JAMB Computer Science Past Questions & Answers - Page 24

116.

Sensitive data can be protected from prying eyes using _________

A.

File permissions

B.

File locks

C.

passwords

D.

encryption

Correct answer is A

A File permission specifies who and what can read, write, modify and access them. It therefore important as the codex explains, because without it in place, anyone or anything can access confidential files

117.

Running other software on idle computer without the knowledge of the organisation is called theft of ___________

A.

Software

B.

computer

C.

computer time

D.

use

Correct answer is C

Computer time theft is hacking into a large computer system and utilising its computing resources for a purpose not authorised by the owner of the system

118.

Which of the following software can't be categorized as an application software?

A.

DBM

B.

MS-DOS

C.

Spreadsheet

D.

word processor

Correct answer is B

MS-DOS can't be classified as an application software because, it is an operating system software. And OS are classified as system software not application software

119.

A half byte is known as ________

A.

data

B.

bit

C.

half byte

D.

nibble

Correct answer is D

A nibble is a 4 bit aggression, or half an octet. It has 16 possible values, and can be represented by a single hexadecimal digit which are called hex digit

120.

Which of the memories must be refreshed many times per second?

A.

EPROM

B.

ROM

C.

Static RAM

D.

Dynamic RAM

Correct answer is D

Dynamic RAM memory must be refreshed many times a second because without it being refreshed often, it will lose the data contents it holds