Professional Documents
Culture Documents
D.P. Questions
D.P. Questions
● A. Blaise Pascal
● B. Gottfried Leibniz
● C. J. Prosper Eckert
● D. Dr. Herman Hollerith
ANSWER D
● A. 100111
● B. 110011
● C. 10001
● D. 1111011
ANSWER A
● A. data verification
● B. data validation
● C. data cross check
● D. data control
ANSWER B
ANSWER D
6
Facebook, Twitter and WhatsApp are examples of
● A. social media
● B. social communication
● C. networking media
● D. search engines
● A. RAM
● B. bubble memory
● C. floppy disk
● D. EPROM
9
Information analysis procedures includes the following except
● A. automatic processing
● B. hacking
● C. fast and reliable processing
● D. storage capacity
● A. multimedia transmission
● B. polymedia transmission
● C. unimedia transmission
● D. monomedia transmission
● A. I and II
● B. I and III
● C. II and III
● D. I, II and III
14
Social networking does not promote.
● A. personal publicity
● B. business expansion
● C. e-commerce
● D. e-payment
ANSWER D
ANSWER B
● A. quotation marl (
● B. equality sign (=)
● C. underscore (_)
● D. apostrophe sign (')
ANSWER D
● A. Enter key
● B. Arrow key
● C. Esc key
● D. Tab key
ANSWER C
● A. compiling
● B. virtual memory
● C. multitasking
● D. load modules
ANSWER D
● A. query
● B. report
● C. form
● D. table
ANSWER A
● A. web analysis
● B. web maintenance
● C. web design
● D. web publishing
24
The type of data entered into a table in database follow a set of rules known as?
● A. protocols
● B. regulators
● C. algorithms
● D. constraints
● A. Smart Art
● B. Shape tool
● C. Textbox
● D. Word Art
● A. ergonomy
● B. economy
● C. ergophobia
● D. biomechanics
● A. highlight an item
● B. drag an item
● C. select an item
● D. move an item
● A. master
● B. transition
● C. back-up
● D. reference
● A. surge protector
● B. metal detector
● C. smoke detector
● D. fore extinguisher
● A. Network Administrator
● B. Web Master
● C. System Analyst
● D. File Manager
● A. drivers
● B. worms
● C. trojan horses
● D. logic bomb
● A. direct access
● B. sequential
● C. serial
● D. hierarchical
● A. Encryption
● B. Data integration
● C. Personal Identification Number
● D. Username and passwords
● A. primary key
● B. foriegn key
● C. normal key
● D. composite key
● A. one to one
● B. three to four
● C. four to three
● D. one to many
● A. trojan
● B. driver
● C. antivirus
● D. spyware
● A. data sharing
● B. data security
● C. faster processing of data
● D. uniform memory access
39
In a relational database management system, files are organized as relations and
● A. tuple
● B. modules
● C. tables
● D. forms
● A. transmission rules
● B. transfer rules
● C. channels rules
● D. protocols
(iii) List two differences between an operating system and application system
software.
b Starting from the Save As dialogue box, outline the steps involved in passwording a
document in a word processing package.
(i) Database
44
(a) Define;
(i) Data Security (i) Data risk assessment
(a) How to log on to www.mybooks.com and obtain the prices of books W, X, Y, Z and
M.
(b) How to tabulate the prices in a worksheet, showing the prices in dollars and the
naira equivalent, for each book and save the workbook as "Prices of Books". Assume
that the prices of the books are given in dollars, [use $1.00=N120.00].
(c) How to send the workbook in 5(b) as an attachment to your father's email address
(myfather@yahoo.com) with the subject "Price of Books".
1. Introduction; I was directed by the school principal to sit at the main gate and record
the type and number of vehicles that passed through the gate on Monday morning.
2. Observation; I arrived at the gate at about 8;00am and left at 12 noon. During this
period, I made the following observation; Car, bus, bus, car, lorry, motorcycle, car,
tricycle, motorcycle, bus, bus."
(a) Beginning from the desktop, outline a step by step procedure of how to type the
passage in MS word, using A4 paper size and portrait orientation.
(b) State the procedure for carrying out the following operations in the passage;
(i) Begin the second and third sentences in new paragraphs; (ii) Write the first sentence
in capital letter underline it and bold it. (iii) Begin the first letter of a sentence with capital
letters (iv) Represent the student's observation in a table with three columns under the
headings; Serial Number, Type of vehicle, Number of vehicle (v) Merge the first two
cells of the ast row of the table and type "Total"and give the total number of vehicles
observed in the column for number of vehicles (vi) Save the document with the name:
"Vehicular traffic"(vii) Print the document.
● A. Blaise Pascal
● B. Joseph Jacquard
● C. Mauchly and Eckert
● D. Von Leibniz
● A. Fourth
● B. Third
● C. Second
● D. First
49
Which of the following is an alphebetical data?
● A. Bed
● B. Ax44jj
● C. AB+CD
● D. %
● A. data set
● B. multimedia data
● C. multi-purpose data
● D. multi-variable data