart Windows B. Shut Down Windows C. Windows Security D. Windows Task - Header
and Footer are added to a document in MS Word by just clicking on the
A. Edit menu B. Format menu C. Insert menu D. View menu - A
typist positioned the insertion point at the beginning of a line of text
in a word processor and then pressed down the Shift key and clicked
at the opposite end of the text. What would be the result of this action?
The text will be
A. copied into the clipboard B. cut into the clipboard C. deleted from the storage D. highlighted on the screen - The
Microsoft Excel menu bar icon shown in Figure 2 is used to
A. automatically add up selected values B. create label that spans multiple columns C. spot trends and patterns in user's data using bars, columns and icons D. organize data for easy analysis - To
add a new column to the right of the IGR column on the interface in
the figure above, the user would
A. right-click on cell C1 and then click on insert B. right-click on cell D1 and then click on insert C. right-click on column C and then click on insert D. right-click on column D and then click on insert - The
function of the foreign key in a database is to
A. uniquely identify tuples in a table B. provide a link between data in two tables C. uniquely identify an entity occurrence D. uniquely identify each record in a table - How
many primary keys exist in the figure above?
A. 3 B. 4 C. 5 D. 12 - Which
of the following lists contains the primary keys in the figure above?
A. Customers, Orders, and Products B. CustomerId, OrderId, ProductId C. CustomerId, FirstName, LastName and DateCreated D. Customers, CustomerId, FirstName, LastName, and DateCreated - Web
design packages include the following, except
A. Macromedia Dreamweaver B. iWeb C. Front Page D. Adobe PageMaker - The
part labelled IV in the image above is used to
A. shape objects B. select and transform objects C. draw lines and curves D. create texts - One
precautionary measure taken when cleaning a monitor is
A. covering the monitor with antiglare B. cleaning the monitor with alcohol C. unplugging the power supply cable D. using a vacuum cleaner to dust the monitor casing - Which
one of the following practices is considered ethical?
A. gaining access into school database to change one's grades
B. gaining access into government database to alter personal details
C. logging into a friend's social media account to read inbox messages
D. signing into school e-library to read e-books - Proper
network implementation and good ICT policies are types of
A. adaptive measures B. corrective measures C. perfective measures D. preventive measures - Preventive
maintenance measures in the computer room include the following options
except
A. good ventilation B. proper illumination C. the use of rugs D. the use of tiles - A
database administrator is responsible for the following tasks except
A. controlling and monitoring user access to the database
B. enrolling users and maintaining system security
C. maintaining archived data
D. maintaining connection between the local network and the Internet - Measures taken to avoid eye strain
include the following except
A. adjusting the brightness of the monitor
B. adjusting the height of the screen
C. blinking of eyes often
D. relaxing the body regularly - A
computer virus replicates itself into other programs or certain areas on
the disk during the
A. dormant phase B. execution phase C. propagation phase D. trigger phase - A
malware that copies and replicates itself using computer networks and
security flaws is
A. Rootkit virus B. Spyware C. Trojan horse D. Worm - The
entities in the figure above are named
A. RegNo, Name and Age B. Musa, Uche and Bayo C. Student and Subject D. Maths, Eng and DP - Which
one of the following statements is true about database tables?
A. All the tables in a database have a common name
B. A table may contain repeating groups
C. Entries in a column are from different domains based on datatype
D. There are no duplicate rows in a table - The
major difference between serial and sequential files is that sequential
files are
A. given a key B. sorted in a particular order C. stored as they come D. recorded in any storage medium - Which
one of the following pairs contains computer file classification?
A. Master file and serial file B. Random file and master file C. Reference file and random file D. Transaction file and master file - Which
of the following statements supports the goals of data backup?
I. Need for duplication II. Need for future reference III. Protection against data loss A. I and II only B. I and III only C. II and III only D. I, II and III - Which
of the following characteristics is associated with the architecture of
parallel database?
A. Communication cost and problems cannot be ignored
B. Machines can be far from each other
C. Machines are physically close to each other
D. It is usually associated with shared-nothing architecture







No comments:
Post a Comment