Home ยป Past Questions ยป Computer-studies ยป Jamb ยป Page 11
211

The rules that govern the structure of a command or programming language is called

  • A. Syntax
  • B. Algorithm
  • C. Logic
  • D. Password
View Answer & Discuss JAMB 2022
212

What is the full form of CU?

  • A. Compound Unit
  • B. Communication Unit
  • C. Computer unit
  • D. Control unit
View Answer & Discuss JAMB 2022
213

Typically, an ATM is used for

  • A. record keeping
  • B. budget making
  • C. watching movies
  • D. withdrawing cash
View Answer & Discuss JAMB 2022
214

Types of software programs are

  • A. Application programs
  • B. replicate programs
  • C. Logical programs
  • D. both A and B
View Answer & Discuss JAMB 2022
215

Computer Monitor is also known as

  • A. DVU
  • B. UVD
  • C. VDU
  • D. CCTV
View Answer & Discuss JAMB 2022
216

Which can be the input and output devices both?

  • A. Scanner
  • B. Touch screen monitor
  • C. Speaker
  • D. Digitizer
View Answer & Discuss JAMB 2022
217

CPU stands for ________________.

  • A. Control Processing Unit
  • B. Computer Process Unit
  • C. Central Personal Unit
  • D. Central Processing Unit
View Answer & Discuss JAMB 2022
218

The actual physical network of wires, cables and satellite that connects computers and resources throughout the world is the _______________

  • A. Web
  • B. Internet
  • C. e-commerce
  • D. social media
View Answer & Discuss JAMB 2022
219

What is considered the brain of the computer?

  • A. Central Processing Unit
  • B. Monitor/Display Screen
  • C. Mouse
  • D. Printer
View Answer & Discuss JAMB 2022
220

Hexadecimal numbers are a mixture of

  • A. Octal and decimal numbers
  • B. Binary and octal numbers
  • C. Letters and decimal digits
  • D. Binary and decimal numbers
View Answer & Discuss JAMB 2022
221

Programming language COBOL works best for use in

  • A. Siemens applications
  • B. student applications
  • C. social applications
  • D. commercial application
View Answer & Discuss JAMB 2022
222

………. provides total solutions to reduce data redundancy, inconsistency, dependence and unauthorized access of data

  • A. Tables
  • B. DBMS
  • C. Production passwords
  • D. Database
View Answer & Discuss JAMB 2022
223

In SQL, which command is used to remove a stored function from the database?

  • A. REMOVE Function
  • B. DELETE function
  • C. DROP function
  • D. ERASE Function
View Answer & Discuss JAMB 2022
224

In Boolean algebra, the bar sign (-) indicates ………………..

  • A. OR operation
  • B. AND operation
  • C. NOT operation
  • D. None of the above
View Answer & Discuss JAMB 2022
225

When an input signal 1 is applied to a NOT gate, the output is ………………

  • A. 0
  • B. 1
  • C. Either 0 & 1
  • D. None of the above
View Answer & Discuss JAMB 2022
226

Destruction of files for malicious reasons such as access by fraudulent people is classified as being

  • A. modified
  • B. accessed
  • C. destroyed
  • D. unauthorized access
View Answer & Discuss JAMB 2022
227

___________ is when someone steals another persons identity.

  • A. Cyber bullying
  • B. Identity Theft
  • C. Identity Phase
  • D. Cyber Know How
View Answer & Discuss JAMB 2022
228

What is the etiquette one should follow while working online?

  • A. Anything goes . . . providing he/she remains anonymous
  • B. Netflix
  • C. Netiquette
  • D. Piracy
View Answer & Discuss JAMB 2022
229

An Operating System is a type of?

  • A. Application Software
  • B. System software
  • C. Utility Program
  • D. None of these
View Answer & Discuss JAMB 2022
230

What does an Operating System do?

  • A. Memory Management
  • B. File Management
  • C. Application Management
  • D. All of the above
View Answer & Discuss JAMB 2022
231

What is the permanent memory built into your computer called?

  • A. RAM
  • B. ROM
  • C. CPU
  • D. CD-ROM
View Answer & Discuss JAMB 2022