WAEC 2021 Computer Studies Theory And Obj Answers are now out.To subscribe, buy MTN recharge card of N400 and send the pin and your subject to 09067385575. If you have already paid, click the link below to enter your password and view the answers.
(1a)
Firewall is a system designed to prevent unauthorized access to or from a private network. In other word You can implement a firewall in either hardware or software form, or a combination of both.
(1aii)
(i) Activation of firewall
(ii) Running of anti-spyware
(1b)
(i)feasibility study: This is the extent to which the required software performs a series of steps to solve business problems and user requirements. This feasibility is dependent on human resources (software development team) and involves visualizing whether the software will operate after it is developed and be operative once it is installed.
(ii) Design: The prerequisite for this phase is the requirement specification document. In this phase, the system and software design are prepared based on the given requirements. The system design helps in specifying hardware and software requirements and overall defines the system architecture.
(iii) Maintenance: Problems arises once the customers start using the product. These problems need to be fixed from time to time. This is what is covered in the maintenance phase. The service engineers oblige the customers by solving the issue.
==========================================
(2a)
(i) Add all basic details to every song (ie tag) : title, artist, album name, album artist, track number, year, genre
(ii) Add artwork for every track
(iii) Add lyrics for every track
(iv) Add genre category to each track
(2b)
(i) Copy
(ii) Move
(2c)
(i) File is a computer resource for recording data discretely in a computer storage device. In other words Just as words can be written to paper, so can information be written to a computer file. Files can be edited and transferred through the internet
(ii) Record is a collection of fields, possibly of different data types, typically in fixed number and sequence.
==========================================
(3ai)
A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device.
(3aii)
Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.
(3bi)
For 2kb
1 byte = 8 bits.
1 Kilobyte = 8 x 10³ Bits.
1 Kilobyte = 8 x 1000 Bits.
1 KB = 8000 bits.
.:. 2kb = 8000 x 2 = 16,000bits
For 2mb
1mb = 1000kb
.:. 2mb = 2000kb
Where 1kb = 8000 bits,
Then to find 2000kb in bits
= 8000 x 2000
=16,000,000 bits
(3bii)
The total storage of the two devices in bits = 16,000 + 16,000,000
= 16,016,000 bits
.:. Changing to bytes
= 8 bits = 1 byte
.:. 16,016,000 bits = ?
= 2,002,000 bytes
============================
(4ai)
Flowchart
(4aii)
I= terminator
J= input/output
K= decision
L= processing
(4bi)
Document stage is one of the most important activity in the system development life cycle that ensure the continuity of the system
(4bii)
(i) Portability
(ii) Readability
(iii) Flexibility
(iv) Efficiency
(v) Structural
================================
(5ai)
Encryption is a process in which information is converted into a form which cannot be understood by unauthorized user.
(5aii)
• Biometric
• Password
(5aiii)
• Encryption hides your data from curious eyes
• Prevents unwanted access to documents and e-mail messages
Want to subscribe for 6 – 9 subjects? Click Here now.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.