2021 Neco Expo/Runz Computer Questions and answer (Essay and Obj) Expo

There is no doubt that you are searching for 2021 Neco Expo/Runz Computer Questions and answer (Essay and Obj) Expo well kindly check below to see all answera immediately.

NECO COMPUTER

COMPUTER STUDIES
1-10: EEBDCEDEBD
11-20: CADAEDDBAA
21-30: BAADCADCEC
31-40: AABAABBCDB
41-50: DDCDBCAECD
51-60: CBAADACDAD

(1ai)
The control unit is a component of a computer’s central processing unit that directs the operation of the processor

(1aii)
an arithmetic logic unit is a combinational digital circuit that performs arithmetic and bitwise operations on integer binary numbers.

(1aiii)
Registers are a type of computer memory used to quickly accept, store, and transfer data and instructions that are being used immediately by the CPU.

(1bi)
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

(1bii)
(i) Network Congestion.
(ii) Infrastructure Parameters (QoS, Filtering, Routing)

(1biii)
(i) AVG Antivirus
(ii) Norton Antivirus.
(iii) Ad-Aware

==================================

(2a)A compiler is a computer program that translates computer code written in one programming language into another

(2bi)
– F5:
• In all modern Internet browsers, pressing F5 will refresh or reload the page or document window.

• Open the find, replace, and go to window in Microsoft Word.

(2bii)
– F1:
• Almost always used as the help key, almost every program opens a help screen when this key is pressed.

• Enter CMOS Setup.

• Windows Key + F1 would open the Microsoft Windows help and support center.

• Open the Task Pane.

(2c) A character set defines the valid characters that can be used in source programs or interpreted when a program is running

===================================

2021 Neco Expo/Runz Computer Questions and answer (Essay and Obj) Expo

(4ai) Network Topology is the schematic description of a network arrangement, connecting various nodes(sender and receiver) through lines of connection.

(4aii)

– Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data.

– Cheap to install and expand

(4bii) An algorithm is a finite sequence of well-defined, computer-implementable instructions, typically to solve a class of specific problems or to perform a computation.

(4biii)

– Word processor
Abiword
Corel WordPerfect.Corel WordPerfect

– Spreadsheet packages
Google Sheets
Microsoft Excel

===================================

(5ai) File security is a feature of your file system which controls which users can access which files, and places limitations on what users can do to various files in your computer.

(5aiii) A programming language is a formal language comprising a set of strings that produce various kinds of machine code output.

(5bii)

Keyboard
Mouse
Scanner
Cameras
Joystick
(Choose any two)

0 Shares:
Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like