Neco 2017 Computer Studies Objective And Essay Free Expo Answers
HomeEducation

Neco 2017 Computer Studies Objective And Essay Free Expo Answers

5/slider-recent

Wednesday 12th July Paper III & II: Objective & Essay Computer Studies - 10:00am - 1:00pm Computer Studies Obj 1ADAABAECCC ...


Wednesday 12th July
Paper III & II: Objective & Essay
Computer Studies - 10:00am - 1:00pm

Computer Studies Obj

1ADAABAECCC
11BDDBCBEBCA
21CECAADAADA
31CABAEEBDEA
41DBDBBBABEE
51EEDCDABDEA

THEORY
Q1a) 1. Hybrid computer
2. Analog comp. .
3. Digital compu. . .
ii) Analog computer is a computer that is used to process data in a containeus from e.g speedometer while Digital computer process data in a disk-rate from this means computer operate ansteps it's use mostly in calculation e.g desk calculation and |BM machine.
1b) 1. RAM--- random access memory
1 ROM---- read only memory
1c) 1. Falsh drive
2. Compaq disk
1d) 1.44mb to byte
= 1024^2 byte=1mb
1024^2 +1.44mb 1.44mb
3b) 1. Monitor
2. Printer
3c) Computer Virus:- This is a program that activates it self unknown to the user and destroy or corrupt data

2ai)
Copyright is a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution. This is usually only for a limited time.


ii)
spam is unsolicited junk email sent indiscriminately in bulk, often for commercial purposes. Much of it is sent by botnets, networks of virus-infected computers , complicating the process of tracking down the spammers .

iii)Malware is short for malicious
software , is an umbrella term used to refer to a variety of forms of hostile or intrusive
software , including computer viruses, worms, trojan horses, ransomware, spyware , adware , scareware, and other malicious programs.

iv) hacking:In computer science , hack verb means gain unauthorized access to computer data: to use a
computer or other technological device or system in order to gain unauthorized access to data held by another person or organization; a transitive verb meaning cope with something: to succeed at or endure something.

v) Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

3a)
i) Copyright is a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution. This is usually only for a limited time.

4b in computer programming, a loop is a sequence of instruction s that is continually repeated until a certain condition is reached

(6 bi)
A presentation program is a software package used to display information in the form of a slide show. It has three major functions: an editor that allows text to be inserted and formatted, a method for inserting and manipulating graphic images, and a slide-show system to display the content.

(6b ii)
(a)Slide master
(b)Slide notes
(C)Transitions
(d) plain text editor

8viii,  Authentication is a process in which the credentials provided are compared to those on file in a database of authorized users' information on a local operating system or within an authentication server.

URL is the abbreviation of Uniform Resource Locator It is the global address of documents and other resources on the World Wide Web.

Answers Loading..
Keep Refreshing this page
Loading...
Name

Betting Tips,3,Blog,4,Education,24,Funny Post,2,Gist,17,Health,18,Lifestyle,21,Music,4,Sport,7,Tutorial,4,
ltr
item
245Naija Gist Review: Neco 2017 Computer Studies Objective And Essay Free Expo Answers
Neco 2017 Computer Studies Objective And Essay Free Expo Answers
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL71ZG_VryTwhsj9XM_SbX4k9BhhyVfMkLPDfywUb1XBOSkHmQ-uhB1EvT1vWFbrAgO6bufvdYmavLRsYSExsXDXuHqIva4V4tAriwVTX_CJEZy-PEgkunHobDWQVw7pVe9K0OpKmImw8/s1600/701192886_6c0d0e23a9-1.png
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL71ZG_VryTwhsj9XM_SbX4k9BhhyVfMkLPDfywUb1XBOSkHmQ-uhB1EvT1vWFbrAgO6bufvdYmavLRsYSExsXDXuHqIva4V4tAriwVTX_CJEZy-PEgkunHobDWQVw7pVe9K0OpKmImw8/s72-c/701192886_6c0d0e23a9-1.png
245Naija Gist Review
https://245naija.blogspot.com/2017/07/neco-2017-computer-studies-objective.html
https://245naija.blogspot.com/
http://245naija.blogspot.com/
http://245naija.blogspot.com/2017/07/neco-2017-computer-studies-objective.html
true
4459651895788526902
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy