WAEC 2016 COMPUTER STUDIES ANSWERS

waec1111

COMPUTER STUDIES:
1-10: AACBCDBCAB
11-20: ABCDACCBCD
21-30: CABCAACBCA
31-40: BDDBBACDBC
41-50: ABDBBADCAD
++++++++++++++++++++++++++ more answers at www.focusnaija.com

(1ai )
Networking cables are networking hardware used
to connect one network device to other network
devices or to
connect two or more computers to share printer,
scanner etc .

(1aii )
(i) Coaxial cable
(ii)Optical fiber cable
(iii)Patch cable

(1b)
Very Small Aperture Terminal

(1ci)
-An email address is used to receive email messages and is under the nomenclature as thus Nameofyourchoice@domain.com
-website URL is an IP address in text resolved by your DNS server and often has nomenclature like this:
www.nameofyourchoice.com

(1cii)
Example of email
(i)xpressdynamo@gmail.com

Example of website:
(i)www.waecdirect.org

================================== more answers at www.focusnaija.com

(2ai )
A computer virus is a malware that , when
executed, replicates by inserting copies of itself
(possibly modified) into
other computer programs , data files, or the boot
sector of the hard drive; when this replication
succeeds , the affected areas are then said to be
” infected ” .

(2aii)
(i) Web scripting Viruses
(ii) Polymorphic Viruses
(iii) Macro Viruses

(2b)
(i) Vulnerabilities and attacks
(ii)Backdoors
(iii)Denial-of-service attack
(iv)Eavesdropping
(v)Privilege escalation

================================== more answers at www.focusnaija.com

(4a) 
8 bits = 1 byte
1000 byte = 1 kilobyte
1000 kilobytes = 1 megabyte

.:. 24000 bytes = 0.003 megabyte

Each line = 0.003mb
then 16 lines = 16×0.003 = 0.048mb
Electronic book pages = 500 pages
Megabyte space occupied by 500 pages ebook = 500 x 0.048
=24megabytes
ie 24mb 

(4b)
(i)Flash Drive

(4ci)
(i) System software
(ii) Application software

(4cii)
(i) System software
(A) file management utilities
(B) Disk Operating system

(ii)Application software
(A)photoshop
(B)Adobe Reader

WAEC EXAM RUNS
(FOR COMPUTER STUDIES ANSWERS)

To Get Answers Direct Mobile: N800 MTN CARD.

Send Your Name, N800 MTN Recharge PIN, Subject Name, Phone number to: 08166266664

 

 

Free Answers Will Also be Drop  Here KEEP REFRESHING this page we will drop the answers soon after we finish sending it to people that paid.

 

 

1 Comment

  1. 1ai )
    Networking cables are networking
    hardware used
    to connect one network device to other
    network devices or to connect two or
    more computers to share printer, scanner
    etc .
    1aii )
    i ) Coaxial cable
    ii )Optical fiber cable
    iii )Patch cable
    1b)
    Very Small Aperture Terminal
    1c )
    -An e – mail address is used to receive e
    – mail messages and is under the
    nomenclature :
    giftanswer.net @ domain. com
    -website URL is an IP address
    in text resolved by your DNS server and
    often
    has nomenclature like this:
    www . nameofyourchoice. com
    1cii )
    i ) www . bbc . com
    ii ) cnn@ gmail. com
    ============================
    2ai) A computer virus is a malware that,
    when executed, replicates by inserting
    copies of itself (possibly modified) into
    other computer programs, data files, or
    the
    boot sector of the hard drive; when this
    replication succeeds, the affected areas
    are then said to be”infected”.
    2aii)
    i)Resident Viruses
    ii)Multipartite Viruses
    iii)Direct Action Viruses
    2b)
    i)Vulnerabilities and attacks-s a system
    susceptibility or flaw, and many
    vulnerabilities are documented in the
    Common Vulnerabilities and Exposures
    (CVE) database and vulnerability
    management is the cyclical practice of
    identifying, classifying, remediating, and
    mitigating vulnerabilities as they are
    discovered.
    ii)Backdoors-in a computer system, a
    cryptosystem or an algorithm, is any
    secret method of bypassing normal
    authentication or security controls.
    iii)Denial-of-service attack-are designed
    to
    make a machine or network resource
    unavailable to its intended users.
    Attackers can deny service to individual
    victims, such as by deliberately entering a
    wrong password enough consecutive
    times
    to cause the victim account to be locked,
    or they may overload the capabilities of a
    machine or network and block all users
    at
    once.
    iv)Eavesdropping- is the act of
    surreptitiously listening to a private
    conversation, typically between hosts on
    a
    network. For instance, programs such as
    Carnivore and NarusInsight have been
    used by the FBI and NSA to eavesdrop on
    the systems of internet service providers.
    v)Privilege escalation-describes a
    situation
    where an attacker with some level of
    restricted access is able to, without
    authorization, elevate their privileges or
    access level.
    ========================
    4b)
    i)Floppy, Hard Drive
    4c)
    i)System software
    ii)Application software
    4cii)
    i)System software
    A)Microsoft Windows
    B)Linux
    ii)Application software
    A)Steam
    B)Adobe Reader
    ===========================
    5a Byte and Goto
    5b i) I= (P*R*T)/100
    5b ii) Y= A*X*X + B*X + C
    5biii) Y= M*X+C

Leave a Reply

Your email address will not be published.


*