2021 NECO COMPUTER ANSWERS

2021-NECO-COMPUTER-ANSWERS⇓

Keep Subscribing With Us For Your Next Subject @Www.ExamAccess.Net To Enjoy Our Service And Get Your Legit Answers At Night before Exam. Invite your friends and school to subscribe with us.

=================================

WAEC PAYMENT IS ONGOING NOW..PAY NOW AND BE ADDED FOR EARLY ANSWERS

WAEC SCHOOL PAYMENT; ₦100,000

 

=================================

COMPUTER-OBJ!-By-ExamAccess.Net

1EEEDCEDAAD
11CDAAEDDBAA
21BAADCADCEC
31AABAABBCDB
41ABCDEABEAD
51CADADACDEE

=================================

COMPUTER-THEORY

(1ai)
The control unit is a component of a computer’s central processing unit that directs the operation of the processor.
CU typically uses a binary decoder to convert coded instructions into timing and control signals that direct the operation of the other units. Most computer resources are managed by the CU.

(1aii)
An arithmetic logic unit is a combinational digital circuit that performs arithmetic and bitwise operations on integer binary numbers. This is in contrast to a floating-point unit, which operates on floating point numbers.

(1aiii)
Register is defined as the small subset of the data that has fast accessible memory in the central processing unit. For the execution of different computer instructions and programs type of registers are used. There are numerous categories of computer registers that are available for the execution of instructions. The registers can be categorized by their size, functions, or names. These registers are used to store the data temporarily and perform the execution of computer instructions and can be also used to store results in it. The processing speed of registers is the fastest to another data set.

(1bi)
Phishing is a method of identity theft that relies on individuals unwittingly volunteering personal details or information that can be then be used for nefarious purposes. It is often carried out through the creation of a fraudulent website, email, or text appearing to represent a legitimate firm.

(1bii)
(i) Space on the hard disk
(ii) The size of the RAM

(1biii)
(i) AVG Antivirus
(ii) Norton Antivirus.
====================================

(2ai)
A compiler is a computer program that translates computer code written in one programming language into another language. The name “compiler” is primarily used for programs that translate source code from a high-level programming language to a lower level language to create an executable program.

(2aii)

(2bi)
– F5: In all modern Internet browsers, pressing F5 will refresh or reload the page or document window.

(2bii)
– F1: Almost always used as the help key, almost every program opens a help screen when this key is pressed.

(2c)
A character set defines the valid characters that can be used in source programs or interpreted when a program is running.
====================================

(3ai)

(3aii)

(3aiii)

(3bi)
(i) .com ; they are use initially intended to distinguish commercial organizations

(ii) .net ; they are use connect Nordic national research and educational networks

(iii) .org ; they are use for both nonprofit and for-profit organizations.

(3bii)
(i)Google Chrome.
(ii)Mozilla Firefox
====================================

(4ai)
Network Topology is the schematic description of a network arrangement, connecting various nodes(sender and receiver) through lines of connection.

(4aii)
(i) Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data.
(ii) Cheap to install and expand

(4bi)

(4bii)
An algorithm is a finite sequence of well-defined, computer-implementable instructions, typically to solve a class of specific problems or to perform a computation.

(4biii)
Word processor:
(i) Abiword
(ii) Corel WordPerfect

Spreadsheet packages:
(i) Google Sheets
(ii) Microsoft Excel
====================================

(5ai)
File security is a feature of your file system which controls which users can access which files, and places limitations on what users can do to various files in your computer.

(5aii)
-COMPUTER FILES:
(i) Computer files are transferred electronically.
(ii) Computer files are difficult to destroy and can last for a long time.
(iii) Computer files is difficult to access at all times

-MANUAL FILES:
(i) Manual files can be transported through physical means
(ii) Manual files can warn off and can be depleted easily by hand.
(iii) Manual files is Easy to access whenever required

(5aiii)
A programming language is a vocabulary and set of grammatical rules for instructing a computer or computing device to perform specific tasks. The term programming language usually refers to high-level languages, such as BASIC, C, C++, COBOL, Java, FORTRAN, Ada, and Pascal.

(5bi)

(5bii)
(i) Keyboard
(ii) Mouse

=================================

COMPLETED

=================================

We Remain Your No.1 Favourite Site For All Exams. Ensure You Tell the world about us @Www.ExamAccess.Net

=================================

Leave a Comment

Your email address will not be published.

Scroll to Top