WAEC GCE 2022 SECOND SERIES November And December Marketing Verified Answers
Oliveloaded.ng waec gce 2022 verifed Questions and Answers Expo, is going to be deliver day before exam thanks so much
Here is the verified Questions and Answers expo.
(6ai)
(Pick Any Four)
(i) Fax machine
(ii) Telephone/mobile phone
(iii) Television
(iv) Radio
(v) Internet
(vi) Telegraph
(6aii)
(Pick Any Two)
(i) Telephone/mobile phone: Telephones and mobiles are most commonly used means of communication. They are not only very fast but also link far distant location within no time. Telephone are static whereas mobile phones can be carried anywhere. They help anyone to talk to others anytime and am from anywhere
(ii) Telegraph: A Telegraph is a Communication system in which information is transmitted over a wire through a series of electrical current pulses ,usually in the form of Morse code. The basic components include a source of direct current, a length of wire or cable , and a current indicating device such as a relay, buzzer it light bulb.
(iii) Internet: In modern age, internet is very cheap and reliable means of not only for communication but also useful for employment and education. Internet has brought the whole world to a very small workplace. We can surf for any information on internet. Search engines help to search that information within no time. E mail can also be used to send small or bulk of information to any part of the world
(6bi)
ARIS : Algorithms for Recovery and Isolation Exploiting Semantics
(6bii)
(Pick Any Two)
(i) Repeating history during Redo
(ii) Logging changes during undo
(iii) Write ahead logging
(6biii)
(i)REDO phrase: The redo phase restore the database to the exact state at the crash, including all the changes of uncommitted transaction that were running at the point in time.
(ii) UNDO phrase : The UNDO Phase undoes all uncommitted changes ,leaving the database in a consistent state. However, the changes of uncommitted transaction have to be undo to restore the database to a consistent state.
Waec Gce Data Processing Object Answers
DATA PROCESSING
1-10: CDCDBCBAEA
11-20: AABEDDDEEB
21-30: CAECABDBCA
31-40: EBCBCBCDCB
41-50: BABDBDDDBC
51-60: BBDAABBCCD
=========================
CATERING CRAFT
1-10: CBAAAACECA
11-20: EDDBDCEBBB
21-30: CCDAEAABBD
31-40: BEEEDDDCAA
41-50: DDADDECCEB
51-60: CEDACBECAE
===================
OFFICE PRACTICE OBJ
1-10: CBACDAADCD
11-20: DBAAABEACD
21-30: EADADEDDBB
31-40: AECDCBACDC
41-50: CEEEECCBEB
51:60: DBACEDCBDA
COMPLETED!
====================
BOOK KEEPING OBJ:
01-10: CBCACDEDEE
11-20: BCDBAEEBBE
21-30: BECDBDCDBA
31-40: BDACDDCAAE
41-50: ACABBADDBC
51-60: BEDDEAEDBB
Completed.!
2022 NECO DATA PROCESSING ESSAY ANSWERS
(5ai)
{CHOOSE ANY FOUR}
(i) Batch Operating System: This type of operating system does not interact with the computer directly. There is an operator which takes similar jobs having the same requirement and group them into batches. It is the responsibility of the operator to sort jobs with similar needs.
(ii) Time-Sharing Operating Systems: Each task is given some time to execute so that all the tasks work smoothly. Each user gets the time of CPU as they use a single system. These systems are also known as Multitasking Systems. The task can be from a single user or different users also. The time that each task gets to execute is called quantum.
(iii) Distributed Operating System: This type of the operating system is a recent advancement in the world of computer technology and are being widely accepted all over the world and, that too, with a great pace. Various autonomous interconnected computers communicate with each other using a shared communication network. Independent systems possess their own memory unit and CPU. These are referred to as loosely coupled systems or distributed systems.
(iv) Network Operating System : These systems run on a server and provide the capability to manage data, users, groups, security, applications, and other networking functions. These types of operating systems allow shared access of files, printers, security, applications, and other networking functions over a small private network.
(v) Real-Time Operating System: These types of OSs serve real-time systems. The time interval required to process and respond to inputs is very small. This time interval is called response time. Real-time systems are used when there are time requirements that are very strict like missile systems, air traffic control systems, robots, etc.
(5aii)
{CHOOSE ANY TWO}
(i) First Come First Serve(FCFS): As the name implies that the operating system jobs are executed on a first come first serve basis.
(ii) Round Robin Scheduling : this is the preemptive process scheduling. Each process is provided a fix time to execute, it is called a quantum.
(iii) Priority scheduling is a non-preemptive scheduling process and one of the most common scheduling in batch systems. · Each process is assigned a priority.
(5bi)
Data modeling is the process of creating a visual representation of either a whole information system or parts of it to communicate connections between data points and structures.
(5bii)
(i) conceptual data model.
(ii) enterprise data model.
(iii) logical data model.
(iv) physical data model.
Data processing
(4aii)
(i) Painting packages.
(ii) Drawing packages.
(4aiii)
{CHOOSE ANY TWO}
(i) Drawing straight lines and freehand lines
(ii) Drawing regular pre-defined shapes like squares, rectangles and circles using a special tool
(iii) Entering text and changing the style and size of font
(iv) Changing the size of an object or scaling
(v) Rotating objects in either clockwise or anticlockwise by specifying the direction and angle of rotation;
(vi) Stretching objects either horizontally or vertically.
(4b)
(i) First normal form (1NF) is a property of a relation in a relational database. A relation is in first normal form if and only if no attribute domain has relations as elements. Or more informally, that no table column can have tables as values (or no repeating groups).
(ii) Second normal form:
A relation is in second normal form if it is in 1NF and every non key attribute is fully functionally dependent on the primary key. A university uses the following relation:
- The attributes IDSt and IDProf are the identification keys.
- All attributes a single valued (1NF).
(iii) Third normal form (3NF) is a database schema design approach for relational databases which uses normalizing principles to reduce the duplication of data, avoid data anomalies, ensure referential integrity, and simplify data management. It was defined in 1971 by Edgar F. Codd, an English computer scientist who invented the relational model for database management.