Header Ads

2017 WAEC Data Processing OBJ & Essay Questions And Answers/ Expo




DATA PROCESSING LOADING>>>>>>
1a. The operating system is
the most important
program that runs on a
computer. Every general-
purpose computer must
have an operating
system to run other
programs and
applications. Operating
systems perform basic
tasks, such as
recognizing input from
the keyboard, sending
output to the display
screen, keeping track of
files and directories on
the disk, and controlling
peripheral devices such
as disk drives and
printers.
2b.Data Dictionary Management
-Data Storage Management
-Data Transformation and Presentation
2c -1. Overwrite it
-2 Demagnetise it
(2d) NO 1 - BACKUP
There is nothing that can replace backup to prevent
data loss and avoid expensive recovery. PRACTISE
GOOD WORKING HABITS
While working on your computer, if you choose the
correct steps, it will help you to prevent major data
loss and in the worst case scenario, will help you to
increase the chance of successful recovery.
3a) application package
Bundle of two or more computer programs that
together address a specific business need. For
example, an 'illustration package' might include a
drawing program, photograph manipulation
program, page setting program, and a color
matching and output control (printing) program.
4a) Data security refers to protective digital privacy
measures that are applied to prevent
unauthorized access to computers, databases
and websites. Data security also protects data
from corruption. Data security is the main
priority for organizations of every size and
genre.
Data security is also known as information
security (IS) or computer security.
4ai Examples of formal risk assessment techniques and
measurements include conditional value at risk-cVaR
(used by portfolio managers to reduce the likelihood
of incurring large losses); loan-to-value ratios (used
by mortgage lenders to evaluate the risk of lending
funds to purchase a particular property); and credit
analysis (used by lenders to analyze a potential
client's financial data to determine whether to lend
money and if so, how much and at what interest
rate).




(2a)
(i)A database is a collection
of information that is
organized so that it can
easily be accessed,
managed, and updated.
(ii) A database management
system (DBMS) is a system
software for creating and
managing databases by
providing users and
programmers with a
systematic way to create,
retrieve, update and manage data ..


2aii)i)Resident Viruses

ii)Multipartite Viruses

iii)Direct Action Viruses

2b)i)Vulnerabilities and attacks-s a system susceptibility or flaw, and many vulnerabilities are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities as they are discovered.

(2d)

(i) Some jobs may be lost due to computerization and thus lowerthe morale of staff members.

(ii) Some staff has to be trained or retrained.

(iii) Extra cost is required to employ specialized staff to operate anddesign the data processing system.

2i.Resident evil
ii. Titanic
iii. Avengers
iv. Kabayaki virus

(4a)- Be adaptable-Be detail - oriented- Work collaboratively- Communicate well

(4b)i Nigeria is a computer society.(NCS)

ii Nigeria Internet Group(NIG)

iii Computer ProfessionalsRegistration Council of Nigeria (CPCN).iv Nigeria Internet Exchange (NIA)

(4c)WiFi - Wireless FidelityGUI - Graphical User Interface

1b it can be defined as an umbrella term that includes any
communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications.


1a) super computer
ii) mainframe computer
iii)mini computer 
iv)mirco computer

2(a) Computer ethics is a part of practical philosophy which concern with how computing professionals should make decisions regarding professional and social conduct.

1b ) Information ormation and communications technology (ICT) refers to all the technology used to handle telecommunications, broadcast media, intelligent building management systems, audiovisual processing and transmission systems, and network-based control and monitoring functions.

 2b)2b. 

Below are suggestion of rules and regulations for computer lab users.

1. Pupils are prohibited to enter the lab unless authorised by the teacher.

2. Scan diskettes before using them.

3. Report all problems related to the system to the teacher.

4. Do not attempt to repair or tamper with lab equipment.

5. Be responsible when using equipment, software and facilities in the lab.

1a) super computer
ii) mainframe computer
iii)mini computer 
iv)mirco computer


1b 

it can be defined as an umbrella term that includes any
communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications.

2

.Computer ethics is 
 part of practical philosophy
which concern with how computing professionals
should make decisions regarding professional
and social conduct.

2b)2b. 

Below are suggestion of rules and regulations for computer lab users.

1. Pupils are prohibited to enter the lab unless authorised by the teacher.

2. Scan diskettes before using them.

3. Report all problems related to the system to the teacher.

4. Do not attempt to repair or tamper with lab equipment.

5. Be responsible when using equipment, software and facilities in the lab.

6ai] Monitor
6aii]
iMonitor
ii. printers
6aiii] III. - CPU
VI- SOCKET AC SOURCE
VII- PRINTER.
6iv] Ensure you use stabilizer when using the computer so that the power source will not be fluctuating.
6v] true the Keybord/cpu
6vi] fan.
1c. 
-   ---   ICT has also change the way we shop
ICT has changed the way we shop lots of people shop online now for a number of things like: cloths, games, food and music witch is easier for us most of the time 

----- ICT technology has changed the way we judge sports how we watch them and also in some case’s how we competed in them. the use of game consoles have a lot to do with sport is well Lewis Hamilton said that he managed to learn the racing tracks because he had played them on his PlayStation

------  Some ICT technology has taken over lots jobs because for example one special built robot can do the work that 60 people would do in a quicker time and also up to a better standard and this is happening because now it is cheaper for the business or companies to do this because then they don’t have to pay the works or pay to keep the room or area they work in heated they also don’t have to pay for sick pay and the robots will work longer they would be faster and the work would be better quality then humans.


 1b 


Legitanswer.com


it can be defined as an umbrella term that includes any

communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications.


2


.Computer ethics is 

 part of practical philosophy

which concern with how computing professionals

should make decisions regarding professional

and social conduct.


2b)2b. 


Below are suggestion of rules and regulations for computer lab users.


1. Pupils are prohibited to enter the lab unless authorised by the teacher.

Legitanswer.com



2. Scan diskettes before using them.


3. Report all problems related to the system to the teacher.





4. Do not attempt to repair or tamper with lab equipment.


5. Be responsible when using equipment, software and facilities in the lab.





6ai] Monitor

6aii]

iMonitor

ii. printers

6aiii] III. - CPU

VI- SOCKET AC SOURCE, By 


Legitanswer.com


6iv] Ensure you use stabilizer when using the computer so that the power source will not be fluctuating.

6v] true the Keybord/cpu


 (4a)- Be adaptable-Be detail - oriented- Work collaboratively- Communicate well

(4b)i Nigeria is a computer society.(NCS)

ii Nigeria Internet Group(NIG)

iii Computer ProfessionalsRegistration Council of Nigeria (CPCN).iv Nigeria Internet Exchange (NIA)

(4c)WiFi - Wireless FidelityGUI - Graphical User Interface

Legitanswer.com
Mr Jonna is this correct
Keep on refreshing this page to  get the answers


NOTE, WE ONLY NEED 100 PEOPLE, TO COMMENT, KINDLY WRITE “I NEED IT” IN THE COMMENT BOX BELOW. And send your mtn 400 to 09064911281. For you to receive the answers direct to your mobile phones immediately....
Data Proccessing answers, has been posted already for OUR  subscribers,  But you  can



Or  You
Subscribe now with Legitanswer.com and make your papers once.

Subscription cost 3,000naira for all  SUBJECTS (BOTH PRACTICAL )

To subscribed call or whatsapp 09064911281



No comments

Powered by Blogger.