Computer Past Questions And Answers

Note: You Can Select Post UTME Schools Name Below The Exam Year.
461

(a)(i) Define the term encryption. (ii) Tick two authentication techniques involved in security measure from Table 1.

Table 1

(ii) Outline two features of data encryption. (b) While exchanging data with a friend through your mobile phone, you observed that it took a longer time than usual. Outline four factors that may be responsible for the delay in the data transfer.

TECHNIQUE

TICK()

Firewall

Biometric

Password

Intranet

View Discussion (0)WAEC 2019 THEORY
462

A single hexadecimal digit is represented by?

  • A. one bit.
  • B. two bits.
  • C. four bits
  • D. eight bits.
View Discussion (0)WAEC 2020 OBJ
463

What type of relationship can you deduce from the statement a department has many employees?

  • A. One-to-one
  • B. One-to-many
  • C. Many-to-many
  • D. Many-to-one
View Discussion (0)WAEC 2021 OBJ
464

(a) Convert the following numbers to be stated bases:

(i) 125.625, to binary

(ii) 111011.10011, to octal

(b) Given that X = 11011011 and Y= 11101101,

(i) construct the truth table for X, Y Z;

(ii) draw the logic gate of X, Y = Z

(iii) state the value of Z.

View Discussion (0)WAEC 2016 THEORY
465

Which of the following statements is not true about a computer file?

  • A. It is very fast to access any record within a file
  • B. It is created electronically
  • C. Initial setup is inexpensive
  • D. File creation and access are less laborious
View Discussion (0)WAEC 2014 OBJ
466

In graphics, a subscript text refers to a text that is positioned?

  • A. a little bit above a normal line of text
  • B. a little bit below a normal line of text.
  • C. at the end of a line of text.
  • D. at the front of a line of text
View Discussion (0)WAEC 2020 OBJ
467

In Microsoft Excel, sheet tabs can be renamed by ______

  • A. Double-clicking any column
  • B. Double-clicking any row
  • C. Double-clicking on the sheet tab; entering the new name
  • D. Going to File, and clicking Save As
View Discussion (0)JAMB 2022
468

The Use of electronic systems to send an unsolicited e-mail to someone's address is known as ______

  • A. Hacking
  • B. Spamming
  • C. Internet fraud
  • D. Piracy
View Discussion (0)WAEC 2014 OBJ
469

Which type of network is usually contained inside one office building?

  • A. CAN
  • B. LAN
  • C. MAN
  • D. WAN
View Discussion (0)JAMB 2022
470

Which of these is not true about peer-to-peer network ?

  • A. there is no dedicated servers
  • B. it has a strong security system
  • C. all computers in this network are known as peers
  • D. there is no hierarchy among the computers
View Discussion (0)JAMB 2023