WAEC Past Questions & Answer: Data Processing 2021
Welcome to our WAEC past question and answer series. In this post, we will be sharing Data Processing 2021 past questions and their answers for various subjects. Stay tuned enjoy while learning.
1. The main component of the first generation computer was
A. microchip
B. transistor
C. integrated circuit
D. electronic valve
2. The term Garbage-In-Garbage-Out is used to explain the characteristics of the computer in terms of
A. storage
B. speed
C. power
D. accuracy
3. The number 1011001012 in denary is
A. 753
B. 653
C. 357
D. 356
4. Which of the following statements is true?
A. Data leads to information and information leads to knowledge
B. Data leads to knowledge and knowledge leads to information
C. Information leads to data and data leads to knowledge
D. Knowledge leads to information and information leads to data
5. The type of computer that counts in discrete form only is referred to as
A. analog computer
B. digital computer
C. hybrid computer
D. mainframe computer
6. Which of the following media involves point-to-point communication?
A. Radio
B. Satellite
C. Telephone
D. Television
7. Fourth generation computer application can execute the following operations except
A. digging of drainages
B. drainage channel design
C. management of recreational facilities
D. payroll management
8. The joystick is mainly used for
A. clicking the links on web pages
B. drawing and playing computer games
C. erasing of unwanted graphics
D. typing of document in a word processor
9. The manipulation of digitalised information by computer by computer or other electronic equipment is known as
A. data collation
B. data manipulation
C. information manipulation
D. information processing
10. Which of the following actions is not a source of computer virus?
A. Checking of e-mail
B. Downloading programs
C. Reading form CD/DVD
D. Uploading data
11. When information is conveyed from one space to another, it is referred to as information
A. retrieval
B. translation
C. transmission
D. transportation
12. Which of the following file organisations requires primary Key?
A. Indexed file organization
B. Random file organization
C. Serial file organization
D. Sequential file organization
13. The protocol for transferring filed from one machine to another is
A. SNMP
B. SMTP
C. FTP
D. FAT
14. Mr Francis has an office complex with 20 rooms. What type of network is suitable for connecting all the computers in their various rooms into a single network?
A. LAN
B. MAN
C. PAN
D. WAN
15. The following software are web browsers except
A. Firefox
B. Google Chrome
C. Linux
D. Opera
16.
Use Figure 1 to answer question 16
To visit the previous page using the interface in Figure 1, the user will click on the part labeled
A. I
B. II
C. III
D. IV
17. An operating system that enables more than one user to access the same data is called
A. multi-tasking OS
B. multi-user OS
C. single user OS
D. virtual memory OS
18. The feature of a word document that shows the page, number of words and errors found in a document is the
A. menu bar
B. scroll bar
C. status bar
D. title bar
19.
Figure 2 shows a dialog box from Microsoft Word application. Use it to answer question 19
Which of the following command shortcuts can be used to display the dialog bax in Figure when the application is running?
A. Ctrl + O
B. Ctrl + S
C. Ctrl + Y
D. Ctrl + Z
20. The highest sale by Joy is recorded in cell
S/NÂ Â Â Â Â Â Â Â Â Â Â Â Â AÂ Â Â Â Â Â Â Â Â BÂ Â Â Â Â Â Â Â CÂ Â Â Â Â Â Â Â Â Â DÂ Â Â Â Â Â Â Â EÂ Â Â Â Â Â Â Â Â Â FÂ Â Â Â Â Â Â Â Â Â Â GÂ Â Â Â Â Â Â Â Â Â Â H
    1               STAFF    DAYS     ITEMS      ITEMS    ITEMS     ITEMS       ITEMS   ITEMSÂ
    2              JOY      MON      208        300      500       400         300       158
    3              AKIN      TUE      300        200      500       400         200       200
    4              KEN      WED      400        300      400       500         100       300
A. F1
B. B4
C. B4
D. E2
21. The formula to calculate the average of a given range of data from cell B2 to cell D4 in a Microsoft Excel worksheet is
A. = AVERAGE (B2+D4)
B. =AVERAGE (B2:D4)
C. =AVERAGE(B2, D4)
D. =AVERAGE(B2;D4)
22. The field in a database which uniquely identifies each record is called a
A. composite key
B. foreign key
C. local key
D. primary key
23. The correct order of the steps taken in creating a database from the database template in MS Access 2007 is
A. click on the Office button –> click New –> choose a database of your choice
B. click New –> click on Office button –> choose a database of your choice
C. click on database of your choice –> click New –> click on Office button
D. click New –> choose database of your choice –> click on Office button
24. To show the whole presentation in Microsoft PowerPoint 2007, select slide show from the
A. design tab
B. home tab
C. title bar
D. menu bar
25. Web design packages includes the following except
A. Macromedia Dreamweaver
B. iWeb
C. Front Page
D. Adobe PageMaker
26
Figure 4 shows CorelDraw tool bar. The part labeled I is used to
A. shape objects
B. select objects
C. draw lines and curves
D. create texts
27. One precautionary measure taken when cleaning a monitor is’
A. plugging of power supply cable
B. spraying a windows cleaner on the monitor
C. unplugging the power supply cable
D. using a vacuum cleaner to clean the monitor casing
28. The erratic movement of the mouse pointer is usually caused by
A. damaged driver
B. dirty mouse ball
C. improper connection of mouse cable
D. outdated driver
29. The use of the internet to perform illegal activities is generally called
A. cyber crime
B. packet sniffing
C. phishing
D. spamming
30. One safety measure to consider in a computer room is
A. arranging the chairs in the room together
B. keeping liquid within the room
C. closing the door always
D. maintaining a dust-free environment
31. Security breaches in computing cannot be prevented through the use of
A. antivirus
B. encryption
C. firewall
D. firmware
32. A system analyst is a person who
A. designs flowchart
B. designs and implements new solutions
C. trains computer users
D. writes complex computer programs
33. The malware which is programmed to initiate at a specific date or when a specific event occurs is called
A. directory virus
B. logic bomb
C. polymorphic virus
D. root kit virus
34. One advantage of information processing is that
A. face-to-face interaction among staff may be reduced
B. initial investment cost can be high
C. running cost becomes lower in the long term
D. It encourages the training/retraining of staff
35. The function of the SQL statement SELECT Student ID, Surname, House Name FROM Student, is that it
A. retrieves the listed fields from student table
B. highlight the listed fields from student table
C. hides the selected fields from student table
D. deletes the listed fields from students table
36. The best arrangement that gives the correct order of magnitude of the database element is
A. character, field, record, table, database, file
B. character, field, record, table, file, database
C. record, file, field, table, character, database
D. table, file, record, field, character, database
37. A file organization that contains a reference number is called
A. direct access
B. indexed access
C. random access
D. sequential access
38. The following ,media are used for information transmission except
A. diary
B. magazine
C. radio
D. television
39. To prevent the loss of data in the computer, it is better to implement file
A. access
B. maintenance
C. checks
D. backup
40. Which of the following terms is not a feature of distributed database?
A. Fragmentation
B. Multiple storage
C. Replication
D. Single server
Answers To Questions
- B
- D
- C
- A
- B
- C
- D
- B
- D
- A
- C
- C
- C
- B
- C
- B
- B
- C
- B
- D
- B
- D
- D
- D
- D
- B
- C
- A
- A
- D
- A
- B
- B
- A
- A
- B
- B
- A
- D
- D