TRENDING POSTS

SUBSCRIBE TO OUR POST

Subscribe With Us!
Why should I subscribe?
  • For Latest Free Browsing Tweaks
  • Android & PC Tutorials
  • Tech News & HOW TOs
  • All Straight into your → INBOX
Safe With Us | Privacy Policy

WAEC 2019 Computer Studies Obj & Essay Answers Now Available Here














Computer Studies 2 (Essay)** – 3:00 p.m. – 4:00 p.m.
Computer Studies 1 (Objective)** – 4:00 p.m. – 5:00 p.m. ===========================================


COMPUTER STUDIES OBJ

*2019 wassce computer study obj*✍✍
By
EXAMRULERS TEAM✔✔✌
1-10 - DCABBAACCD
11-20 - CBADCCAADA
21-30 - BBDAACABBA
31-40 - DDCBCCADCB
41-50 - ABBDACCAAD
completed✔
100% verified
 *EXAMRULERS TEAM*


COMPUTER STUDIES THEORY


(1a)
firewall is a system designed to prevent unauthorized access to or from a private network. In other word You can implement a firewall in either hardware or software form, or a combination of both.
(1aii)
(i)If you are using Windows XP, always turn on the firewall.
(ii)Always run all necessary latest updates & service packs (all windows! including all your programs & software!—keep them updated)
(1b)
(i)feasibility study- this extent to which the required software performs a series of steps to solve business problems and user requirements. This feasibility is dependent on human resources (software development team) and involves visualizing whether the software will operate after it is developed and be operative once it is installed.
(ii) Design – The prerequisite for this phase is the requirement specification document. In this phase, the system and software design are prepared based on the given requirements. The system design helps in specifying hardware and software requirements and overall defines the system architecture.

(iii) Maintenance –Problems arises once the customers start using the product. These problems need to be fixed from time to time. This is what is covered in the maintenance phase. The service engineers oblige the customers by solving the issue.

(2a)
(i) Add all basic details to every song (ie tag) : title, artist, album name, album artist, track number, year, genre
(ii) Add artwork for every track
(iii) Add lyrics for every track
(iv) Add genre category to each track
(2b)
(i) Copy
(ii) Move
(2c)
(i) file: is a computer resource for recording data discretely in a computer storage device. In other words Just as words can be written to paper, so can information be written to a computer file. Files can be edited and transferred through the internet
(ii) record: is a collection of fields, possibly of different data types, typically in fixed number and sequence


(3ai)
A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device.

(3aii)
Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.

(3bi)
For 2kb
1 byte = 8 bits.
1 Kilobyte = 8 x 10³ Bits.
1 Kilobyte = 8 x 1000 Bits.
1 KB = 8000 bits.
.:. 2kb = 8000 x 2 = 16,000bits

For 2mb
1mb = 1000kb
.:. 2mb = 2000kb
Where 1kb = 8000 bits,
Then to find 2000kb in bits
= 8000 x 2000
=16,000,000 bits

(3bii)
The total storage of the two devices in bits = 16,000 + 16,000,000
= 16,016,000 bits
.:. Changing to bytes
= 8 bits = 1 byte
.:. 16,016,000 bits = ?
= 2,002,000 bytes


(4ai)
Flowchart

(4aii)
I= terminator
J= input/output
K= decision
L= processing

(4bi)
Document stage is one of the most important activity in the system development life cycle that ensure the continuity of the system

Use any oneπŸ‘‡πŸ‘‡
(4bii)
(i) portability
(ii) readability
(iii) flexibility
(iv) efficiency
(v) structural

Or

SPEED : In general, no human being can compete to
solving the complex computation, faster than computer.
ACCURACY : Since Computer is programmed, so what
ever input we give it gives result with accuratly.
STORAGE : Computer can store mass storage of data with
appropriate formate.
DILIGENCE : Computer can work for hours without any
break and creating error.
VERSATILITY : We can use computer to perform
completely different type of work at the same time.
POWER OF REMEMBERING : It can remember data for us.
NO IQ : Computer does not work without


(5ai)
Encryption is a process in which information is converted into a form which cannot be understood by unauthorized user.

 (5aii)
• Biometric
• Password

 (5aiii)
• Encryption hides your data from curious eyes

• Prevents unwanted access to documents and e-mail messages



COMPLETED... 

Recent Post

Comments system

[blogger][disqus][facebook]
Copyright © 2015. Welcome to Mercy Gist's Blog - All Rights Reserved
Proudly Designed By Obhiaba Blog