Computer studies ree questions and Answers, August 14th - NECO 2021

3 minute read

 COMPUTER free questions and Answers

Saturday 14th August

Paper III & II: Objective & Essay – Computer Studies – 10:00am – 1:00pm

COMPUTER OBJ

1-10: EEEDCEDAAD

11-20: CDAAEDDBAA

21-30: BAADCADCEC

31-40: AABAABBCDB

41-50: ABCDEABEAD

51-60: CADADACDEE

Completed

°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°

COMPUTER ESSAY

You are to answer 4 Questions Only!

Start subscribing for your Waec Runs Now!

(1ai)

The control unit is a component of a computer's central processing unit that directs the operation of the processor

(1aii)

an arithmetic logic unit is a combinational digital circuit that performs arithmetic and bitwise operations on integer binary numbers.

(1aiii)

Registers are a type of computer memory used to quickly accept, store, and transfer data and instructions that are being used immediately by the CPU.

(1bi)

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

(1bii)

(i) Network Congestion.

(ii) Infrastructure Parameters (QoS, Filtering, Routing)

(1biii)

(i) AVG Antivirus

(ii) Norton Antivirus.

(iii) Ad-Aware

°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°

(2ai) A compiler is a computer program that translates computer code written in one programming language into another language. The name "compiler" is primarily used for programs that translate source code from a high-level programming language to a lower level language to create an executable program.

(2aii)


(2bi) 

- F5:

• In all modern Internet browsers, pressing F5 will refresh or reload the page or document window.

• Open the find, replace, and go to window in Microsoft Word.

(2bii)

- F1:

• Almost always used as the help key, almost every program opens a help screen when this key is pressed.

• Enter CMOS Setup.

• Windows Key + F1 would open the Microsoft Windows help and support center.

• Open the Task Pane.

(2c) A character set defines the valid characters that can be used in source programs or interpreted when a program is running.

°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°

(3ai) 


(3aii)

(3aiii)


(3bi)

(i) .com ; they are use initially intended to distinguish commercial organizations

(ii) .net ; they are use connect Nordic national research and educational networks

(iii) .org ; they are use for both nonprofit and for-profit organizations.


(3bii)

(i)Google Chrome.

(ii)Mozilla Firefox

°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°

(4ai)

Network topology is the arrangement of the elements of a communication network


(4aii)

(i) All data flows in one direction, reducing the chance of packet collisions.

(ii) A network server is not needed to control network connectivity between each workstation.

(iii) Data can transfer between workstations at high speeds.


(4bi)

-WORM-

(i) Worm Requires a host

(ii) Worm Triggered by human interaction

(iii) Worm Often arrives through an infected file


-VIRUS-

(i) Virus Spreads independently

(ii) Virus doesn’t require human interaction

(iii) Often arrives through a software vulnerability


(4bii)

An algorithm is a set of step-by-step procedures, or a set of rules to follow, for completing a specific task or solving a particular problem


(4biii)

-WORD PROCESSOR-

(i) Abiword

(ii) Apple iWork - Pages.

(iii) Apple TextEdit - Apple macOS (

included word processor.

(iv) Corel WordPerfect.


-SPREADSHEET PACKAGE-

(i) Google Sheets

(ii) Microsoft Excel.

(iii) OpenOffice -> Calc (free).

(iv) VisiCalc (discontinued).

°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°

(5ai) File security is a feature of your file system which controls which users can access which files, and places limitations on what users can do to various files in your computer.


(5aii)

-FILES-

(i) Computer files are transferred electronically.

(ii) Computer files are difficult to destroy and can last for a long time.

(iii) Computer files is dfficult to access at all times


-MANUAL FILES-

(i) Manual files can be transported through physical means

(ii) Manual files can warn off and can be depleted easily by hand.

(iii) Manual files is Easy to access whenever required


(5aiii) A programming language is a formal language comprising a set of strings that produce various kinds of machine code output.


(5bi) 



(5bii)

(Pick any two)

  • Keyboard
  • Mouse
  • Scanner
  • Cameras
  • Joystick

°°°°°°°°°°°°°°°°°°°°°°°°°′°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°′°°°°°°°°°°°°°°

Completed!


We are Getview Updates, the Sure Plug!
Enjoy!

KEEP REFRESHING PAGE

On How To Get Your Live Question And Answer before Exam.

