WAEC Data Processing Past Questions & Answers - Page 18

86.

The function of the SQL statement SELECT Student ID, Surname, House Name FROM Student, is that it 

A.

Retrieves the listed fields from student table

B.

Highlight the listed fields from student table

C.

Hides the selected fields from student table

D.

Deletes the listed fields from students table

Correct answer is A

No explanation has been provided for this answer.

87.

One advantage of information processing is that

A.

Face-to-face interaction among staff may be reduced

B.

Initial investment cost can be high

C.

Running cost becomes lower in the long term

D.

It encourages the training/retraining of staff

Correct answer is A

No explanation has been provided for this answer.

88.

The malware which is programmed to initiate at a specific date or when a specific event occurs is called

A.

Directory virus

B.

Logic bomb

C.

Polymorphic virus

D.

Root kit virus

Correct answer is B

No explanation has been provided for this answer.

89.

A system analyst is a person who

A.

Designs flowchart

B.

Designs and implements new solutions

C.

Trains computer users

D.

Writes complex computer programs

Correct answer is B

No explanation has been provided for this answer.

90.

Security breaches in computing cannot be prevented through the use of

A.

Antivirus

B.

Encryption

C.

Firewall

D.

Firmware

Correct answer is A

No explanation has been provided for this answer.