JAMB Computer Science Past Questions & Answers - Page 17

81.

The following are the methods of file security except

A.

hacking

B.

use of password

C.

Use of back up

D.

Use of Anti-virus

Correct answer is A

The methods of file security are
- Use of back-ups
- Use of anti-virus
- Password
- Proper label of storage devices

82.

What protocol is used between Email servers?

A.

SMTP

B.

SNMP

C.

FTP

D.

POP

Correct answer is A

The Simple Mail Transfer Protocol is an internet standard communication protocol for electronic mail transmission

83.

A set of programs that direct computers to perform specific information processing activities for end users is

A.

System software

B.

Operating System

C.

Application software

D.

Translators

Correct answer is C

Application software is the set of programs necessary to carry out operations for a specified application

84.

What is the function of the escape key ?

A.

to shutdown the computer

B.

to start an application

C.

to interrupt or cancel the current process or running program

D.

to delete a file/folder

Correct answer is C

Escape key can perform various functions like interrupting or cancelling the current process or running program or close a pop-up window

85.

A type of application software that combines the abilities of several general purpose applications in one program is ?

A.

Graphics Packages

B.

Integrated Packages

C.

Multipurpose application

D.

Database management packages

Correct answer is B

Integrated Packages is an all-in-one application package that includes word processing, spreadsheet, database manager, graphics and communications