Nigeria Universities, Polytechnics and Colleges News Updates


WAEC 2016/17 Computer Answers Now Available For Free

THEORY ANSWERS

================================

CERTIFIED COMPUTER SCIENCE OBJECTIVES
__________________________
1-10: AACBCDBCAB
11-20: ABCDACCBCD
21-30: CABCAACBCA
31-50: BDDBBACDBC
41-50: ABDBBADCAD
__________________________
wait as we solve the rest

(4a)
8 bits = 1 byte
1000 byte = 1 kilobyte
1000 kilobytes = 1 megabyte
.:. 24000 bytes = 0.003 megabyte
Each line = 0.003mb
then 16 lines = 16x0.003 = 0.048mb
Electronic book pages = 500 pages
Megabyte space occupied by 500 pages ebook = 500 x
0.048
=24megabytes
ie 24mb

4b)
i)Floppy, Hard Drive
4c)
i)System software
ii)Application software

4cii)
i)System software
A)Microsoft Windows
B)Linux
ii)Application software
A)Steam
B)Adobe Reader.

5a.
i syntax
ii Reserved ranges

5b)

2ai ) A computer virus is a malware that , when executed, replicates by inserting copies of itself (possibly modified) into other computer programs , data files, or the boot sector of the hard drive; when this replication succeeds , the affected areas are then said to be " infected " .

2aii ) i ) Resident Viruses
ii )Multipartite Viruses
iii )Direct Action Viruses

2b) i ) Vulnerabilities and attacks- s a system susceptibility or flaw , and many vulnerabilities are documented in the Common Vulnerabilities and Exposures ( CVE ) database and vulnerability management is the cyclical practice of identifying , classifying , remediating , and mitigating vulnerabilities as they are discovered .
ii )Backdoors - in a computer system , a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls .
iii )Denial -of- service attack- are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims , such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of a machine or network and block all users at once .
iv )Eavesdropping- is the act of surreptitiously listening to a private conversation, typically between hosts on a network . For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers .
v )Privilege escalation- describes a situation where an attacker with some level of restricted access is able to , without authorization , elevate their privileges or access level. .

1ai ) Networking cables are networking hardware used to connect one network device to other network devices or to connect two or more computers to share printer, scanner etc .

1aii ) i ) Coaxial cable
ii )Optical fiber cable
iii )Patch cable

1b) Very Small Aperture Terminal 
1ci) Difference Between Email address And Web Address.  The simplest way to tell the difference is an email address always contains the ‘at sign’ (@), and a website address never does.  Also, An e- mail address is a web service used to send and receive messages and web address is collection of static and dynamic web pages to perform several tasks like shopping, searching information, other govt. work purpose.

1cii)1ii) Types Of email.

i)Djbadoo@ymail.com ii)Donpizzy@gmail.com 

Types Of Website
i)www.jamb.org.ng
ii)www.waecdirect.org  

More Answers Loading

Related Post

Previous
Next Post »

2 comments

Write comments
Anonymous
AUTHOR
14 April 2016 at 08:17 delete

Tnx PatricsoN

Reply
avatar
Steven
AUTHOR
14 April 2016 at 08:28 delete

Your're welcome sir

Reply
avatar

(adsbygoogle = window.adsbygoogle || []).push({});