WAEC Data Processing 2024 Answers
- A. Gottfried Whichelm Lebniz A Stepped Reckoner is a mechanical calculator invented by Gottfried Wilhelm Leibniz in 1673. The Stepped Reckoner could perform: Addition, Subtraction, Multiplication and Division
- B. 37
The binary number 100101 can be converted to decimal by multiplying each bit by its place value
(powers of 2) and adding them up:
(1×32) + (0×16) + (0×8) + (1×4) + (0×2) + (1×1) = 32 + 0 + 0 + 4 + 0 + 1 = 37.
This shows how binary (base-2) represents data in digital computers. - A. Collection of data Data processing begins with collecting raw data. Without input data, no meaningful processing can occur. This step involves gathering facts, figures, or observations that will later be validated, processed, and analyzed.
- D. Handles complex data Electronic Data Processing (EDP) systems can handle large and complex datasets much faster and more accurately than manual methods. Tasks like calculations, sorting, searching, and statistical analysis can be performed efficiently.
- B. Digital computer Digital computers process discrete data, typically represented as binary (0s and 1s). Unlike analog computers, which deal with continuous data, digital computers are ideal for precise calculations, database management, and programming tasks.
- B. Manufacturing time is reduced Computer-Aided Design (CAD) allows designers to create and simulate products digitally before production. This reduces trial-and-error in physical prototyping, shortens design cycles, and speeds up manufacturing.
- A. Converts voice and video data into digital signals and transmits over the Internet Voice over IP (VoIP) converts analog voice signals into digital packets for transmission over the Internet. This enables voice and video communication without traditional telephone lines, reducing cost and allowing integration with other digital services.
- D. RAM, Register and Zip Drive RAM and CPU registers are primary memory used during active processing to store temporary data. Zip drives, though less common today, are secondary storage that can also hold data during processing. This combination illustrates different storage layers in computing systems.
- D. Analysis Analysis is the stage where processed data is examined and interpreted to extract useful information. It follows data validation, sorting, and processing, converting raw numbers into insights or reports.
- B. Increased running cost in the long run While computers improve efficiency, they also incur costs such as electricity, maintenance, software updates, and hardware replacement over time. This is considered a disadvantage of electronic data processing.
- A. Information processing The diagram typically shows data moving from input through processing to output. This sequence represents information processing, where raw data is transformed into meaningful information.
- D. Launches signal into the air In a communication system, the transmitter sends signals from the source into a transmission medium such as air, cables, or optical fiber so that it can reach the receiver.
- C. Folder Network resources such as printers, files, and applications are usually shared. A folder itself is only a container for files and is not typically considered a network resource.
- C. Media to use, amount of data and frequency of backup An effective backup system depends on the type of storage media, how much data is involved, and how often the backup is carried out to prevent data loss.
- A. An examination body The domain name ".edu.ng" indicates an educational institution in Nigeria, commonly used by examination bodies, schools, and academic organizations.
- B. Retrieve email from a mail server The Post Office Protocol (POP) allows users to download emails from a mail server to their local computer or device for reading.
- C. Windows Security Pressing Ctrl + Alt + Del in Windows opens the Windows Security screen, which provides options such as Task Manager, Lock, and Sign Out.
- C. Insert menu In Microsoft Word, headers and footers are added through the Insert menu, which contains tools for adding page elements such as tables, pictures, headers, and footers.
- D. Highlighted on the screen Using Shift-click selects all text between the first click position and the second click, causing the selected text to be highlighted.
- A. Automatically adds selected values The AutoSum icon in Microsoft Excel quickly calculates the sum of selected numeric values without manually typing a formula.
- D. Right-click on column D and click Insert In spreadsheet applications, inserting a new column to the right requires right-clicking the target column header and selecting the Insert option.
- B. Provide a link between data in two tables A foreign key connects records in one table to records in another table, ensuring data consistency and supporting relational database design.
- B. 4 The figure shows four tables, each with a unique identifier. Each table has one primary key, giving a total of four primary keys.
- B. CustomerId, OrderId, ProductId Primary keys uniquely identify records in a table. The listed fields are identifiers that ensure each record can be uniquely accessed.
- D. Adobe PageMaker Adobe PageMaker is a desktop publishing application, not a web design tool. Web design packages focus on creating and managing websites.
- C. Draw lines and curves The labelled tool in graphics software is commonly used for drawing shapes such as straight lines and curves when creating or editing images.
- D. Unplugging the power supply Disconnecting the power source before cleaning a monitor prevents electric shock and protects the equipment from damage.
- C. Logging into a friend’s social media account Accessing another person’s account without permission violates privacy and ethical rules of ICT usage, even if no harm is intended.
- D. Preventive measures Proper network implementation and ICT policies help prevent security issues before they occur, making them preventive rather than corrective measures.
- C. The use of rugs Preventive maintenance involves actions like regular cleaning and proper ventilation. Rugs do not directly protect computer systems and may even attract dust.
- D. Maintaining connection between local network and the Internet A database administrator is responsible for managing databases, ensuring data security, backup, and integrity. Maintaining Internet connectivity is the duty of a network administrator, not a database administrator.
- C. Blinking of eyes often Proper lighting, correct seating position, and screen adjustment help reduce eye strain. Blinking often is a natural action but is not considered a direct preventive measure.
- C. Propagation phase During the propagation phase, a computer virus spreads itself by copying into other files, programs, or systems, allowing it to infect more computers.
- D. Worm A worm is a type of malware that replicates itself and spreads across networks without needing to attach itself to a host program.
- A. RegNo, Name and Age These are entity attributes that describe a student record in a database. They represent the properties or fields used to store information about each entity.
- C. Entries in a column are from the same domain In a database table, all values in a column must follow the same data type or domain, ensuring consistency and data integrity.
- B. Sorted in a particular order Sequential files are organized in a specific order based on a key field, unlike serial files which store records in the order they are entered.
- A. Master file and serial file Computer files are classified based on their function. Master files store permanent data, while serial files store records without any specific order.
- D. I, II and III Data backup ensures data recovery after failure, protects against data loss, and supports system reliability. All listed statements correctly describe backup objectives.
- C. Machines are physically close to each other In parallel database architecture, multiple processors work together within close proximity to process data simultaneously, improving speed and efficiency.
Really helpful thanks👍
ReplyDelete