FOLLOW US ON FACEBOOK 


      1. Saturday 14th August
      2. Paper III & II: Objective & Essay – Computer Studies – 10:00am – 1:00pm
      3. COMPUTER OBJ
      4. 1-10: EEEDCEDAAD
      5. 11-20: CDAAEDDBAA
      6. 21-30: BAADCADCEC
      7. 31-40: AABAABBCDB
      8. 41-50: ABCDEABEAD
      9. 51-60: CADADACDEE
      10. Completed
      11. °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°
      12. COMPUTER ESSAY
      13. You are to answer 4 Questions Only!
      14. Start subscribing for your Waec Runs Now!
      15. (1ai)
      16. The control unit is a component of a computer's central processing unit that directs the operation of the processor
      17. (1aii)
      18. an arithmetic logic unit is a combinational digital circuit that performs arithmetic and bitwise operations on integer binary numbers.
      19. (1aiii)
      20. Registers are a type of computer memory used to quickly accept, store, and transfer data and instructions that are being used immediately by the CPU.
      21. (1bi)
      22. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
      23. (1bii)
      24. (i) Network Congestion.
      25. (ii) Infrastructure Parameters (QoS, Filtering, Routing)
      26. (1biii)
      27. (i) AVG Antivirus
      28. (ii) Norton Antivirus.
      29. (iii) Ad-Aware
      30. °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°
      31. (2ai) A compiler is a computer program that translates computer code written in one programming language into another language. The name "compiler" is primarily used for programs that translate source code from a high-level programming language to a lower level language to create an executable program.
      32. (2aii)
      33. (2bi) 
      34. - F5:
      35. • In all modern Internet browsers, pressing F5 will refresh or reload the page or document window.
      36. • Open the find, replace, and go to window in Microsoft Word.
      37. (2bii)
      38. - F1:
      39. • Almost always used as the help key, almost every program opens a help screen when this key is pressed.
      40. • Enter CMOS Setup.
      41. • Windows Key + F1 would open the Microsoft Windows help and support center.
      42. • Open the Task Pane.
      43. (2c) A character set defines the valid characters that can be used in source programs or interpreted when a program is running.
      44. °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°
      45. (3ai) 
      46. (3aii)
      47. (3aiii)
      48. (3bi)
      49. (i) .com ; they are use initially intended to distinguish commercial organizations
      50. (ii) .net ; they are use connect Nordic national research and educational networks
      51. (iii) .org ; they are use for both nonprofit and for-profit organizations.
      52. (3bii)
      53. (i)Google Chrome.
      54. (ii)Mozilla Firefox
      55. °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°
      56. (4ai)
      57. Network topology is the arrangement of the elements of a communication network
      58. (4aii)
      59. (i) All data flows in one direction, reducing the chance of packet collisions.
      60. (ii) A network server is not needed to control network connectivity between each workstation.
      61. (iii) Data can transfer between workstations at high speeds.
      62. (4bi)
      63. -WORM-
      64. (i) Worm Requires a host
      65. (ii) Worm Triggered by human interaction
      66. (iii) Worm Often arrives through an infected file
      67. -VIRUS-
      68. (i) Virus Spreads independently
      69. (ii) Virus doesn’t require human interaction
      70. (iii) Often arrives through a software vulnerability
      71. (4bii)
      72. An algorithm is a set of step-by-step procedures, or a set of rules to follow, for completing a specific task or solving a particular problem
      73. (4biii)
      74. -WORD PROCESSOR-
      75. (i) Abiword
      76. (ii) Apple iWork - Pages.
      77. (iii) Apple TextEdit - Apple macOS (
      78. included word processor.
      79. (iv) Corel WordPerfect.
      80. -SPREADSHEET PACKAGE-
      81. (i) Google Sheets
      82. (ii) Microsoft Excel.
      83. (iii) OpenOffice -> Calc (free).
      84. (iv) VisiCalc (discontinued).
      85. °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°
      86. (5ai) File security is a feature of your file system which controls which users can access which files, and places limitations on what users can do to various files in your computer.
      87. (5aii)
      88. -FILES-
      89. (i) Computer files are transferred electronically.
      90. (ii) Computer files are difficult to destroy and can last for a long time.
      91. (iii) Computer files is dfficult to access at all times
      92. -MANUAL FILES-
      93. (i) Manual files can be transported through physical means
      94. (ii) Manual files can warn off and can be depleted easily by hand.
      95. (iii) Manual files is Easy to access whenever required
      96. (5aiii) A programming language is a formal language comprising a set of strings that produce various kinds of machine code output.
      97. (5bi) 
      98. (5bii)
      99. (Pick any two)
      100. KeyboardMouseScannerCamerasJoystick
      101. °°°°°°°°°°°°°°°°°°°°°°°°°′°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°′°°°°°°°°°°°°°°
        1. Completed!
        2. We are Getview Updates, the Sure Plug!Enjoy!
      102. KEEP REFRESHING PAGE
  1. FOLLOW US ON FACEBOOK