Neco 2017 Data Processing Obj And Theory Questions And Answers

Our Music Promotion is Express » Clean » Classic » Dope » Well Packaged » And Very Cheap Call >>> 08069041389

Wednesday 08th June 2017
DATA PROCESSING – 10am – 12:45pm

2017 NECO Marketing Questions And Answers Expo Now Available

IT IS BETTER TO SUBCRIBE A DAY BEFORE EACH
PAPER‎

(SUBSCRIPTION)
‎ N2000 Bank Transfer

Whatsapp: N2500 MTN CARD.‎

Forward: NAME OF EXAM , Your Name, MTN
PINs, Subject Name, and Your Phone number
to 08069041389

Always refresh This page answers will drop During Exams Period 

 DATA PROCESSING:OBJ

1-10: DEEBDCCCAA
11-20: BBBAAADEAB
21-30: EDCDADBAEA
31-40: ABCBDADBDB
41-50: DBBEEBDCBA
51-60: AADBCACCDB.
.

.

1a)
i) Enable one to create document and
store it electronically on a disk
ii)Enable one to display a document on
the screen
iii) error edited by deleting not noticeable
iv) extra copies are equally original and
there is no limit to the number that can
be printed
vi) Document score in the computer
storage can be retrieved and edited by
different users
1b)
Presentation package are computer
software package that are used to display
information usually in the form of a slide
show. Example is Microsoft power point
1bii)
Web design package:
It is used in designing websites
Presentation package
It is used in creating slides
(3a)
software that handles the storage,
retrieval, and updating of data in a
computer system.
3aii)
MySQL
Microsoft Access
3aiii)
A file is a collection of records which
have common properties. Each file has its
own file reference which is unique. The
file reference indicates the subject or
contexts of the records.
While
A record can be an image, text based or
in electronic or physical format.
3bi) Normalization is a process of
organizing the data in database to avoid
data redundancy, insertion anomaly ,
update anomaly & deletion anomaly
3Bii)
*Insertion Anomalies:Insertion anomalies
occur when we
try to insert data into a flawed table.
*Deletion Anomalies:- Deletion anomalies
occur when we
delete data from a flawed schema.
*Update Anomalies:- Update anomalies
occur when we
change data in a flawed schema.
3c)
Pick tool
Shape tool
Zoom tool
Freehand tool
(4a)
(4b)
Log files – A log file is a recording of
everything that goes in and out of a
particular server
Firewall- A firewall is a system designed
to prevent unauthorized access to or from
a private network.
Encryption – Encryption is the conversion
of electronic data into another form,
called ciphertext, which cannot be easily
understood by anyone except authorized
parties.
Backup- backup refers to the copying and
archiving of computer data so it may be
used to restore the original after a data
loss event.
(4ci)
(i)
Primary key uniquely identify a record in
the table. While,
Foreign key is a field in the table that is
primary key in another table.
(ii)
Primary Key can’t accept null values.
While,
Foreign key can accept multiple null
value.
(4cii)
Vision problems
Headache
Obesity
5a)
i)Transmission is the act of transferring
something from one spot to another, like
a radio or TV broadcast, or a disease
going from one person to another.
5ii)
i)Tasks can be completed faster because
computers work at amazing speed.
ii)Computers can process large amounts
of data and generate error-free results,
provided that the data is entered
correctly.

MORE ANWERS LOADING….. 

 

CLICK HERE TO SEE ANIMAL HUSBANDRY ANSWERS NOW

Our Music Promotion is Express » Clean » Classic » Dope » Well Packaged » And Very Cheap Call >>> 08069041389

Get more Updates like this in your inbox, Enter your email address::

Delivered by WadupAfrica

Add a Comment

Your email address will not be published. Required fields are marked *

Open

Close