Neco Computer studies answers 2021

Neco Computer studies answers 2021

Here is neco computer studies answers 2021, make sure to subscribe for our waec answers. Cheers

COMPUTER STUDIES OBJ:

1EEEDCEDAAD
11CDAAEDDBAA
21BAADCADCEC
31AABAABBCDB
41ABCDEABEAD
51CADADACDEE

3ai)

(3aii)

(3aiii)

(3bi)
(i) .com ; they are use initially intended to distinguish commercial organizations

(ii) .net ; they are use connect Nordic national research and educational networks

(iii) .org ; they are use for both nonprofit and for-profit organizations.

(3bii)
(i)Google Chrome.
(ii)Mozilla Firefox

1ai)

The control unit is a component of a computer’s central processing unit that directs the operation of the processor.
 CU typically uses a binary decoder to convert coded instructions into timing and control signals that direct the operation of the other units. Most computer resources are managed by the CU.
(1aii)
An arithmetic logic unit is a combinational digital circuit that performs arithmetic and bitwise operations on integer binary numbers. This is in contrast to a floating-point unit, which operates on floating point numbers.
(1aiii)
Register is defined as the small subset of the data that has fast accessible memory in the central processing unit. For the execution of different computer instructions and programs type of registers are used. There are numerous categories of computer registers that are available for the execution of instructions. The registers can be categorized by their size, functions, or names. These registers are used to store the data temporarily and perform the execution of computer instructions and can be also used to store results in it. The processing speed of registers is the fastest to another data set.
(1bi)
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
(1bii)
(i) Network Congestion.
(ii) Infrastructure Parameters (QoS, Filtering, Routing)
(1biii)
(i) AVG Antivirus
(ii) Norton Antivirus.
(iii) Ad-Aware
================================
(2ai) A compiler is a computer program that translates computer code written in one programming language into another language. The name “compiler” is primarily used for programs that translate source code from a high-level programming language to a lower level language to create an executable program.
(2bi)
– F5:
• In all modern Internet browsers, pressing F5 will refresh or reload the page or document window.
• Open the find, replace, and go to window in Microsoft Word.
(2bii)
– F1:
• Almost always used as the help key, almost every program opens a help screen when this key is pressed.
• Enter CMOS Setup.
• Windows Key + F1 would open the Microsoft Windows help and support center.
• Open the Task Pane.
(2c) A character set defines the valid characters that can be used in source programs or interpreted when a program is running.
====================================
4a) Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.
4aii)
1. Data can transfer between workstations at high speeds.
2. A network server is not needed to control network connectivity between each workstation.
====================================
(5ai) File security is a feature of your file system which controls which users can access which files, and places limitations on what users can do to various files in your computer.
(5aii)
(5aiii) A programming language is a formal language comprising a set of strings that produce various kinds of machine code output.
(5bi)
(5bii)
(Pick any two)
Keyboard
Mouse
Scanner
Cameras
Joystick

5 Comments

  1. Sunday Alabi August 14, 2021
    • MyScholarshipBaze August 14, 2021
  2. Sunday Alabi August 14, 2021
  3. Nasir Suleiman August 14, 2021
    • MyScholarshipBaze August 14, 2021

Leave a Reply

error: Content is protected !!