Wednesday 12th July Paper III & II: Objective & Essay Computer Studies - 10:00am - 1:00pm Computer Studies Obj 1ADAABAECCC ...
Wednesday 12th July
Paper III & II: Objective & Essay
Computer Studies - 10:00am - 1:00pm
Computer Studies Obj
1ADAABAECCC
11BDDBCBEBCA
21CECAADAADA
31CABAEEBDEA
41DBDBBBABEE
51EEDCDABDEA
THEORY
Q1a) 1. Hybrid computer
2. Analog comp. .
3. Digital compu. . .
ii) Analog computer is a computer that is used to process data in a containeus from e.g speedometer while Digital computer process data in a disk-rate from this means computer operate ansteps it's use mostly in calculation e.g desk calculation and |BM machine.
1b) 1. RAM--- random access memory
1 ROM---- read only memory
1c) 1. Falsh drive
2. Compaq disk
1d) 1.44mb to byte
= 1024^2 byte=1mb
1024^2 +1.44mb 1.44mb
3b) 1. Monitor
2. Printer
3c) Computer Virus:- This is a program that activates it self unknown to the user and destroy or corrupt data
2ai)
Copyright is a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution. This is usually only for a limited time.
ii)
spam is unsolicited junk email sent indiscriminately in bulk, often for commercial purposes. Much of it is sent by botnets, networks of virus-infected computers , complicating the process of tracking down the spammers .
iii)Malware is short for malicious
software , is an umbrella term used to refer to a variety of forms of hostile or intrusive
software , including computer viruses, worms, trojan horses, ransomware, spyware , adware , scareware, and other malicious programs.
iv) hacking:In computer science , hack verb means gain unauthorized access to computer data: to use a
computer or other technological device or system in order to gain unauthorized access to data held by another person or organization; a transitive verb meaning cope with something: to succeed at or endure something.
v) Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.
3a)
i) Copyright is a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution. This is usually only for a limited time.
4b in computer programming, a loop is a sequence of instruction s that is continually repeated until a certain condition is reached
(6 bi)
A presentation program is a software package used to display information in the form of a slide show. It has three major functions: an editor that allows text to be inserted and formatted, a method for inserting and manipulating graphic images, and a slide-show system to display the content.
(6b ii)
(a)Slide master
(b)Slide notes
(C)Transitions
(d) plain text editor
8viii, Authentication is a process in which the credentials provided are compared to those on file in a database of authorized users' information on a local operating system or within an authentication server.
URL is the abbreviation of Uniform Resource Locator It is the global address of documents and other resources on the World Wide Web.
Answers Loading..
Keep Refreshing this page
COMMENTS