WORD OF FAITH SECNIOR SECONDARY SCHOOL, ABUJA
MOCK EXAMINATION, 2022/2023 ACADEMIC SESSION
SUBJECT: DPC TIME ALLOWED: 3 HOURS
SECTION A (OBJECTIVE)
1. The manipulation and conversion of data from raw to machine
readable form is
A. Sharing B. Retrieval C. Processing D. Collection
2. Which of the following is example of web design package?
A. Adobe Dreamweaver B. Quattro pro C. Paradox D.
Harvard graphics
3. Convert 2113 to its binary equivalent
(a) 101102 (b) 1001112 (c) 100012 (d) 1100112
4. Animation, social media and film editing all fall under which category
of ICT
a. Security b. Paparazi c, Entertainment d.
Medicine
5. The operation of checking input data against specified criteria is
referred to as
(a) Data verification (b) Data Validation
(c) Data cross check (d) Data control
6. Which of the following is not a source of data collection?
(a) Observation (b) Interview (c) Questionnaire (d)
Classification
7. The ICT usage area that covers video games and music playing is......
a. Medicine b. Entertainment c. Agriculture d.
Fun
8. Which of the following represents ICT in education?
a. Flight booking b. Electronic Fund Transfer (EFT)
c. bills payment d. result checker
9. Which of the following represents ICT in Banking?
a. Flight booking b. Electronic Fund Transfer (EFT)
c. bills payment d. result checker
10. Tracking criminals through database maintenance is a form of............
in ICT
1
a. Entertainment b. Communication c. Security d.
Protection
11. Bringing a system back to working order is ……………. Maintenance
a. Adaptive b. Preventive c. Corrective d.
Perfective
12. The type of data which consists of text, numbers, audio, video,
graphic and animation is called
(a) Data set (b) Multimedia data
(c) Multi – purpose data (d) Multi – variable data
13. One of the following factors is not considered when classifying
computers
(a) Location (b) Size (C) Type (d) Purpose
14. A search engine is a
(a) Program that searches engine (b) Tool that searches the
web
(c) Hardware component of a computer
(d) Computer engine that searches a database
15. Taking steps to avoid the system breaking down is ………….
Maintenance
a. Adaptive b. Preventive c. Corrective d.
Perfective
16. Taking care of the computer's physical components is………...
a. Maintenance b. Software maintenance
c. Hardware maintenance d. Preservation
17. The practice of keeping computers in a good working state of repair
for durability is………
a. Maintenance b. Software maintenance
c. Computer maintenance d. Hardware maintenance
18. Identify the daily maintenance activity here
a. Reformat the hard disk drive and reinstall all software
2
b. Swipe your CD and DVD media c. Vacuum the keyboard
d. Check your power surge protection
19. A data element that uniquely identifies one record from the other in a
table is
(a) Attribute key (b) Determinant (c) Entity key (d) Primary
key
20. In computing, ergonomics is a term associated with computer
(a) Ethics (b) Maintenance (c) Malware detection (d) Safety
measure
21. The information transmission medium from location A to B in space is
called
(a) Asynchronous Transmission (b) guided Transmission
(c) Synchronous Transmission (d) Wireless Transmission
22. Which of the following statement explains information processing
better?
(a) Saving documents in a device (b) Data upload to
server
(c) Changing information detectable by an observer
(d) Transfer of information between devices
23. The Auto – fill feature in MS Excel fills the -------- data
(a) cell (b) worksheet (c) book (d) parallel
24. The change case feature of MS Office contains all but one of these?
(a) Upper case (b) Toggle (c) Mixed case (d) sentence
25. The paragraph option available in MS word are all except
(a)Align text left (b) Align text middle (c) Align text right (d)
Justify
26. ---------- bar gives information such as page number of a document
(a) Status (b) Task (c) Menu (d) Title
27. Which of the following is not a function of MS Word?
(a) Create (b) query (c) Edit (d) Format
28. The use of transistors in circuits was a major advancement in the
3
(a) First generation computers (b) Second generation
computers
(c) Third generation computers (d) Fourth generation
computers
29. Arrange the following ICT devices in order from the earliest to the
latest
(a) Cell phone, Satellite, Radio, Internet
(b) Internet, Satellite, Cell phone, Radio
(c) Radio, Cell phone, Satellite, Internet
(d) Radio, Cell phone, Internet, Satellite
30. Examples of information include the following except one option
(a) International passport (b) Weather Report
(c) Observations and readings (d) Utility bill
31. Multiply 259 by 369
(a) Duplicating the document (b) To move text/document to other
places (c) Completely move text/document (d) To highlight
text/document
32. What is the correct order of these beginning from the highest to the
lowest?
I. Range II. Workbook III. Worksheet IV. Cell
(a) I, II, III and IV (b) IV, II, I, and III
(c) II, III, IV and I (d) III, I, IV and II
33. Identify the common feature between database and spread sheet
(a) Form (b) query (c) Filter (d) Report
34. Table fields are also known as?
(a) Addresses (b) Indexes
(c) Column headings (d) Row headings
35. Which of the following ICT devices has made 24 hour banking
possible?
(a) Internet (b) ATM (c) Software (d)
Token
36. 3NF stands for -----------------------------------------------------
(a) First Normal Form (b) Second Normal Form
(c) Third Normal Form (d) Fourth Normal Form
37. The WORD ART feature in MS office is found under which menu/tab?
(a) Home (b) View (c) Insert (d) Page layout
4
38. The insert menu feature in MS word are all except
(a) Header (b) Bullet (c) Footer (d) Comment
39. A program designed to detect and remove malicious programs from a
computer system is called
(a) Spyware (b) malware (c) Anti – virus (d)
Password
40. In Data processing, computing works in close relationship with ……. To
make representations
(a) Numbers (b) Bases (c) Position (d) Number
system
41. “Protect Document” used for document permissions in MS Word is
found where?
