Computer Past Questions And Answers
(a)(i) Define the term encryption. (ii) Tick two authentication techniques involved in security measure from Table 1.
Table 1
(ii) Outline two features of data encryption. (b) While exchanging data with a friend through your mobile phone, you observed that it took a longer time than usual. Outline four factors that may be responsible for the delay in the data transfer.
TECHNIQUE | TICK() |
Firewall | |
Biometric | |
Password | |
Intranet |
A single hexadecimal digit is represented by?
- A. one bit.
- B. two bits.
- C. four bits
- D. eight bits.
What type of relationship can you deduce from the statement a department has many employees?
- A. One-to-one
- B. One-to-many
- C. Many-to-many
- D. Many-to-one
(a) Convert the following numbers to be stated bases:
(i) 125.625, to binary
(ii) 111011.10011, to octal
(b) Given that X = 11011011 and Y= 11101101,
(i) construct the truth table for X, Y Z;
(ii) draw the logic gate of X, Y = Z
(iii) state the value of Z.
View Discussion (0)WAEC 2016 THEORYWhich of the following statements is not true about a computer file?
- A. It is very fast to access any record within a file
- B. It is created electronically
- C. Initial setup is inexpensive
- D. File creation and access are less laborious
In graphics, a subscript text refers to a text that is positioned?
- A. a little bit above a normal line of text
- B. a little bit below a normal line of text.
- C. at the end of a line of text.
- D. at the front of a line of text
In Microsoft Excel, sheet tabs can be renamed by ______
- A. Double-clicking any column
- B. Double-clicking any row
- C. Double-clicking on the sheet tab; entering the new name
- D. Going to File, and clicking Save As
The Use of electronic systems to send an unsolicited e-mail to someone's address is known as ______
- A. Hacking
- B. Spamming
- C. Internet fraud
- D. Piracy
Which type of network is usually contained inside one office building?
- A. CAN
- B. LAN
- C. MAN
- D. WAN
Which of these is not true about peer-to-peer network ?
- A. there is no dedicated servers
- B. it has a strong security system
- C. all computers in this network are known as peers
- D. there is no hierarchy among the computers

