Nc

Wednesday 12 July 2017

FREE NECO 2017 Computer Studies Obj and Theory/Essay Questions & Answers loading!!!

3ai)
A network topology is the pattern in which nodes (i.e., computers, printers, routers or other devices) are connected to a local area network (LAN) or other network via links
3ii)
i)Star topology
ii)bus topology
iii)Mesh topology
iv)Ring topology
3bi)Web server is a computer system, which provides the web pages via HTTP (Hypertext Transfer Protocol).
While
Web browser is a client, program, software or tool through which we sent HTTP request to web server.
3bii)
Hub connects multiple Ethernet devices together, making them act as a single segment.
While
Switch is used to connect various network segments.
6i) Collation is the assembly of written information into a standard order
Collation is a fundamental element of most office filing systems, library catalogs, and reference books.
ii)Information processing is the change (processing) of information in any manner detectable by an observer. As such, it is a process that describes everything that happens (changes) in the universe, from the falling of a rock (a change in position) to the printing of a text file from a digital computer system
iii)Information Analysis is a vital function in both government and the private sector. Analysts identify, obtain, analyze, and synthesize information to provide insights and advice to policymakers on critical decisions they must make.
iv)The gathering of relevant and up-to-date information is a key business process. Information consists of organised facts and figures that have meaning within the context that the information is intended to be interpreted by people. Information is thus a valuable business commodity, and frequently businesses pay money for up-to-date and relevant information.
6bi)
A presentation program is a software package used to display information in the form of a slide show.
6bii)
i)Slide master
ii)Slide notes
iii)Transitions
iv) plain text editor
2ai)
Copyright is a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution. This is usually only for a limited time.
2aii)
spam is unsolicited junk email sent indiscriminately in bulk, often for commercial purposes. Much of it is sent by botnets, networks of virus-infected computers, complicating the process of tracking down the spammers.
2aiii)
Malware is short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
2aiv)
hacking:In computer science , hack verb means gain unauthorized access to computer data: to use a computer or other technological device or system in order to gain unauthorized access to data held by another person or organization.
2av)
Encryption is the most effective way to achieve data security . To read anencrypted file, you must have access to a secret key or password that enables you to decrypt it.
2b)
i)computer slowdown
ii)frequent crashes and freezes
iii)excessive drive or processor use
iv)unfamiliar programs and pop-ups

Or
i A computer program disappears from its memory, especially if there is no known removal of the program.
ii Unfamiliar music or sounds unexpectedly starts playing through the speakers.
iii Icons appear on the desktop unrelated to any programs that are currently being installed, or new icons seem to appear when no software has been installed.
iv An antivirus program will not run, or a new one will not install properly or at all.Previously installed antivirus programs will suddenly disable and can not be restarted.

8e ii, worm is a standalone malware computer program that replicates itself in order to spread to other computers.
8Vii, cache is a hardware or software component that stores data so future requests for that data can be served faster; the data stored in a cache might be the result of an earlier computation, or the duplicate of data stored elsewhere.
8viii, Authentication is a process in which the credentials provided are compared to those on file in a database of authorized users' information on a local operating system or within an authentication server.
8e,intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area
8e ii, worm is a standalone malware computer program that replicates itself in order to spread to other computers.
URL is the abbreviation of Uniform Resource Locator It is the global address of documents and other resources on the World Wide Web.
: firewall is a network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic.(6 bi)A presentation program is a software package used to display information in the form of a slide show. It has three major functions: an editor that allows text to be inserted and formatted, a method for inserting and manipulating graphic images, and a slide-show system to display the content.

No comments:

Post a Comment