EducationWAEC Past Questions and Answers

WAEC Past Questions & Answer: Data Processing 2018

Welcome to our WAEC past question and answer series. In this post, we will be sharing Data Processing 2018 past questions and their answers for various subjects. Stay tuned enjoy while learning.



1. The first generation computers made use of



A. low level programming
B. high level programming language
C. object-oriented programming language
D. procedural programming language



2. Microprocessor was used as the main electronic component of the



A. first generation computers
B. second generation computers
C. third generation computers
D. fourth generation computers



3. The act of producing information from figures, text or images is called data



A. collation
B. conversion
C. preparation
D. processing



4. The following are primary sources of information except



A. questionnaire
B. publication
C. observation
D. processing



5. Which of the following is not considered when classifying computers



A. size
B. type
C. location
D. purpose



6. Which of these channels would enable business transactions between a buyer from Nigeria and a seller from Ghana



A. e-portal
B. e-library
C. e-commerce
D. podcasting



7. The ICT application which helps to resolve road congestion at junctions is



A. automatic teller machine
B. automatic traffic marshal
C. Street light
D. traffic light



8. The main components of the central processing unit (CPU) of the computer are



A. register and memory
B. control unit and register
C. control unit and ALU
D. ALU and BUS



9. Stages in data processing cycle includes the following except data



A. collation
B. gathering
C. parsing
D. processing



10. At what stage of information processing is data validation carried out?



A. Data analysis
B. Data collection
C. Data processing
D. Data summarisation



11. The media which enable electromagnetic signals to be transmitted through free space is known as



A. unguided media
B. intranet
C. guided media
D. ethernet



12. The following are advantages of networking except



A. spamming
B. sharing of resources
C. communication
D. backup



13. Which of the following devices would not transmit signals from one point to another?



A. telephone line
B. modem
C. fibre optics
D. coaxial cable



14. Another term for Uniform Resources Locator (URL) is



A. website address
B. IP address
C. domain name
D. data link



15. The website “www.google.com” indicates that Google is



A. a commercial organization
B. a non-profit organization
C. a research organization
D. an educational organization



16. Identify an operating system from the following software



A. Writer
B. MS One note
C. MS Access
D. Linux



17. Which of the following command would undo the last operation carried out in Microsoft Word



A. Ctrl + Z
B. Ctrl + Y
C. Ctrl + W
D. Ctrl + U



18. While typing, a series of letters were highlighted and the keyboard key combination “Ctrl + B” was executed, the highlighted letters would be



A. underlined
B. italicised
C. deleted
D. bold



19. Table 1 is a part of MS Excel worksheet which shows the mark obtained by some students in an examination. Use the table to answer questions 20 and 21.



S/N           A                                         B                        C                      D                              E                                F
1               NAME OF STUDENT         ENG LAN.         MATHS            DATA PRO.               COMP.                     CIVIC
2              ANENE LORRETA               65                      90                    70                             85                             65
3              BAKARE IMAN                    60                      65                    75                             80                             75
4              ENEH GRACE                      75                      65                    65                             75                             60
5              MOHEMMED DEJI              65                      60                    65                             60                             60
6              ONYEBUEKE DEBBY          89                      65                    60                             60                             65


Which of the following formulas would calculate the average score of the students in Mathematics?

A. = Average (C2:C6)
B. = Average (C2:F2)
C. = Average (C1:C6)
D. = Average (C1:F1)



20. Which of the following formulas would calculate the total score of ONYEBUEKE DEBBY’s in the five subjects



S/N           A                                         B                        C                      D                              E                                F
1               NAME OF STUDENT         ENG LAN.         MATHS            DATA PRO.               COMP.                     CIVIC
2              ANENE LORRETA               65                      90                    70                             85                             65
3              BAKARE IMAN                    60                      65                    75                             80                             75
4              ENEH GRACE                      75                      65                    65                             75                             60
5              MOHEMMED DEJI              65                      60                    65                             60                             60
6              ONYEBUEKE DEBBY          89                      65                    60                             60                             65


A. =SUM(B2:B6)
B. =SUM(A6:G6)
C. =SUM(A2:A6)
D. =SUM(B6:F6)



21. The following are advantages of a Database Management System (DBSM) except



A. restriction of unauthorised access to data
B. provision of multiple interfaces to different classes of users
C. provision of backup and recovery
D. compromise of data integrity



22. Extracting information in Database Management System (DCMS) involves



A. sorting
B. querying
C. editing
D. cross-referencing



23. A special effect that controls the way slides appear in PowerPoint presentation is called



A. WordArt
B. Transition
C. Theme
D. ClipArt



24. A reference to another page or resource on a website is done by



A. FTP
B. Hyperlinks
C. SMTP
D. Web page



25. The design output of a graphic package can be in the following file formats except



A. .rtf
B. .jpg
C. .gif
D. .bmp



26. The proactive maintenance of computer equipment before a fault or failure occurs is called



A. corrective maintenance
B. predictive maintenance
C. preventive maintenance
D. preservative maintenance



27. A good computer maintenance practice entails



A. washing the dusty computer parts with soap and water
B. keeping computer exposed to sunlight to dry the body
C. cleaning the display unit with methylated spirit
D. blowing the system unit with blower



28. Set of moral principles that regulate the use of computers and concerns professional and social conduct is known as



A. computer ethics
B. computer misuse act
C. computer use act
D. safety measure



29. Which of the following programs is a computer virus



A. Kaspersky
B. NOD 32
C. Norton
D. Tuareg



30. Precautionary measures on computer do not include



A. handling all files with care
B. giving access to unauthorised persons into the computer room
C. avoiding smoking in the computer room
D. avoiding dirts and dust in the computer room



31. The computer professional responsible for designing and maintaining a database is called database



A. programmer
B. operator
C. instructor
D. administrator



32. Computer virus is not transmitted through



A. formatting of documents
B. email
C. external storage device
D. internet



33. The following are attributes of computer virus except the ability to



A. modify other files
B. replicate itself in order to spread to other files and system
C. execute without the user’s approval
D. warn the user before execution



34. A relational database model is designed according to set of rules known as



A. Normalisation
B. Isolation
C. Grouping
D. Enumeration



35. Which of the following statements about relational model is not correct?



A. A file is a sequence of related records
B. A record consist of a row of data containing single value from each column
C. Data in the column of a table are of the same data type
D. Data in the rows of a table are of the same data type



36. Arranging records in a file according to a particular order is referred to as



A. matching
B. merging
C. sorting
D. updating



37. One advantage of indexed sequential file organization is that



A. index tables are small and can be searched quickly
B. it is cost effective
C. it is suitable for dynamically changing files
D. it requires less storage space



38. The protection of database against compromise is known as



A. data passwording
B. data protection
C. database encoding
D. database security



39. Which of the following is a characteristic of parallel databases?



A. there can be shared-memory or shared disk
B. they are connected using public purpose network
C. machines in this environment are in different locations
D. it has local autonomy



40. Information that stimulates both the senses of hearing and sight is called



A. audio information
B. audio-visual
C. video information
D. visual information







Answers To Questions

  1. A
  2. C
  3. D
  4. B
  5. C
  6. C
  7. D
  8. C
  9. C
  10. A
  11. A
  12. A
  13. B
  14. A
  15. A
  16. D
  17. A
  18. D
  19. A
  20. D
  21. D
  22. B
  23. B
  24. B
  25. A
  26. C
  27. D
  28. A
  29. D
  30. B
  31. D
  32. A
  33. D
  34. A
  35. D
  36. C
  37. C
  38. D
  39. A
  40. B

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button