waecE-LEARNING
Data Processing Part 2, May/June 2014  
Questions: 1 2 3 4   Main
General Comments
Weakness/Remedies
Strength













































Question 4

  1. A general hospital decides to computerize the records in all its departments.
  2. State one database management system that can be used for this project
  3. List two ways of preventing unauthorized access to the stored data

                                                                                                                                               

 

_____________________________________________________________________________________________________
Observation

 

  1. List two advantages of networking all the computers in the various departments of the hospital.
  2. State the type of network that can be implemented in such a hospital.
  3. State one difference between a graphical user interface and a command line interface.

The Chief Examiner reported that this question was quite unpopular with the candidates. The performance of the few who attempted the question was described as fair.
In part (a)(i), candidates were expected to state any one of the following Database Management Systems : Microsoft Access, SQL Server, My SQL, Dbase and Oracle.
In part (a) (ii), two ways of ensuring unauthorized access to the stored data were use of passwords and Data coding/encryption.
In part (a) (iii), some of the advantages of networking all the computers in the various departments of the hospital were – to promote file sharing and information distribution within the hospital, to enhance easy access to patients’ records, to enhance easy update of patients’ records, to ensure the overall efficiency of the hospital’s management.
The network type that can be implemented in the hospital was the Local Area Network(LAN).
The differences between Graphical User Interface and Command Line Interface were as tabulated below;


S/N

GRAPHICAL USER INTERFACE

COMMAND LINE INTERFACE

1

Makes use of Windows, Icons, Menus, Pointer (WIMP)

Makes use of commands

2

It is user friendly and interactive

It requires the user to memorize the commands

3

Makes use of other input devices

Makes use of only the keyboard

 

Powered by Sidmach Technologies(Nigeria) Limited .
Copyright © 2015 The West African Examinations Council. All rights reserved.