April 29, 2019
0 comment
*2019 WAEC COMPUTER STUDIES ANSWERS*
+++++++++++++++++++
*YOU ARE TOLD TO ANSWER ONLY THREE QUESTIONS.*
*2019 wassce computer study obj*✍✍
1-10 - DCABBAACCD
11-20 - CBADCCAADA
21-30 - BBDAACABBA
31-40 - DDCBCCADCB
41-50 - ABBDACCAAD
completed✔
100% verified
π₯π₯π₯π₯π₯π₯π₯π₯
1a. Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
1ii.
a) Run defragmentation
b) Run anti-spyware
1bi. Feasibility Study: The purpose of this first phase is to find out the scope of the problem and determine solutions. Resources, cost, time, benefits and other items should be considered here.
1bii System Design: This third phase describes, in details, the necessary specifications, features and operations that will satisfy the functional requirements of the proposed system which will be in place
1biii. Maintenance: The last phase is when end users can fine-tune the system, if they wish, to boost performance, add new capabilities or meet additional user requirements.
=======
(2a)
(i) Add all basic details to every song (ie tag) : title, artist, album name, album artist, track number, year, genre
(ii) Add artwork for every track
(iii) Add lyrics for every track
(iv) Add genre category to each track
(2b)
(i) Copy
(ii) Move
(2c)
(i) file: is a computer resource for recording data discretely in a computer storage device. In other words Just as words can be written to paper, so can information be written to a computer file. Files can be edited and transferred through the internet
(ii) record: is a collection of fields, possibly of different data types, typically in fixed number and sequence.
=======
(3ai)
A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device.
(3aii)
Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.
(3bi)
For 2kb
1 byte = 8 bits.
1 Kilobyte = 8 x 10³ Bits.
1 Kilobyte = 8 x 1000 Bits.
1 KB = 8000 bits.
.:. 2kb = 8000 x 2 = 16,000bits
For 2mb
1mb = 1000kb
.:. 2mb = 2000kb
Where 1kb = 8000 bits,
Then to find 2000kb in bits
= 8000 x 2000
=16,000,000 bits
(3bii)
The total storage of the two devices in bits = 16,000 + 16,000,000
= 16,016,000 bits
.:. Changing to bytes
= 8 bits = 1 byte
.:. 16,016,000 bits = ?
= 2,002,000 bytes
=======
(4ai)
Flowchart
(4aii)
I= terminator
J= input/output
K= decision
L= processing
(4bi)
Document stage is one of the most important activity in the system development life cycle that ensure the continuity of the system
(4bii)
(i) portability
(ii) readability
(iii) flexibility
(iv) efficiency
(v) structural
4.bii
Characteristics of Computer
SPEED : In general, no human being can compete to solving the complex computation, faster than computer.
ACCURACY : Since Computer is programmed, so what ever input we give it gives result with accuratly.
STORAGE : Computer can store mass storage of data with appropriate formate.
DILIGENCE : Computer can work for hours without any break and creating error.
VERSATILITY : We can use computer to perform completely different type of work at the same time.
POWER OF REMEMBERING : It can remember data for us.
NO IQ : Computer does not work without
======
5a)
encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor.
5aii
Biometric
Password
5aiii
Encryption hides your data from curious eyes
Prevents unwanted access to documents and e-mail messages
ANSWERS LOADING…
Do You Also Need Runs For WAEC Computer Then Pay N800 OR instead pay N4,500 9subjects
U CAN ALSO SUBSCRIBE TO GET YOUR OBJ ANSWERS AS TEXT MESSAGE DIRECTLY TO YOUR MOBILE PHONE {SEND UR MTN AIRTIME AS TEXT, FOLLOWED BY UR MOBILE NUMBER TO 08170764699..
THEN WAIT PATIENTLY FOR UR ANSWERS
+++++++++++++++++++
*YOU ARE TOLD TO ANSWER ONLY THREE QUESTIONS.*
*2019 wassce computer study obj*✍✍
1-10 - DCABBAACCD
11-20 - CBADCCAADA
21-30 - BBDAACABBA
31-40 - DDCBCCADCB
41-50 - ABBDACCAAD
completed✔
100% verified
π₯π₯π₯π₯π₯π₯π₯π₯
1a. Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
1ii.
a) Run defragmentation
b) Run anti-spyware
1bi. Feasibility Study: The purpose of this first phase is to find out the scope of the problem and determine solutions. Resources, cost, time, benefits and other items should be considered here.
1bii System Design: This third phase describes, in details, the necessary specifications, features and operations that will satisfy the functional requirements of the proposed system which will be in place
1biii. Maintenance: The last phase is when end users can fine-tune the system, if they wish, to boost performance, add new capabilities or meet additional user requirements.
