Neco Data processing answers 2021
Here is neco data processing answers for 2021, enjoy… Remember to subscribe for waec, join. Our Whatsapp on top and chat the admin to subscribe. Waec won’t be free and will be tough.
1DBCCEDACCD
11AECCCCCDCA
21EBBEDAABDB
31CDBEADEDEE
41BBDABEEAAE
51ACCCAAACAE
Completed!
DATA-PROCESSING-THEORY
(6a)
Systems engineering is an interdisciplinary field of engineering and engineering management that focuses on how to design, integrate, and manage complex systems over their life cycles. At its core, systems engineering utilizes systems thinking principles to organize this body of knowledge.
(6bi)
(i)Great analytical skills
(ii)Paying attention to details
(iii)Maths knowledge
(iv)Commitment to work and self-development
(6bii)
(i)Math knowledge; Mathematics is used in most of the informational technology sphere branches, so it is important that the computer specialist is fluent in this subject.
(ii)Great analytical; skills Of course, without analytical skills, it is hard to become a computer industry professional, because this whole branch is about finding solutions to new problems or coming up with fresh ideas.
(iii)Commitment to work and self-development Technology is probably one of the most complex areas of life there is a lot of stuff to learn every day, and those who are truly dedicated to their profession will always expand their knowledge.
(6ci)
Normal form; These is a Certain rules in database management system design have been developed to better organize tables and minimize anomalies. The stage at which a table is organized is known as its normal form.
(6cii)
(i)First Normal Form (or 1NF)
(ii)Second Normal Form (or 2NF)
====================================
(3ai)
Fragmentation is a database server feature that allows you to control where data is stored at the table level.
(3aii)
To provide a consistent copy of data across all the database nodes.
(ii)To increase the availability of data.
(3bi)
(i)Personal Area Network (PAN)
(ii)Local Area Network (LAN) .
(iii)Wireless Local Area Network (WLAN) .
(iv)Campus Area Network (CAN) .
(3bii)
Personal Area Network (PAN)
The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building.
(3c)
Save refers to storing changes made to an already existing/saved file. While Save as refers to storing file for the first time or when a different file name,storage location or media needs to be a changed.
====================================
(2ai)
Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle.
(2bi)
Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be. Authentication technology provides access control for systems by checking to see if a user’s credentials match the credentials in a database of authorized users or in a data authentication server.
(2bii)
Backup is the process of creating a copy of the data on your system that you use for recovery in case your original data is lost or corrupted. You can also use backup to recover copies of older files if you have deleted them from your system.
(2biii)
firewall is software or firmware that prevents unauthorized access to a network. It inspects incoming and outgoing traffic using a set of rules to identify and block threats. Firewalls are used in both personal and enterprise settings, and many devices come with one built-in, including Mac, Windows, and Linux computers.
====================================
(1ai)
(i)Fiber optics, also spelled fibre optics, the science of transmitting data, voice, and images by the passage of light through thin, transparent fibers. In telecommunications, fiber optic technology has virtually replaced copper wire in long-distance telephone lines, and it is used to link computers within local area networks.
(ii)Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of improving electromagnetic compatibility
(1aii)
(i)ST (Straight Tip Connector) ·
(ii)SC (Subscriber Connector) ·
(1bi)
computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
(1bii)
Trojan Horse is a form of malware that capture some important information about a computer system or a computer network. while Worm is a form of malware that replicates itself and can spread to different computers via Network.
(1c)
(i)Transmission Control Protocol (TCP)
(ii)Internet Protocol (IP)
Thank you so much
Thank you
But it is not complete or even tallying with the question
Please ignore the question
Pls we need the complete answer😓
This 30 minute to go