Earboard Logo

Welcome, Guest: Join Earboard / LOGIN! / Advertise / Contact Us
Stats: 9457 members, 32078 topics. Date: Sunday, 15th September 2019


HOME GENERAL EDUCATION NEWS TECHNOLOGY
Click Here to Receive Our Next Post via Email ...
 

WAEC 2019 Computer Studies Theory And Obj Answers

(0) (Reply) (Go Down)

WAEC 2019 Computer Studies Theory And Obj Answers by : 12:00 am On April 9, 2017

WAEC 2019 Computer Studies Theory And Obj Answers are now out.To subscribe, buy MTN recharge card of N400 and send the pin and your subject to 09067385575. If you have already paid, click the link below to enter your password and view the answers.

Click Here to Enter Password

COMPUTER OBJ
1-10: ADBBBDBDBB
11-20: CADCBCDCAD
21-30: BBDDACCAAA
31-40: DADAAACDAC
41-50: BACDAACADA

(1a)
Firewall is a system designed to prevent unauthorized access to or from a private network. In other word You can implement a firewall in either hardware or software form, or a combination of both.
(1aii)
(i) Activation of firewall
(ii) Running of anti-spyware
(1b)
(i)feasibility study: This is the extent to which the required software performs a series of steps to solve business problems and user requirements. This feasibility is dependent on human resources (software development team) and involves visualizing whether the software will operate after it is developed and be operative once it is installed.
(ii) Design: The prerequisite for this phase is the requirement specification document. In this phase, the system and software design are prepared based on the given requirements. The system design helps in specifying hardware and software requirements and overall defines the system architecture.
(iii) Maintenance: Problems arises once the customers start using the product. These problems need to be fixed from time to time. This is what is covered in the maintenance phase. The service engineers oblige the customers by solving the issue.

==========================================
(2a)
(i) Add all basic details to every song (ie tag) : title, artist, album name, album artist, track number, year, genre
(ii) Add artwork for every track
(iii) Add lyrics for every track
(iv) Add genre category to each track
(2b)
(i) Copy
(ii) Move
(2c)
(i) File is a computer resource for recording data discretely in a computer storage device. In other words Just as words can be written to paper, so can information be written to a computer file. Files can be edited and transferred through the internet
(ii) Record is a collection of fields, possibly of different data types, typically in fixed number and sequence.

==========================================
(3ai)
A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device.
(3aii)
Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.
(3bi)
For 2kb
1 byte = 8 bits.
1 Kilobyte = 8 x 10³ Bits.
1 Kilobyte = 8 x 1000 Bits.
1 KB = 8000 bits.
.:. 2kb = 8000 x 2 = 16,000bits
For 2mb
1mb = 1000kb
.:. 2mb = 2000kb
Where 1kb = 8000 bits,
Then to find 2000kb in bits
= 8000 x 2000
=16,000,000 bits
(3bii)
The total storage of the two devices in bits = 16,000 + 16,000,000
= 16,016,000 bits
.:. Changing to bytes
= 8 bits = 1 byte
.:. 16,016,000 bits = ?
= 2,002,000 bytes

============================
(4ai)
Flowchart
(4aii)
I= terminator
J= input/output
K= decision
L= processing
(4bi)
Document stage is one of the most important activity in the system development life cycle that ensure the continuity of the system
(4bii)
(i) Portability
(ii) Readability
(iii) Flexibility
(iv) Efficiency
(v) Structural

================================
(5ai)
Encryption is a process in which information is converted into a form which cannot be understood by unauthorized user.
(5aii)
• Biometric
• Password
(5aiii)
• Encryption hides your data from curious eyes
• Prevents unwanted access to documents and e-mail messages
Want to subscribe for 6 – 9 subjects? Click Here now.

Tags: WAEC 2019 Computer studies answers, WAEC 2019 Computer Studies answers, WAEC 2019 Expo Questions and Answers, WAEC 2019 Computer theory and objective Answers, WAEC computer studies 2019 expo answers, Free WAEC computer answers

About Flex

I am a verified author at EARBOARD.com... For any complaint or information, contact EARBOARD admin on 09067385575

Leave a Reply

(0) (Reply)

2019 WAEC GCE Chemistry Alternative to Practical Answers | Free Expo / 2019 WAEC GCE Physics Theory and Obj Answer / Post UTME past questions and answers /  

(Go Up)


Sections: News (1) Technology Education (2)
Earboard - Copyright @ 2016 - 2019 George Gosmooth. All rights reserved. See How To Advertise. DMCA Content Removal.
Disclaimer: Every member is solely responsible for anything that he/she posts or uploads on Earbaord.