Home ยป Past Questions ยป Computer-studies ยป Page 13
253

___________ booting is done by turning on the computer at first instance.

  • A. hot
  • B. spicy
  • C. cold
  • D. cool
View Answer & Discuss JAMB 2022
254

Which of these is not a programming language

  • A. HTML
  • B. Java
  • C. C++
  • D. ios
View Answer & Discuss JAMB 2022
255

Binary coded decimals (BCD) numbers express each digit as a ___________

  • A. byte
  • B. nibble
  • C. bit
  • D. All of the above
View Answer & Discuss JAMB 2022
256

The hexadecimal digits are 0-9 and A-_____

  • A. E
  • B. F
  • C. G
  • D. D
View Answer & Discuss JAMB 2022
257

___________________ is a program meant to be sent from one computer to another across the world wide Web.

  • A. Applet
  • B. Mail
  • C. algorithm
  • D. data packages
View Answer & Discuss JAMB 2022
258

The java interpreter translates a java program from ____________ to machine language.

  • A. nibble
  • B. bit
  • C. byte code
  • D. high level language
View Answer & Discuss JAMB 2022
259

The logical structure of the database can be depicted through its ______

  • A. Domain
  • B. Data model
  • C. Architecture
  • D. Schemas
View Answer & Discuss JAMB 2022
260

A collection of facts and figures is known to be _________

  • A. Data
  • B. Database
  • C. sequenced data
  • D. structural data
View Answer & Discuss JAMB 2022
261

When does the output of a NOR gate =0?

  • A. whenever 0 is present at input
  • B. only when all input =0
  • C. whenever 1 is present at input
  • D. only when all input =1.
View Answer & Discuss JAMB 2022
262

The number of input combination for a 4 input gate is ______

  • A. 9
  • B. 8
  • C. 15
  • D. 16
View Answer & Discuss JAMB 2022
263

Sensitive data can be protected from prying eyes using _________

  • A. File permissions
  • B. File locks
  • C. passwords
  • D. encryption
View Answer & Discuss JAMB 2022
264

Running other software on idle computer without the knowledge of the organisation is called theft of ___________

  • A. Software
  • B. computer
  • C. computer time
  • D. use
View Answer & Discuss JAMB 2022
265

Which of the following software can’t be categorized as an application software?

  • A. DBM
  • B. MS-DOS
  • C. Spreadsheet
  • D. word processor
View Answer & Discuss JAMB 2022
266

A half byte is known as ________.

  • A. data
  • B. bit
  • C. half byte
  • D. nibble
View Answer & Discuss JAMB 2022
267

Which of the memories must be refreshed many times per second?

  • A. EPROM
  • B. ROM
  • C. Static RAM
  • D. Dynamic RAM
View Answer & Discuss JAMB 2022
268

Which of the following is not a type of computer network?

  • A. VPN
  • B. CAN
  • C. WLAN
  • D. DAN
View Answer & Discuss JAMB 2022
269

Which type of network can span several building, but is usually less than 30 square miles big?

  • A. CAN
  • B. LAN
  • C. MAN
  • D. WAN
View Answer & Discuss JAMB 2022
270

Which type of network is usually contained inside one office building?

  • A. CAN
  • B. LAN
  • C. MAN
  • D. WAN
View Answer & Discuss JAMB 2022
271

At least how many keys is a keyboard made up of?

  • A. 105
  • B. 107
  • C. 101
  • D. 103
View Answer & Discuss JAMB 2022
272

Which of the following is an example of output device

  • A. Keyboard
  • B. Mouse
  • C. speaker
  • D. microphone
View Answer & Discuss JAMB 2022
273

Microsoft PowerPoint is a ________________ application

  • A. presentation software
  • B. graphing
  • C. productivity software
  • D. gaming
View Answer & Discuss JAMB 2022