Loading....
Press & Hold to Drag Around |
|||
Click Here to Close |
Question 1 Report
Modem computers Compared to earlier computers are ?
Answer Details
Compared to earlier computers, modern computers are faster and smaller. This means that they can process information at a much faster rate than earlier computers and they are also more compact and easier to transport. Additionally, modern computers have more storage capacity, enabling them to store larger amounts of data. This has made them more efficient and user-friendly, making them an indispensable tool for both personal and professional use.
Question 3 Report
The part labelled Y in the compiler interface in the diagram represents
Answer Details
In a typical compiler interface diagram, the part labelled Y represents the output of the compilation process. This output is usually in the form of machine-readable instructions that can be executed directly by a computer's processor. The specific type of output produced by the compiler depends on the programming language being used and the target machine's architecture. It could be in the form of assembly code, object code, or executable binary code. Therefore, the correct option is: object code or binary code, depending on the level of abstraction of the compilation process. However, if the diagram is showing the output after the optimization phase, then it could also be intermediate code.
Question 4 Report
use the diagram above to answer questions below
The logic gate in the diagram above is called a
Answer Details
The logic gate in the given diagram is an AND gate. An AND gate is a digital logic gate that has two or more inputs and produces an output that is the logical conjunction of the inputs. In an AND gate, the output is only HIGH when both the inputs are HIGH. In the given diagram, the two inputs are A and B, and the output is Y. Therefore, if A and B are both HIGH, then the output Y will be HIGH, otherwise, it will be LOW.
Question 5 Report
The following options are examples of information except?
Answer Details
The example of information that does not fit with the other options is "plain shape of a rectangle". This is because the other options all relate specifically to measurements or calculations related to geometric shapes, while "plain shape of a rectangle" is a more general description that doesn't provide any specific information or calculation. For example, the "area of a circle" refers to the amount of space inside a circle, while the "circumference of a circle" refers to the distance around the outside of a circle. Similarly, the "perimeter of a rectangle" refers to the distance around the outside of a rectangle. In contrast, the phrase "plain shape of a rectangle" simply describes the fact that a rectangle is a four-sided shape with opposite sides that are equal in length and parallel to each other. It doesn't provide any specific information or calculation related to the rectangle, which is why it is the odd one out in this list of examples.
Question 6 Report
Select two stages of booting from the following list:
i. Power on Self Test;
ii. Loading of Operating System;
iii. Loading of e-mails;
iv. Start in safe mode.
iv. Save all active files
Answer Details
The correct answer is "I and II only". Booting refers to the process of starting up a computer system. During this process, the computer goes through several stages before the operating system is loaded and the user can begin using the computer. The first stage of booting is the Power on Self Test (POST), which checks the hardware components of the computer to make sure they are functioning properly. If any issues are detected during the POST, an error message will be displayed. The second stage of booting is the loading of the operating system. Once the hardware checks are completed, the computer loads the operating system from the hard drive or another storage device. Options III and IV are not stages of the booting process. Loading of emails is a task performed by an email client after the operating system has loaded, and starting in safe mode is an option that can be selected during the booting process to troubleshoot issues with the operating system.
Question 7 Report
The result of the expression 2*6+2/4*2*4^2
Answer Details
To evaluate the expression, we need to follow the rules of arithmetic operations, which are Parentheses, Exponents, Multiplication and Division, and Addition and Subtraction (PEMDAS). First, we calculate 4^2, which is 16. Then, we perform multiplication and division from left to right, giving us: 2*6 + 2/4 * 2 * 16 = 12 + 0.5 * 32 = 12 + 16 = 28 Therefore, the result of the expression is 28. Hence, the correct option is "28".
Question 8 Report
One-millionth of a second is also referred to as
Answer Details
One-millionth of a second is also referred to as a "microsecond." The prefix "micro-" means "one millionth," so a microsecond is one millionth of a second. It is commonly used to measure small intervals of time in electronics, computer science, and other fields where precise timing is important. For example, the time it takes for a computer's processor to execute a single instruction is typically measured in microseconds.
