Home ยป Past Questions ยป Computer-studies ยป Page 16
316

Another word for booting is

  • A. starting
  • B. restarting
  • C. loading
  • D. running
View Answer & Discuss JAMB 2022
317

Files that maintain the hierarchical structure of the file system.

  • A. Descriptors
  • B. Directories
  • C. Modifiers
  • D. Relative files
View Answer & Discuss JAMB 2022
318

In general, a file is basically a collection of all related______.

  • A. Rows & Columns
  • B. Fields
  • C. Database
  • D. Records
View Answer & Discuss JAMB 2022
319

The rules that govern the structure of a command or programming language is called

  • A. Syntax
  • B. Algorithm
  • C. Logic
  • D. Password
View Answer & Discuss JAMB 2022
320

What is the full form of CU?

  • A. Compound Unit
  • B. Communication Unit
  • C. Computer unit
  • D. Control unit
View Answer & Discuss JAMB 2022
321

Typically, an ATM is used for

  • A. record keeping
  • B. budget making
  • C. watching movies
  • D. withdrawing cash
View Answer & Discuss JAMB 2022
322

Types of software programs are

  • A. Application programs
  • B. replicate programs
  • C. Logical programs
  • D. both A and B
View Answer & Discuss JAMB 2022
323

Computer Monitor is also known as

  • A. DVU
  • B. UVD
  • C. VDU
  • D. CCTV
View Answer & Discuss JAMB 2022
324

Which can be the input and output devices both?

  • A. Scanner
  • B. Touch screen monitor
  • C. Speaker
  • D. Digitizer
View Answer & Discuss JAMB 2022
325

CPU stands for ________________.

  • A. Control Processing Unit
  • B. Computer Process Unit
  • C. Central Personal Unit
  • D. Central Processing Unit
View Answer & Discuss JAMB 2022
326

The actual physical network of wires, cables and satellite that connects computers and resources throughout the world is the _______________

  • A. Web
  • B. Internet
  • C. e-commerce
  • D. social media
View Answer & Discuss JAMB 2022
327

What is considered the brain of the computer?

  • A. Central Processing Unit
  • B. Monitor/Display Screen
  • C. Mouse
  • D. Printer
View Answer & Discuss JAMB 2022
328

Hexadecimal numbers are a mixture of

  • A. Octal and decimal numbers
  • B. Binary and octal numbers
  • C. Letters and decimal digits
  • D. Binary and decimal numbers
View Answer & Discuss JAMB 2022
329

Programming language COBOL works best for use in

  • A. Siemens applications
  • B. student applications
  • C. social applications
  • D. commercial application
View Answer & Discuss JAMB 2022
330

………. provides total solutions to reduce data redundancy, inconsistency, dependence and unauthorized access of data

  • A. Tables
  • B. DBMS
  • C. Production passwords
  • D. Database
View Answer & Discuss JAMB 2022
331

In SQL, which command is used to remove a stored function from the database?

  • A. REMOVE Function
  • B. DELETE function
  • C. DROP function
  • D. ERASE Function
View Answer & Discuss JAMB 2022
332

In Boolean algebra, the bar sign (-) indicates ………………..

  • A. OR operation
  • B. AND operation
  • C. NOT operation
  • D. None of the above
View Answer & Discuss JAMB 2022
333

When an input signal 1 is applied to a NOT gate, the output is ………………

  • A. 0
  • B. 1
  • C. Either 0 & 1
  • D. None of the above
View Answer & Discuss JAMB 2022
334

Destruction of files for malicious reasons such as access by fraudulent people is classified as being

  • A. modified
  • B. accessed
  • C. destroyed
  • D. unauthorized access
View Answer & Discuss JAMB 2022
335

___________ is when someone steals another persons identity.

  • A. Cyber bullying
  • B. Identity Theft
  • C. Identity Phase
  • D. Cyber Know How
View Answer & Discuss JAMB 2022
336

What is the etiquette one should follow while working online?

  • A. Anything goes . . . providing he/she remains anonymous
  • B. Netflix
  • C. Netiquette
  • D. Piracy
View Answer & Discuss JAMB 2022