Computer Past Questions And Answers
Symptoms of computer virus attack include: I improved processing speeds; Il drive light coming up without a parent reason; Ill unexplainable printer activity; IV the disappearance or strange files appearance on screen
- A. l, Il and Ill only
- B. I, Ill and IV only
- C. I, IIl and Iv only
- D. I, II, Ill and IV
What protocol is used between Email servers?
- A. SMTP
- B. SNMP
- C. FTP
- D. POP
The maximum length of a text field in MS Access is?
- A. 75
- B. 120
- C. 255
- D. 265
Which of the following statements is true of encryption? It
- A. provides complete privacy.
- B. provides security of varying reliability.
- C. makes messages un- readable by the recipient.
- D. permits an individual to have access to another person's message.
A suite of software that controls and manages the basic operation of a computer is?
- A. application Software.
- B. management system.
- C. software package.
- D. system software.
Converting 4B716 to binary?
- A. 0100 1010 0111
- B. 0100 1011 0111,
- C. 0100 1000 0111,
- D. 0100 1100 0111
The computer hardware is made up of system unit and?
- A. motherboard
- B. peripheral
- C. control unit
- D. central processing unit
Which of the following is not a step involved in data conversion?
- A. Input
- B. Output
- C. Process
- D. Transfer
The equivalent of the decimal number 89 in base 4 is?
- A. 1021.
- B. 1201.
- C. 1211.
- D. 1121.
(a) List the two main constituents of a computer (b) State four characteristics of a computer.
(c) In a tabular form, categorize each of the following statements into either data or information: (i) It is no significant alone by itself; (ii) It is significant by itself
(iii) It is obtained through observations and recordings (iv) It is obtained through analysis.
View Discussion (0)WAEC 2015 THEORY
