2018 NECO COMPLETE DATA PROCESSING QUESTIONS AND ANSWERS -MRCODED - Scholarships, Nigeria Universities, Polytechnics And Admissions News
A serious Student would go vividly
extreme miles to see his or her success
because no one would be happy to say am
going to re- write EXAM next year! that we rejectin jesus name!!

NOTE:-TEXT OR CALL US BEFORE SUBSCRIBING. IF WE DON?T PICK YOUR CALL, JUST TEXT, ?I WANT TO SUBSCRIBE FOR WAEC (OR ANY KIND OF EXAMINATION YOU WANT TO WRITE)? TO OUR NUMBER(09030866320)

CLICK HERE TO CHAT WITH US DIRECTLY ON WHATSAPP


Hot: Click Here For Latest School News, University, College, Scholarships And ...Education Updates!


JAMB 2019
WAEC 2019
How to Score 250 ? 270+ Flat In Your 2019/2020 Jamb CBT Exam (EXPO/RUNZ/RUNS)
2019 WAEC WASSCE EXPO: CONFIRM YOUR WAEC 2019 DETAILS IN OUR DATABASE EXPO
Click Here

Monday, 9 July 2018

2018 NECO COMPLETE DATA PROCESSING QUESTIONS AND ANSWERS -MRCODED

Sponsored Post... [CLICK HERE=> FOR FREE 2020/2021 WAEC QUESTIONS AND ANSWERS A DAY TO EXAM ANSWERS DIRECTLY TO YOUR PHONE AS SMS | OR CLICK HERE TO MESSAGE US ON WHATSAPP]


DATA PROCESSING Obj
1-10:DCCBBCCDAA
11-20:EACBBEBDEC
21-30:DBDAAECDEB
31-40:BABBEEAECE
41-50:CDCBAEDCCD
51-60:CCBAAABAAE

COMPLETED✅



(DATA PROCESSING)

(1a)
Database security refers to protective digital privacy measures that are applied to prevent unauthorized access to computer, databases and websites

(1aii)
(i)Database security ensure that physical damage to the server doesn't result in the loss of data

(ii)Database security block attacks from unauthorised users or hackers. this prevents the loss of sensitive information

(iii)Database security prevent malware infections and stop viruses stealing data

(1bi)
(i)Physical data model
(ii)Conceptual data model
(iii)Canonical data model
(iv)Application data model


(1bii)
Physical data model:-Physical data models describe how data is stored in the computer, representing information such as record structures, record ordering and access paths. it also represents how the model will be built in the database



(NUMBER 4)

(4i)
Mobile phone:-Mobile phone also known as cellular phone , cell phone and a hand phone is a device that can make and receive telephone calls over a radio link while moving around a wide geographic area. it does so by connecting to a cellular network provided by a mobile phone operator, allowing access to the public telephone network

(4ii)
Vending machine:-A  vending machine is a machine which dispenses items such as snacks, beverages, alcohol, cigarettes, lottery tickets, cologne, customer products and even gold and gems to customers automatically, after the customer inserts currency or credit into the machine.

(4iii)
Cash Register:-A cash register also referred to as  a mechanical or electronic device for calculating and recording sales transactions and an attached cash drawer for storing cash. The cash register also usually prints a receipt for the customer

(4iv)
Fax machine:-Fax machine also known as facsimile or tele copying, is the telephonic transmission of scanned printed material, both text and images, normally to a telephone number connected to a printer or other output device. The receiving fax machine reconverts the coded image, printing a paper copy.

(4v)
Point of sale machine:-A point of sale/service (POS)machine is used to conduct retail transactions. It can provide many services, including credit card processing, check reading and cash transactions, depending on the model.



(NUMBER 5)

(5a)
(i)Data models can facilitate interaction among the designer, the applications programmer and the end user.

(ii)data models can  greatly improve user  experience and increase  the efficiency of data utilization.

(iii)Data models make data statistics more consistent and reduce the possibility of computing errors

(iv)Data models can significantly reduce unnecessary data redundancy, reduce the storage and computing costs for a big data system

(5aii)
A standard data model or industry standard data model(ISDM)is a data model that is widely applied in some industry and share amongst competitors to some degree. They  are often defined by standards bodies, database vendors or operating system vendors

(5b)
(In Tabular form)
(i)Preventive maintenance is the  act of a regularly scheduled check of the computer hardware or  software to help ensure it  continues to operate  properly.
While
Corrective maintenance  is a form of maintenance  that is performed after a  fault or problem emerges  in the system, with the  goal of restoring  operability.

(ii)preventive maintenance in computer system is done frequently(preventing problem)
While
Corrective maintenance in computer system is done randomly (when problem occurs)



(NUMBER 6)


(6a)
(Take note:Discuss not explanation)

(6ai)
NAPIER BONES:-John napier ( 1550 - 1617 ), a Scottish mathematician , is mostly known for his invention of logarithms, a device that revolutionized calculation by reducing difficult and tedious multiplication to addition of table entries. In 1614 john Napier made a more sophisticated computing machine called the napier  bones. This was a small instrument made of 10rods on which the multiplication table was engraved. It was made of  the strips of ivory bones, and so the name Napier bones. This device enable multiplication in fast manner,  if one of the numbers was of one digit only.

(6aii)
JACQUARD LOOM:- In 1801 , Joseph Marie  Jacquard , a French textile weaver , invented a power loom with an automatic card reader. This  power loom used a series of cards with holes punched at different position. To automatic the weaving process, these cards were placed between the needles and the thread, therefore creating different patterns. The presence or absence of a hole in a punched card representing the two digits of the binary system, which is the base for all modern digital computer.

(6aiii)
(i)Pascal calculator
(ii)Slide rule
(iii)Abacus
(iv)Analytical engine

(6b)
(i)creating fast and easily formatted tables for  pasting into form letters,
billings, PowerPoint presentations

(ii)To sort and compare databases in order to  locate differences of  incomplete files or to better prove accuracy of files needing certification
or authentication

(iii)It create and  develop Budgets, produce graphs and charts, and for storing and sorting data

(6bi)
Title bar:-Is  used to display the name of the application, or the name of the open document, and may provide title bar buttons for minimizing, maximizing, closing or rolling up of application windows.

(6bii)
Status bar:- Is located at the bottom of Internet browser windows and many application  windows and displays the current state of the web page or application being displayed.

(6biii)
Row heading:-Is the grays colored column located to the left of column 1 in the  worksheet containing
the numbers (1, 2, 3, etc.) used to identify each row in the worksheet

(iv)Spreadsheet is used in producing loan  amortization schedules and statistical analyses


(6biv)
Manu Bar:-t provides the user with a standard  place in a window to find the majority of a program's essential  functions, such as opening and closing files, editing text, and quitting the program.



Goodluck✌🏿✌🏿✌🏿

No comments:

Post a Comment

After dropping your comment, keep calm, it may take minutes before it appears after moderation.
Your comment(s) are appreciated.

You want to get notified when we reply your comment? Kindly tick the Notify Me box..


offeroffer
Do You Love The Current Design Of This Blog? We Can Set Up Same Design For You At An Affordable Price.

Click Here Now To Get Started!


HOME | ABOUT US | CONTACT US | DISCLAIMER NOTICE | PRIVACY POLICY
SITEMAP

Copyright © 2017. Powered by CodedExam.