Computer Studies JAMB, WAEC, NECO AND NABTEB Official Past Questions

589

Which of the following function keys can be used to run slide show in a PowerPoint presentation?     

  • A. F2
  • B. F5
  • C. F7
  • D. F12
View Answer & Discuss WAEC 2017
590

Which of the following tasks is accomplished by using bookmarks? To       

  • A. add anchors in webpage
  • B. add hyperlinks in webpage
  • C. quickly jump to specific location in document
  • D. mark the ending of a paragraph of a document
View Answer & Discuss WAEC 2017
591

The flowchart ♦ symbol represents?       

  • A. comment
  • B. connector
  • C. decision
  • D. input/output
View Answer & Discuss WAEC 2017
592

Which of the following statements can be used for looping in BASIC?       

  • A. FOR ... NEXT
  • B. IF ... THEN
  • C. GO TO
  • D. Go SUB
View Answer & Discuss WAEC 2017
593

To hibernate windows operating system means?     

  • A. re-start the computer in safe mode
  • B. restart the computer in hibernate mode
  • C. shut down the computer and terminate all the running applications
  • D. shut down the computer without closing all the running applications
View Answer & Discuss WAEC 2017
594

Use the information below to answer this question
I. – Mouse II. – Keyboard III. – Scanner IV. – Joystick.
The input devices used to capture finger print is?

  • A. I
  • B. II
  • C. III
  • D. IV
View Answer & Discuss WAEC 2017
595

Use the information below to answer questions 35 and 36

I-Mouse Il. -Keyboard III-Scanner IV. -Joystick.

The input devices used to capture date of birth on an Online form are?     

  • A. I, Il and IV only
  • B. I, II and lll only
  • C. I and ll only
  • D. lI and IV only
View Answer & Discuss WAEC 2017
596
  INPUT OUTPUT
P O R
0 0 1
0 1 0
1 0 0
1 1 0

The table above represents the Truth Table for?    

  • A. NOT logic gate
  • B. NOR logic gate
  • C. AND logic gate
  • D. NAND logic gate
View Answer & Discuss WAEC 2017
597

Which of the following is not a good ICT security policy?     

  • A. Re-use of old password
  • B. Frequent change of password
  • C. Backing up files and documents
  • D. Scanning e-mail attachment for virus before opening it
View Answer & Discuss WAEC 2017
598

Which of the following factors limits access to computerized file system? it      

  • A. occupies less space
  • B. requires regular supply of power
  • C. is highly efficient in processing information
  • D. provides easy and fast access to information
View Answer & Discuss WAEC 2017
599

Soft boot is initiated by pressing?     

  • A. Ctrl + Alt + Del.
  • B. function key F10.
  • C. main switch.
  • D. bootstrap buttons.
View Answer & Discuss WAEC 2017
600

The absolute address of cell G5 in a spreadsheet application is represented by?   

  • A. $G5
  • B. G$5
  • C. $G$5
  • D. $G5$
View Answer & Discuss WAEC 2017
601

The act of translating data into a secret code is known as?         

  • A. authentication
  • B. authorisation
  • C. encryption
  • D. piracy
View Answer & Discuss WAEC 2017
602

The following are features of web browsers except?

  • A. address bar
  • B. formula bar
  • C. menu bar
  • D. title bar
View Answer & Discuss WAEC 2017
603

Which of the following symbols is not a relational operator in BASIC programming language?      

  • A. <
  • B. >
  • C. ^
  • D.
View Answer & Discuss WAEC 2017
604

Which of the file formats is supported in all windows operating systems?   

  • A. BSDB.
  • B. EXT
  • C. FAT
  • D. NTFS
View Answer & Discuss WAEC 2017
605

Which of the following statements is not true about secondary storage media? They

     

  • A. are volatile
  • B. are non-volatile
  • C. are relatively cheap
  • D. have storage capacity
View Answer & Discuss WAEC 2017
606

In MS Excel, comments used in cells are called?      

  • A. cell tip
  • B. smart tip
  • C. soft tip
  • D. web tip
View Answer & Discuss WAEC 2017
607

The advantages of a computer include that they?
I. operate at high speeds; II. think for the user; Ill. are accurate; IV. are credible.
 

  • A. I, Il and lll only
  • B. I, III and IV only
  • C. II, l and IV only
  • D. I, II, l and IV
View Answer & Discuss WAEC 2017
608

Which of the following is not a method of accessing file?       

  • A. Circular
  • B. Random
  • C. Serial
  • D. Sequential
View Answer & Discuss WAEC 2017
609

The ASCII code for the word NOT can be written as?          

  • A. 101010010011111001110.
  • B. 100111010011111010100
  • C. 100111110101001001110
  • D. 100111010101001111
View Answer & Discuss WAEC 2017