Question 10 Report
If A is in cell A1 and B is in Cell B1 of a worksheet in a spreadsheet application,write a formula to calculate
x= A2=B1/2100
Answer Details
Question 12 Report
The process of running more than one program concurrently is known as
Answer Details
Question 13 Report
Deleted items in the computers are temporarily stored in the?
Answer Details
Deleted items in computers are temporarily stored in the recycle bin. When you delete a file or folder on your computer, it is not permanently removed from your system. Instead, it is moved to the recycle bin, which acts as a holding area for deleted files. The recycle bin is a temporary storage location that allows you to retrieve files that were deleted by mistake or that you no longer need. Once you empty the recycle bin, the files are permanently deleted from your computer's memory unit. Therefore, the recycle bin serves as a safety net for deleted items and helps prevent accidental file loss.
Question 15 Report
The pictorial representation of an object or application in the computer is called?
Answer Details
Question 16 Report
How many binary digits are contained in 10MB of a memory stick?
Answer Details
To determine the number of binary digits contained in 10MB of a memory stick, we need to know the size of a binary digit in a memory stick. One byte consists of 8 bits. Therefore, 10MB of memory consists of: 10 x 1024 x 1024 bytes To calculate the number of binary digits, we need to multiply the number of bytes by 8: 10 x 1024 x 1024 x 8 = 83,886,080 bits Therefore, 10MB of memory stick contains 83,886,080 binary digits. In summary, the answer is "10 x 1024 x 1024 x 8" which represents the total number of bits contained in 10MB of a memory stick.
Question 17 Report
In the URL https://waec.org.ng, the domain name is?
Answer Details
In the URL https://waec.org.ng, the domain name is "waec.org.ng". A domain name is a unique name that identifies a website on the internet. It is part of a larger internet address called a URL (Uniform Resource Locator), which specifies the exact location of a web page or resource on the internet. In the given URL, "waec.org.ng" is the domain name. The ".org.ng" is the top-level domain (TLD) for Nigeria, and it indicates that the website is operated by an organization based in Nigeria. The "https://" portion of the URL specifies the protocol being used to access the website, which in this case is HTTP Secure, or HTTPS. The "www" portion is a subdomain that is used to indicate the specific server that hosts the website. However, many websites nowadays omit the "www" subdomain and simply use the domain name. Therefore, the correct answer to the question is "waec.org.ng" is the domain name in the given URL.
Question 18 Report
Answer Details
A laptop computer would be the most suitable type of computer for a student who lives in a remote village without constant electricity. This is because a laptop is portable and can be easily charged using a battery or solar-powered charger, allowing the student to work even in areas with limited or no access to electricity. Additionally, a laptop can perform all the necessary functions required for studying, including research, writing, and online communication. In contrast, a desktop computer requires a constant source of electricity and is not portable, making it less practical for a student living in a remote area without a reliable source of power. Mainframe and minicomputers are not suitable for individual use, as they are typically used in large organizations and require specialized expertise to operate.
Question 19 Report
What will be the result of writing the formula=year[now[][ + 3 in a worksheet,of a spread sheet,if the current calendar is 14 august ,1960?
Answer Details
Question 20 Report
Answer Details
The exception in the given guidelines for drawing flowcharts is that it should follow a direction of right to left or bottom to top. The standard practice for drawing flowcharts is to follow a logical direction of left to right or top to bottom. This ensures that the flowchart is easy to read and understand. Flowcharts should also have a clear and logical start and finish, and should be neat, organized, and easy to follow.
Question 22 Report
The protocol used for email transmission is known as ?
Answer Details
The protocol used for email transmission is SMTP (Simple Mail Transfer Protocol). SMTP is a communication protocol for sending and receiving email messages over the internet. It is responsible for the transfer of email messages from one server to another until they reach the recipient's email server. SMTP is used to authenticate and encrypt email transmissions to ensure that they are secure and delivered to the intended recipient.
