Thursday, 14 April 2016

Waec 2016 Computer Obj And Theory Answers – May/June Expo

COMPUTER OBJ
1aacbcdbcab
11abcdaccbcd
21cabcaacbca
31bddbbacdbc
41abdbbadcad

5a) state two BASIC programming keywords

5b) writhe following equations in BASIC format i) 1=PRT/100 ii) Y=AX^2 + BX + C iii) Y= MX + C 5c)
Write a BASIC program that accept mass and
volume of a liquid as input from the user.the
program should compute and display the density
of the liquid [density =mass/volume]

5ai) Reserved programming keyword
ii)Unreserved programming keyword


4a) more coming pls bear with us
4b)

i)Floppy, Hard Drive
4c)

i)System software
ii)Application software
4cii)
i)System software
A)Microsoft Windows
B)Linux
ii)Application software
A)Steam
B)Adobe Reader

1ai)
Networking cables are networking hardware used to connect one network device to other network devices or to connect two or more computers to share printer, scanner etc.


1aii)
i)Coaxial cable
ii)Optical fiber cable
iii)Patch cable
1b)
Very Small Aperture Terminal

1c)
-An e-mail address is used to receive e-mail messages and is under the
nomenclature:
Nameofyourchoice@domain.com
-website URL is an IP address in text resolved by your DNS server and often has nomenclature like this: www.nameofyourchoice.com
1cii)
i)www.gmail.com
ii)yourname@gmail.com

===============
2ai)
A computer virus is a malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be”infected”.

2aii)
i)Resident Viruses
ii)Multipartite Viruses
iii)Direct Action Viruses

2b)
i)Vulnerabilities and attacks-s a system susceptibility or law, and many vulnerabilities are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating
vulnerabilities as they are discovered.
ii)Backdoors-in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls.
iii)Denial-of-service attack-are designed to make a machine or network resource unavailable to its intended users.
Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of a machine or network and block all users at once.
iv)Eavesdropping- is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers.
v)Privilege escalation-describes a situation where an attacker with some level of restricted access is able to, without authorization, elevate their privileges or
access level.

Keep Refreshing
Keep Refreshing
Keep Refreshing

No comments:

Post a Comment