(a) Folders are used for storing files in the computer. List the steps for carrying out the following operations; (i) creating a folder on the desktop (ii) giving name on the folder (iii) sending a file from "My Document…
See more
2016
(a) Use the information in the spreadsheet to answer questions (a)i-v(i) Write the formula to calculate the total score in Mathematics.(ii) Write two spreadsheet formulas to calculate Paul's average score in the four sub…
See more
2016
(a) Mention four qualities of a good computer professional.(b) List four computer professional bodies in Nigeria.(c) Write the full meaning of the following:(i) Wifi (ii) GUI
See more
2016
(a)(i) With the aid of a simple diagram, explain information transmission.(ii) Give one example of information transmission.(b) Give one example of each of the following;(i)single user single tasking operating system.(ii…
See more
2016
(a) Define Information Processing.(b) State four steps involved in information processing.(c) Mention three advantages of using computers for information processing.(d) Highlight three disadvantages of using computers fo…
See more
2016
(a) Describe data handling.(b) Explain two ways of handling data.(c) State four factors to consider when handling data electronically.
See more
2016
Which of the following defines heterogeneousdistributed database?
See more
2016
The prevention of data from corruption and unauthorized access is a function of data
See more
2016
The records of students in a school are kept in order of their arrival. What files access method would be used to access a student's record if the latest record would first be retrieved?
See more
2016
Computers store data as
See more
2016
Relationship between tables in a relational model are created by
See more
2016
In relational model, a tuple is a?
See more
2016
A program designed to detect and prevent malicious programs from a computer system is
See more
2016
Computer virus cannot be transmitted by
See more
2016
Acomputer pofessional who studies an existing system with a view to evolving a computer based system from it is
See more
2016
Which of the following operations prevent file loss?
See more
2016
A technician can protect itself from electronic discharge by using
See more
2016
The moral principles that regulates the use of computers, its accessories and environment are called
See more
2016
The perfomance of the computer can be enhanced by
See more
2016
Routine checks operations on computers in order to ensure its continuous functioning is known as computer