Question 24 Report
Key skills of a system analyst include the following except
Answer Details
The key skills of a system analyst include the ability to troubleshoot, an interest in learning new skills, and proficiency in programming languages. However, motivational skills are not typically considered a key skill of a system analyst. System analysts are responsible for analyzing an organization's computer systems and procedures, designing information systems solutions to help the organization operate more efficiently and effectively, and ensuring that these solutions meet the organization's needs. The ability to troubleshoot problems and proficiency in programming languages are essential for this role, while an interest in learning new skills is important for keeping up with emerging technologies and trends in the field. Motivational skills, while important for many roles, are not typically considered a key skill for a system analyst.
Question 25 Report
A student would require the following devices to online application form except?
Answer Details
Question 26 Report
The type of transmission in the part labelled q in the diagram above is called
Answer Details
Question 29 Report
Duplicating copyrighted electronic or digital content without the authors approval is considered?
Answer Details
Question 30 Report
Serial files are
Answer Details
Serial files are stored as they come, meaning that the records are simply added to the end of the file as they are created or received. A serial file is a type of file organization used in computer systems where records are stored one after the other, with no particular order or sequence. The records are simply appended to the end of the file as they are created or received, and there is no attempt to sort or organize them in any particular way. Serial files are commonly used for logging or recording sequential events such as sensor readings, financial transactions, or web server requests. They are simple and easy to implement and are suitable for applications where the records are read in the order they were created. However, one drawback of serial files is that searching and sorting records can be time-consuming and inefficient because the records are not stored in any particular order. For applications that require frequent searching or sorting of records, other file organization methods such as indexed files or relational databases may be more appropriate. Therefore, the correct answer to the question is that serial files are stored as they come, with no particular order or sequence.
Question 31 Report
In number system ,base 16 is called ?
Answer Details
In number system, base 16 is called "hexadecimal". We use different number systems in our daily lives to represent and manipulate numbers. The most common number system is the decimal system, which uses ten digits (0, 1, 2, 3, 4, 5, 6, 7, 8, 9) to represent all numbers. However, in some computer science and engineering applications, it is more convenient to use the hexadecimal number system, which uses 16 digits (0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F) to represent numbers. The letters A through F are used to represent the numbers 10 through 15, respectively. For example, the decimal number 15 is represented as F in hexadecimal, and the decimal number 255 is represented as FF in hexadecimal. So, to summarize, base 16 is called "hexadecimal" because it uses 16 digits to represent numbers, and it is commonly used in computer science and engineering applications.
Question 33 Report
EDSAC was produced using a concept known as
Answer Details
EDSAC was produced using a concept known as "Stored program". The stored program concept is a fundamental idea in computer science that refers to the ability of a computer to store instructions in memory along with data. This allows the computer to retrieve and execute those instructions at a later time, without the need for human intervention. Before the advent of the stored program concept, computers were programmed using hard-wired circuitry, which made them inflexible and difficult to reprogram. However, with the stored program concept, computers became much more versatile and easier to program, leading to the development of more sophisticated software and the modern computing era. EDSAC, which stands for Electronic Delay Storage Automatic Calculator, was one of the first computers to be built using the stored program concept. It was designed and built in the late 1940s and early 1950s at the University of Cambridge, and was used for scientific research and engineering calculations. Therefore, the correct answer to the question is "Stored program".
Question 34 Report
Use the QBASIC program below to answer question below
10 REM Program to calculate product of numbers
20 CLS
30 INPUT A
40 INPUT B
50 LET PRODUCT=A*B
60 PRINT PRODUCT
70 END
The number 10, 20,30, 40, 50, 60 and 70 as stated in the program indicate
Answer Details
The numbers 10, 20, 30, 40, 50, 60, and 70 in the QBASIC program represent line numbers. In QBASIC, each line of code is identified by a line number. The line numbers are used to help navigate the program, jump to specific lines, and edit the code. In the example program, line 10 is a comment that describes the program, line 20 clears the screen, line 30 asks the user for input of the value of A, line 40 asks the user for input of the value of B, line 50 multiplies A and B and stores the result in the variable PRODUCT, line 60 prints the value of PRODUCT, and line 70 ends the program.
Question 35 Report
The file access method illustrated in the diagram above is called?