Congrats: 2015 Batch A Passing Out Corpers will get April Alawi Today
DG, NYSC
UNILAG Notify Students In-Course Assessment – 2nd Semester 2015/16
- Students without their Biometric Identity Cards will not be allowed into the Examination Halls.
- Verification starts two hours before the examination.
- All the verified candidates must be seated in the Examination Halls 30 minutes before the commencement of the examination.
- No student will be permitted to be verified 30 minutes after the commencement of the examination.
List Of Nigerian Universities that Accept Lower Credit for Direct Entry
- All private universities – you may need upper credit for some courses.
- University of Nigeria Nsukka (UNN)
- Osun State University (UNIOSUN)
- Ahmadu Bello University (ABU)
- Chukwuemeka Odumegwu Ojukwu University formerly Anambra State University (ANSU)
- University of Calabar (UNICAL)
- University of Maiduguri (UNIMAID)
- Usman Dan Fodio University Sokoto (UDUSOK)
- Niger Delta University, NDU, Wilberforce
- Enugu State University of Science and Technology, ESUT
- Nasarawa State University (NSUK), Keffi
- University of Jos, UNIJOS
- Umaru Musa Yar’Adua University, UMYU
- Federal University of Technology, Minna, FUTMINNA
- University of Ilorin, UNILORIN (accepts lower credit in history and performer art)
WAEC 2016/17 Computer Answers Now Available For Free
THEORY ANSWERS
================================
CERTIFIED COMPUTER SCIENCE OBJECTIVES
__________________________
1-10: AACBCDBCAB
11-20: ABCDACCBCD
21-30: CABCAACBCA
31-50: BDDBBACDBC
41-50: ABDBBADCAD
__________________________
wait as we solve the rest
(4a)
8 bits = 1 byte
1000 byte = 1 kilobyte
1000 kilobytes = 1 megabyte
.:. 24000 bytes = 0.003 megabyte
Each line = 0.003mb
then 16 lines = 16x0.003 = 0.048mb
Electronic book pages = 500 pages
Megabyte space occupied by 500 pages ebook = 500 x
0.048
=24megabytes
ie 24mb
4b)
i)Floppy, Hard Drive
4c)
i)System software
ii)Application software
4cii)
i)System software
A)Microsoft Windows
B)Linux
ii)Application software
A)Steam
B)Adobe Reader.
5a.
i syntax
ii Reserved ranges
5b)
2ai ) A computer virus is a malware that , when executed, replicates by inserting copies of itself (possibly modified) into other computer programs , data files, or the boot sector of the hard drive; when this replication succeeds , the affected areas are then said to be " infected " .
2aii ) i ) Resident Viruses
ii )Multipartite Viruses
iii )Direct Action Viruses
2b) i ) Vulnerabilities and attacks- s a system susceptibility or flaw , and many vulnerabilities are documented in the Common Vulnerabilities and Exposures ( CVE ) database and vulnerability management is the cyclical practice of identifying , classifying , remediating , and mitigating vulnerabilities as they are discovered .
ii )Backdoors - in a computer system , a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls .
iii )Denial -of- service attack- are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims , such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of a machine or network and block all users at once .
iv )Eavesdropping- is the act of surreptitiously listening to a private conversation, typically between hosts on a network . For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers .
v )Privilege escalation- describes a situation where an attacker with some level of restricted access is able to , without authorization , elevate their privileges or access level. .
1ai ) Networking cables are networking hardware used to connect one network device to other network devices or to connect two or more computers to share printer, scanner etc .
1aii ) i ) Coaxial cable
ii )Optical fiber cable
iii )Patch cable
1b) Very Small Aperture Terminal
1ci) Difference Between Email address And Web Address. The simplest way to tell the difference is an email address always contains the ‘at sign’ (@), and a website address never does. Also, An e- mail address is a web service used to send and receive messages and web address is collection of static and dynamic web pages to perform several tasks like shopping, searching information, other govt. work purpose.
1cii)1ii) Types Of email.
i)Djbadoo@ymail.com ii)Donpizzy@gmail.com
Types Of Website
i)www.jamb.org.ng
ii)www.waecdirect.org
More Answers Loading