Computer Past Questions And Answers

Note: You Can Select Post UTME Schools Name Below The Exam Year.
251

A graph plotter is most suited for use in a/an?

  • A. tax office
  • B. immigration office
  • C. population census office
  • D. geographical information system.
View Discussion (0)WAEC 2017 OBJ
252

The smallest unit of information representation which is addressable on the computer memory is?

  • A. 1 bit
  • B. 2 bits
  • C. 4 bits
  • D. 8 bits
View Discussion (0)WAEC 2016 OBJ
253

Which of the following is true when data maintained in MS Excel workbook is linked to a word document? The word document

  • A. cannot be edited.
  • B. must contain a hyperlink.
  • C. contains a copy of the actual data.
  • D. contains a reference to the original source application.
View Discussion (0)WAEC 2019 OBJ
254

_________ are programmes that affect the effectiveness of a computer system.

  • A. bugs
  • B. virus
  • C. anti virus
  • D. none of the above
View Discussion (0)JAMB 2022
255

Data created by the user is called

  • A. primary data
  • B. qualitative data
  • C. quantitative data
  • D. secondary data
View Discussion (0)WAEC 2021 OBJ
256

A program that can copy itself and infect a computer without the permission or knowledge of the owner is called what?

  • A) monitor
  • B) flash
  • C) floppy
  • D) virus
View Discussion (0)POST UTME UNICAL
257

Serial files are

  • A. stored using a key
  • B. sorted in a particular order
  • C. stored as they come
  • D. stored in any storage media
View Discussion (0)WAEC 2022 OBJ
258

Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?

  • A. protection
  • B. Identity theft
  • C. pranks
  • D. research purpose
View Discussion (0)JAMB 2022
259

''Your blood be upon your heads! I am innocent. From now on I will go to the Gentiles''. The above statement was made by

  • A. Jesus Christ
  • B. Paul
  • C. Peter
  • D. James
View Discussion (0)JAMB 1991
260

The conversion of readable data to unreadable codes in order to prevent unauthorised access is known as?

  • A. authentication
  • B. encryption
  • C. encoding
  • D. decryption
View Discussion (0)WAEC 2018 OBJ