Waec Computer Studies Questions
Question 51:
Use Table 3 to answer the questions below
In table 3, the content of cell C5 ____________
View Answer & Explanation| A | B | C | D | E | |
| 1 | BOOK SUPPLIED TO SENIOR HIGH SCHOOLS | ||||
| 2 | MATHS | ICT | ENGLISH | ||
| 3 | SHS1 | 3450 | 4500 | 5678 | |
| 4 | SHS11 | 8765 | 6580 | 9000 | |
| 5 | SHS111 | 2456 | 4009 | 4400 |
In table 3, the content of cell C5 ____________
Question 52:
(a) List: (i) three application areas of a word processing program;
(ii) three types of data item.
(b) identify program; the four data types available in Table 2.
Table 2
View Answer & Explanation(ii) three types of data item.
(b) identify program; the four data types available in Table 2.
Table 2
| Student I.D. | Name | Date of Birth | Score in Computer Studies | Gender |
| A 00022 | Odi, G. A | 13/10/97 | 38 | M |
| C 00021 | Zakari, M. | 15/05/98 | 71 | M |
| B 00023 | Ngozi Tella | 16/09/96 | 62 | F |
Question 53:
(a) (i) Define Information and Communication Technology. (ii) State three uses of Information and Communication Technology in the banking sector.
(b) State the full meaning of the following: i) LAN; (ii) GPS; (iii) IP
View Answer & Explanation(b) State the full meaning of the following: i) LAN; (ii) GPS; (iii) IP
Question 54:
(a) List: (i) three application areas of a word processing program;
(ii) three types of data item.
(b) identify program; the four data types available in Table 2.
Table 2
View Answer & Explanation(ii) three types of data item.
(b) identify program; the four data types available in Table 2.
Table 2
| Student I.D. | Name | Date of Birth | Score in Computer Studies | Gender |
| A 00022 | Odi, G. A | 13/10/97 | 38 | M |
| C 00021 | Zakari, M. | 15/05/98 | 71 | M |
| B 00023 | Ngozi Tella | 16/09/96 | 62 | F |
Question 55:
(a) List three criteria that are used in classifying file.
(b) State: (i) two advantages and two disadvantages of computer files; (ii) three methods of file security.
View Answer & Explanation(b) State: (i) two advantages and two disadvantages of computer files; (ii) three methods of file security.