Free Neco 2017 Computer Studies Obj &
Theory Answers Now Available
2017 NECO Expo Runs, Questions and
Answers.
This great
opportunity to get grades like A’s, B’s
and
Minimum of Credit in this exam and be
Free
forever from O Level Issues Every Year.
Take Our Free Runz : Neco 2017
Computer
Studies theory and obj Answers will be
posted
here for free but 20 minutes after
exam starts.
Take Our Paid Runz : To Get The
Answers 3 Hours Before Exam
Computer Science Verified Obj
1A 2D 3A 4A 5B
6A 7E 8C 9C 10C
11B 12D 13D 14E 15E
16C 17A 18B 19B 20D
21C 22E 23C 24A 25A
26D 27A 28A 29D 30A
31C 32A 33B 34A 35E
36E 37B 38D 39E 40A
41D 42B 43D 44B 45B
46B 47A 48B 49E 50E
51E 52E 53D 54C 55D
56S 57B 58D 59E 60A
COMPUTER STUDIES ESSAY ANSWER:-
2ai)
Copyright is a legal right created by the law of
a country that grants the creator of an original
work exclusive rights for its use and
distribution. This is usually only for a limited
time.
ii)
spam is unsolicited junk email sent
indiscriminately in bulk, often for commercial
purposes. Much of it is sent by botnets,
networks of virus-infected computers ,
complicating the process of tracking down the
spammers .
iii)Malware is short for malicious
software , is an umbrella term used to refer to a
variety of forms of hostile or intrusive
software , including computer viruses, worms,
trojan horses, ransomware, spyware , adware ,
scareware, and other malicious programs.
iv) hacking:In computer science , hack verb
means gain unauthorized access to computer
data: to use a
computer or other technological device or
system in order to gain unauthorized access to
data held by another person or organization; a
transitive verb meaning cope with something: to
succeed at or endure something.
v) Encryption is the most effective way to
achieve data security. To read an encrypted file,
you must have access to a secret key or
password that enables you to decrypt it.
Unencrypted data is called plain text ; encrypted
data is referred to as cipher text.
2aiv)A Hacker is a person who finds and
exploits the weakness in computer systems and/
or networks to gain access. Hackers are usually
skilled computer programmers with knowledge
of computer security.
2b) i Computer Slowdown
ii Frequent Crashes and Freezes
iii Excessive Drive or Processor Use
iv Unfamiliar Programs and Pop-Ups
Or
i A computer program disappears from its
memory, especially if there is no known removal
of the program.
ii Unfamiliar music or sounds unexpectedly
starts playing through the speakers.
iii Icons appear on the desktop unrelated to any
programs that are currently being installed, or
new icons seem to appear when no software hasy
been installed.
iv An antivirus program will not run, or a new
one will not install properly or at all.Previously
installed antivirus programs will suddenly
disable and can not be restarted.
==================================
(6)
(I) Collation is the assembly of written
information into a standard order
Collation is a fundamental element of most
office filing systems, library catalogs,
and reference books.
(Ii)Information processing is the change
(processing) of information in any manner
detectable by an observer. As such, it is a
process that describes everything that happens
(changes) in the universe, from the falling of a
rock (a change in position) to the printing of a
text file from a digital computer system
(iii)Information Analysis is a vital function in
both government and the private sector.
Analysts identify, obtain, analyze, and
synthesize information to provide insights and
advice to policymakers on critical decisions they
must make.
(Iv)The gathering of relevant and up-to-date
information is a key business process.
Information consists of organised facts and
figures that have meaning within the context
that the information is intended to be
interpreted by people. Information is thus a
valuable business commodity, and frequently
businesses pay money for up-to-date and
relevant information.
(6bi)
A presentation program is a software package
used to display information in the form of a
slide show. It has three major functions: an
editor that allows text to be inserted and
formatted, a method for inserting and
manipulating graphic images, and a slide-show
system to display the content.
(6bii)
(a)Slide master
(b)Slide notes
(C)Transitions
(d) plain text editor
=================================
8eii) worm is a standalone malware computer
program that replicates itself in order to spread
to other computers.
8Vii) cache is a hardware or software
component that stores data so future requests
for that data can be served faster; the data
stored in a cache might be the result of an
earlier computation, or the duplicate of data
stored elsewhere.
8viii) Authentication is a process in which the
credentials provided are compared to those on
file in a database of authorized users'
information on a local operating system or
within an authentication server.
3a)
A network topology is the pattern in which
nodes (i.e., computers, printers, routers or other
devices) are connected to a local area network
(LAN) or other network via links
3ii)
i)Star topology
ii)bus topology
iii)Mesh topology
iv)Ring topology
3bi)Web server is a computer system, which
provides the web pages via HTTP (Hypertext
Transfer Protocol).
While
Web browser is a client, program, software or
tool through which we sent HTTP request to
web server.
3bii)
Hub connects multiple Ethernet devices
together, making them act as a single segment.
While
Switch is used to connect various network
segments.
==================================
=========================
Completed
=========================
Always Tell Your Friends About Www.Hellogist.com.ng To Get The Latest Updated