EducationWAEC Past Questions and Answers

WAEC Past Questions & Answer: Data Processing 2021

Welcome to our WAEC past question and answer series. In this post, we will be sharing Data Processing 2021 past questions and their answers for various subjects. Stay tuned enjoy while learning.




1. The main component of the first generation computer was



A. microchip
B. transistor
C. integrated circuit
D. electronic valve



2. The term Garbage-In-Garbage-Out is used to explain the characteristics of the computer in terms of



A. storage
B. speed
C. power
D. accuracy

 


3. The number 1011001012 in denary is



A. 753
B. 653
C. 357
D. 356



4. Which of the following statements is true?



A. Data leads to information and information leads to knowledge
B. Data leads to knowledge and knowledge leads to information
C. Information leads to data and data leads to knowledge
D. Knowledge leads to information and information leads to data



5. The type of computer that counts in discrete form only is referred to as



A. analog computer
B. digital computer
C. hybrid computer
D. mainframe computer




6. Which of the following media involves point-to-point communication?



A. Radio
B. Satellite
C. Telephone
D. Television



7. Fourth generation computer application can execute the following operations except



A. digging of drainages
B. drainage channel design
C. management of recreational facilities
D. payroll management



8. The joystick is mainly used for



A. clicking the links on web pages
B. drawing and playing computer games
C. erasing of unwanted graphics
D. typing of document in a word processor



9. The manipulation of digitalised information by computer by computer or other electronic equipment is known as



A. data collation
B. data manipulation
C. information manipulation
D. information processing



10. Which of the following actions is not a source of computer virus?



A. Checking of e-mail
B. Downloading programs
C. Reading form CD/DVD
D. Uploading data



11. When information is conveyed from one space to another, it is referred to as information



A. retrieval
B. translation
C. transmission
D. transportation



12. Which of the following file organisations requires primary Key?



A. Indexed file organization
B. Random file organization
C. Serial file organization
D. Sequential file organization



13. The protocol for transferring filed from one machine to another is



A. SNMP
B. SMTP
C. FTP
D. FAT



14. Mr Francis has an office complex with 20 rooms. What type of network is suitable for connecting all the computers in their various rooms into a single network?



A. LAN
B. MAN
C. PAN
D. WAN



15. The following software are web browsers except



A. Firefox
B. Google Chrome
C. Linux
D. Opera




16.
Use Figure 1 to answer question 16

To visit the previous page using the interface in Figure 1, the user will click on the part labeled



A. I
B. II
C. III
D. IV



17. An operating system that enables more than one user to access the same data is called



A. multi-tasking OS
B. multi-user OS
C. single user OS
D. virtual memory OS



18. The feature of a word document that shows the page, number of words and errors found in a document is the



A. menu bar
B. scroll bar
C. status bar
D. title bar



19.
Figure 2 shows a dialog box from Microsoft Word application. Use it to answer question 19

Which of the following command shortcuts can be used to display the dialog bax in Figure when the application is running?



A. Ctrl + O
B. Ctrl + S
C. Ctrl + Y
D. Ctrl + Z



20. The highest sale by Joy is recorded in cell

 

S/N                          A                 B                C                   D                E                   F                     G                     H
       1                             STAFF        DAYS          ITEMS           ITEMS        ITEMS         ITEMS             ITEMS     ITEMS 
       2                            JOY            MON           208               300            500             400                  300             158
       3                            AKIN           TUE            300               200            500             400                  200             200
       4                            KEN            WED           400               300            400             500                  100             300

A. F1
B. B4
C. B4
D. E2



21. The formula to calculate the average of a given range of data from cell B2 to cell D4 in a Microsoft Excel worksheet is



A. = AVERAGE (B2+D4)
B. =AVERAGE (B2:D4)
C. =AVERAGE(B2, D4)
D. =AVERAGE(B2;D4)



22. The field in a database which uniquely identifies each record is called a



A. composite key
B. foreign key
C. local key
D. primary key



23. The correct order of the steps taken in creating a database from the database template in MS Access 2007 is



A. click on the Office button –> click New –> choose a database of your choice
B. click New –> click on Office button –> choose a database of your choice
C. click on database of your choice –> click New –> click on Office button
D. click New –> choose database of your choice –> click on Office button



24. To show the whole presentation in Microsoft PowerPoint 2007, select slide show from the



A. design tab
B. home tab
C. title bar
D. menu bar



25. Web design packages includes the following except



A. Macromedia Dreamweaver
B. iWeb
C. Front Page
D. Adobe PageMaker



26
Figure 4 shows CorelDraw tool bar. The part labeled I is used to



A. shape objects
B. select objects
C. draw lines and curves
D. create texts



27. One precautionary measure taken when cleaning a monitor is’



A. plugging of power supply cable
B. spraying a windows cleaner on the monitor
C. unplugging the power supply cable
D. using a vacuum cleaner to clean the monitor casing



28. The erratic movement of the mouse pointer is usually caused by



A. damaged driver
B. dirty mouse ball
C. improper connection of mouse cable
D. outdated driver



29. The use of the internet to perform illegal activities is generally called



A. cyber crime
B. packet sniffing
C. phishing
D. spamming



30. One safety measure to consider in a computer room is



A. arranging the chairs in the room together
B. keeping liquid within the room
C. closing the door always
D. maintaining a dust-free environment



31. Security breaches in computing cannot be prevented through the use of



A. antivirus
B. encryption
C. firewall
D. firmware



32. A system analyst is a person who



A. designs flowchart
B. designs and implements new solutions
C. trains computer users
D. writes complex computer programs



33. The malware which is programmed to initiate at a specific date or when a specific event occurs is called



A. directory virus
B. logic bomb
C. polymorphic virus
D. root kit virus



34. One advantage of information processing is that



A. face-to-face interaction among staff may be reduced
B. initial investment cost can be high
C. running cost becomes lower in the long term
D. It encourages the training/retraining of staff



35. The function of the SQL statement SELECT Student ID, Surname, House Name FROM Student, is that it



A. retrieves the listed fields from student table
B. highlight the listed fields from student table
C. hides the selected fields from student table
D. deletes the listed fields from students table




36. The best arrangement that gives the correct order of magnitude of the database element is



A. character, field, record, table, database, file
B. character, field, record, table, file, database
C. record, file, field, table, character, database
D. table, file, record, field, character, database



37. A file organization that contains a reference number is called



A. direct access
B. indexed access
C. random access
D. sequential access



38. The following ,media are used for information transmission except



A. diary
B. magazine
C. radio
D. television



39. To prevent the loss of data in the computer, it is better to implement file



A. access
B. maintenance
C. checks
D. backup



40. Which of the following terms is not a feature of distributed database?



A. Fragmentation
B. Multiple storage
C. Replication
D. Single server


 

Answers To Questions

  1. B
  2. D
  3. C
  4. A
  5. B
  6. C
  7. D
  8. B
  9. D
  10. A
  11. C
  12. C
  13. C
  14. B
  15. C
  16. B
  17. B
  18. C
  19. B
  20. D
  21. B
  22. D
  23. D
  24. D
  25. D
  26. B
  27. C
  28. A
  29. A
  30. D
  31. A
  32. B
  33. B
  34. A
  35. A
  36. B
  37. B
  38. A
  39. D
  40. D

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button