=======
(2a)
(i) Add all basic details to every song (ie tag) : title, artist, album name, album artist, track number, year, genre
(ii) Add artwork for every track
(iii) Add lyrics for every track
(iv) Add genre category to each track
(2b)
(i) Copy
(ii) Move
(2c)
(i) file: is a computer resource for recording data discretely in a computer storage device. In other words Just as words can be written to paper, so can information be written to a computer file. Files can be edited and transferred through the internet
(ii) record: is a collection of fields, possibly of different data types, typically in fixed number and sequence.
=======
(3ai)
A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device.
(3aii)
Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.
(3bi)
For 2kb
1 byte = 8 bits.
1 Kilobyte = 8 x 10³ Bits.
1 Kilobyte = 8 x 1000 Bits.
1 KB = 8000 bits.
.:. 2kb = 8000 x 2 = 16,000bits
For 2mb
1mb = 1000kb
.:. 2mb = 2000kb
Where 1kb = 8000 bits,
Then to find 2000kb in bits
= 8000 x 2000
=16,000,000 bits
(3bii)
The total storage of the two devices in bits = 16,000 + 16,000,000
= 16,016,000 bits
.:. Changing to bytes
= 8 bits = 1 byte
.:. 16,016,000 bits = ?
= 2,002,000 bytes
=======
(4ai)
Flowchart
(4aii)
I= terminator
J= input/output
K= decision
L= processing
(4bi)
Document stage is one of the most important activity in the system development life cycle that ensure the continuity of the system
(4bii)
(i) portability
(ii) readability
(iii) flexibility
(iv) efficiency
(v) structural
4.bii
Characteristics of Computer
SPEED : In general, no human being can compete to solving the complex computation, faster than computer.
ACCURACY : Since Computer is programmed, so what ever input we give it gives result with accuratly.
STORAGE : Computer can store mass storage of data with appropriate formate.
DILIGENCE : Computer can work for hours without any break and creating error.
VERSATILITY : We can use computer to perform completely different type of work at the same time.
POWER OF REMEMBERING : It can remember data for us.
NO IQ : Computer does not work without
======
5a)
encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor.
5aii
Biometric
Password
5aiii
Encryption hides your data from curious eyes
Prevents unwanted access to documents and e-mail messages
_________________________________________________________________________________
_________________________________________________________________________________
ANSWERS LOADING…
Do You Also Need Runs For WAEC Computer Then Pay N800 OR instead pay N4,500 9subjects
U CAN ALSO SUBSCRIBE TO GET YOUR OBJ ANSWERS AS TEXT MESSAGE DIRECTLY TO YOUR MOBILE PHONE {SEND UR MTN AIRTIME AS TEXT, FOLLOWED BY UR MOBILE NUMBER TO 08170764699..
THEN WAIT PATIENTLY FOR UR ANSWERS
Waec 2019 DATA PROCESSING Answers – May/June Runz Expo
Welcome, Are you among those sitting for
2019 WASSCE (May/June WAECExam)? Are you among those
searching for 2019 waec
expo .
2019 WASSCE (May/June WAECExam)? Are you among those
searching for 2019 waec
expo .
Follow the steps below to get
the live Questions and Answers at least Six
(3-4) hours before your exam
time.
the live Questions and Answers at least Six
(3-4) hours before your exam
time.
SUBSCRIPTION FEE PER SUBJECT
- Text Message/obj: #300 MTN
CARD - Password/Online
Answers: #800 MTN CARD - WhatsApp Message: #600
MTN CARD
OUR DELIVERY PATTERN
- Text Message: In this package,
we send Answers to your phone inbox via
SMS obj only. - WhatsApp Message: In this
package, we add you to an answer broadcast
on WhatsApp were we will post answers to
you. - Password/Online Answers: In this
package we send you the password to unlock
an answer page and access your
answers.
HOW TO SUBSCRIBE OR MAKE PAYMENT
Send
- Your Name,
- Subject Name (e.g
Marketing), - MTN Recharge Card Pin(s)
and - Your Phone Number to
08170764699
Please don’t call, just send us text
message, We don’t attend
to calls because of too many calls. We are
always busy.
message, We don’t attend
to calls because of too many calls. We are
always busy.
No Free Answer will be Posted here at All,
So Subscribe Now and Get Your Answers In The Night Or latest 5hours Before Exam.
So Subscribe Now and Get Your Answers In The Night Or latest 5hours Before Exam.
Keep your recharge cards safe
until you receive a confirmation
message.
Make your examination with this help desk without stressing yourself.until you receive a confirmation
message.
YOUR ANSWERS ARE LOADING KEEP ON REFRESHING EVERY 2MINUTES OR CLICK ON THE HOME BUTTON BELOW TO REFRESH!!! WE ARE ATTEND
0 Response to "WAEC 2019 COMPUTER EXPO"
Post a Comment
DROP YOUR COMMENTS HERE