home
Home
home
JAMB
home
WAEC
home
NECO
home
NABTEB
home
NEWS
Welcome To Examface.Net>>>>  The Nigeria's No 1 Exam Expo Website, With Many Years of Experience Verified by Google We Are The Best Among The Rest!.       ---

PAYMENT FOR 2024 JAMB, WAEC GCE, NECO & WAEC EXPO ARE ON!!!

---

---

---
---
WAEC 2024 EXPO RUNS (Score A's and B's In YOUR 2024 WAEC Exam) (Click Here now to Get Our Assistance)


NECO 2024 EXPO RUNS (Score A's and B's In YOUR 2024 NECO Exam) (Click Here now to Get Our Assistance)

--- ---

---

---

---

NECO 2021 - COMPUTER ANSWER
NECO 2021 - COMPUTER ANSWER

NECO 2021 - COMPUTER ANSWER


COMPUTER STUDIES
1-10: EEBDCEDEBD
11-20: CADAEDDBAA
21-30: BAADCADCEC
31-40: AABAABBCDB
41-50: DDCDBCAECD
51-60: CBAADACDAD



(1ai)
The control unit is a component of a computer's central processing unit that directs the operation of the processor.
CU typically uses a binary decoder to convert coded instructions into timing and control signals that direct the operation of the other units. Most computer resources are managed by the CU.

(1aii)
An arithmetic logic unit is a combinational digital circuit that performs arithmetic and bitwise operations on integer binary numbers. This is in contrast to a floating-point unit, which operates on floating point numbers.

(1aiii)
Register is defined as the small subset of the data that has fast accessible memory in the central processing unit. For the execution of different computer instructions and programs type of registers are used. There are numerous categories of computer registers that are available for the execution of instructions. The registers can be categorized by their size, functions, or names. These registers are used to store the data temporarily and perform the execution of computer instructions and can be also used to store results in it. The processing speed of registers is the fastest to another data set.

(1bi)
Phishing is a method of identity theft that relies on individuals unwittingly volunteering personal details or information that can be then be used for nefarious purposes. It is often carried out through the creation of a fraudulent website, email, or text appearing to represent a legitimate firm.

(1bii)
(i) Space on the hard disk
(ii) The size of the RAM

(1biii)
(i) AVG Antivirus
(ii) Norton Antivirus.

========================

(3ai)


(3aii)


(3aiii)


(3bi)
(i) .com: They are use initially intended to distinguish commercial organizations

(ii) .net: They are use connect Nordic national research and educational networks

(iii) .org: They are use for both nonprofit and for-profit organizations.

(3bii)
(i) Google Chrome.
(ii) Mozilla Firefox


==================================

(4ai)
Network Topology is the schematic description of a network arrangement, connecting various nodes(sender and receiver) through lines of connection.

(4aii)
(i) Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data.
(ii) Cheap to install and expand

(4bi)


(4bii)
An algorithm is a finite sequence of well-defined, computer-implementable instructions, typically to solve a class of specific problems or to perform a computation.

(4biii)
Word processor:
(i) Abiword
(ii) Corel WordPerfect

Spreadsheet packages:
(i) Google Sheets
(ii) Microsoft Excel

========================


(5ai)
File security is a feature of your file system which controls which users can access which files, and places limitations on what users can do to various files in your computer.

(5aii)
-COMPUTER FILES:
(i) Computer files are transferred electronically.
(ii) Computer files are difficult to destroy and can last for a long time.
(iii) Computer files is difficult to access at all times

-MANUAL FILES:
(i) Manual files can be transported through physical means
(ii) Manual files can warn off and can be depleted easily by hand.
(iii) Manual files is Easy to access whenever required

(5aiii)
A programming language is a vocabulary and set of grammatical rules for instructing a computer or computing device to perform specific tasks. The term programming language usually refers to high-level languages, such as BASIC, C, C++, COBOL, Java, FORTRAN, Ada, and Pascal.

(5bi)



(5bii)
(Pick any two)-
(i) Keyboard
(ii) Mouse
(iii) Scanner
(iv) Cameras
(v) Joystick


0 Response
FORUM POST LOCKED FOR COMMENTING

Ads; Click Here Now to See How to Make Cool Cash Here in Examface.net

Click Here Now to Join Our WhatsApp Group

Contact Mr.Prof
| |

best exam expo site / legit waec expo runz