JAMB Computer Science Past Questions & Answers - Page 39

191.

___________ is when someone steals another persons identity.

A.

Cyber bullying

B.

Identity Theft

C.

Identity Phase

D.

Cyber Know How

Correct answer is B

Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964

192.

What is the etiquette one should follow while working online?

A.

Anything goes . . . providing he/she remains anonymous

B.

Netflix

C.

Netiquette

D.

Piracy

Correct answer is C

Netiquette, which is a portmanteau of "net" and "etiquette," refers to using courtesy and politeness when communicating with others online

193.

An Operating System is a type of?

A.

Application Software

B.

System software

C.

Utility Program

D.

None of these

Correct answer is B

An operating system (OS) is a system software that manages computer hardware, software resources, and provides common services for computer programs

194.

What does an Operating System do?

A.

Memory Management

B.

File Management

C.

Application Management

D.

All of the above

Correct answer is D

Operating System (OS) is a program that manages a computer's resources, especially the allocation of those resources among other programs. Typical resources include the central processing unit (CPU), computer memory, file storage, input/output (I/O) devices, and network connections

195.

What is the permanent memory built into your computer called?

A.

RAM

B.

ROM

C.

CPU

D.

CD-ROM

Correct answer is B

ROM is an acronym for Read-Only Memory. It refers to computer memory chips containing permanent or semi-permanent data. Unlike RAM, ROM is non-volatile; even after you turn off your computer, the contents of ROM will remain. Almost every computer comes with a small amount of ROM containing the boot firmware