Home Β» Past Questions Β» Computer-studies Β» Page 31
631

(a) State two BASIC programming keywords.

(b) Write the following equations in BASIC format:

(i) I = PRT/100: (ii) Y= AX\(_2\) +BX+C; (iii) Y= MX + C

(c) Write a BASIC program that accepts mass and volume of a liquid as input from the User.

The program should compute.and display the density of the liquid. Density = mass volume

View Answer & Discuss WAEC 2016
632

(a) An electronic book is made up of 500 pages and there are 16 lines of 24,000 bits line on each page.

Complete the space it will occupy on a computer in megabytes.

 (b) Give an example of auxiliary storage.

(c) In the table below:

(i) List the two main types of computer software.

(ii) Give two examples under each in 4(c)i)

main type  example
i A
  B
ii A
B

 

View Answer & Discuss WAEC 2016
633

(a) Convert the following numbers to be stated bases:

(i) 125.625, to binary

(ii) 111011.10011, to octal

(b) Given that X = 11011011 and Y= 11101101,

(i) construct the truth table for X, Y Z;

(ii) draw the logic gate of X, Y = Z

(iii) state the value of Z.

View Answer & Discuss WAEC 2016
634

(a) (i) Define computer virus.

(i) List three types of computer network security breach.

(b) State five sources of computer network security breach.

View Answer & Discuss WAEC 2016
635

(a) (i) What is a network cable?

(ii) State three types of cable used in networking

(b) Write the acronym VSAT in full.

(C) (i) Distinguish between an e-mail address and a website address.

(ii) List examples of each of: (1) e-mail address (2) website address

View Answer & Discuss WAEC 2016
636

Symptoms of computer virus attack include:

I improved processing speeds; Il drive light coming up without apparent reason; Ill unexplainable printer activity; IV the disappearance or strange files appearance on the screen

  • A. l, Il and Ill only
  • B. I, Ill and IV only
  • C. II, IIl, and IV only
  • D. I, II, Ill and IV
View Answer & Discuss WAEC 2016
637

The illegal copying and use of proprietary/copy righted software is called?

 

  • A. hacking
  • B. spamming
  • C. hardware piracy
  • D. software piracy.
View Answer & Discuss WAEC 2016
638

Sorting of records is sufficient and a necessary condition for creating?

 

  • A. random file
  • B. indirect file
  • C. sequential file
  • D. indexed sequential file.
View Answer & Discuss WAEC 2016
639

Which of the following is a temporary file that can be used only once and then discarded?

 

  • A. Refresh file
  • B. Master file
  • C. System file
  • D. Transaction file
View Answer & Discuss WAEC 2016
640

Which of the following is true of a digital logic gate?

.

  • A. It has at least two inputs but only one output.
  • B. It has many outputs and inputs.
  • C. It has at least one or more inputs but only one output.
  • D. It has at least one input and two outputs
View Answer & Discuss WAEC 2016
641

The decimal number 1024 in hexadecimal equivalent is?

 

  • A. 24
  • B. 400
  • C. 3E8
  • D. 8BB
View Answer & Discuss WAEC 2016
642

The word bit refers to?

 

  • A. the value zero or one
  • B. the value zero of more
  • C. central processing unit command
  • D. central processing unit instructions.
View Answer & Discuss WAEC 2016
643

The main advantage of intellectual property right is?

 

  • A. maximization of profit
  • B. discovering of brilliant persons
  • C. discovering of sharing
  • D. encouragement of innovations.
View Answer & Discuss WAEC 2016
644

 

Which of the following is not a biometric data?

 

  • A. finger prints
  • B. password
  • C. pattern of eye iris
  • D. sound of the voice.
View Answer & Discuss WAEC 2016
645

The initial screen that is displayed after a computer booting is referred to as?

 

  • A. desktop
  • B. interface
  • C. software
  • D. taskbar
View Answer & Discuss WAEC 2016
646

The speed of data transfer in the computer can be determined in terms of ?

 

  • A. protocol and bus speed
  • B. bus speed and width
  • C. bus speed and storage media
  • D. bus width and storage media.
View Answer & Discuss WAEC 2016
647

Converting 4B7\(_16\) to binary?           

  • A. 0100 1010 0111
  • B. 0100 1011 0111,
  • C. 0100 1000 0111,
  • D. 0100 1100 0111
View Answer & Discuss WAEC 2016
648

One megabyte is equivalent to?

 

  • A. one million bytes
  • B. two million bytes
  • C. three million bytes
  • D. four million bytes
View Answer & Discuss WAEC 2016
649

In a database, a primary key is a field which contains?

 

  • A. text only
  • B. unique entries
  • C. duplicate values
  • D. numeric value only.
View Answer & Discuss WAEC 2016
650

Principal uses of word processing software packages include:

I preparing deft articles for publication

ll pre- paring reports for top management

Ill preparing accounts
IV preparing organizations’ newsletter.

  • A. I, IIIΒ and IV only
  • B. I, II and IV only
  • C. II, III and IV only
  • D. I, II, IIl, and IV.
View Answer & Discuss WAEC 2016
651

A block of text that is marked by the tab key when the enter key is pressed can be referred to as?

  • A. margin
  • B. paragraph
  • C. white space
  • D. word wrap
View Answer & Discuss WAEC 2016