Waec 2016 Computer studies objective and essay Answers and Questions – expo
CLICK HERE TO GET ENGLISH LANGUAGE AS SMS
VERIFIED WAEC 2016
COMPUTER STUDIES QUESTIONS
AND ANSWERS
Thursday 14th April 2016
COMPUTER STUDIES:
1-10: AACBCDBCAB
11-20: ABCDACCBCD
21-30: CABCAACBCA
31-40: BDDBBACDBC
41-50: ABDBBADCAD
CLICK HERE TO GET ENGLISH LANGUAGE AS SMS
1ai )
Networking cables are networking hardware used
to connect one network device to other network
devices or to
connect two or more computers to share printer,
scanner etc .
1aii )
i ) Coaxial cable
ii )Optical fiber cable
iii )Patch cable
1b)
Very Small Aperture Terminal
1c )
-An e – mail address is used to receive e –
mail messages and is under the
nomenclature :
Nameofyourchoice @ domain. com
-website URL is an IP address
in text resolved by your DNS server and often
has nomenclature like this:
www . nameofyourchoice. com
1cii )
i ) www . bbc . com
ii ) cnn@ gmail. com
CLICK HERE TO GET ENGLISH LANGUAGE AS SMS
2ai )
A computer virus is a malware that , when
executed, replicates by inserting copies of itself
(possibly modified) into
other computer programs , data files, or the boot
sector of the hard drive; when this replication
succeeds , the affected areas are then said to be
” infected ” .
2aii )
i ) Resident Viruses
ii )Multipartite Viruses
iii )Direct Action Viruses
2b)
i ) Vulnerabilities and attacks- s a system
susceptibility
or flaw , and many vulnerabilities are
documented in the Common Vulnerabilities and
Exposures ( CVE ) database and vulnerability
management
is the cyclical practice of identifying ,
classifying , remediating , and mitigating
vulnerabilities as they are discovered .
ii )Backdoors – in a computer system , a
cryptosystem or an algorithm, is any secret
method of bypassing normal
authentication or security controls .
iii )Denial -of- service attack- are designed to
make a machine or network resource
unavailable to its intended users.
Attackers can deny service to individual
victims , such as by deliberately entering a
wrong password enough consecutive times to
cause the victim account to be
locked, or they may overload the
capabilities of a machine or network and
block all users at once .
iv )Eavesdropping- is the act of surreptitiously
listening to a private conversation,
typically between hosts on a network . For
instance, programs such as Carnivore and
NarusInsight have been used by the FBI and NSA
to eavesdrop on the systems of internet service
providers .
v )Privilege escalation- describes a situation where
an attacker with some level of
restricted access is able to , without
authorization , elevate their privileges or
access level.
CLICK HERE TO GET ENGLISH LANGUAGE AS SMS
4a)
an electronic book is made up of 500 pages and there are 16lines of
24000 bit line on each page compute the space it will occupy on a
computer in megabytes
4b)
i)Floppy, Hard Drive
4c)
i)System software
ii)Application software
4cii)
i)System software
A)Microsoft Windows
B)Linux
ii)Application software
A)Steam
B)Adobe Reader
Computer question
1a)
i) what is network cable
ii) state three types of cable used in computer networking
1b) write the acronym VSAT in full
1c) distinguish between an email address and a website address
2a)
i) define computer virus
iii) list three types of computer virus
2b) state five sources of computer network breach.
CLICK HERE TO GET ENGLISH LANGUAGE AS SMS
WAEC EXAM RUNS
(ENGLISH LANGUAGE)
Direct Mobile:
N800 MTN CARD.
CLICK HERE TO GET ENGLISH LANGUAGE AS SMS
Forward Your Name,MTN PIN,Subject Name, Phone number to:
08162402890
We appreciate you for reading Codedexam, but we think it will be better you like our facebook fanpage and also follow us on twitter below.