(a) File (b) Home (c) Insert (d) Review
42. The prevention of data from corruption and unauthorized access is a
function of data……
(a) Security (b) Secrecy (c) Integrity (d)
management
43. Which of the following defines a heterogeneous distributed database?
(a) Same DBMS is used at each location but data are not distributed
across all nodes
(b) Same DBMS is used at each location with data distributed across
all nodes
(c) Different DBMS is used at each location and data are distributed
across all nodes
(d) Different DBMS is used at each location but data are not
distributed across all nodes
44. Advantages of wireless media communication are ------ except
(a) Handling of Urgent situations (b) Quick conveyance of
information
(c) Information loss (d) Anytime internet
45. One of the ways of storing in a Distributed DBMS is
(a) Repetition(b) Fragmentation (c) Vertical (d)
Distribution
46. Without -----, both the computer, its hardware and software will be
useless
5
(a) Middle ware (b) Printer (c) Operating system (d) None of the
above
47. The recovery algorithm designed to work with a no –force approach
is------ recovery
(a) Media (b) Crash (c) Aries (d) none of the above
48. ------ is the sending of electrostatically – generated signals through a
wire to the receiver?
(a) Cellphone (b) Telephone (c) Telegraph (d) Satellite
49. Social Networking does not promote
(a) Personal publicity (b) Business expansion
(c) e – commerce (d) e – payment
50. Organization by geographical order such as travel guide or map is
-------
(a) Timing (b) Continuum (c) Categorization (d)
Location
51. In MS Access, which of the following database objects used for
entering, modifying and viewing records?
A. Tables B. Records C. Queries D. Modules
52. When handling data electronically, ----- is not a factor to be
considered.
A. Storage type B. Security C. Integrity D.
Format
53. A relational table is said to be in its ---- normal from, if all values of
the columns are atomic
A. First B. Third C. Second D. Fourth
54. Which of the following is not a type of data model?
A. Star schema B. Network C. Hierarchical D. Flat file
55. Data models in database management systems are classified into ----
categories
A. Two B. Three C. Six D. Four
56. The association among several entities in a database is ----
A. Relationship B. Merging C. Extraction D.
Distribution
6
57. A common method of sorting data by creating keywords is
A. Stocking B. Indexing C. Searching D. Piling
58. DQL stands for ------------------------------------------------------------
(a) Data query Language (b) Data query Learning
(c) Data control Language (d) Data query Lugbe
59. The Letter P in the acronym WIMP stands for----------
(a) Paint (b) Process (c) Pointer (d) Procedure
60. The following are benefits of normalization except
A. Reduction of duplicated data B. Better integrity and less risk
C. Increased data redundancy D. Faster running of query on
data E.
SECTION B (THEORY)
ANSWER ALL QUESTIONS
1a. State two ways each by which ICT can be applied in the following
professions
7
PROFESSIONS ICT APPLICATION /USAGE
AVIATION
MEDICINE
EDUCATION
TRANSPORTATION
BUSINESS
2a. Define information processing
b. How is information processing different from data processing?
c. Summarily state the four procedures for information processing
d. State two functions of an operating system
3a. List the four types of software maintenance
-----------------------------, ------------------------, -------------------------------------,
---------------------------------------
8
b. Which of the software maintenance types is concerned with adding
new functionalities in the software to improve its value, according to
user
demands? ..............................................................................................
.....................
c. How the new features added is implemented in the user’s device.
…………….. ……. …… ……… ……
……………………………………………………………………………………………
……………………
d. Show the percentage distribution of each type of maintenance
4. Define data handling …………………… ……………………………….
……………………………………………… …………………….. ……
……………………………………………………………………………………………
………………………………………………………………………………..
……………………………………………………………………………………………
…………………………………………………………………………
b. Why should unutilized research data be discarded?
………………………………………………………………………………………..
……………………………………………………………………………………………
……………………………………………
c. List four (4) of the sub – components that work with the data path
i) …………………………………………………………….
Ii) ……………………………………………… iii)
………………………………………………
iv) ………………………………………………………..
d. Draw the diagram that shows the components of the computer.
SECTION C (ALTERNATIVE TO PRACTICALS)
9
5. Egboluche was tasked with the responsibility of producing the report
of his group project. He is to submit both the soft and hard copies of
the report to his form teacher. The soft copy must be submitted to the
email: formteacher@[Link]
(i) List two each:
I. applications required to carry out the task;
i.
ii.
II. hardware required to carry out the task.
i.
ii.
ii) Identify two conditions to be satisfied by Egboluche to submit the
electronic copy of the report.
i.
ii.
iii) On the first attempt to send the soft copy of the report, Egboluche
observed a “spinning wait cursor”/”spinning disc pointer’ on the
screen for a long time.
Identify three possible reasons for the observation.
i.
ii.
iii.
iv) State one output device that can be used to produce the hard
copy of the report.
i.
6. Outline the steps to perform the following actions in Corel Draw
application:
a) Inserting a rectangular shape with size
b) Adding the caption “WELCOME TO MY GRAD”
c) Changing the color of the caption to blue
d) Increasing the thickness of the borders (edges) of the rectangle
e) Coloring the edges of the rectangle instead of coloring the whole
shape
10