EducationWAEC Past Questions and Answers

WAEC Past Questions & Answer: Data Processing 2020

Welcome to our WAEC past question and answer series. In this post, we will be sharing Data Processing 2020 past questions and their answers for various subjects. Stay tuned enjoy while learning.



1. The use of Visual Display Unit was a major breakthrough in the



A. first generation computers
B. second generation computers
C. third generation computers
D. fifth generation computers


2. In hexadecimal system, D is equivalent to



A. 15
B. 14
C. 13
D. 10



3. A teacher computed the average score of students in given test



A. record
B. information
C. data
D. file



4. The sum of 1102 and 1012 is



A. 11012
B. 11102
C. 11002
D. 10112



5. One advantage of the first generation computers is



A. Processing speed
B. Portability
C. heating effect
D. burglar-proof



6. Magnetic Ink Character Recognition is applied on



A. voice recognition devices
B. mobile devices
C. large data capturing machines
D. bank cheques



7. Internet banking entails



A. applying computer networks in banking operation
B. applying computers to automate banking operations
C. generating tokens and One-Time-Passwords for online payments
D. Using ATM for banking operations



8. Which of the following parts of the computer ensures the smooth operation of its hardware?



A. Main memory
B. Control unit
C. Auxiliary age
D. Arithmetic and Logic Unit



9. Basic computer operations include the following except



A. control
B. input
C. output
D. process



10. One disadvantage of electronic data processing is



A. handling complex computation
B. medium for effective storage
C. processing data at a phenomenal speed
D. vulnerability to attack



11. Which of the following sources of information is received by the user in visual mode only?



A. Television
B. Radio
C. Photograph
D. Computer



12. Which of the options A to D is not a medium of information transmission?



A. Cable
B. Satellite
C. Television set
D. Wireless transmission



13. A company has four computer system, one printer and one scanner for its daily operations. One factor that can motivate the company to connect all the devices in a network is the need to



A. provide efficient services
B. save running cost
C. share software only
D. use a wireless connection



14. One similarity between the internet and intranet is that they both



A. were invented by the same company
B. use the same technology
C. have the same coverage
D. are open to the public



15. The process of copying data or information form the internet to a personal computer is termed



A. browsing
B. downloading
C. retrieving
D. surfing



16. An entrepreneur who wishes to send digital data over a telephone line would need a



A. hub
B. modem
C. router
D. switch



17. Graphical User Interface is considered user friendly because of the following reasons except that it



A. compels the user to learn all the command before operating the system
B. displays all the actions available to the user for easy access.
C. is easier for user to operate and understand
D. makes the icons and menu familiar to the user



18. The symbols dialog box of MS Word application is located on the



A. format menu
B. help menu
C. insert menu
D. view menu



19. Pressing the key combination Ctrl + J on a selected text in a Microsoft Word document would



A. align the text
B. deselect the text
C. justify the paragraph
D. juxtapose the text



20. The merge button in spreadsheet application is used to



A. combine adjacent cell
B. convert selected cell into single cell
C. merge two tables
D. split a cell into two or more cells



21. If cell A20 in MS Excel contains the value 5, then the formula “A=A20^3” will return a value equal to



A. 15
B. 25
C. 65
D. 125



22. A database contains list of customers and their phone numbers. What typ of relationship describes a customer having multiple phone numbers?



A. Many-to-many
B. Many-to-one
C. One-to-many
D. One-to-one



23. The DBSM statement select* from Marksheet in table Marksheet will display all records in the fields;



ID                                   NAME                                  SCORE                                     GRADE
001                                Abdul                                   55                                             C
002                                Emeka                                 52                                             C
003                                Kola                                     49                                             P




A. ID and Name only
B. ID, Score and Grade only
C. Score and Grade only
D. ID, Name, Score and Grade



24. Which of the following objects is not located on the slide layout



A. Animations
B. Charts
C. Lists
D. Titles



25. The following programming tools are employed by



A. COBOL
B. CSS
C. HTML
D. PHP



26. Graphics can be captured using the following devices except



A. webcam
B. scanners
C. joystick
D. digital camera



27. Which of the following substances is used for cleaning the mouse ball



A. Distilled water
B. Engine oil
C. Isopropyl alcohol
D. Kerosene



28. One characteristics of a dirty mouse is that the mouse



A. is not recognised by the system
B. unmount itself from the system
C. pointer changes appearance
D. pointer moves erratically



29. One responsible way of using the computer is



A. software piracy
B. phishing
C. pharming
D. ethical hacking



30. Any activity carried out to protect the user from hazards while using the computer is called



A. computer ethics
B. computer maintenance
C. laboratory rules
D. safety measures



31. In order to protect a computer on the World Wide Web from throats, the user should



A. Install the latest operating system version
B. Install a single user antivirus software
C. implement an internet security software
D. deploy online transaction application



32. Responsibilities of a database administrator includes the following except performing



A. database backup
B. data recovery
C. network maintenance
D. user authentication



33. The following tools are used for protecting the computer against virus attack except



A. Avast anti malware
B. Kaspersky
C. Norton
D. Trojan horse



34. Which of the following software replicates itself without being executed by the user



A. worm
B. Trojan
C. Plug-ins
D. Driver



35. In the model; Furniture (Table, Chair, Wardrobe) Furniture is…



A. a relation
B. a schema
C. a tuple
D. an attribute



36. Which of the following database operations does not require a Data Maniulation Language?



A. Modification of information
B. Insertion of new information
C. Deletion of information
D. Creating of information



37. The file organisation method which allows records to be accessed in any sequence is



A. Index
B. random
C. sequential
D. serial



38. A file organization that has reference which identifies a record in relation to other records is called…



A. indexed file organization
B. random file organization
C. sequential file organization
D. serial file organization



39. Providing access control to a school is the responsibility of a



A. database administrator
B. programmer
C. system administrator
D. system analyst



40. Figure 1 depicts…



A. a distributed database
B. a parallel database
C. an extranet
D. an internet


 

Answers To Questions

  1. C
  2. C
  3. B
  4. D
  5. A
  6. D
  7. A
  8. B
  9. A
  10. D
  11. C
  12. C
  13. B
  14. B
  15. B
  16. C
  17. A
  18. C
  19. C
  20. B
  21. D
  22. C
  23. D
  24. A
  25. A
  26. C
  27. C
  28. D
  29. D
  30. D
  31. C
  32. C
  33. D
  34. A
  35. A
  36. C
  37. B
  38. A
  39. A
  40. C

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button